2025-01-26 01:04:26,457:DEBUG:certbot._internal.main:certbot version: 1.6.0
2025-01-26 01:04:26,457:DEBUG:certbot._internal.main:Arguments: []
2025-01-26 01:04:26,457:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2025-01-26 01:04:27,416:DEBUG:certbot._internal.log:Root logging level set at 20
2025-01-26 01:04:27,416:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2025-01-26 01:04:27,467:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x048E9110> and installer <certbot._internal.cli.cli_utils._Default object at 0x048E9110>
2025-01-26 01:04:27,517:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-26 01:04:27,753:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:04:27,755:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2025-01-26 01:04:27,759:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2025-01-26 01:04:27,769:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-01-26 01:04:27,774:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:04:27,822:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-26 01:04:28,003:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:04:28,004:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is signed by the certificate's issuer.
2025-01-26 01:04:28,005:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD
2025-01-26 01:04:28,011:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-01-26 01:04:28,015:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:04:28,056:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-26 01:04:28,257:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:04:28,259:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2025-01-26 01:04:28,260:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2025-01-26 01:04:28,265:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-01-26 01:04:28,269:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:04:28,315:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-01-26 01:04:28,529:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:04:28,531:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is signed by the certificate's issuer.
2025-01-26 01:04:28,532:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD
2025-01-26 01:04:28,536:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-01-26 01:04:28,540:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:04:28,597:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-26 01:04:28,777:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:04:28,779:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert22.pem is signed by the certificate's issuer.
2025-01-26 01:04:28,780:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD
2025-01-26 01:04:28,786:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-01-26 01:04:28,791:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:04:28,834:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-01-26 01:04:29,037:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:04:29,038:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-01-26 01:04:29,040:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-01-26 01:04:29,045:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:13:49 UTC.
2025-01-26 01:04:29,045:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-26 01:04:29,046:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:04:29,052:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x043413B0>
Prep: True
2025-01-26 01:04:29,053:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x043413B0> and installer None
2025-01-26 01:04:29,054:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-26 01:04:29,070:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-26 01:04:29,071:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-26 01:04:29,074:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-26 01:04:29,523:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-26 01:04:29,523:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:04:31 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "SuLnYnLF8Ug": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-26 01:04:29,524:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-26 01:04:39,927:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8913_key-certbot.pem
2025-01-26 01:04:49,508:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8911_csr-certbot.pem
2025-01-26 01:04:49,509:DEBUG:acme.client:Requesting fresh nonce
2025-01-26 01:04:49,509:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-26 01:04:49,658:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-26 01:04:49,659:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:04:51 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Z6auUXuuNvihsfphzx_K46IpBNvzkg_ZRjT9nd31hMC1MqSt9bs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-26 01:04:49,659:DEBUG:acme.client:Storing nonce: Z6auUXuuNvihsfphzx_K46IpBNvzkg_ZRjT9nd31hMC1MqSt9bs
2025-01-26 01:04:49,660:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-26 01:04:49,668:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVOdmloc2ZwaHp4X0s0NklwQk52emtnX1pSalQ5bmQzMWhNQzFNcVN0OWJzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "uebqD2e2BM8T9x3qBjyL2naavy3uLBqjMOXJYHzU0bu5_kYa01VYLCHyf3Fl7kiWxZwbjMxi0jnnHzWPvl9_7rKB9YPOUA1fTbjq2p1owDfoD5x7uXaJTfwskGKMmRzAEkKgd9X_gDecrXh9YQ_Krm-TH-2ZNjKtle1m1CgO0Ibg9VB3Mo4Sp-3tfJNT0xrvSNh8L14_eGJTCkIYtKl28ELgoAwd875xDbHEI1VwNTkIZRosS3thFq61DZJ-fdrlmAR1qBuKSoumbBNyCRArwpPlKKWvxjY22Ymyn9r4OhAzxdGVbarpgDRvhLzmsUZ_psIE1MgaEF2Ab3O9d03yvg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-01-26 01:04:49,917:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2025-01-26 01:04:49,918:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 26 Jan 2025 00:04:51 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140171795
Replay-Nonce: KY2mD_AjzyKe4bO5K4awtl2p6HcjZSgOdg_bbMYesViKKVC4nVA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:50:04Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464853999535"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140171795"
}
2025-01-26 01:04:49,918:DEBUG:acme.client:Storing nonce: KY2mD_AjzyKe4bO5K4awtl2p6HcjZSgOdg_bbMYesViKKVC4nVA
2025-01-26 01:04:49,918:DEBUG:acme.client:JWS payload:
b''
2025-01-26 01:04:49,925:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464853999535:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWp6eUtlNGJPNUs0YXd0bDJwNkhjalpTZ09kZ19iYk1ZZXNWaUtLVkM0blZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTM5OTk1MzUifQ",
  "signature": "RYLKoBE0VP4rUMGC419BpR-Z4cfpMKuOyRT8q2NgmKUEsvNx6a21RJfhs9aVq8Hk-Kc7Gg2SlfP8nrH7mgHHBqlkL5PANTkfVaT2BDa1HHv_VwQZDd1OL2TCQPxpmhrtsUE9pfWxCQ6REtolqTW2lPdOhBhWnDP_Ez933AwCrbZtnxQ_XQ7LCz1w3LIFNDh_yb38IFmHpVmiHQzO2wDlth0JWOePu0RiHFdppc9OtZ_ncCSei9R2eOZJdbUYtAeY1V5jeJ8vnd_NMo3nZ8HRtoM4h4x3oDZLC0dOpIO36AhsZ7-NLcU8E1_VwqYLhOYbt2Ki5vedI9ub--4sRLhs4g",
  "payload": ""
}
2025-01-26 01:04:50,103:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464853999535 HTTP/1.1" 200 823
2025-01-26 01:04:50,104:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:04:51 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Z6auUXuuGQnTXwf5hgBoMss_4NOrEV3KAtx-wCE7yQOHIm-JPFE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:50:04Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/Gzz9fw",
      "status": "pending",
      "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/_gvNVQ",
      "status": "pending",
      "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/PVUjPA",
      "status": "pending",
      "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ"
    }
  ]
}
2025-01-26 01:04:50,104:DEBUG:acme.client:Storing nonce: Z6auUXuuGQnTXwf5hgBoMss_4NOrEV3KAtx-wCE7yQOHIm-JPFE
2025-01-26 01:04:50,105:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-26 01:04:50,105:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2025-01-26 01:04:50,107:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-26 01:04:50,107:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-26 01:04:50,110:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:04:50,110:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-26 01:04:50,110:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-26 01:04:50,111:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-26 01:04:50,114:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:04:50,158:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-26 01:04:50,371:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:04:50,372:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2025-01-26 01:04:50,373:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2025-01-26 01:04:50,379:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:20 UTC.
