2025-02-01 06:58:21,454:DEBUG:certbot._internal.main:certbot version: 1.6.0
2025-02-01 06:58:21,455:DEBUG:certbot._internal.main:Arguments: []
2025-02-01 06:58:21,455:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2025-02-01 06:58:22,205:DEBUG:certbot._internal.log:Root logging level set at 20
2025-02-01 06:58:22,205:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2025-02-01 06:58:22,243:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04566570> and installer <certbot._internal.cli.cli_utils._Default object at 0x04566570>
2025-02-01 06:58:22,283:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-02-01 06:58:22,492:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 06:58:22,493:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2025-02-01 06:58:22,497:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2025-02-01 06:58:22,505:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-02-01 06:58:22,509:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 06:58:22,547:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-02-01 06:58:22,713:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 06:58:22,715:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is signed by the certificate's issuer.
2025-02-01 06:58:22,715:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD
2025-02-01 06:58:22,720:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-02-01 06:58:22,724:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 06:58:22,760:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-02-01 06:58:22,959:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 06:58:22,960:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2025-02-01 06:58:22,961:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2025-02-01 06:58:22,965:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-02-01 06:58:22,971:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 06:58:23,039:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-02-01 06:58:23,242:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 06:58:23,244:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is signed by the certificate's issuer.
2025-02-01 06:58:23,244:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD
2025-02-01 06:58:23,248:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-02-01 06:58:23,251:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 06:58:23,288:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-02-01 06:58:23,495:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 06:58:23,497:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert22.pem is signed by the certificate's issuer.
2025-02-01 06:58:23,497:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD
2025-02-01 06:58:23,502:INFO:certbot._internal.renewal:Cert not yet due for renewal
2025-02-01 06:58:23,506:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 06:58:23,543:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-02-01 06:58:23,751:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 06:58:23,752:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-02-01 06:58:23,753:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-02-01 06:58:23,757:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:13:49 UTC.
2025-02-01 06:58:23,758:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-02-01 06:58:23,758:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 06:58:23,763:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0442ECD0>
Prep: True
2025-02-01 06:58:23,763:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0442ECD0> and installer None
2025-02-01 06:58:23,763:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-02-01 06:58:23,779:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-02-01 06:58:23,780:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-02-01 06:58:23,783:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-02-01 06:58:24,259:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-02-01 06:58:24,260:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:57:43 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "tEuhbi1VsEY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2025-02-01 06:58:24,260:INFO:certbot._internal.main:Renewing an existing certificate
2025-02-01 06:58:31,799:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9023_key-certbot.pem
2025-02-01 06:58:38,771:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9021_csr-certbot.pem
2025-02-01 06:58:38,772:DEBUG:acme.client:Requesting fresh nonce
2025-02-01 06:58:38,772:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-02-01 06:58:38,929:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-02-01 06:58:38,930:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:57:57 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: hXNDuA8iJ7mgaT5bRh_PiJbdlR82rhyWUT1cu2iMcTTyitTt6nY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-02-01 06:58:38,930:DEBUG:acme.client:Storing nonce: hXNDuA8iJ7mgaT5bRh_PiJbdlR82rhyWUT1cu2iMcTTyitTt6nY
2025-02-01 06:58:38,930:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2025-02-01 06:58:38,936:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlKN21nYVQ1YlJoX1BpSmJkbFI4MnJoeVdVVDFjdTJpTWNUVHlpdFR0Nm5ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "c3SUSD6jrrQ62Dn-cSmSjEa1QGt8bv1D_T-T3rENp7v4PyLbssxrZFtHGvmzRdjRShZ2aD7yY4Ilkks95XC2daY6xKNe_v-VnlgaRpKFVmOHm_tvl-N6hj8_Q2fbMvuPmq_zK70NQHPUmkgnG_TWMUrShhlaTiaq8qf0HeXj-2UWNmDMIxr4D_IUjt1agzRP2NSzA9uzy3jkFVCOXjI678C1rcuFrO3vPNEfVmwvbvcfSTN93ZwQRbXf98_d_tsj0vZD18sKkdgN_N8-e1UcyhbalYu8lYM3328AQgcZQJ8VOQly0TwyXT0gjnLMuqB9f1cuDc8A0VXg4gNQAk1BUA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-02-01 06:58:39,129:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2025-02-01 06:58:39,130:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 01 Feb 2025 05:57:57 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603648845
