2025-01-25 17:41:24,127:DEBUG:certbot._internal.main:certbot version: 1.6.0
2025-01-25 17:41:24,128:DEBUG:certbot._internal.main:Arguments: []
2025-01-25 17:41:24,128:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2025-01-25 17:41:24,996:DEBUG:certbot._internal.log:Root logging level set at 20
2025-01-25 17:41:24,996:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2025-01-25 17:41:25,043:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x05067FF0> and installer <certbot._internal.cli.cli_utils._Default object at 0x05067FF0>
2025-01-25 17:41:25,089:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-25 17:41:25,306:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:41:25,308:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2025-01-25 17:41:25,313:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2025-01-25 17:41:25,322:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-01-25 17:41:25,327:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:41:25,392:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-25 17:41:25,578:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:41:25,580:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is signed by the certificate's issuer.
2025-01-25 17:41:25,580:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD
2025-01-25 17:41:25,585:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-01-25 17:41:25,592:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:41:25,641:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-25 17:41:25,824:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:41:25,826:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2025-01-25 17:41:25,827:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2025-01-25 17:41:25,832:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-01-25 17:41:25,836:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:41:25,876:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-01-25 17:41:26,084:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:41:26,086:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is signed by the certificate's issuer.
2025-01-25 17:41:26,087:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD
2025-01-25 17:41:26,091:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-01-25 17:41:26,094:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:41:26,165:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-25 17:41:26,370:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:41:26,371:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert22.pem is signed by the certificate's issuer.
2025-01-25 17:41:26,372:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD
2025-01-25 17:41:26,377:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-01-25 17:41:26,383:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:41:26,440:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-01-25 17:41:26,614:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:41:26,617:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-01-25 17:41:26,618:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-01-25 17:41:26,623:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:13:49 UTC.
2025-01-25 17:41:26,623:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-25 17:41:26,623:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:41:26,627:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04AE8AD0>
Prep: True
2025-01-25 17:41:26,628:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04AE8AD0> and installer None
2025-01-25 17:41:26,628:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-25 17:41:26,634:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-25 17:41:26,636:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-25 17:41:26,638:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-25 17:41:27,147:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-25 17:41:27,148:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:41:28 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "5G4AofZlDdE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-25 17:41:27,148:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-25 17:41:38,890:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8903_key-certbot.pem
2025-01-25 17:41:49,078:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8901_csr-certbot.pem
2025-01-25 17:41:49,079:DEBUG:acme.client:Requesting fresh nonce
2025-01-25 17:41:49,079:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-25 17:41:49,246:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-25 17:41:49,247:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:41:50 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5m-m03bO3HnoXdIWso8fSiUYmCrW4iWvsdSXvT0bf4wc2MKzXWQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-25 17:41:49,247:DEBUG:acme.client:Storing nonce: 5m-m03bO3HnoXdIWso8fSiUYmCrW4iWvsdSXvT0bf4wc2MKzXWQ
2025-01-25 17:41:49,247:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-25 17:41:49,257:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk8zSG5vWGRJV3NvOGZTaVVZbUNyVzRpV3ZzZFNYdlQwYmY0d2MyTUt6WFdRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "eUfGOSN8psLCrDft_IdjUAcwNaKf7QJJbDtejri_NPjklgXA1qmIGFz55jGKfDedAXl-NXg7b1rHcOOE2CEQ2bIKrimUyfd_BgKR6YpYpHN9NwDlrJ4B0NLHe9WPk3eEoWWL5z1_2GVsW5roGUBad_-qziO2NY_z8A28eHgSpfmBZGixPY4pVzLDwC_wZbgYZLlJa_cpR_8wCTLzxLlNX1k_uHOS9osLKeNQreAtUNq8yVUtnpbNQOr3RISrwuR0cIfd2DqlLS0-gfG1Hw4gO9ko_K0_aCA38eF11SG8L1_2FiifnFpZfNmxS2aWQvs8gdF3NNRgkuqJ6P_Ph1JBNw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-01-25 17:41:49,520:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2025-01-25 17:41:49,521:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Jan 2025 16:41:51 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140171795
Replay-Nonce: 5m-m03bOCEtDikwfuOGC3Jo1yMl0I4O_Hr_XfN9YA-2HuI0xMMo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:50:04Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464853999535"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140171795"
}
2025-01-25 17:41:49,522:DEBUG:acme.client:Storing nonce: 5m-m03bOCEtDikwfuOGC3Jo1yMl0I4O_Hr_XfN9YA-2HuI0xMMo
2025-01-25 17:41:49,522:DEBUG:acme.client:JWS payload:
b''
2025-01-25 17:41:49,530:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464853999535:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9DRXREaWt3ZnVPR0MzSm8xeU1sMEk0T19Icl9YZk45WUEtMkh1STB4TU1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTM5OTk1MzUifQ",
  "signature": "CyGnvDL4w1C5AjdDEH3rGq0WDMnVdXpAjJCVXDUnATyP3m7MzjThkCRLfdtmxIgkVFZjxVbnE43kIRl4S4dibAIN669H34LDPbF7l2TrbhrzPqj3nfwfe8NhC7DNOlpoZLK1mXt_ninzOsLLgJgjO-zR-i3Ur9qXWmUEq2MlRHCU_rk4gC8inzQCS8TmFQJw_VesyOHgI2ISXBqacKMfixtOA5ZlhADy2tXP9XSfQJhVJxBIQmG3s-I1tW4GZX2fEgTpyaGvcn-QibToTOSG0umcNB2DYtwrSsuxssqdcA8p4d-kLRW2vSqueiuZSblQILPPAW0m5Q7MSXtDgnRHcg",
  "payload": ""
}
2025-01-25 17:41:49,704:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464853999535 HTTP/1.1" 200 823
2025-01-25 17:41:49,705:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:41:51 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5m-m03bOBobhk1n3gxRpb5AItWC_ASUQ9b-9IjauQxUsrxKF1iE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:50:04Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/PVUjPA",
      "status": "pending",
      "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/_gvNVQ",
      "status": "pending",
      "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/Gzz9fw",
      "status": "pending",
      "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ"
    }
  ]
}
2025-01-25 17:41:49,705:DEBUG:acme.client:Storing nonce: 5m-m03bOBobhk1n3gxRpb5AItWC_ASUQ9b-9IjauQxUsrxKF1iE
2025-01-25 17:41:49,706:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-25 17:41:49,706:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2025-01-25 17:41:49,707:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-25 17:41:49,708:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-25 17:41:49,719:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:41:49,719:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-25 17:41:49,720:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-25 17:41:49,720:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-25 17:41:49,733:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:41:49,782:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-25 17:41:49,975:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:41:49,976:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2025-01-25 17:41:49,977:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2025-01-25 17:41:49,981:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:20 UTC.