2025-01-26 01:04:50,380:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-26 01:04:50,380:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:04:50,385:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048F1B10>
Prep: True
2025-01-26 01:04:50,386:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048F1B10> and installer None
2025-01-26 01:04:50,386:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-26 01:04:50,391:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-26 01:04:50,392:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-26 01:04:50,394:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-26 01:04:50,854:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-26 01:04:50,855:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:04:52 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "6HJOTJhP-4w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-26 01:04:50,855:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-26 01:05:00,685:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8914_key-certbot.pem
2025-01-26 01:05:09,446:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8912_csr-certbot.pem
2025-01-26 01:05:09,446:DEBUG:acme.client:Requesting fresh nonce
2025-01-26 01:05:09,447:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-26 01:05:09,597:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-26 01:05:09,598:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:05:11 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: KY2mD_Aj3nrj47BSqwv93dVoDtNdlq3vh63IFgsDnncOiE_oDJ0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-26 01:05:09,599:DEBUG:acme.client:Storing nonce: KY2mD_Aj3nrj47BSqwv93dVoDtNdlq3vh63IFgsDnncOiE_oDJ0
2025-01-26 01:05:09,599:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-26 01:05:09,605:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWozbnJqNDdCU3F3djkzZFZvRHROZGxxM3ZoNjNJRmdzRG5uY09pRV9vREowIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ZoMIpoGk7_3lhiA5zsHCsA8eXYteYk1KzoYuvJXDQRfqUpVXKdNcQs1aAwxTFpqv8i4gYB1Nxv82MwUa2hiYK5EhYhm5MRfqpjyz69SsczS5IgQi-g7u0-ySNTYLLNqOWcS2aq7NcVz-WfX97Wgu-LXGl9jsQ-k1Oe-tIE-YuK49oPBIpbTiGuZCR1T-xFS6Hp1-ciklk8HWMSJCiZgm1VrzEXDrOj3bYyhtlKj6TMU3S9mg31SQZzWgWH_Yfie0NXUG3lXAk3nypqQYqSljEm2wDIO0ioZIab9niyGD9wuCPi1Y4Y5s9aZiO-lX_WuxqoOD2tCZisTYXpFG9tRPqQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2025-01-26 01:05:09,804:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355
2025-01-26 01:05:09,805:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 26 Jan 2025 00:05:11 GMT
Content-Type: application/json
Content-Length: 355
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140234075
Replay-Nonce: KY2mD_Aj4izui4_B_Pq3aGPSaHjsT6chsuIvAdAgVaUynkKQlFo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:50:18Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854097235"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140234075"
}
2025-01-26 01:05:09,805:DEBUG:acme.client:Storing nonce: KY2mD_Aj4izui4_B_Pq3aGPSaHjsT6chsuIvAdAgVaUynkKQlFo
2025-01-26 01:05:09,805:DEBUG:acme.client:JWS payload:
b''
2025-01-26 01:05:09,813:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854097235:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWo0aXp1aTRfQl9QcTNhR1BTYUhqc1Q2Y2hzdUl2QWRBZ1ZhVXlua0tRbEZvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQwOTcyMzUifQ",
  "signature": "VEQA8jP9LhLhFmlSt48eJGAsppIrySIFEb3nzT7VCKzmVZLWL-h2t4cpU0eA71uMguAG1VKPdZD9WeS8wCUH1KrHFeFdD0xHDWWSpR4fEcbHsBeItZ0Vn_LTh4JAxypLlehf7x5WP7uI4AwKZdWo_2SHFwWN0SgGTsWz2lEJL0l5aWo19eavi5ktpk1FsV6chUrvPzT1VRBEth65nxx0XJ6u0Fd-YEMYaGbaqvMidFwgS8tcIqAAWVGkShvtDiqdCuBg7Mmp_wMQ1PSuqRtHixIKBs1iwiuurPSxR_F6xz5mhNU7lyLwCXS_MCUxh27RRV8bOctzhWPbH0BVPhsgaA",
  "payload": ""
}
2025-01-26 01:05:09,976:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854097235 HTTP/1.1" 200 827
2025-01-26 01:05:09,978:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:05:11 GMT
Content-Type: application/json
Content-Length: 827
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Z6auUXuud3EEfqhUMMszdC_YI3yQ0e-6rp0cne9eIiaxI_Ojl1w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:50:18Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/UT_D8g",
      "status": "pending",
      "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/UjHR1g",
      "status": "pending",
      "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/V5AJ-w",
      "status": "pending",
      "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ"
    }
  ]
}
2025-01-26 01:05:09,978:DEBUG:acme.client:Storing nonce: Z6auUXuud3EEfqhUMMszdC_YI3yQ0e-6rp0cne9eIiaxI_Ojl1w
2025-01-26 01:05:09,979:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-26 01:05:09,979:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2025-01-26 01:05:09,980:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-26 01:05:09,980:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-26 01:05:09,981:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:05:09,981:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-26 01:05:09,982:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-26 01:05:09,982:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-26 01:05:09,984:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:05:10,037:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-26 01:05:10,233:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:05:10,234:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is signed by the certificate's issuer.
2025-01-26 01:05:10,235:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is: OCSPCertStatus.GOOD
2025-01-26 01:05:10,240:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:51 UTC.