Replay-Nonce: aTttXYyyNK_NCmbSCeJMeafJ9gEwYsOrKPGd4-ObZWXGM7O6GFY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-02-06T20:15:56Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613419375"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603648845"
}
2025-02-01 06:58:39,130:DEBUG:acme.client:Storing nonce: aTttXYyyNK_NCmbSCeJMeafJ9gEwYsOrKPGd4-ObZWXGM7O6GFY
2025-02-01 06:58:39,130:DEBUG:acme.client:JWS payload:
b''
2025-02-01 06:58:39,136:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613419375:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlOS19OQ21iU0NlSk1lYWZKOWdFd1lzT3JLUEdkNC1PYlpXWEdNN082R0ZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM0MTkzNzUifQ",
  "signature": "AWi_6cGMrTeGWdX70HfvvOnmAw63aCAF45rdf3qldE9HEXO1pqm5aT839OiHPY6k6f1xyEZWVJdDFffoZxxui4TTjIS65lZBIlEXMNamZJhor2rgyWy3Yc0JGV5dg-Fe9bK2fJ-4SBSzgHOkx_AeFwIU_3jxpP2fPZk1SgEDMquTLjYGMV6hSJ59j9rg0VUGZpoCqnOTShW99zETJKUzB9_SiBGKppoLJx7ErhUGA9LJz-De3Pbc7NDMaMqGwPSgcx-RLe8MuvJLwh6beEhcQtlwl8InmmB4JZQa08PmVZ3oGbCEKK80_8UQq7AhspPXJP-uV_4GhA2_j6ct9ymGOA",
  "payload": ""
}
2025-02-01 06:58:39,297:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613419375 HTTP/1.1" 200 823
2025-02-01 06:58:39,298:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:57:58 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: aTttXYyy37oDCx3TgcSlPWaFTBalE7NsbRdTfx1xxI96BpR9LJ0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-02-06T20:15:56Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/T3sOUw",
      "status": "pending",
      "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/bahWuQ",
      "status": "pending",
      "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/yJLmdw",
      "status": "pending",
      "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns"
    }
  ]
}
2025-02-01 06:58:39,298:DEBUG:acme.client:Storing nonce: aTttXYyy37oDCx3TgcSlPWaFTBalE7NsbRdTfx1xxI96BpR9LJ0
2025-02-01 06:58:39,298:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-02-01 06:58:39,299:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2025-02-01 06:58:39,310:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-02-01 06:58:39,310:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-02-01 06:58:39,319:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 06:58:39,319:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-02-01 06:58:39,320:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-02-01 06:58:39,320:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-02-01 06:58:39,331:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 06:58:39,369:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-02-01 06:58:39,570:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 06:58:39,571:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2025-02-01 06:58:39,572:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2025-02-01 06:58:39,576:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:20 UTC.
2025-02-01 06:58:39,576:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-02-01 06:58:39,577:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 06:58:39,582:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0456CA50>
Prep: True
2025-02-01 06:58:39,582:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0456CA50> and installer None
2025-02-01 06:58:39,582:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-02-01 06:58:39,598:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-02-01 06:58:39,599:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-02-01 06:58:39,601:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-02-01 06:58:40,085:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-02-01 06:58:40,085:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:57:58 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "XynDTqd14ho": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-02-01 06:58:40,087:INFO:certbot._internal.main:Renewing an existing certificate
2025-02-01 06:58:46,720:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9024_key-certbot.pem
2025-02-01 06:58:53,450:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9022_csr-certbot.pem
2025-02-01 06:58:53,450:DEBUG:acme.client:Requesting fresh nonce
2025-02-01 06:58:53,450:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-02-01 06:58:53,612:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-02-01 06:58:53,613:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:58:12 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: aTttXYyynMmQv5hEloi9UCJxw8sO4eveV6DYFMl-ErlDtvLlC2k
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-02-01 06:58:53,613:DEBUG:acme.client:Storing nonce: aTttXYyynMmQv5hEloi9UCJxw8sO4eveV6DYFMl-ErlDtvLlC2k
2025-02-01 06:58:53,613:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2025-02-01 06:58:53,619:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXluTW1RdjVoRWxvaTlVQ0p4dzhzTzRldmVWNkRZRk1sLUVybER0dkxsQzJrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Y4LlLQHM2UPHKtB8q6c-ETDpvWgOOOQoHW6QGbrDQ55aJkpztNK1nh3EI0y_hOZ97-R8_XoSBHyeZ5Vwr_5dYwyoXaEYxuXyUdugTk9dsQ78cIE0jFCz78OK1blDOajFpoiJ6BTavIoj8eqA-HWye_wAVPFqFBn3AuRuBEfaERtiE98obNp9z9xcX5sosodTm80POM_zro9-u4dWhKiYWhYRUCLcPFqLXfbBtDc2wevOT80_1vGGt9HDFYjM1w-nOTIXbuJCWTD6Gew9Zcr4Xsz1BI1zlXF5O3X63m0KnI5G0XmECD-VmjjK4hYLTVZUiKuSZF1mdO6ZI2Apke7MEA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2025-02-01 06:58:53,814:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355
2025-02-01 06:58:53,815:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 01 Feb 2025 05:58:12 GMT
Content-Type: application/json
Content-Length: 355
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603700365
Replay-Nonce: hXNDuA8iWYd04xr8ekt-HiU5A-OvyUxRU9j6EXykeKFPkBl7Vr4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-02-06T20:16:10Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613495675"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603700365"
}
2025-02-01 06:58:53,815:DEBUG:acme.client:Storing nonce: hXNDuA8iWYd04xr8ekt-HiU5A-OvyUxRU9j6EXykeKFPkBl7Vr4