2025-01-25 17:41:49,981:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-25 17:41:49,982:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:41:49,988:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05055070>
Prep: True
2025-01-25 17:41:49,988:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05055070> and installer None
2025-01-25 17:41:49,988:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-25 17:41:49,994:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-25 17:41:49,995:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-25 17:41:49,997:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-25 17:41:50,523:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-25 17:41:50,525:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:41:52 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "o2LEfefhjvE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-25 17:41:50,525:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-25 17:41:59,901:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8904_key-certbot.pem
2025-01-25 17:42:08,455:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8902_csr-certbot.pem
2025-01-25 17:42:08,456:DEBUG:acme.client:Requesting fresh nonce
2025-01-25 17:42:08,456:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-25 17:42:08,629:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-25 17:42:08,630:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:42:10 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qx2pCBNfwEQHPXVtbu-YE8pU_mdpLGRjly6WSY-0yxCjE1bTy7M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-25 17:42:08,630:DEBUG:acme.client:Storing nonce: qx2pCBNfwEQHPXVtbu-YE8pU_mdpLGRjly6WSY-0yxCjE1bTy7M
2025-01-25 17:42:08,631:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-25 17:42:08,638:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZ3RVFIUFhWdGJ1LVlFOHBVX21kcExHUmpseTZXU1ktMHl4Q2pFMWJUeTdNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "XmhjE1AMA_J21beXsRYPFSVMhFMBgCeoTs6usVRV-jrzrn1BjIajCUArzuVCmG-CBtgbZJ0DrNYAIjCMiyHA1rPhLuknzV5z__0t_B0mEL-3gzi2YgkSq3VmxWmeOornfAZrxiqUEsg3xc7tziVAu46lkICeyVj_65WJlX0qLrwqpKDkVXSIiU3q9OrRpmWL4aZhnncQoO9R7fTo1zXiw02F7zOxgTdRm9KEgdz1Wj-OGoXyLRCd0BYLMsvEegCTOR4Fk4PlyCIK8hje2rl2PyINfKIzyKWWbEfnN3z74rSe3ItbjFGWNskjrvioZ2IG8-THaXt2SkQJhtF_JNl37g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2025-01-25 17:42:08,836:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355
2025-01-25 17:42:08,837:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Jan 2025 16:42:10 GMT
Content-Type: application/json
Content-Length: 355
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140234075
Replay-Nonce: 5m-m03bOkvD4dgQrSkWwm362F7CwrLIgsNfDZJZWmNNsWxkrYd0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:50:18Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854097235"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140234075"
}
2025-01-25 17:42:08,837:DEBUG:acme.client:Storing nonce: 5m-m03bOkvD4dgQrSkWwm362F7CwrLIgsNfDZJZWmNNsWxkrYd0
2025-01-25 17:42:08,837:DEBUG:acme.client:JWS payload:
b''
2025-01-25 17:42:08,843:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854097235:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9rdkQ0ZGdRclNrV3dtMzYyRjdDd3JMSWdzTmZEWkpaV21OTnNXeGtyWWQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQwOTcyMzUifQ",
  "signature": "tl3qIHi8kMHULO-Uqz4YkPI1djImSbblvKjqqILXNvUMNdJu9Whx9ppm8_44X47-Yp-RqklsQ7PNMNYFPO_9UP7UvGfCHxn-kgSv8oOK0MxEmP3tQmwRsys7amk7Mt86avT9gguWoyloyq6YvSYq1CWYChPw_vPbGB6YDt5Alk3zWedS2f3MD3zYGRfeg5wPDu3K1fUAfhL2RCRP1o7kQiWPtC93tivsKV8aC40afA8Z8Qt5UhMsHvCIzFoXMhPUa5I0IXpW4jpy_faVJI0-RqJJWQT7U1eqTyzixJQQkCSSsBB2mqETOc1MvO8153Q6pXvJ7zlNJpNaar2_rRWqGQ",
  "payload": ""
}
2025-01-25 17:42:09,031:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854097235 HTTP/1.1" 200 827
2025-01-25 17:42:09,032:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:42:10 GMT
Content-Type: application/json
Content-Length: 827
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qx2pCBNfQfVdmMW1cKDdcUcTl1yBvHXO41HzwIbJxXSTOfmbjuA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:50:18Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/UjHR1g",
      "status": "pending",
      "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/V5AJ-w",
      "status": "pending",
      "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/UT_D8g",
      "status": "pending",
      "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ"
    }
  ]
}
2025-01-25 17:42:09,032:DEBUG:acme.client:Storing nonce: qx2pCBNfQfVdmMW1cKDdcUcTl1yBvHXO41HzwIbJxXSTOfmbjuA
2025-01-25 17:42:09,032:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-25 17:42:09,033:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2025-01-25 17:42:09,034:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-25 17:42:09,034:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-25 17:42:09,034:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:42:09,035:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-25 17:42:09,035:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-25 17:42:09,035:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-25 17:42:09,037:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:42:09,080:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-25 17:42:09,270:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:42:09,271:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is signed by the certificate's issuer.
2025-01-25 17:42:09,273:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is: OCSPCertStatus.GOOD
2025-01-25 17:42:09,280:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:51 UTC.