2025-01-26 01:05:10,241:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-26 01:05:10,241:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:05:10,248:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04B85CF0>
Prep: True
2025-01-26 01:05:10,248:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04B85CF0> and installer None
2025-01-26 01:05:10,248:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-26 01:05:10,255:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-26 01:05:10,256:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-26 01:05:10,259:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-26 01:05:10,758:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-26 01:05:10,758:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:05:12 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "CPZwZYZSiZM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-26 01:05:10,759:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-26 01:05:19,564:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8915_key-certbot.pem
2025-01-26 01:05:27,859:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8913_csr-certbot.pem
2025-01-26 01:05:27,860:DEBUG:acme.client:Requesting fresh nonce
2025-01-26 01:05:27,860:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-26 01:05:28,028:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-26 01:05:28,028:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:05:29 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qx2pCBNfKhHeSbsEXnHMke62ccidGOyfal-baNfJHwQARyDVqLY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-26 01:05:28,028:DEBUG:acme.client:Storing nonce: qx2pCBNfKhHeSbsEXnHMke62ccidGOyfal-baNfJHwQARyDVqLY
2025-01-26 01:05:28,028:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "helix.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-26 01:05:28,035:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZLaEhlU2JzRVhuSE1rZTYyY2NpZEdPeWZhbC1iYU5mSkh3UUFSeURWcUxZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "FwyheeEB71CCenBi4PJ5_7yRtqx-pqaypwQsvnBHGQQOcI9PUjiS1ZjmIyaq4hIZGmUndFAbqnVhw8LUvHxSrc5UGFC5JLdXZ86yEuW9DTBMycs8t9_aMVyyNJelu6wTQkdp1LZa3FjG-HZwlADefzz88nXo3Kou2Pq7fPnY86VKdkpTXuQ85Q_hqSKodiCvSxrW-BJNxrCOvXw1gfvaemb6rmBZ-a53NNadRb3NK1sDVF9Q-Q9kRz8AFynbc5QUeOWLRoWiOtZkHxhsG4EA-wsWNdzivGIJjPwUcfOT59UP38Y6KVV5nlKNZCy1R3IdhJtxvVlrHHkutkIzlTDV-g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2025-01-26 01:05:28,245:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353
2025-01-26 01:05:28,246:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 26 Jan 2025 00:05:30 GMT
Content-Type: application/json
Content-Length: 353
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140287525
Replay-Nonce: 5m-m03bOnovLTAtoh853930HG7hNMebJfleRaQagd5kO80aJ_Yw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:50:33Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "helix.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854177205"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140287525"
}
2025-01-26 01:05:28,246:DEBUG:acme.client:Storing nonce: 5m-m03bOnovLTAtoh853930HG7hNMebJfleRaQagd5kO80aJ_Yw
2025-01-26 01:05:28,247:DEBUG:acme.client:JWS payload:
b''
2025-01-26 01:05:28,254:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854177205:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9ub3ZMVEF0b2g4NTM5MzBIRzdoTk1lYkpmbGVSYVFhZ2Q1a084MGFKX1l3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQxNzcyMDUifQ",
  "signature": "ZsmY-DANP0xmFBhv96sHTHgD0r9EouhcOU5-wMexi48A58llq-YlbVaLZUm8wDTSDc3VwHusVuT3SxHJxesdQB-MjlOpC5_CFo3EixSeKzJi7qVu31P9liiZN9Vs0Mj8KwzU1_2qvnRumWft25nuD3qzcfFGqaPWVzFNRx7SnVmE4MHsqLlD9Cc7vgnBuaQrYufUJ0WKD0CzF-6SiHp2yIFo2efsbSi7Xws9TRe7kKfDRGufHajfoSdi4GQpB_RYi60UbC2zSra2E6VQtbrvYcXFGkL92SNgKhc-RNy4eKTi4Gj_n9Uf2A8Z9JwpMK48Buofxt0tmBhvxpxP5SinKA",
  "payload": ""
}
2025-01-26 01:05:28,428:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854177205 HTTP/1.1" 200 825
2025-01-26 01:05:28,430:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:05:30 GMT
Content-Type: application/json
Content-Length: 825
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qx2pCBNf1XNwJL_OpmHWuBNZlCJVLP4jbXxHUCSS9FTIRcpcHEs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "helix.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:50:33Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/rxXYJw",
      "status": "pending",
      "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/kFR0rA",
      "status": "pending",
      "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/kg1xTg",
      "status": "pending",
      "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0"
    }
  ]
}
2025-01-26 01:05:28,430:DEBUG:acme.client:Storing nonce: qx2pCBNf1XNwJL_OpmHWuBNZlCJVLP4jbXxHUCSS9FTIRcpcHEs
2025-01-26 01:05:28,431:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-26 01:05:28,432:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl
2025-01-26 01:05:28,432:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-26 01:05:28,433:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-26 01:05:28,434:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:05:28,434:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-26 01:05:28,434:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-26 01:05:28,435:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-26 01:05:28,436:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:05:28,480:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-26 01:05:28,679:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:05:28,682:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-01-26 01:05:28,683:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-01-26 01:05:28,690:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:13 UTC.
2025-01-26 01:05:28,691:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-26 01:05:28,691:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:05:28,698:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048CBAD0>
Prep: True
2025-01-26 01:05:28,698:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048CBAD0> and installer None
2025-01-26 01:05:28,699:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-26 01:05:28,706:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-26 01:05:28,707:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-26 01:05:28,710:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-26 01:05:29,147:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-26 01:05:29,147:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:05:30 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "SIWeW_FC3hE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-26 01:05:29,148:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-26 01:05:37,581:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8916_key-certbot.pem
2025-01-26 01:05:45,830:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8914_csr-certbot.pem
2025-01-26 01:05:45,830:DEBUG:acme.client:Requesting fresh nonce
2025-01-26 01:05:45,830:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-26 01:05:45,979:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-26 01:05:45,980:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:05:47 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Z6auUXuuqWrCPbtRWGKNT_cmRRZFyOq_Q2_B7BL6JmIqlqOgCiI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-26 01:05:45,980:DEBUG:acme.client:Storing nonce: Z6auUXuuqWrCPbtRWGKNT_cmRRZFyOq_Q2_B7BL6JmIqlqOgCiI
2025-01-26 01:05:45,980:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-26 01:05:45,987:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVxV3JDUGJ0UldHS05UX2NtUlJaRnlPcV9RMl9CN0JMNkptSXFscU9nQ2lJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "H091aM8LApx4goDy_jwN8Ig4jJp1-_IV_O2mjdgd4bgIM8CkM8mB8-7fyyoMk0DBSJVywLqcodm4wMlxSJA6kKGnFiQ5zLvOdupMqkRazJkelVysfK6ti34fKF4bPucWxmfbk3VbK4EWldxOIf2eJ6_cghok25xDe_-9rc1S-90qF30NgxR36J2JmNODqy7cDQBaEreQLWpXkzMt9PNOriHseFtrexDaQFCqV1VUijnokJihyyjrEX75fHES88iIHyGKcaIB1n_Dzk8k9SSSBDj2BHDiZnqjJCS5EspK1uLtkC95SGbkwug06fUkEvZJS6Ge9CaIMEAOyoLZoSlCfw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2025-01-26 01:05:46,213:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352
2025-01-26 01:05:46,214:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 26 Jan 2025 00:05:48 GMT
Content-Type: application/json
Content-Length: 352
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140337675
Replay-Nonce: Z6auUXuuTyVkuLwjgbp1oAJNkWG9Pp1IE3f7QuOsoGhcG_9RuAI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:50:47Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854251985"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140337675"
}
2025-01-26 01:05:46,214:DEBUG:acme.client:Storing nonce: Z6auUXuuTyVkuLwjgbp1oAJNkWG9Pp1IE3f7QuOsoGhcG_9RuAI
2025-01-26 01:05:46,214:DEBUG:acme.client:JWS payload:
b''
2025-01-26 01:05:46,220:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854251985:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVUeVZrdUx3amdicDFvQUpOa1dHOVBwMUlFM2Y3UXVPc29HaGNHXzlSdUFJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQyNTE5ODUifQ",
  "signature": "KQXX6ztfc0FzXOWd3s4Igw-6RxqHwF59hBBHP19EPETmaPzb_ZH5enW6gTaWgP3rbJOuFL9TlOnFroZELwGCgeieokfjOiYa1wH5BEhsi7tn1ST6C7_hk8NAijc4rFtwxKlnT-M6zzS3mJ9b8MH8Z3vF8xH0dXLEQaJ5I8soMddpggZe-iT9Lj-oiexH1JSd1wItl2iBwHrPIcY-ah0HTIiuDEQaMPXlmx5A0hEeUFd3Vo84yJSMEkMJK-8zYL79k0lzJkbZZGAhsWbPdCcenxZs3FH8Lh572WcQAVrEC9wiY77rffSz_j7E5js7WPhqb3WgKyAMTIzRb8toPBXrVA",
  "payload": ""
}
2025-01-26 01:05:46,388:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854251985 HTTP/1.1" 200 824
2025-01-26 01:05:46,389:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:05:48 GMT
Content-Type: application/json
Content-Length: 824
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Z6auUXuuYpSSa5XyI_EQYWmLfaBbX4ZOVerVps3uKhI_0uEIfb8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:50:47Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/BXlLPQ",
      "status": "pending",
      "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/5c2Euw",
      "status": "pending",
      "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/0MCU7A",
      "status": "pending",
      "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU"
    }
  ]
}
2025-01-26 01:05:46,389:DEBUG:acme.client:Storing nonce: Z6auUXuuYpSSa5XyI_EQYWmLfaBbX4ZOVerVps3uKhI_0uEIfb8
2025-01-26 01:05:46,391:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-26 01:05:46,391:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2025-01-26 01:05:46,392:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-26 01:05:46,392:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-26 01:05:46,393:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:05:46,393:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-26 01:05:46,393:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-26 01:05:46,394:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-26 01:05:46,395:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:05:46,445:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2025-01-26 01:05:46,445:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-26 01:05:46,445:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2025-01-26 01:05:46,453:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2025-01-26 01:05:46,454:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2025-01-26 01:05:46,455:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2025-01-26 01:05:46,455:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2025-01-26 01:05:46,455:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2025-01-26 01:05:46,457:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2025-01-26 01:05:46,501:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-26 01:05:46,709:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:05:46,710:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-01-26 01:05:46,711:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-01-26 01:05:46,715:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:35 UTC.
2025-01-26 01:05:46,716:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-26 01:05:46,716:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:05:46,721:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04355DB0>
Prep: True
2025-01-26 01:05:46,721:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04355DB0> and installer None
2025-01-26 01:05:46,721:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-26 01:05:46,738:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-26 01:05:46,739:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-26 01:05:46,742:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-26 01:05:47,225:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-26 01:05:47,225:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:05:49 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "0U-mY2iugic": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-26 01:05:47,226:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-26 01:05:55,828:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8917_key-certbot.pem
2025-01-26 01:06:04,068:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8915_csr-certbot.pem
2025-01-26 01:06:04,069:DEBUG:acme.client:Requesting fresh nonce
2025-01-26 01:06:04,069:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-26 01:06:04,231:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-26 01:06:04,231:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:06:06 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5m-m03bOcvWNQRu9GFomXIuc5s8w7a0oV_aWSSQNqB4EpVhclVU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-26 01:06:04,231:DEBUG:acme.client:Storing nonce: 5m-m03bOcvWNQRu9GFomXIuc5s8w7a0oV_aWSSQNqB4EpVhclVU
2025-01-26 01:06:04,232:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-26 01:06:04,238:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9jdldOUVJ1OUdGb21YSXVjNXM4dzdhMG9WX2FXU1NRTnFCNEVwVmhjbFZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "MzDXTcOsnEOAiO23xgesnYBWTfiE95FZ3CcjAHZqYo_9kpCp14lgaH2MaqDGlfy1FsOlpN4GCFHq8xFVQY9rsIiGd8bbeKEuAmKY7mJTu4nRScKyJ_1_isKxlLrZDvk1n3LGcZ1VUw1XSm0X4gkTmGOHh3Edobpav0o0XYgRyZuD5NvZMx2RHwKP1Dz3U1GXcNIIw6EI3qjPYCb_ay-9wrVUwWiY4vmi80xgltxZufT2srO_iaYJrg8uLfw1GCVj3zOWv-bzIb7V4fedvgLddqj19-2zgNu3CO9eEVCmjqzquo_j05gn0suyXEcH0lFbgmq5yUmLtfkUwwirVdeFew",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-01-26 01:06:04,430:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357
2025-01-26 01:06:04,431:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 26 Jan 2025 00:06:06 GMT
Content-Type: application/json
Content-Length: 357
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140387985
Replay-Nonce: qx2pCBNfp1RiB-UGQgnBmwXNQzC5A-QIViQXZK1xUlFg07PGMI8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:51:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854328725"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140387985"
}
2025-01-26 01:06:04,432:DEBUG:acme.client:Storing nonce: qx2pCBNfp1RiB-UGQgnBmwXNQzC5A-QIViQXZK1xUlFg07PGMI8
2025-01-26 01:06:04,432:DEBUG:acme.client:JWS payload:
b''
2025-01-26 01:06:04,440:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854328725:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZwMVJpQi1VR1FnbkJtd1hOUXpDNUEtUUlWaVFYWksxeFVsRmcwN1BHTUk4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQzMjg3MjUifQ",
  "signature": "qW97oK19gGzxfjd80juMf49Ye2g8I0E1USTOz7MZHGEDHfhEfSOOTKIG29ZYN-kv8lLY4GrZcf3B9xRkPjNGkPERKSnMYupSjzH-4Vmdb_eQ3nG-gzB9oXL4NhyXYS4qzG_1QIQBO1by9mzJaE0J-siglJjqpJ1eeLQvEFNdZs_ltWaLQa2phx84-JgOgcknFLXDLzuIsE8xczJrLG-1-IXAel8GM1dUdcXNsjDOXw2HIQN_0WNGoO5j5l6RDxINqAEzujZHqVyblHWixvcB43kCdplqY41tqLMAVTsPGsgy6NlIl9fM9xOHOX-1uz8K1DVrWaPkaBZvHCbbxgrtUg",
  "payload": ""
}
2025-01-26 01:06:04,606:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854328725 HTTP/1.1" 200 829
2025-01-26 01:06:04,607:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:06:06 GMT
Content-Type: application/json
Content-Length: 829
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qx2pCBNfxvyE5G59k9QNHOASPdn5M5-lkJi9pLTusIdh8Lr8Uho
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:51:01Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/F1PGXg",
      "status": "pending",
      "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/VqO_UQ",
      "status": "pending",
      "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/HpD31A",
      "status": "pending",
      "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI"
    }
  ]
}
2025-01-26 01:06:04,607:DEBUG:acme.client:Storing nonce: qx2pCBNfxvyE5G59k9QNHOASPdn5M5-lkJi9pLTusIdh8Lr8Uho
2025-01-26 01:06:04,608:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-26 01:06:04,608:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2025-01-26 01:06:04,609:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-26 01:06:04,609:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-26 01:06:04,610:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:06:04,610:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-26 01:06:04,611:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-26 01:06:04,611:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-26 01:06:04,612:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:06:04,665:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-01-26 01:06:04,861:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:06:04,863:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-01-26 01:06:04,864:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-01-26 01:06:04,869:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:05 UTC.