2025-02-01 06:58:53,815:DEBUG:acme.client:JWS payload:
b''
2025-02-01 06:58:53,821:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613495675:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlXWWQwNHhyOGVrdC1IaVU1QS1PdnlVeFJVOWo2RVh5a2VLRlBrQmw3VnI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM0OTU2NzUifQ",
  "signature": "oTB2kK3TGhKjdv8SYGCqOWm3Wn6AUEqDWyJigVGiOun01Wd2aynsIjH-_jioEaXcOAOA_TL4kR9M-5RyLJPMRV_pQiVaJ1KlkniyZ9Dg-F5nKiFS-q0Pw3XF_J6QMlexWlNVNjZtSaWSby6nlRpQQnp4OevZCSDaFxtZbLvJRFwunJoNEexRGJvMyHOTgx0y9MJR5Mg_kj0Amu0YGuGtbJB950w1WJ8ilJuKy02lz3ncthfabVxVgq9f22Q_-Md9AtC_CTY1gTswWfsmqI1kpkepjlCKdjJqycRDAaY6gmCUdLdN1QIz1ZT3q-RpRUkfZpK1TD5oTrNWg8IbJ389BA",
  "payload": ""
}
2025-02-01 06:58:53,988:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613495675 HTTP/1.1" 200 827
2025-02-01 06:58:53,989:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:58:12 GMT
Content-Type: application/json
Content-Length: 827
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: aTttXYyyO06YJBf7X9tTsL6JhOG5J1j_YYDQX_jVGQf2Pq_wsro
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-02-06T20:16:10Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/TKifNg",
      "status": "pending",
      "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/OR7sGQ",
      "status": "pending",
      "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/DpTZMg",
      "status": "pending",
      "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo"
    }
  ]
}
2025-02-01 06:58:53,989:DEBUG:acme.client:Storing nonce: aTttXYyyO06YJBf7X9tTsL6JhOG5J1j_YYDQX_jVGQf2Pq_wsro
2025-02-01 06:58:53,990:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-02-01 06:58:53,990:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2025-02-01 06:58:53,991:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-02-01 06:58:53,991:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-02-01 06:58:53,991:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 06:58:53,992:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-02-01 06:58:53,992:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-02-01 06:58:53,992:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-02-01 06:58:53,994:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 06:58:54,042:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-02-01 06:58:54,235:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 06:58:54,236:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is signed by the certificate's issuer.
2025-02-01 06:58:54,237:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is: OCSPCertStatus.GOOD
2025-02-01 06:58:54,240:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:51 UTC.
2025-02-01 06:58:54,240:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-02-01 06:58:54,240:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 06:58:54,246:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03F1A450>
Prep: True
2025-02-01 06:58:54,246:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03F1A450> and installer None
2025-02-01 06:58:54,246:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-02-01 06:58:54,251:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-02-01 06:58:54,252:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-02-01 06:58:54,254:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-02-01 06:58:54,735:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-02-01 06:58:54,736:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:58:13 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "sDgwhTQ8RpA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2025-02-01 06:58:54,736:INFO:certbot._internal.main:Renewing an existing certificate
2025-02-01 06:59:01,141:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9025_key-certbot.pem
2025-02-01 06:59:07,239:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9023_csr-certbot.pem
2025-02-01 06:59:07,240:DEBUG:acme.client:Requesting fresh nonce
2025-02-01 06:59:07,240:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-02-01 06:59:07,400:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-02-01 06:59:07,401:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:58:26 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: aTttXYyyYdOMZPksdD9yvRPzV6yTvZB738tThdnfXZUveMBBaAo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-02-01 06:59:07,401:DEBUG:acme.client:Storing nonce: aTttXYyyYdOMZPksdD9yvRPzV6yTvZB738tThdnfXZUveMBBaAo
2025-02-01 06:59:07,401:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "helix.daisuke-design.pl"\n    }\n  ]\n}'
2025-02-01 06:59:07,407:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlZZE9NWlBrc2REOXl2UlB6VjZ5VHZaQjczOHRUaGRuZlhaVXZlTUJCYUFvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "p-buV-zCjH12ivDO0rz-yAGP5mbKH8LoOh7sTHTyn3TmW6_rqsnJ2VtS0buz_nFVT64dERgp79mLWKU_5cwKrX-GMu3lcpKFOAFX9YUVCeVx1IA0RdXPEDEqpq0iN6AfppNcMd9nhmfcdfF1YRJuoz5C44T7lUpUKK6a_NYdoIIRRnevZWRnAJQSBYriGpnlC0M2JkKi-EBnO_F-kDN6E1_6UUuSxI8PKbhqA1Jv0nbGjxgnxOOpj3MJg7R6mS1R7uHER69Fqw31dIUTTAkoigdEXxUx5W35dycBl8eG7M1-Z5DQG9kDDZSF5p-6TQHPhdGi7gPgNz1ciWpgJrV8jw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2025-02-01 06:59:07,601:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353
2025-02-01 06:59:07,601:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 01 Feb 2025 05:58:26 GMT
Content-Type: application/json
Content-Length: 353
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603747715
Replay-Nonce: hXNDuA8iGqZwq1cdoDdGqGvKtebWwgxQwio3AvfOcx9BGPCs-Uw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-02-06T20:16:23Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "helix.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613569085"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603747715"
}
2025-02-01 06:59:07,602:DEBUG:acme.client:Storing nonce: hXNDuA8iGqZwq1cdoDdGqGvKtebWwgxQwio3AvfOcx9BGPCs-Uw