2025-01-25 17:42:09,281:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-25 17:42:09,281:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:42:09,288:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04AAE670>
Prep: True
2025-01-25 17:42:09,288:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04AAE670> and installer None
2025-01-25 17:42:09,288:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-25 17:42:09,295:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-25 17:42:09,297:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-25 17:42:09,300:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-25 17:42:09,754:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-25 17:42:09,755:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:42:11 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "WG16uaIpesg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-25 17:42:09,755:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-25 17:42:18,139:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8905_key-certbot.pem
2025-01-25 17:42:26,095:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8903_csr-certbot.pem
2025-01-25 17:42:26,095:DEBUG:acme.client:Requesting fresh nonce
2025-01-25 17:42:26,096:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-25 17:42:26,248:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-25 17:42:26,249:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:42:27 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: KY2mD_Ajm7J1INHdPhjfUlXIoM1Uafmv30AaxhvdmfGhHLzILOo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-25 17:42:26,249:DEBUG:acme.client:Storing nonce: KY2mD_Ajm7J1INHdPhjfUlXIoM1Uafmv30AaxhvdmfGhHLzILOo
2025-01-25 17:42:26,249:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "helix.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-25 17:42:26,258:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWptN0oxSU5IZFBoamZVbFhJb00xVWFmbXYzMEFheGh2ZG1mR2hITHpJTE9vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "x2OfSpgERToeLAvc4jeGIo6H-u0j57d0bFiggzqZUC6yI-7SssVMlGa3PonrpaDp1LTvqUd5gkL6jlQOPQ7JbHkBQD90qg1muSjuB1TWN2zcYuMV2yJJBJ4fnGHkLHkV2CVOfBafJtzpjqjy3RFzUjcOJw7BEk_vEyST9555axOcZB5T9kdb-xb7GeR_zsrZds1edzposI-wguZ3N_qjQLg6KC-tUSRSb5wz_nIyCNgh2a1DV2BRPCsA4iyvbhCddSdkhoSZBUFSqFnEqsfdyZrjYK-44AsBgbVXUStwXLTNxTSqlxE4dfqKt-gCuhKUzLMOmPLnAMa5kxOFLupHcg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2025-01-25 17:42:26,470:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353
2025-01-25 17:42:26,471:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Jan 2025 16:42:28 GMT
Content-Type: application/json
Content-Length: 353
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140287525
Replay-Nonce: KY2mD_AjzLe8mFNXS2hHLh6eXrjs70be1YCH6B6ZVTMUWANgXl0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:50:33Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "helix.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854177205"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140287525"
}
2025-01-25 17:42:26,471:DEBUG:acme.client:Storing nonce: KY2mD_AjzLe8mFNXS2hHLh6eXrjs70be1YCH6B6ZVTMUWANgXl0
2025-01-25 17:42:26,472:DEBUG:acme.client:JWS payload:
b''
2025-01-25 17:42:26,478:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854177205:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWp6TGU4bUZOWFMyaEhMaDZlWHJqczcwYmUxWUNINkI2WlZUTVVXQU5nWGwwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQxNzcyMDUifQ",
  "signature": "dZWdb3qR5zauvJltrW8MX9O2_-LlrpMfYIPTt53eNgiGqExSPc11JClYTIB7ySKjrqp11K5GpZvh58A9WkNwmo34LVDjH4iwmPFsb4o6bc3t6hXv4gYNMq5-AL70I9Fksm_bld_5HpdPAI2fDO2sac2C3gfePjJcm8iTatagrzuo6-GV_D5DOb2gf6U-PV9vM6aFvik0ODk6qNwW3IGeKg7HGWlz3FnbXSEodgMs5oI0bJHo2dqzSCdLlmnWySzRsUM9iI1z5ocl8gK8giS-T7SB-XdYGUR95soZd2isoxbFUth-7mGZx4OipHzqpIslawmpMaFMokInI0jDZj3Rbw",
  "payload": ""
}
2025-01-25 17:42:26,665:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854177205 HTTP/1.1" 200 825
2025-01-25 17:42:26,666:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:42:28 GMT
Content-Type: application/json
Content-Length: 825
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: KY2mD_AjFYgVD1Y-RsC97zYTyJIjNWZk87BOnGUr23Glkcyz4-M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "helix.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:50:33Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/kg1xTg",
      "status": "pending",
      "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/rxXYJw",
      "status": "pending",
      "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/kFR0rA",
      "status": "pending",
      "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0"
    }
  ]
}
2025-01-25 17:42:26,666:DEBUG:acme.client:Storing nonce: KY2mD_AjFYgVD1Y-RsC97zYTyJIjNWZk87BOnGUr23Glkcyz4-M
2025-01-25 17:42:26,667:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-25 17:42:26,667:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl
2025-01-25 17:42:26,668:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-25 17:42:26,668:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-25 17:42:26,669:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:42:26,669:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-25 17:42:26,669:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-25 17:42:26,670:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-25 17:42:26,671:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:42:26,728:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-25 17:42:26,937:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:42:26,939:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-01-25 17:42:26,940:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-01-25 17:42:26,945:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:13 UTC.
2025-01-25 17:42:26,946:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-25 17:42:26,946:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:42:26,953:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x050716F0>
Prep: True
2025-01-25 17:42:26,953:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x050716F0> and installer None
2025-01-25 17:42:26,954:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-25 17:42:26,959:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-25 17:42:26,960:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-25 17:42:26,962:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-25 17:42:27,460:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-25 17:42:27,461:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:42:29 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "2dLB1h66sMo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-25 17:42:27,461:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-25 17:42:35,868:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8906_key-certbot.pem
2025-01-25 17:42:43,815:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8904_csr-certbot.pem
2025-01-25 17:42:43,816:DEBUG:acme.client:Requesting fresh nonce
2025-01-25 17:42:43,816:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-25 17:42:43,984:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-25 17:42:43,984:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:42:45 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5m-m03bOPr8sFH8ImnBr8F7GWZtUc7maGrO0p44z_9di2QTgXBs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-25 17:42:43,985:DEBUG:acme.client:Storing nonce: 5m-m03bOPr8sFH8ImnBr8F7GWZtUc7maGrO0p44z_9di2QTgXBs
2025-01-25 17:42:43,985:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-25 17:42:43,991:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9QcjhzRkg4SW1uQnI4RjdHV1p0VWM3bWFHck8wcDQ0el85ZGkyUVRnWEJzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "fBnnlWYb-ABHfj9jUvHv_JZjOF_T3KUnFtQu6UNpfgcfNV-rT6XRVWG13nK9ogUTG2Pne1Xll_tur0viZBjTe6Vz-gEgXqSa4VmSRNW-tna73_1g6U05Svw68gHdMdBQgswzuvynhXGL9Uwpv1rvPednemn6dBxRRNQXWBflZK9B5vTGvSvzS5dsgJeaux-yjB-LmfV7BUs2_eFqncqrMNYmL2DdksPaOFmpqwz3oOyre23CzFQ3qLsE6x5kuPIyJ-a9vV2U1QhBb7sxaAlc6IkVDrh0hZoNc8d6isR1TcxgvDfPn8Pmw1wJnevQCe1hY-612mOIy6dUrjGFI9kfQQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2025-01-25 17:42:44,176:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352
2025-01-25 17:42:44,176:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Jan 2025 16:42:45 GMT
Content-Type: application/json
Content-Length: 352
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140337675
Replay-Nonce: qx2pCBNfLUd0oQTS2lm77sBsRNxSiNlXtkl_b3xXU5HxgJTFrBc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:50:47Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854251985"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140337675"
}
2025-01-25 17:42:44,177:DEBUG:acme.client:Storing nonce: qx2pCBNfLUd0oQTS2lm77sBsRNxSiNlXtkl_b3xXU5HxgJTFrBc
2025-01-25 17:42:44,177:DEBUG:acme.client:JWS payload:
b''
2025-01-25 17:42:44,186:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854251985:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZMVWQwb1FUUzJsbTc3c0JzUk54U2lObFh0a2xfYjN4WFU1SHhnSlRGckJjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQyNTE5ODUifQ",
  "signature": "pWHmdb28sH7Jq4ql3LP9tiAHRsU0a2CLuQODmT6k_Hf5tBXpxD7DK0aIaQc8coyn4dVbbgoBzG6QapOdXhNZPCbldGXOKgoalqg0o7buCIzka-QoyFUCmz2vninTTaSV_hBaBPoy5y6b8uKKXAzE8XCTQXSUqRZVkxf57FhmIABns6OWNJjDMEbGuKbY8Cacs-cJCyKQ3bEoqgtaMOd_gRI_wpwpmRImU3-yexjJux6gT0Cs0PRCQsiAkDK_C1ul8gJZ9y7QzFpgT0EABLTBylbDyefeyp4f1HIuJjof7EgN2oMBoWGhwl_DGneo3ibf3D_711UhBIssORkOCceR7w",
  "payload": ""
}
2025-01-25 17:42:44,359:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854251985 HTTP/1.1" 200 824
2025-01-25 17:42:44,360:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:42:46 GMT
Content-Type: application/json
Content-Length: 824
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5m-m03bOcJSCo6_FbVd-DHedKhpkWaoSzN2Fmtdy0odH3buaFr8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:50:47Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/0MCU7A",
      "status": "pending",
      "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/BXlLPQ",
      "status": "pending",
      "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/5c2Euw",
      "status": "pending",
      "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU"
    }
  ]
}
2025-01-25 17:42:44,360:DEBUG:acme.client:Storing nonce: 5m-m03bOcJSCo6_FbVd-DHedKhpkWaoSzN2Fmtdy0odH3buaFr8
2025-01-25 17:42:44,361:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-25 17:42:44,361:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2025-01-25 17:42:44,363:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-25 17:42:44,363:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-25 17:42:44,364:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:42:44,364:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-25 17:42:44,364:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-25 17:42:44,365:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-25 17:42:44,367:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:42:44,424:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2025-01-25 17:42:44,424:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-25 17:42:44,424:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2025-01-25 17:42:44,434:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2025-01-25 17:42:44,441:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2025-01-25 17:42:44,441:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2025-01-25 17:42:44,441:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2025-01-25 17:42:44,442:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2025-01-25 17:42:44,446:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2025-01-25 17:42:44,492:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-25 17:42:44,730:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:42:44,732:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-01-25 17:42:44,733:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-01-25 17:42:44,738:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:35 UTC.
2025-01-25 17:42:44,738:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-25 17:42:44,739:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:42:44,744:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0530F8B0>
Prep: True
2025-01-25 17:42:44,745:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0530F8B0> and installer None
2025-01-25 17:42:44,745:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-25 17:42:44,753:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-25 17:42:44,754:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-25 17:42:44,758:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-25 17:42:45,240:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-25 17:42:45,241:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:42:46 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "1Fmp0tFTzig": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-25 17:42:45,241:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-25 17:42:53,412:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8907_key-certbot.pem
2025-01-25 17:43:01,636:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8905_csr-certbot.pem
2025-01-25 17:43:01,636:DEBUG:acme.client:Requesting fresh nonce
2025-01-25 17:43:01,636:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-25 17:43:01,799:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-25 17:43:01,800:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:43:03 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Z6auUXuunB1McktbT-buPUCQPElP6ZZWshLYkmA-pR6wOrA-uTo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-25 17:43:01,800:DEBUG:acme.client:Storing nonce: Z6auUXuunB1McktbT-buPUCQPElP6ZZWshLYkmA-pR6wOrA-uTo
2025-01-25 17:43:01,800:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-25 17:43:01,807:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVuQjFNY2t0YlQtYnVQVUNRUEVsUDZaWldzaExZa21BLXBSNndPckEtdVRvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "dfJuRue5c37C9nxbCy9q01QyLAD5AtgBAvPSXarACGd5e7t9Zy6opcN0HSVtIBT3OS4KhtQy2CyU4JhaFbSzpd9xsns7nlyxfbsD77I_Hsv9vIORNtZGh1Wpaagw4WbYv3km0lFCf7b7hIZO2bSQemTXEGUIDu4VnyAtIRyWOq1NXh8TeocXFjXcFluGF465iUZokvFI8jhvyQBoI0ch_ZUfpzKV802dDtAmLEaKINGwn_2a94kbN299i0JcjWm81xz7DXgGkY30w8R2By65Rl5_x9YgHYcdXjKdOi8WHNKr82ktqvIXNint8RE8D2scRqoinqvErukVCxMgykQIGQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-01-25 17:43:02,022:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357
2025-01-25 17:43:02,023:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Jan 2025 16:43:03 GMT
Content-Type: application/json
Content-Length: 357
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140387985
Replay-Nonce: Z6auUXuuXVQJWhrTaZXJ_6yXnfHXj_jyzIh3gUoJ0HPnJpxoaLk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:51:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854328725"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140387985"
}
2025-01-25 17:43:02,023:DEBUG:acme.client:Storing nonce: Z6auUXuuXVQJWhrTaZXJ_6yXnfHXj_jyzIh3gUoJ0HPnJpxoaLk
2025-01-25 17:43:02,024:DEBUG:acme.client:JWS payload:
b''
2025-01-25 17:43:02,032:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854328725:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVYVlFKV2hyVGFaWEpfNnlYbmZIWGpfanl6SWgzZ1VvSjBIUG5KcHhvYUxrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQzMjg3MjUifQ",
  "signature": "TL4I57Of45D-jf_vAql78i8QbJtOTVuodLyzCvalE27uJYLtysO-brYbctl9Yhj6RJ4kwcHaASbrdV6b4XCbDB0HH9ka9Lj-lnaSEFW2AGlzB-ivBBrHQg0J24395pXZCMfXaCp7cv4YDDfd5YW__8IMMxiv8Hz7cMtx5e0Qs2fgRgQS0R0f8Q53m25-gPZ2SaHW8nQzicJ8_xmjfHt5d5gE1eUdM0RzbOwBGae_7w_i7T6dsNZ97fbzzVHcC2PqITkozej_oyqDWOKunzfhW3oeKDlhXxynXueuAHeAKtxNMe2xQGj5xUQnuSR-YKPpZL40cf61RHK-RUNY5M8RqQ",
  "payload": ""
}
2025-01-25 17:43:02,206:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854328725 HTTP/1.1" 200 829
2025-01-25 17:43:02,207:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:43:03 GMT
Content-Type: application/json
Content-Length: 829
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: KY2mD_AjgcBAiJx2ORVNlnE5AZ90MEU4_hZvNBrN61BsaF5aJAA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:51:01Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/HpD31A",
      "status": "pending",
      "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/VqO_UQ",
      "status": "pending",
      "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/F1PGXg",
      "status": "pending",
      "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI"
    }
  ]
}
2025-01-25 17:43:02,207:DEBUG:acme.client:Storing nonce: KY2mD_AjgcBAiJx2ORVNlnE5AZ90MEU4_hZvNBrN61BsaF5aJAA
2025-01-25 17:43:02,207:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-25 17:43:02,208:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2025-01-25 17:43:02,209:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-25 17:43:02,209:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-25 17:43:02,210:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:43:02,210:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-25 17:43:02,211:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-25 17:43:02,211:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-25 17:43:02,212:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:43:02,257:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-01-25 17:43:02,469:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:43:02,471:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-01-25 17:43:02,472:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-01-25 17:43:02,476:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:05 UTC.