2025-01-26 01:06:04,869:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-26 01:06:04,870:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:06:04,875:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x00D29110>
Prep: True
2025-01-26 01:06:04,876:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x00D29110> and installer None
2025-01-26 01:06:04,876:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-26 01:06:04,881:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-26 01:06:04,882:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-26 01:06:04,884:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-26 01:06:05,384:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-26 01:06:05,385:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:06:07 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "XV1LObXNA7Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-26 01:06:05,386:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-26 01:06:13,688:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8918_key-certbot.pem
2025-01-26 01:06:21,660:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8916_csr-certbot.pem
2025-01-26 01:06:21,661:DEBUG:acme.client:Requesting fresh nonce
2025-01-26 01:06:21,661:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-26 01:06:21,828:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-26 01:06:21,829:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:06:23 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5m-m03bOe5MdT6uVJXTjeUY5U4ZchWirPq5VgjrkPL7yw8z05Bk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-26 01:06:21,829:DEBUG:acme.client:Storing nonce: 5m-m03bOe5MdT6uVJXTjeUY5U4ZchWirPq5VgjrkPL7yw8z05Bk
2025-01-26 01:06:21,830:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-26 01:06:21,838:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9lNU1kVDZ1VkpYVGplVVk1VTRaY2hXaXJQcTVWZ2pya1BMN3l3OHowNUJrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "a9dYXAvjeiuGnIPZzzwhQqEyW2eoO3ziGkorChbPmLT_BTIXCjK6F3TDwprcALlwvjFxmr09WjovbXVVra8zoX9YqkxN8CwvzUHrpq85F3dA1DqR6beV1eq5cas-AXfN36493i9trqev68kXJoggV13euJYtFqDhUE-zwriMB6FMe_qnCSP2aA3Q4kEBfsR2B2qxQZLoW4m0LRJvNmCXzxlWwh1xOhYLLtCPfbG-mLjJtAcbovV8F98V1z7bgIospsiWn9AK780dFUCg2tSKQkghu1J812M0Auk3wDF6hPoA_83dkod2Gk0NGqlTyu-0A5nWG5uQAngk3KYr1PUEwg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2025-01-26 01:06:22,043:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356
2025-01-26 01:06:22,044:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 26 Jan 2025 00:06:23 GMT
Content-Type: application/json
Content-Length: 356
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140450885
Replay-Nonce: 5m-m03bO2UfJyBR0XKiUrx3WO4mA4H43Wv3QIa0US6es3NhlwiQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:51:16Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854428445"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140450885"
}
2025-01-26 01:06:22,045:DEBUG:acme.client:Storing nonce: 5m-m03bO2UfJyBR0XKiUrx3WO4mA4H43Wv3QIa0US6es3NhlwiQ
2025-01-26 01:06:22,045:DEBUG:acme.client:JWS payload:
b''
2025-01-26 01:06:22,053:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854428445:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk8yVWZKeUJSMFhLaVVyeDNXTzRtQTRINDNXdjNRSWEwVVM2ZXMzTmhsd2lRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ0Mjg0NDUifQ",
  "signature": "p2DQ-RtfjEIZCKLuWzC0ziTMTH9e_7duFQRrwRUT7zRNBnrRaY5QO9O_dhZjNgV77dWX3Bsu45WXQIGW-t70iaVt8_BIT_pKauKhOSs-pCckMwP4EfSxcQvyFDBaVjiUIZv7oYH4UyR6Lupo6UmSFhmjQwhCB_Z1P_AhwOq0pkH8-yr68-pzxjLzEma6VvQpmXHEqfx7ZY6mdafbhOozZ-cFR9KP1Nt0LY-ZHRQizgl1JlDViBwBtMG5page9DVl5uH9wg-HW5nS9EUYDk5AHmQBKRu_6RPYG8suZw08wBKEK2QSdvVWABf5TGxwmUyRFVl-jQibh5gmFm4vU98F7w",
  "payload": ""
}
2025-01-26 01:06:22,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854428445 HTTP/1.1" 200 828
2025-01-26 01:06:22,227:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:06:24 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qx2pCBNffUyWQOjDhYawHLOde_ktKxzkhpwHzHf6sXX4nfKo7HE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:51:16Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/HO9jNQ",
      "status": "pending",
      "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/Ra9g4Q",
      "status": "pending",
      "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/tA2UdQ",
      "status": "pending",
      "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo"
    }
  ]
}
2025-01-26 01:06:22,227:DEBUG:acme.client:Storing nonce: qx2pCBNffUyWQOjDhYawHLOde_ktKxzkhpwHzHf6sXX4nfKo7HE
2025-01-26 01:06:22,228:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-26 01:06:22,228:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2025-01-26 01:06:22,229:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-26 01:06:22,229:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-26 01:06:22,230:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:06:22,230:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-26 01:06:22,231:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-26 01:06:22,231:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-26 01:06:22,233:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:06:22,287:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-26 01:06:22,493:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:06:22,495:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2025-01-26 01:06:22,496:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2025-01-26 01:06:22,500:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:33 UTC.