2025-02-01 06:59:07,602:DEBUG:acme.client:JWS payload:
b''
2025-02-01 06:59:07,608:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613569085:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlHcVp3cTFjZG9EZEdxR3ZLdGViV3dneFF3aW8zQXZmT2N4OUJHUENzLVV3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM1NjkwODUifQ",
  "signature": "J9fxvTdJJEC7FIOR89iPVxMnyt_03m7KTKuJnCCmReguLF408DhnG4I2GX1Ub3f5AAvS-UIKBlib2rgFt8dq5laASay2OqpI9b7QVHvowJ6vlYTTgkOMD5tvftITmdNlajeCiBZacsM_dCJdlXI58A1vhE864oQcq606gm428iL7mUzYkOnrAHa-uXgxxCkXt8sx9hrWNLq6rWto9Rgg4vFWCc8aTmiokp3k5G2RcWoPR-lcf_vhtH7JeAbiBFRmtU5kGqnfwjArFqNm0fKBkZgMTx4YVB0VQDsPGhaMV10H19lGSNbcRlPXW7iRnVfdtnRBeMCfrYEZb0oLaTYN-A",
  "payload": ""
}
2025-02-01 06:59:07,774:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613569085 HTTP/1.1" 200 825
2025-02-01 06:59:07,775:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:58:26 GMT
Content-Type: application/json
Content-Length: 825
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: hXNDuA8iTtaWV2I1Z1_Q73vCU_GE2MXMxZloKREfhrctJcl9Y2A
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "helix.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-02-06T20:16:23Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/i556TQ",
      "status": "pending",
      "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/_lVOeQ",
      "status": "pending",
      "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/67S_cA",
      "status": "pending",
      "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM"
    }
  ]
}
2025-02-01 06:59:07,775:DEBUG:acme.client:Storing nonce: hXNDuA8iTtaWV2I1Z1_Q73vCU_GE2MXMxZloKREfhrctJcl9Y2A
2025-02-01 06:59:07,776:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-02-01 06:59:07,776:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl
2025-02-01 06:59:07,777:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-02-01 06:59:07,777:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-02-01 06:59:07,777:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 06:59:07,778:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-02-01 06:59:07,778:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-02-01 06:59:07,778:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-02-01 06:59:07,779:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 06:59:07,830:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-02-01 06:59:08,038:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 06:59:08,039:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-02-01 06:59:08,040:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-02-01 06:59:08,044:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:13 UTC.
2025-02-01 06:59:08,044:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-02-01 06:59:08,044:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 06:59:08,049:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03FDD1F0>
Prep: True
2025-02-01 06:59:08,049:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03FDD1F0> and installer None
2025-02-01 06:59:08,050:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-02-01 06:59:08,054:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-02-01 06:59:08,055:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-02-01 06:59:08,057:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-02-01 06:59:08,505:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-02-01 06:59:08,506:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:58:27 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "bt4Gp5x85QE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-02-01 06:59:08,506:INFO:certbot._internal.main:Renewing an existing certificate
2025-02-01 06:59:14,979:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9026_key-certbot.pem
2025-02-01 06:59:21,087:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9024_csr-certbot.pem
2025-02-01 06:59:21,088:DEBUG:acme.client:Requesting fresh nonce
2025-02-01 06:59:21,088:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-02-01 06:59:21,238:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-02-01 06:59:21,239:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:58:40 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UvlUZ57PQRnRbb28qKEDxPuqC3c2wMGGVdFeXGqWpGc2pDL9tyA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-02-01 06:59:21,239:DEBUG:acme.client:Storing nonce: UvlUZ57PQRnRbb28qKEDxPuqC3c2wMGGVdFeXGqWpGc2pDL9tyA
2025-02-01 06:59:21,239:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2025-02-01 06:59:21,245:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BRUm5SYmIyOHFLRUR4UHVxQzNjMndNR0dWZEZlWEdxV3BHYzJwREw5dHlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "cKNIO0ZJ-1PVpfazTwXqQcQSRq2g8a1lACaL21tPrD0FI3e57OGWA4wRJz7F0-O1YZsgj4THykQn137U2rGTWv4ynt2fUiSra8cQKorRKdqQzDFNm7myR53Ou1WtAjZE5KOxHfpYb1cANNhFUpLIfmaGVFc5KbxTOHRpxeOE_SWF893cWYMalILuhZBf3Ev88D2q_N7u8rMyeEY2UTuGSFmCEVit06-l51jpZAQDi5RVeYQ2A1abFDiqiXa-Il0Lbl3tvocgChCkGbWgswxOv2GHf1ZGLgfsRgen_yt_MhUm_Wa-9yd5bHBzly7OzHoRNpNMbxmQsMJGB7OaLPq1hQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2025-02-01 06:59:21,500:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352
2025-02-01 06:59:21,501:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 01 Feb 2025 05:58:40 GMT
Content-Type: application/json
Content-Length: 352
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603792325
Replay-Nonce: TUC11O6Xf8HZZKQZyvIzvu4arEPNWlANmubbAzVBh2aM9L9JKM0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-02-06T20:16:37Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613637565"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603792325"
}
2025-02-01 06:59:21,501:DEBUG:acme.client:Storing nonce: TUC11O6Xf8HZZKQZyvIzvu4arEPNWlANmubbAzVBh2aM9L9JKM0
2025-02-01 06:59:21,501:DEBUG:acme.client:JWS payload:
b''