2025-01-25 17:43:02,477:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-25 17:43:02,477:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:43:02,485:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x053751B0>
Prep: True
2025-01-25 17:43:02,485:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x053751B0> and installer None
2025-01-25 17:43:02,485:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-25 17:43:02,502:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-25 17:43:02,503:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-25 17:43:02,505:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-25 17:43:02,997:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-25 17:43:02,998:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:43:04 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "hkte5wtpbLY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-25 17:43:02,998:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-25 17:43:11,373:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8908_key-certbot.pem
2025-01-25 17:43:19,376:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8906_csr-certbot.pem
2025-01-25 17:43:19,377:DEBUG:acme.client:Requesting fresh nonce
2025-01-25 17:43:19,377:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-25 17:43:19,541:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-25 17:43:19,542:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:43:21 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Z6auUXuuZMrVxRIwjle6F0TPD4Sa1-E6iQ6acsVABQq4_egH4oU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-25 17:43:19,543:DEBUG:acme.client:Storing nonce: Z6auUXuuZMrVxRIwjle6F0TPD4Sa1-E6iQ6acsVABQq4_egH4oU
2025-01-25 17:43:19,543:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-25 17:43:19,550:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVaTXJWeFJJd2psZTZGMFRQRDRTYTEtRTZpUTZhY3NWQUJRcTRfZWdING9VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "WBrJELXO0jk15AttO2WEls_miRjX1V5TnMdQUkjMFzRfNVn0EMZYN-0_NqOzSSfwW7VRL20TX8-Y9PqBVbfQTV0Oggd70k5eQltQleaGm7T3cG1QKlxCvoenbWOoxSpXMzdNKA2SsZMzbd_R7HMto8tJZV8jyX0vjzaLf12MlnCBhzKCiO-ExqBSnIaGgdoo2tJDzJEn78mYdU6FnN678qjF-vq1V77ea1TrfnY-cEtRVIGaxietGJ3QHtwx6SaP6BvEcZvFYKaK7IBuXNdWFMGC7izV5uczSJrBGIzH17G-vzkQekqICcwnndaPB24QtqRUzfvVBX4Rw9h4Teztzw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2025-01-25 17:43:19,751:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356
2025-01-25 17:43:19,751:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Jan 2025 16:43:21 GMT
Content-Type: application/json
Content-Length: 356
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140450885
Replay-Nonce: Z6auUXuuACC78KFzSQ-TY8GLfVhrIpvImQC9AsztL25UIRrIpyQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:51:16Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854428445"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140450885"
}
2025-01-25 17:43:19,751:DEBUG:acme.client:Storing nonce: Z6auUXuuACC78KFzSQ-TY8GLfVhrIpvImQC9AsztL25UIRrIpyQ
2025-01-25 17:43:19,751:DEBUG:acme.client:JWS payload:
b''
2025-01-25 17:43:19,758:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854428445:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVBQ0M3OEtGelNRLVRZOEdMZlZocklwdkltUUM5QXN6dEwyNVVJUnJJcHlRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ0Mjg0NDUifQ",
  "signature": "yqZbVqA-EKMuMyMSMZ3qvTDPIyF7llJeePR50T96HyOUMWV0zzdcdrWIldreL_2SyMO025GpNZ9XzZUwSI2Nlz_LH-4HZS-dLzMXKuk7MJmUonsZ8qDKB-qMchbzv59bf8g2J_EkYB6NWLzMzNHEIACqQgcir9A-f_YXk7Rk0V7o_8KEqnbhRQRwPmP0FZ7d6e6AePwkpiKITmPw0qoh-gc6FRYvRhFfSIFM7Jr69Rigx0WiiTUg0DsIA8BqEe4_m6Nb4xMmJN9YikC2TcVptMpEuupQNy-ttdYm8Ay8UtBD2wNgovDgH5t0nsZQV6Nt0Wu2DD6xIaeZRLivESfWaw",
  "payload": ""
}
2025-01-25 17:43:19,929:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854428445 HTTP/1.1" 200 828
2025-01-25 17:43:19,930:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:43:21 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: KY2mD_AjK-LxNMEV9634QOucDpxqx94ZrrOmnl46ggYK3x_oX_s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:51:16Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/Ra9g4Q",
      "status": "pending",
      "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/tA2UdQ",
      "status": "pending",
      "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/HO9jNQ",
      "status": "pending",
      "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo"
    }
  ]
}
2025-01-25 17:43:19,930:DEBUG:acme.client:Storing nonce: KY2mD_AjK-LxNMEV9634QOucDpxqx94ZrrOmnl46ggYK3x_oX_s
2025-01-25 17:43:19,931:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-25 17:43:19,931:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2025-01-25 17:43:19,932:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-25 17:43:19,932:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-25 17:43:19,933:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:43:19,933:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-25 17:43:19,933:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-25 17:43:19,934:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-25 17:43:19,935:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:43:19,985:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-25 17:43:20,177:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:43:20,179:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2025-01-25 17:43:20,180:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2025-01-25 17:43:20,184:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:33 UTC.