2025-01-26 01:06:22,500:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-26 01:06:22,501:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:06:22,509:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04BF23D0>
Prep: True
2025-01-26 01:06:22,509:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04BF23D0> and installer None
2025-01-26 01:06:22,510:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-26 01:06:22,515:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-26 01:06:22,515:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-26 01:06:22,517:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-26 01:06:22,955:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-26 01:06:22,956:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:06:24 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "hnw1IpqJ3yc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-26 01:06:22,957:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-26 01:06:31,241:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8919_key-certbot.pem
2025-01-26 01:06:39,175:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8917_csr-certbot.pem
2025-01-26 01:06:39,176:DEBUG:acme.client:Requesting fresh nonce
2025-01-26 01:06:39,176:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-26 01:06:39,323:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-26 01:06:39,323:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:06:41 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: KY2mD_Ajfj00FfBXIjwic_oOXNXOGyBlGr3Dn5fFZmBkTQar7AQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-26 01:06:39,324:DEBUG:acme.client:Storing nonce: KY2mD_Ajfj00FfBXIjwic_oOXNXOGyBlGr3Dn5fFZmBkTQar7AQ
2025-01-26 01:06:39,324:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-26 01:06:39,330:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWpmajAwRmZCWElqd2ljX29PWE5YT0d5QmxHcjNEbjVmRlptQmtUUWFyN0FRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "InCoQKGu-63DOyh4W_cLBkeIRFJjvv0AKPgS0l_JG50Q2OoTq35XZOeO91aMQA6sJ5Q9Cq3qT7_TSrX8AuJz5Zs3RqJOegOztepO-MfzkCKKBGgcOwHo6RICcvky4y0pq1WaG_u1jSBFNK6ZfGtSc0LmY8ura2WAoYiD9RC9BCMYTJNbCzN_Ite3qxruT4Z7s6dEvT8pYzRaiHAifiNX2_md6hVuVUC-p_cmRd2rFsZZUdRktrw-PFWwUr-Q3R11tqx3CmwSJB-dFEE6ui8yp-MPyvu4rfzg1EsjexAX2bYaFsqDZCxoftCaeayK1u8s4MeZCEbebCTK-U3KFkvyRg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2025-01-26 01:06:39,524:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355
2025-01-26 01:06:39,525:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 26 Jan 2025 00:06:41 GMT
Content-Type: application/json
Content-Length: 355
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140503565
Replay-Nonce: KY2mD_AjEnLGkbpV8KgJoBcZxZb7n4cynYCCiZ1LzzvsRed7ksM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:51:31Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854513645"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140503565"
}
2025-01-26 01:06:39,525:DEBUG:acme.client:Storing nonce: KY2mD_AjEnLGkbpV8KgJoBcZxZb7n4cynYCCiZ1LzzvsRed7ksM
2025-01-26 01:06:39,525:DEBUG:acme.client:JWS payload:
b''
2025-01-26 01:06:39,532:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854513645:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWpFbkxHa2JwVjhLZ0pvQmNaeFpiN240Y3luWUNDaVoxTHp6dnNSZWQ3a3NNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ1MTM2NDUifQ",
  "signature": "O_yyGvWWZl-BOSPXG41kXV80IE9bHeoJPNLEg71rAbw9A2p7_otS1AqvETvCF4vBdjkLKjyQLTT2GPXIUgWe88anpGd-NBSDq2Z_Te0rO_fZAQksC3MNmSkyXINeycPdqeSy36wE2uDPYwKL6Qg3U3kMkRv35Uzn2obqbnvOitGmx8uu7s-9gqf90obvCmDT57rynvACxfRwTQHu32xGSeVGGA40cljggdxS-MzfHu7lEaqGvEUtqmUSu_9gAYyOjHZEq1a4rDVa7aph9mhTI2CHThHZNFcgK21NVwRTORHV8e5FsY83LuAM7piizeHMBjy6dc87MXhx4vE1Zqckqg",
  "payload": ""
}
2025-01-26 01:06:39,709:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854513645 HTTP/1.1" 200 827
2025-01-26 01:06:39,710:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:06:41 GMT
Content-Type: application/json
Content-Length: 827
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Z6auUXuutss6BwzdijtKvWrlH8MMeAUYO32ZwjbqMuvYZP0Mb2c
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:51:31Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/YCt_0g",
      "status": "pending",
      "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/IJYfNQ",
      "status": "pending",
      "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/2DTePg",
      "status": "pending",
      "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0"
    }
  ]
}
2025-01-26 01:06:39,710:DEBUG:acme.client:Storing nonce: Z6auUXuutss6BwzdijtKvWrlH8MMeAUYO32ZwjbqMuvYZP0Mb2c
2025-01-26 01:06:39,711:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-26 01:06:39,711:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2025-01-26 01:06:39,712:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-26 01:06:39,712:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-26 01:06:39,714:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:06:39,714:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-26 01:06:39,715:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-26 01:06:39,716:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-26 01:06:39,718:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:06:39,763:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-01-26 01:06:39,962:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:06:39,964:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2025-01-26 01:06:39,966:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2025-01-26 01:06:39,971:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:54 UTC.