2025-02-01 06:59:21,507:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613637565:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhmOEhaWktRWnl2SXp2dTRhckVQTldsQU5tdWJiQXpWQmgyYU05TDlKS00wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM2Mzc1NjUifQ",
  "signature": "xvOevx1udl_jOpdkNv4WC4n8qiCUac9Gnat-eUKMG-fwB7BzIZrVN7gtzWyf3MwLQi37kDFHOvuzqkhXKMxhPHjv3bHPVIRwLorgQFmUPVwPIxZPtgCTIGm6Cuj2CTJsMM6nSW9ZaoHmtwa1rJZOC0Z5b-GkcyQjjbOdDgctNNAKg-Y65nRASDSyWgr4dMwE05_77THesqjggjvKnM0wIOGtA9ZukYN8b19nsiZ_Dt_aicgYBugD4a06SPJc22H0WUhcGbop6j8VUwf8nK4UIUye_G2zsBEuB7iyYLmygegkI6IdskpElccoM5KD5KIPTYc9vD_QZtJXasqwvJnWiA",
  "payload": ""
}
2025-02-01 06:59:21,670:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613637565 HTTP/1.1" 200 824
2025-02-01 06:59:21,671:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:58:40 GMT
Content-Type: application/json
Content-Length: 824
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UvlUZ57P5i3u9-3dzBUnAAfCNq5gEor2ibUfOBWXPjefMuVf4NE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-02-06T20:16:37Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/HkAMUw",
      "status": "pending",
      "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/5bZpJA",
      "status": "pending",
      "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/_4E6Mg",
      "status": "pending",
      "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk"
    }
  ]
}
2025-02-01 06:59:21,671:DEBUG:acme.client:Storing nonce: UvlUZ57P5i3u9-3dzBUnAAfCNq5gEor2ibUfOBWXPjefMuVf4NE
2025-02-01 06:59:21,671:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-02-01 06:59:21,672:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2025-02-01 06:59:21,672:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-02-01 06:59:21,673:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-02-01 06:59:21,673:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 06:59:21,673:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-02-01 06:59:21,674:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-02-01 06:59:21,674:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-02-01 06:59:21,675:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 06:59:21,721:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2025-02-01 06:59:21,721:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-02-01 06:59:21,721:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2025-02-01 06:59:21,729:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2025-02-01 06:59:21,735:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2025-02-01 06:59:21,735:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2025-02-01 06:59:21,735:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2025-02-01 06:59:21,736:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2025-02-01 06:59:21,741:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2025-02-01 06:59:21,779:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-02-01 06:59:21,962:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 06:59:21,963:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-02-01 06:59:21,964:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-02-01 06:59:21,968:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:35 UTC.
2025-02-01 06:59:21,968:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-02-01 06:59:21,968:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 06:59:21,974:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x047FC4F0>
Prep: True
2025-02-01 06:59:21,975:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x047FC4F0> and installer None
2025-02-01 06:59:21,975:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-02-01 06:59:21,979:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-02-01 06:59:21,980:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-02-01 06:59:21,982:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-02-01 06:59:22,464:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-02-01 06:59:22,465:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:58:41 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "LTu0gNxSn6Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-02-01 06:59:22,466:INFO:certbot._internal.main:Renewing an existing certificate
2025-02-01 06:59:28,924:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9027_key-certbot.pem
2025-02-01 06:59:35,047:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9025_csr-certbot.pem
2025-02-01 06:59:35,048:DEBUG:acme.client:Requesting fresh nonce
2025-02-01 06:59:35,048:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-02-01 06:59:35,209:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-02-01 06:59:35,210:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:58:54 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: hXNDuA8itSJOmIZJJ7N_5EunDurz1flqXV8NTRCPbEgueCFv1NA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-02-01 06:59:35,210:DEBUG:acme.client:Storing nonce: hXNDuA8itSJOmIZJJ7N_5EunDurz1flqXV8NTRCPbEgueCFv1NA
2025-02-01 06:59:35,210:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2025-02-01 06:59:35,216:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGl0U0pPbUlaSko3Tl81RXVuRHVyejFmbHFYVjhOVFJDUGJFZ3VlQ0Z2MU5BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "gdu38MwgQidRGi0RggiHcmahaoHp8DVgviNaiC3lr8lEwoL3ZUwnX-ciO2EA_cN0pgwbysbnp6yqFNt48UYP2af5zvOv69dvg2mj_2yLyewOxqSb5HZbzxmdVgB-xIf7JIQKlc9MYgStZ43LHIsD5gfVFtnDI4x1v7QbkA_kSSqqTrVwWPWw8CFGHIev_Sbbo4gcX4iUGC5HnZ0zcxPyK2-nSznDKrj4CJFl9Kh3aLk2yOZyh5LDGpuOBeXRyqDL1vxDb1KYer8lqjjJh6ITbqj-ZvVdNVKXLamMRoLRcRL5UbOFv_4H1pmX8gkjiyLieTky_xvIuVeHCxRKguFALw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-02-01 06:59:35,423:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357
2025-02-01 06:59:35,424:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 01 Feb 2025 05:58:54 GMT
Content-Type: application/json
Content-Length: 357
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603833745
Replay-Nonce: hXNDuA8iZ5j26nxUTNT07RnaSkibbp--IUaRLxVm7AnXQPB-rus