2025-01-25 17:43:20,184:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-25 17:43:20,185:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:43:20,190:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05370450>
Prep: True
2025-01-25 17:43:20,191:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05370450> and installer None
2025-01-25 17:43:20,191:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-25 17:43:20,196:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-25 17:43:20,197:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-25 17:43:20,199:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-25 17:43:20,705:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-25 17:43:20,706:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:43:22 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "LwSnICZZT8k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-25 17:43:20,706:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-25 17:43:28,558:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8909_key-certbot.pem
2025-01-25 17:43:36,576:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8907_csr-certbot.pem
2025-01-25 17:43:36,577:DEBUG:acme.client:Requesting fresh nonce
2025-01-25 17:43:36,577:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-25 17:43:36,744:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-25 17:43:36,745:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:43:38 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5m-m03bOlXMIUnQpagTaWVn8xiD85Pxrdg5uqBkdQy8HuLd_HIY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-25 17:43:36,745:DEBUG:acme.client:Storing nonce: 5m-m03bOlXMIUnQpagTaWVn8xiD85Pxrdg5uqBkdQy8HuLd_HIY
2025-01-25 17:43:36,746:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-25 17:43:36,753:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9sWE1JVW5RcGFnVGFXVm44eGlEODVQeHJkZzV1cUJrZFF5OEh1TGRfSElZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "I33R3kMGxKJyu4fQJG3gN959-vMf-ctOyOj6diEsdBie6_LoisoAu_5541txAnGr4xHCh48zyUOlAFjk9xCCI09s6jnKmXi2UopGx5nPB5nDc0NChlvCTnuk81wBA2rSJeWqolh0NRtAZaEUb5qODNEG8KXj2gckFGhlxZDn0q3quKFkZLmMTwP5pdwEqrTsIGmjmkvPE4mEiyd2ZQuBKSm4I3vKkuVt1qEB-GSC_xPc4Jz0ZGEBDJmpD1m9slKYgbaqPHRuZEg2HsSeiFhGWhBJBS3D2_HuF08ZVr1rvFfpMiXBRMMRz39_0Vh4OuP0v2OU-F_Q0_0mHQjVAC9Hvg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2025-01-25 17:43:36,935:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355
2025-01-25 17:43:36,936:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Jan 2025 16:43:38 GMT
Content-Type: application/json
Content-Length: 355
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140503565
Replay-Nonce: qx2pCBNfhlIqcsoJC32rbCCtluEIsfFv19av-CYlLFVT-i6iET0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:51:31Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854513645"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140503565"
}
2025-01-25 17:43:36,936:DEBUG:acme.client:Storing nonce: qx2pCBNfhlIqcsoJC32rbCCtluEIsfFv19av-CYlLFVT-i6iET0
2025-01-25 17:43:36,936:DEBUG:acme.client:JWS payload:
b''
2025-01-25 17:43:36,944:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854513645:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZobElxY3NvSkMzMnJiQ0N0bHVFSXNmRnYxOWF2LUNZbExGVlQtaTZpRVQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ1MTM2NDUifQ",
  "signature": "pyVIT5OrSBOCK5spL3PhXppq88UQ4-No6q4JcxO4ax70or1nv233NkpbwamyKybA1IOj1CT_3Tigf_a3VVNYlwkPWFSG0Y8nVZTHcfF8Aq40V_AlLOdlmpoVyvgwQxhDJVvd2Bm724h4sSDUjDk_GJIQWcprLfRcKrQlmxHbx8FcjEFHM1BpX7vqn0DED4AIB0zJJgy8mZoPs4TM2JpnN4IGi46EdQxSOPeDCoTnOlL_l4M7ITCymfZGASySLz0HVW8x8w9HWVCYudBiqqLsTTavhYdnOXRFhrFrTde4EvbySoCx08PQTdOM5seBX1-Pck43spnX6Sr63O3kxKlgTA",
  "payload": ""
}
2025-01-25 17:43:37,118:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854513645 HTTP/1.1" 200 827
2025-01-25 17:43:37,118:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:43:38 GMT
Content-Type: application/json
Content-Length: 827
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qx2pCBNf3GaiF0kcDXYOUIEWZYSHH4Zh71GPyFiHqsYA87YeIGY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:51:31Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/YCt_0g",
      "status": "pending",
      "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/2DTePg",
      "status": "pending",
      "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/IJYfNQ",
      "status": "pending",
      "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0"
    }
  ]
}
2025-01-25 17:43:37,118:DEBUG:acme.client:Storing nonce: qx2pCBNf3GaiF0kcDXYOUIEWZYSHH4Zh71GPyFiHqsYA87YeIGY
2025-01-25 17:43:37,119:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-25 17:43:37,119:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2025-01-25 17:43:37,120:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-25 17:43:37,121:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-25 17:43:37,121:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:43:37,121:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-25 17:43:37,122:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-25 17:43:37,122:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-25 17:43:37,123:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:43:37,164:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-01-25 17:43:37,354:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:43:37,355:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2025-01-25 17:43:37,356:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2025-01-25 17:43:37,362:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:54 UTC.
2025-01-25 17:43:37,362:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-25 17:43:37,362:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:43:37,369:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05370BD0>
Prep: True
2025-01-25 17:43:37,369:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05370BD0> and installer None
2025-01-25 17:43:37,369:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-25 17:43:37,374:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-25 17:43:37,375:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-25 17:43:37,376:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-25 17:43:37,876:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-25 17:43:37,877:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:43:39 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "N8St_GbD_LE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-25 17:43:37,877:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-25 17:43:46,221:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8910_key-certbot.pem
2025-01-25 17:43:54,516:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8908_csr-certbot.pem
2025-01-25 17:43:54,517:DEBUG:acme.client:Requesting fresh nonce
2025-01-25 17:43:54,517:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-25 17:43:54,683:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-25 17:43:54,684:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:43:56 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5m-m03bO44bq8RwAyfqyDCmIMbR96OcC2NCg2O4v7kJezJmSjmg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-25 17:43:54,684:DEBUG:acme.client:Storing nonce: 5m-m03bO44bq8RwAyfqyDCmIMbR96OcC2NCg2O4v7kJezJmSjmg
2025-01-25 17:43:54,685:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-25 17:43:54,693:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk80NGJxOFJ3QXlmcXlEQ21JTWJSOTZPY0MyTkNnMk80djdrSmV6Sm1Tam1nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "gMDcOvle2oOMlXCNS97d99sDTH2ytQ0oKRQyWm6CQ35lStZIIk9Kg3imZZVeK8p6-o1bZQyUPHpV8lT_gZEp9YPe6Ih-B04gg4_sKMWlCGvhoMPBFjD7j6aCx1bJH1bEgKO9TiEqqEH34JMvgB2vSJOcCe0wWzaw7RSNKqXXOD3SeZgN15vSIhBiFZGblOHdyDjQO5Qt5x--8Kc37I-yL1_SbGOAHfOZNv9G_D6jrHCkfejhBpb9TKQJ0Hf4vRh2xeaq7PvWxhrRa7qZ7v9T85NhY3IgGCye8bl_GbWx1ed-U-_EAOKC5HDxVYSxsifqHepISVGGEJpjzfuGEwwlLg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-01-25 17:43:54,886:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2025-01-25 17:43:54,887:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Jan 2025 16:43:56 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140552425