2025-01-26 01:06:39,971:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-26 01:06:39,972:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:06:39,978:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x00D29D10>
Prep: True
2025-01-26 01:06:39,978:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x00D29D10> and installer None
2025-01-26 01:06:39,978:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-26 01:06:39,983:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-26 01:06:39,984:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-26 01:06:39,986:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-26 01:06:40,470:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-26 01:06:40,471:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:06:42 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "wLSNPtcfw50": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2025-01-26 01:06:40,471:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-26 01:06:48,534:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8920_key-certbot.pem
2025-01-26 01:06:56,786:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8918_csr-certbot.pem
2025-01-26 01:06:56,787:DEBUG:acme.client:Requesting fresh nonce
2025-01-26 01:06:56,787:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-26 01:06:56,949:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-26 01:06:56,950:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:06:58 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5m-m03bOtQqItnoWOzh5MZPB9ypm5owvoVXGaKWj-cixcBXsBJ8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-26 01:06:56,951:DEBUG:acme.client:Storing nonce: 5m-m03bOtQqItnoWOzh5MZPB9ypm5owvoVXGaKWj-cixcBXsBJ8
2025-01-26 01:06:56,951:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-26 01:06:56,958:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk90UXFJdG5vV096aDVNWlBCOXlwbTVvd3ZvVlhHYUtXai1jaXhjQlhzQko4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Sb2OCMP2j6SIhCC5zAZasHDdl32j55aXOXTcyQnJ2rqStrNSWk61BLn2eLS93cWtQA8NiP2UxJg6EvLfYGipN9iQVu-Y9CBXaydNB9XUkYhcTsbQeyy75_I2gnf8Kbhhf1_Jt_y_EBAGase-ylKwGDvh2OCW26nbl2zhWnos8oeOug40yR5xSO9MVA97tleF94tm5jsp3ch7qMmno_JWyq_kavB7rXs7kh6dcsCo9pP3gNjwtEeVYx9EjnYLAHQ82DSFRkENBlwONFjP2Y0l-Co3Uj5dZN-szPBKuq762Un3sA8f4W3sem2m2NPMcfXrXQV64x-DZSKKHmJTxGsz5A",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-01-26 01:06:57,140:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2025-01-26 01:06:57,141:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 26 Jan 2025 00:06:58 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140552425
Replay-Nonce: qx2pCBNfbBWlV7p1bqFXF342sTFPryVjtuCjOHpshotJwl5pffk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:51:46Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854589515"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140552425"
}
2025-01-26 01:06:57,141:DEBUG:acme.client:Storing nonce: qx2pCBNfbBWlV7p1bqFXF342sTFPryVjtuCjOHpshotJwl5pffk
2025-01-26 01:06:57,142:DEBUG:acme.client:JWS payload:
b''
2025-01-26 01:06:57,148:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854589515:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZiQldsVjdwMWJxRlhGMzQyc1RGUHJ5Vmp0dUNqT0hwc2hvdEp3bDVwZmZrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ1ODk1MTUifQ",
  "signature": "sE6kyvm36irNsRNjCtnn2ML1AvyMJSBDB9Mo_pFTr1D9yUHzZBamIhuSRkWNXbZ1Kxe4SfNZ1sNrlgSxMWBzsUgxGeUNWFMViNQ2pmPxucsXJ_qke6g8UMwwFqA4UxvBgkdpLv-wcfn86i1UgSPN5rR8gOcl9RU6bb7ALfrwd3MWM646Jhv8zLA60JqeLitwBPDk-8ZTJxG2rZrQn3JhbfNdJlb_Q8u_CX1vQAKaSPUM7fMBLCvWM5Au1sh6JDFo5pxhKLINg-Bv7CUZ9lCCpj6VMSbLM0w2JaJ5WwjhelBQy_NG2OcTaFZ14aveF7HcPqN58vJobmpsvMOvf27JEg",
  "payload": ""
}
2025-01-26 01:06:57,328:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854589515 HTTP/1.1" 200 823
2025-01-26 01:06:57,328:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:06:59 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5m-m03bO9UsBifwfdfaBFrWgQppUxLcc5BaGjj4dBSO5IFlrFEk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:51:46Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/qQ_GAQ",
      "status": "pending",
      "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/0ytQ9g",
      "status": "pending",
      "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/MXV7zQ",
      "status": "pending",
      "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8"
    }
  ]
}
2025-01-26 01:06:57,329:DEBUG:acme.client:Storing nonce: 5m-m03bO9UsBifwfdfaBFrWgQppUxLcc5BaGjj4dBSO5IFlrFEk
2025-01-26 01:06:57,329:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-26 01:06:57,330:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2025-01-26 01:06:57,331:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-26 01:06:57,331:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-26 01:06:57,332:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:06:57,332:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-26 01:06:57,332:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-26 01:06:57,333:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-26 01:06:57,334:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:06:57,385:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-26 01:06:57,593:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:06:57,594:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-01-26 01:06:57,595:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-01-26 01:06:57,599:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:15 UTC.
2025-01-26 01:06:57,599:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-26 01:06:57,599:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:06:57,605:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x043529B0>
Prep: True
2025-01-26 01:06:57,605:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x043529B0> and installer None
2025-01-26 01:06:57,606:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-26 01:06:57,622:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-26 01:06:57,623:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-26 01:06:57,626:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-26 01:06:58,077:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-26 01:06:58,079:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:06:59 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "6W-XtS1M5as": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-26 01:06:58,079:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-26 01:07:06,714:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8921_key-certbot.pem
2025-01-26 01:07:14,851:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8919_csr-certbot.pem
2025-01-26 01:07:14,851:DEBUG:acme.client:Requesting fresh nonce
2025-01-26 01:07:14,851:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-26 01:07:15,012:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-26 01:07:15,012:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:07:16 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: KY2mD_AjWpEmMoToZ5vNzFLFJBFWcfUQrLqZPKj7CyMPVpRa69g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-26 01:07:15,013:DEBUG:acme.client:Storing nonce: KY2mD_AjWpEmMoToZ5vNzFLFJBFWcfUQrLqZPKj7CyMPVpRa69g
2025-01-26 01:07:15,013:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-26 01:07:15,021:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWpXcEVtTW9Ub1o1dk56RkxGSkJGV2NmVVFyTHFaUEtqN0N5TVBWcFJhNjlnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "nXdXi_bNtQZbCyTv1nLCwUN1vTBZgnOup-kwEQsT7bJLKXq6O3w3avkpAH_vJ1Xe4fIWl0-RcXKGmKqc64MREntnf7PNzACabHjRYLxvSD4B8O3y9A_sKepZfPR5JJk9s3mTHxzW92Rm_ZMQrS8lovr6Xb41fvzghMKdoruhfxfVwoWwpAClYEY9gsmEGi8LaS5hhCLD-u3rjq82w1_jClKg4NzBXOkqJ9QQlV6EGpRgExyUG301ViYlqxL6F_nXwpoVeCR9mb6w2WvtM88qQZiaQWyGcN2xOOlcB_aKfSj2htPh9FM1By1fKU9vmBnAwBOjHUzW9uM_RuUeqEZjxg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-01-26 01:07:15,260:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2025-01-26 01:07:15,261:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 26 Jan 2025 00:07:17 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140602055
Replay-Nonce: Z6auUXuuukNtuKlEn76vJZM_Sh56Gmhyksx34ecNPCfDXcx3oM4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:52:00Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854665835"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140602055"
}
2025-01-26 01:07:15,262:DEBUG:acme.client:Storing nonce: Z6auUXuuukNtuKlEn76vJZM_Sh56Gmhyksx34ecNPCfDXcx3oM4
2025-01-26 01:07:15,262:DEBUG:acme.client:JWS payload:
b''
2025-01-26 01:07:15,271:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854665835:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXV1a050dUtsRW43NnZKWk1fU2g1NkdtaHlrc3gzNGVjTlBDZkRYY3gzb000IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ2NjU4MzUifQ",
  "signature": "cbeO92kQrEK34GxMsEMwXYLh95eaXOwmt0I5kg4DfxcBZS0gqGAp9ho__0mGWXmzNJDhuW9PcYRdU-tZZl6UigwBXbW4wBCrboWh0PXnPFB6d0qBx3iCCGwsYtorfvRxurFxhjZxAV8vFeP5TbLRPV4fdAAJ3e8jF5trU0I4dep-UFivTinhTfJVxvvF524Z7AMBgGSONxhDCUTSAlzsC7ZgUv_w8jG33vHBXwcfvrzV6hnFZjW4W9EgXSKO2IapwD6nNrNosbQvqF5mDrfwl9f6MpiiWax13ymurOVAEuuioX5xuuw1PqyUm2M7AaZIu7rmv0Gxtcld8_xz-wp3fw",
  "payload": ""
}
2025-01-26 01:07:15,464:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854665835 HTTP/1.1" 200 823
2025-01-26 01:07:15,465:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:07:17 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Z6auUXuuS6p3TxkDoJEiBXi5Y3QXIciX_MU4qOHR9qZ59Lw8zwU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:52:00Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/A7xmXA",
      "status": "pending",
      "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/hkfxMA",
      "status": "pending",
      "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/VSa2Qg",
      "status": "pending",
      "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8"
    }
  ]
}
2025-01-26 01:07:15,465:DEBUG:acme.client:Storing nonce: Z6auUXuuS6p3TxkDoJEiBXi5Y3QXIciX_MU4qOHR9qZ59Lw8zwU
2025-01-26 01:07:15,465:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-26 01:07:15,466:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2025-01-26 01:07:15,466:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-26 01:07:15,467:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-26 01:07:15,467:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:07:15,467:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-26 01:07:15,467:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-26 01:07:15,468:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-26 01:07:15,469:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:07:15,523:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-01-26 01:07:15,722:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-26 01:07:15,724:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2025-01-26 01:07:15,726:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2025-01-26 01:07:15,731:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:38 UTC.