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-02-06T20:16:51Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613700475"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603833745"
}
2025-02-01 06:59:35,424:DEBUG:acme.client:Storing nonce: hXNDuA8iZ5j26nxUTNT07RnaSkibbp--IUaRLxVm7AnXQPB-rus
2025-02-01 06:59:35,424:DEBUG:acme.client:JWS payload:
b''
2025-02-01 06:59:35,430:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613700475:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlaNWoyNm54VVROVDA3Um5hU2tpYmJwLS1JVWFSTHhWbTdBblhRUEItcnVzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM3MDA0NzUifQ",
  "signature": "NXDHvhqNpaCfrvS40K6MefuoypxPttdMbIKcIxrITvLGTyoO95uXVcmDpyzV96NjRGwThueFTFqjUQv8YMRfivPTux5AKESa_5gNYg_xD75SdWtYJ38tdNRFYoyl-mBSnf8-X20UY173amH9Q8j1zrRvA9YLNkGtO4hkxjwPYw0UV4RfF0TscZZzAwkvhcX_9FnOShAiGb3vuzEgMCLC_1nmnT8Bf3JPpnKu2bnXr1KP23KrZ8_Rot8a4oRW8w4xkuLtb_zMxAWYB0dFpd2JrFdnjlDKrS4HmHi0zGP-EHGo4p2tp4CYS0DsdiyAim7AAqczLdj0cKRB8bXAEG0gIw",
  "payload": ""
}
2025-02-01 06:59:35,596:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613700475 HTTP/1.1" 200 829
2025-02-01 06:59:35,597:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:58:54 GMT
Content-Type: application/json
Content-Length: 829
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: hXNDuA8ik8m3aiFqaqpmAHWm5lBpwBOJMuwlyYXaRb4QjdTxH04
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-02-06T20:16:51Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/4GWkdQ",
      "status": "pending",
      "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/B2drkw",
      "status": "pending",
      "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/jElvnA",
      "status": "pending",
      "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE"
    }
  ]
}
2025-02-01 06:59:35,597:DEBUG:acme.client:Storing nonce: hXNDuA8ik8m3aiFqaqpmAHWm5lBpwBOJMuwlyYXaRb4QjdTxH04
2025-02-01 06:59:35,597:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-02-01 06:59:35,598:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2025-02-01 06:59:35,598:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-02-01 06:59:35,599:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-02-01 06:59:35,599:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 06:59:35,600:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-02-01 06:59:35,600:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-02-01 06:59:35,600:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-02-01 06:59:35,601:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 06:59:35,639:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-02-01 06:59:35,836:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 06:59:35,837:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-02-01 06:59:35,838:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-02-01 06:59:35,842:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:05 UTC.
2025-02-01 06:59:35,843:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-02-01 06:59:35,843:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 06:59:35,848:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04860CB0>
Prep: True
2025-02-01 06:59:35,848:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04860CB0> and installer None
2025-02-01 06:59:35,848:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-02-01 06:59:35,853:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-02-01 06:59:35,854:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-02-01 06:59:35,856:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-02-01 06:59:36,323:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-02-01 06:59:36,324:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:58:55 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "udj41x61po0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2025-02-01 06:59:36,324:INFO:certbot._internal.main:Renewing an existing certificate
2025-02-01 06:59:42,685:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9028_key-certbot.pem
2025-02-01 06:59:48,704:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9026_csr-certbot.pem
2025-02-01 06:59:48,704:DEBUG:acme.client:Requesting fresh nonce
2025-02-01 06:59:48,704:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-02-01 06:59:48,862:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-02-01 06:59:48,863:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:59:07 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: aTttXYyyNyW4JUkxCE-CObz__eOd-WUd4cXQCI02NbPBueNJX7g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-02-01 06:59:48,863:DEBUG:acme.client:Storing nonce: aTttXYyyNyW4JUkxCE-CObz__eOd-WUd4cXQCI02NbPBueNJX7g
2025-02-01 06:59:48,863:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2025-02-01 06:59:48,869:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlOeVc0SlVreENFLUNPYnpfX2VPZC1XVWQ0Y1hRQ0kwMk5iUEJ1ZU5KWDdnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ndL8wUriP7IozQ1ZKbBZ6lduCILDeM-xFbjYLpXdqdFVg_msi8299AWSC_DgcLdnn03MdWeLK3LKsC3I7vEZdU9MwYcMrV3aE1h8bJwqusLRedbfjHAJQsjKKgsU6L73uDJwIcdid8wUKLhedToVZUnyYRAGdawOURCVqi5zJDJJzogue7Y0L5kT_Tqm9r5-Qg9wM7U4dr0BdLlT6Pwj4AEVULtE-yah9HzNjb5vBKnc5fiOmb6rDKyuqRfw1JqF2GWSBjYYu7RXYpVxa4LllWd-QIUbj2FINNlzYOig54xnouoATpr1h_nOzqi4m-s1GVFB7eVySjP8fVu5gnhurw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2025-02-01 06:59:49,056:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356
2025-02-01 06:59:49,057:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 01 Feb 2025 05:59:07 GMT
Content-Type: application/json
Content-Length: 356
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603881465
Replay-Nonce: aTttXYyyHY1VVZiwoLtK19-Aem-uJhiUozgDgq3o1MqVY-_QzB8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-02-06T20:17:04Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613770605"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603881465"
}
2025-02-01 06:59:49,057:DEBUG:acme.client:Storing nonce: aTttXYyyHY1VVZiwoLtK19-Aem-uJhiUozgDgq3o1MqVY-_QzB8