Replay-Nonce: 5m-m03bOdYtlDMrBP7JC8dlz-EbwemxargFR2o4NzpEaXY99-Tw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:51:46Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854589515"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140552425"
}
2025-01-25 17:43:54,887:DEBUG:acme.client:Storing nonce: 5m-m03bOdYtlDMrBP7JC8dlz-EbwemxargFR2o4NzpEaXY99-Tw
2025-01-25 17:43:54,888:DEBUG:acme.client:JWS payload:
b''
2025-01-25 17:43:54,894:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854589515:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9kWXRsRE1yQlA3SkM4ZGx6LUVid2VteGFyZ0ZSMm80TnpwRWFYWTk5LVR3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ1ODk1MTUifQ",
  "signature": "Jaf8i84s9B5MVcPZLakNuaTClhNiEqiL4fbT-FjVi_y7Bl_z5LX9-sgyHLaOPn_l__c0eTJyDQlaY5o6WJqwOPg-_T_U5sSvr5sszWVMYEP0weAWXaKZvfgRil2SQ_sun9wVLLoBjkV3xevxynA3FloymZ6JAeWIIEyrQKz8pHBA_HhzE-6j9mGayqhEK9GdDgzj6alus9AuCJ6AdBlzlzNl77GT2cjF4oM_m56-2640ayz3Fi5r4fCWNvbbT86za7XbRvqKoopK4V9aFaTlUUWjkgVQjSikqHfi61tAU9hkKvsuR3nIRJEOjx7nC0rcrGNIbaBU4TfCRIaN-NN1CA",
  "payload": ""
}
2025-01-25 17:43:55,065:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854589515 HTTP/1.1" 200 823
2025-01-25 17:43:55,066:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:43:56 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qx2pCBNfmOCD1dB0GVu-RKbQOTL940KI-6xkb2yBV6vjIRr6gPc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:51:46Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/0ytQ9g",
      "status": "pending",
      "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/qQ_GAQ",
      "status": "pending",
      "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/MXV7zQ",
      "status": "pending",
      "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8"
    }
  ]
}
2025-01-25 17:43:55,066:DEBUG:acme.client:Storing nonce: qx2pCBNfmOCD1dB0GVu-RKbQOTL940KI-6xkb2yBV6vjIRr6gPc
2025-01-25 17:43:55,067:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-25 17:43:55,067:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2025-01-25 17:43:55,068:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-25 17:43:55,069:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-25 17:43:55,070:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:43:55,070:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-25 17:43:55,070:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-25 17:43:55,071:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-25 17:43:55,072:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:43:55,135:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-01-25 17:43:55,335:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:43:55,336:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-01-25 17:43:55,337:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-01-25 17:43:55,342:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:15 UTC.
2025-01-25 17:43:55,342:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-25 17:43:55,342:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:43:55,347:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x014C17F0>
Prep: True
2025-01-25 17:43:55,347:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x014C17F0> and installer None
2025-01-25 17:43:55,348:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-25 17:43:55,354:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-25 17:43:55,355:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-25 17:43:55,358:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-25 17:43:55,795:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-25 17:43:55,796:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:43:57 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "FRpoSjwYW0g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-25 17:43:55,797:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-25 17:44:04,279:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8911_key-certbot.pem
2025-01-25 17:44:12,253:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8909_csr-certbot.pem
2025-01-25 17:44:12,254:DEBUG:acme.client:Requesting fresh nonce
2025-01-25 17:44:12,254:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-25 17:44:12,404:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-25 17:44:12,405:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:44:14 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Z6auUXuurOA6pGvWBLCUlUrZdCXLOqsjidZeu0PAFed93uRHY70
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-25 17:44:12,405:DEBUG:acme.client:Storing nonce: Z6auUXuurOA6pGvWBLCUlUrZdCXLOqsjidZeu0PAFed93uRHY70
2025-01-25 17:44:12,405:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-25 17:44:12,411:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVyT0E2cEd2V0JMQ1VsVXJaZENYTE9xc2ppZFpldTBQQUZlZDkzdVJIWTcwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "vYe9GTISjmXbV2wBqiyebWPiSOMTBwfxMwQ_vLhHVpRIpDVloVpGHcTsbS6drsRe1S0abbHgNaHW6lHDsFIZzJGEMckg-vgB4tNgLmKk3K8PmyGUxrZ2pY3OwM7FKz01EXxOUK0jbZO2ZwxD-fLhK2BCGT-wlx8Yu-Feigvugyg5BhSVBoYiQvRVdljvCmURJ8zyJcEUdIvBoovv28H4Q4eo1TiZwzmQeXO1b0nhdE1_59NR8Ja_iEXjabTzJg9-_FfQLYYzPsR3CKPIlrcNkttTjZvarYPod-UA7QZu5dUFpxzl4JyL_9X1sdus48TNoUfM47lIulSU73OFg9TXQA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-01-25 17:44:12,605:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2025-01-25 17:44:12,605:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Jan 2025 16:44:14 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140602055
Replay-Nonce: KY2mD_Aj8fsiQLWLy3ZChVBzfYwuaSUoekgT0I69BodNwIlBJT0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:52:00Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854665835"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140602055"
}
2025-01-25 17:44:12,606:DEBUG:acme.client:Storing nonce: KY2mD_Aj8fsiQLWLy3ZChVBzfYwuaSUoekgT0I69BodNwIlBJT0
2025-01-25 17:44:12,606:DEBUG:acme.client:JWS payload:
b''
2025-01-25 17:44:12,612:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854665835:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWo4ZnNpUUxXTHkzWkNoVkJ6Zll3dWFTVW9la2dUMEk2OUJvZE53SWxCSlQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ2NjU4MzUifQ",
  "signature": "FPEhEEmzPgCUcr3KKmfV9MEvUPh_UTXH9k8bCEPkOhGh8seqIYKf9aLOxQIY8DbDBRp7nkek8eMa_ukoy3ohQ30KjmaLWugSR8N5y3yLbasGRtaIir5LH5G-wEhiE0oRTfJGlc05fLmqhVpzFnsrhQ1ECsiJdYy5ueTy88Iqc2FIXmT4Le5r0oYw_nWL5eJg8tdLNfG2J0ZLQscm2nGtQyqGgWBbTN4oIChxvs3FA-4EeCuBNhE8tHoopJt2kKhoilNdAgFZf6tsiSFBJH78FIULN6iGEKJxLfjK9ZwPBETeK4JrxoV3BVbVdXaUQknlgSLv85a75sTZ5njAkqESkw",
  "payload": ""
}
2025-01-25 17:44:12,767:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854665835 HTTP/1.1" 200 823
2025-01-25 17:44:12,767:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:44:14 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: KY2mD_AjU9C5AHeteFrpkA1OX5-GP1jhIYYuq6Y8OIJc8LUw924
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:52:00Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/A7xmXA",
      "status": "pending",
      "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/hkfxMA",
      "status": "pending",
      "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/VSa2Qg",
      "status": "pending",
      "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8"
    }
  ]
}
2025-01-25 17:44:12,767:DEBUG:acme.client:Storing nonce: KY2mD_AjU9C5AHeteFrpkA1OX5-GP1jhIYYuq6Y8OIJc8LUw924
2025-01-25 17:44:12,768:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-25 17:44:12,768:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2025-01-25 17:44:12,769:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-25 17:44:12,769:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-25 17:44:12,770:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:44:12,770:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-25 17:44:12,771:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-25 17:44:12,771:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-25 17:44:12,772:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:44:12,819:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-01-25 17:44:13,109:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-25 17:44:13,111:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2025-01-25 17:44:13,112:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2025-01-25 17:44:13,119:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:38 UTC.