2025-01-26 01:07:15,731:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-26 01:07:15,732:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-26 01:07:15,740:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048E9710>
Prep: True
2025-01-26 01:07:15,741:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048E9710> and installer None
2025-01-26 01:07:15,741:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-26 01:07:15,746:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-26 01:07:15,747:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-26 01:07:15,750:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-26 01:07:16,250:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-26 01:07:16,251:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:07:18 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Fe9NtpF1KJs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-26 01:07:16,251:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-26 01:07:24,271:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8922_key-certbot.pem
2025-01-26 01:07:32,342:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8920_csr-certbot.pem
2025-01-26 01:07:32,342:DEBUG:acme.client:Requesting fresh nonce
2025-01-26 01:07:32,343:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-26 01:07:32,513:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-26 01:07:32,514:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:07:34 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5m-m03bOQ6KQLTBVJzR3ZBhQNhY10ud8Pi08xwaP4lN0kGsCa20
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-26 01:07:32,514:DEBUG:acme.client:Storing nonce: 5m-m03bOQ6KQLTBVJzR3ZBhQNhY10ud8Pi08xwaP4lN0kGsCa20
2025-01-26 01:07:32,514:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-26 01:07:32,522:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9RNktRTFRCVkp6UjNaQmhRTmhZMTB1ZDhQaTA4eHdhUDRsTjBrR3NDYTIwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "HtsHsCiYM-iLBHzn3qsRHoSydDRsDUJV_faZZ55R_N5fBUPSfvjH6ppS2LUXXetCBDvBjmWmPtivIz5tcZf89R0Nf3UuWxScZb_-oJifsaVGoeyC2_ImxRusSspdJ2Q8d-3F8amGVBQcdgoz1RYMzfBLtOnyCCzlQwW5f0CcnMgHmHohHzG-cmaZyPLXqSBm1Xt1Gc5zt2xkfaBUZW6kxGGL9nxg0fjHbqMl0zx2_YRUyV5zoBe5cYB6B4Php7kVg9wjAmCZOgqo8YzH9iNFO2mqg1kdw_wa7ZFF_qUhmofkmn6F0iEe9TlaXb1cYd2ZDswps1obZN0VfEz2ujx6UA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-01-26 01:07:32,722:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2025-01-26 01:07:32,723:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 26 Jan 2025 00:07:34 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140669395
Replay-Nonce: qx2pCBNf96FuI5JrNXhmOq_g4qIRiMlwF7Lpudgj6IUW1QGoBYk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:52:15Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854767445"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140669395"
}
2025-01-26 01:07:32,723:DEBUG:acme.client:Storing nonce: qx2pCBNf96FuI5JrNXhmOq_g4qIRiMlwF7Lpudgj6IUW1QGoBYk
2025-01-26 01:07:32,724:DEBUG:acme.client:JWS payload:
b''
2025-01-26 01:07:32,730:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854767445:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmY5NkZ1STVKck5YaG1PcV9nNHFJUmlNbHdGN0xwdWRnajZJVVcxUUdvQllrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ3Njc0NDUifQ",
  "signature": "oZEq0fyde2T7VNHKRbO5t5Qwcw_Hd_vNiSNORLOj9jGFXp6aSHN6a_hfEBAvmkelXs-CQSiqifnsUdnkGNmvz3MNytmUxWOqewfW3Y-m8BtBzyIUsfp7HtP2mh1Y2mUTaVNqfe9YVPQ3uWuX9za4K_JalXwERgr-cfs-Z9Br4ntIYbxXBFeSqcI38iNih8jupiDpmI9YafvXh1f2p94EHA-ZU5guZ_BuVcYmLLeo2cXBPr5wQdwwIY0vX6mYZIYW7SMabSbLXNTDdyC5zEcZwYV0woMDMVJMjKHDDpAajh0iIYFcT7Qm9GJ-hpbbIB8fjMxyp7F_S0J5bl9-SPl2Gw",
  "payload": ""
}
2025-01-26 01:07:32,902:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854767445 HTTP/1.1" 200 823
2025-01-26 01:07:32,903:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 26 Jan 2025 00:07:34 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5m-m03bOlePjopZ8fdG_QZ7yfJGLiqk6GAUyOwHy7jRToYSj7v8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:52:15Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/I_YfaQ",
      "status": "pending",
      "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/KFIdlQ",
      "status": "pending",
      "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/9iBbmQ",
      "status": "pending",
      "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k"
    }
  ]
}
2025-01-26 01:07:32,903:DEBUG:acme.client:Storing nonce: 5m-m03bOlePjopZ8fdG_QZ7yfJGLiqk6GAUyOwHy7jRToYSj7v8
2025-01-26 01:07:32,904:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-26 01:07:32,905:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2025-01-26 01:07:32,906:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-26 01:07:32,906:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-26 01:07:32,907:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:07:32,907:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-26 01:07:32,907:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-26 01:07:32,908:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-26 01:07:32,909:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-26 01:07:32,909:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2025-01-26 01:07:32,910:ERROR:certbot._internal.renewal:  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2025-01-26 01:07:32,911:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 11 renew failure(s), 0 parse failure(s)
2025-01-26 01:07:32,922:ERROR:certbot._internal.log:11 renew failure(s), 0 parse failure(s)