2025-02-01 06:59:49,057:DEBUG:acme.client:JWS payload:
b''
2025-02-01 06:59:49,063:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613770605:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlIWTFWVlppd29MdEsxOS1BZW0tdUpoaVVvemdEZ3EzbzFNcVZZLV9RekI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM3NzA2MDUifQ",
  "signature": "S43Yt2AK-YtJ2T7v63i3Vcygf16nP9dvdjpBjMfOf81sBTfNH3HyCJ1Rga1qW7TL438kIuGMSMASm8LOgLj8kZ-wPNVGaDJBTAVUQoKHllhGrJHOR2ABBnrD-ZkpfHRkyxSAGAN3BwmOIDKuz_xvQ3Cr4ZQo92US97OUH3QaWC9wO_g6__MW_HUK6z8NKAXT9g6pztiS7rwe29oP3ZpMfDfW4yFlXFZfcxkWO6mCEAK3LUtOxFBB_A5dtpP7IWFVP0e5yAbkBhpwjdYKgATHH2RpEro17CE8-63Y01q0UtevT1P_MGfFqR4ote0mM94Eo_PBWI3zQHxjfuLYlokssQ",
  "payload": ""
}
2025-02-01 06:59:49,225:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613770605 HTTP/1.1" 200 828
2025-02-01 06:59:49,226:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:59:08 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: aTttXYyyTFTTB8gUXO9M7Kz_jwF6GKZFhN5z1n4xNtnZspBT64g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-02-06T20:17:04Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/F9o6HQ",
      "status": "pending",
      "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/9nrvYA",
      "status": "pending",
      "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/QBtWUw",
      "status": "pending",
      "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws"
    }
  ]
}
2025-02-01 06:59:49,226:DEBUG:acme.client:Storing nonce: aTttXYyyTFTTB8gUXO9M7Kz_jwF6GKZFhN5z1n4xNtnZspBT64g
2025-02-01 06:59:49,227:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-02-01 06:59:49,227:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2025-02-01 06:59:49,228:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-02-01 06:59:49,228:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-02-01 06:59:49,229:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 06:59:49,229:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-02-01 06:59:49,229:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-02-01 06:59:49,229:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-02-01 06:59:49,230:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 06:59:49,270:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-02-01 06:59:49,485:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 06:59:49,486:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2025-02-01 06:59:49,487:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2025-02-01 06:59:49,491:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:33 UTC.
2025-02-01 06:59:49,491:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-02-01 06:59:49,491:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 06:59:49,496:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04543230>
Prep: True
2025-02-01 06:59:49,496:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04543230> and installer None
2025-02-01 06:59:49,496:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-02-01 06:59:49,501:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-02-01 06:59:49,502:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-02-01 06:59:49,504:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-02-01 06:59:49,958:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-02-01 06:59:49,959:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:59:08 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "j-PqhT4uaCo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-02-01 06:59:49,959:INFO:certbot._internal.main:Renewing an existing certificate
2025-02-01 06:59:56,599:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9029_key-certbot.pem
2025-02-01 07:00:02,615:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9027_csr-certbot.pem
2025-02-01 07:00:02,615:DEBUG:acme.client:Requesting fresh nonce
2025-02-01 07:00:02,615:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-02-01 07:00:02,765:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-02-01 07:00:02,766:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:59:21 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: TUC11O6XLzqMad0fzWaRkAkrea6WzcUjhZsCFnky--aLeTgdt-w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-02-01 07:00:02,766:DEBUG:acme.client:Storing nonce: TUC11O6XLzqMad0fzWaRkAkrea6WzcUjhZsCFnky--aLeTgdt-w
2025-02-01 07:00:02,766:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2025-02-01 07:00:02,772:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhMenFNYWQwZnpXYVJrQWtyZWE2V3pjVWpoWnNDRm5reS0tYUxlVGdkdC13IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "uijb9r2BojhQm43Fx_zvNiFxNh7UUcDoNmaxX2jqa_NKaslCekU5Pe-HptfeHhFP9cC3V12v0Kuv6XqMn2XknyNDS2jho5-pqrE8rdBceE4oHbLR3HpRNymzGVlYu7kBKHaWgBogr15_V_L34Y2RBOI8FjJCjsO3lo7ZkBFH9DxluVozqvkgbMOpZFhSMOH3Geha81Lk7nwu-YjqF-AEw7EWyT3tA6OPsNSo8qbDtMX2ZtBbit-jXO0zOVR2lTpj-m66buJdmILjE8YLpTMTWPBNU5pWklcjpl0I9pF_eLGcrdsmJyxwv2YH-IJaoq9FtPllTosR564Lyw8jSvd4UA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2025-02-01 07:00:02,974:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355
2025-02-01 07:00:02,974:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 01 Feb 2025 05:59:21 GMT
Content-Type: application/json
Content-Length: 355
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603934575
Replay-Nonce: TUC11O6XCiGUkYdccwN45SUeGHkTihwak-bCqwhenCGtMJT0Dx4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-02-06T20:17:18Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613854905"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603934575"
}
2025-02-01 07:00:02,975:DEBUG:acme.client:Storing nonce: TUC11O6XCiGUkYdccwN45SUeGHkTihwak-bCqwhenCGtMJT0Dx4
2025-02-01 07:00:02,975:DEBUG:acme.client:JWS payload:
b''
2025-02-01 07:00:02,981:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613854905:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhDaUdVa1lkY2N3TjQ1U1VlR0hrVGlod2FrLWJDcXdoZW5DR3RNSlQwRHg0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM4NTQ5MDUifQ",