2025-01-25 17:44:13,119:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-01-25 17:44:13,119:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-25 17:44:13,124:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05055650>
Prep: True
2025-01-25 17:44:13,125:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05055650> and installer None
2025-01-25 17:44:13,125:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-25 17:44:13,131:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-01-25 17:44:13,132:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-25 17:44:13,134:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-25 17:44:13,602:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-25 17:44:13,603:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:44:15 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "nZBx3FND0Ws": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-25 17:44:13,604:INFO:certbot._internal.main:Renewing an existing certificate
2025-01-25 17:44:21,691:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8912_key-certbot.pem
2025-01-25 17:44:29,681:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8910_csr-certbot.pem
2025-01-25 17:44:29,682:DEBUG:acme.client:Requesting fresh nonce
2025-01-25 17:44:29,682:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-25 17:44:29,839:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-25 17:44:29,840:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:44:31 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5m-m03bO2JqZkT1DTpj99BP8sGHMzuXaunMVfkRIkj_cu3UZsGg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-01-25 17:44:29,840:DEBUG:acme.client:Storing nonce: 5m-m03bO2JqZkT1DTpj99BP8sGHMzuXaunMVfkRIkj_cu3UZsGg
2025-01-25 17:44:29,840:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2025-01-25 17:44:29,848:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk8ySnFaa1QxRFRwajk5QlA4c0dITXp1WGF1bk1WZmtSSWtqX2N1M1Vac0dnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "dNoZEuJBFMFq2rcPdnb339waLqPtyoCM1BlbiIzENZEkNG8oUYB0uEqLnzp-fMPTp2DIYMmLsZbzLly3s7RJgcyYNtLnsExLD55TjH4ES8ctLX38tdg_UgjdJp6iM2FV1jaqTp1H00Vdc819KXs24kAIhSPuPt-grfD5iM8S7-9--cTaVOhQca0d92ZR5YRXbYFi7SOOO5rzBpAYoWU0VM3_PlgeG5i2GTnYFdkrm3cNsd05DM_-S-uLLJh43nYkIbLsqSmZYu1ENzIQINoO6TwxT84pZDppVGpRUepcegCKRYmHcOdOoYvIq6Zi1xk7uBW9jDaHejfxtEgBem2_iQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-01-25 17:44:30,096:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2025-01-25 17:44:30,097:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Jan 2025 16:44:31 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140669395
Replay-Nonce: qx2pCBNfPRl_-8lRD-rkIGiWRctsrFLmwqceb98vCImJnu0ct9w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-01-30T04:52:15Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854767445"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140669395"
}
2025-01-25 17:44:30,097:DEBUG:acme.client:Storing nonce: qx2pCBNfPRl_-8lRD-rkIGiWRctsrFLmwqceb98vCImJnu0ct9w
2025-01-25 17:44:30,098:DEBUG:acme.client:JWS payload:
b''
2025-01-25 17:44:30,106:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854767445:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZQUmxfLThsUkQtcmtJR2lXUmN0c3JGTG13cWNlYjk4dkNJbUpudTBjdDl3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ3Njc0NDUifQ",
  "signature": "k7w5hIKeILSgXbEM21FqK0-5nY36YjraJxPx1jLPkoKz4KkuQFznIeHmn-WR4yhMQCh71l_VQax5uxDpXPlTc38NVTsPvZLm_fB_D-RqfZCR_apswvIdt9HlJs9rXoklDKSJkoDY6NqVsOYsEWkY7lgCrkwq5VlJPzuW55FevIbgAJwDCV8fkThvY7sNrBel5zhDO47-V24woSuPqe3HsrbvrVz0cNVNoQtwST5A6mwiv6b95Tz-n_nHObYkaZdCqkKtkYzAI0G_XP1yf6qwHwBdKx_Ge_dSOFL5Zw9wIDM215wOkSeNEKwKCUXxUDabryOzgSi8D90hynpD7_Zy6A",
  "payload": ""
}
2025-01-25 17:44:30,267:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854767445 HTTP/1.1" 200 823
2025-01-25 17:44:30,268:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Jan 2025 16:44:31 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5m-m03bOkTxV9ai-7tD5XZVIfXN98Jv92gJcGOSOkCV5yZcEYuQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-01-30T04:52:15Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/I_YfaQ",
      "status": "pending",
      "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/9iBbmQ",
      "status": "pending",
      "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/KFIdlQ",
      "status": "pending",
      "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k"
    }
  ]
}
2025-01-25 17:44:30,269:DEBUG:acme.client:Storing nonce: 5m-m03bOkTxV9ai-7tD5XZVIfXN98Jv92gJcGOSOkCV5yZcEYuQ
2025-01-25 17:44:30,269:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-01-25 17:44:30,270:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2025-01-25 17:44:30,270:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-01-25 17:44:30,271:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-01-25 17:44:30,272:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:44:30,272:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-01-25 17:44:30,272:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-01-25 17:44:30,273:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-01-25 17:44:30,274:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-01-25 17:44:30,274:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2025-01-25 17:44:30,274:ERROR:certbot._internal.renewal:  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2025-01-25 17:44:30,276:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 11 renew failure(s), 0 parse failure(s)
2025-01-25 17:44:30,291:ERROR:certbot._internal.log:11 renew failure(s), 0 parse failure(s)