  "signature": "W0lN2CgrZlV67V862SRXKlud6WBCSLrxNsNleLeNxlrTmkRFNHlnLD1ciSTQz9Z4t3hShmJtBYjp-8iH7nkKW0nxqz1A2xZzwwhiWnDplvyZAU03DIiQ7oxAxR8idwVwcY3Gh7OQzygDm3pp9g13IYX5TaL5vk5PA_lvfZXyavjic1aZbgBz3-O0skwCFIXPEVZ67tVdqvNzSUU7NrpQLdWAzaqRjNip2DkpR2y2NnufHgMl3k-aTKVDIkIk4kBIQHrM9z-nKwdhqJBGK0aO7W7mXfUsozz7PwVTtNO16HGeIW26YmNBAYYGqP548dLovFB6okDfpu_0ZZoEAuVkiQ",
  "payload": ""
}
2025-02-01 07:00:03,138:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613854905 HTTP/1.1" 200 827
2025-02-01 07:00:03,139:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:59:21 GMT
Content-Type: application/json
Content-Length: 827
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UvlUZ57PCISfMwyTxqbcSFMcV7fdn-FJE18ln0QxBKdK8clcKoo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-02-06T20:17:18Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/7RtzaQ",
      "status": "pending",
      "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/ke1eMQ",
      "status": "pending",
      "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/bMnPCg",
      "status": "pending",
      "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ"
    }
  ]
}
2025-02-01 07:00:03,139:DEBUG:acme.client:Storing nonce: UvlUZ57PCISfMwyTxqbcSFMcV7fdn-FJE18ln0QxBKdK8clcKoo
2025-02-01 07:00:03,140:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-02-01 07:00:03,140:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2025-02-01 07:00:03,140:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-02-01 07:00:03,141:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-02-01 07:00:03,141:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 07:00:03,141:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-02-01 07:00:03,142:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-02-01 07:00:03,142:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-02-01 07:00:03,143:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 07:00:03,190:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-02-01 07:00:03,391:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 07:00:03,392:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2025-02-01 07:00:03,393:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2025-02-01 07:00:03,397:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:54 UTC.
2025-02-01 07:00:03,397:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-02-01 07:00:03,398:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 07:00:03,403:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x00892FB0>
Prep: True
2025-02-01 07:00:03,403:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x00892FB0> and installer None
2025-02-01 07:00:03,403:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-02-01 07:00:03,408:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-02-01 07:00:03,408:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-02-01 07:00:03,411:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-02-01 07:00:03,844:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-02-01 07:00:03,845:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:59:22 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "U-vp2Amgrcw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-02-01 07:00:03,846:INFO:certbot._internal.main:Renewing an existing certificate
2025-02-01 07:00:10,109:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9030_key-certbot.pem
2025-02-01 07:00:16,139:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9028_csr-certbot.pem
2025-02-01 07:00:16,139:DEBUG:acme.client:Requesting fresh nonce
2025-02-01 07:00:16,139:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-02-01 07:00:16,285:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-02-01 07:00:16,286:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:59:35 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: TUC11O6Xhgl7WGk5E2xvMXed-ffRG4guIWfSe8ffNlPsakAWHro
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-02-01 07:00:16,286:DEBUG:acme.client:Storing nonce: TUC11O6Xhgl7WGk5E2xvMXed-ffRG4guIWfSe8ffNlPsakAWHro
2025-02-01 07:00:16,286:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2025-02-01 07:00:16,294:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhoZ2w3V0drNUUyeHZNWGVkLWZmUkc0Z3VJV2ZTZThmZk5sUHNha0FXSHJvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "snjhiKjt7hWz1nULFCGYMwa6WJxIWmyG2qfUYZJ6pSKMhMawBJUxRezoh3UJOPYH3TdfQFGp-Vo7fvqIJP2p4Hts6SXB-5Ye1eUktR9uQS0pJO3Kawr0q1uEuKQZQaf7Nl6yxBL72iqz_6Xh7cYfsKAw2Bqbg_WDx94Dg05RWEk2lQRnIyVt1Mfbp_qYvZ9_AyCQNUAN-15ha6-z635M_3-__TZCXBvdnO569pVLkMUFG9HBu0tPbD_8lrlyHIdcD6xuKq9Ujuss0-9U2MiIBG81jRjOydV5gyQ-En113UlB0JFVJPQcK_6XE6pur41WY6rKhsisFp_lQqmKH8mKqg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-02-01 07:00:16,475:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2025-02-01 07:00:16,475:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 01 Feb 2025 05:59:35 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603978585
Replay-Nonce: TUC11O6XTmvHfjkCoHjXnof00eMVRCQ9DqCM4RMX-psROBJofd8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-02-06T20:17:32Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613923815"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603978585"
}
2025-02-01 07:00:16,475:DEBUG:acme.client:Storing nonce: TUC11O6XTmvHfjkCoHjXnof00eMVRCQ9DqCM4RMX-psROBJofd8
2025-02-01 07:00:16,476:DEBUG:acme.client:JWS payload:
b''
2025-02-01 07:00:16,482:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613923815:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhUbXZIZmprQ29Ialhub2YwMGVNVlJDUTlEcUNNNFJNWC1wc1JPQkpvZmQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM5MjM4MTUifQ",
  "signature": "AFYkjRoVpuMxgjJEk34p0EPzpn-YwyUwDAWsBRXBg3ub4THgH6vKJHji0FFpdy-U8toZB-FOxdVsL5V2SQRuvtah4ZUFxZ4OkMamEs05_lbyuQy54jPZjbc1_Z9zmha2iUG69ZFNxfYRwDqYos5kmBe0A8DLmWHQkaat3leKbgw1KKx0ZW8WEUktFVO3HMY4Ii8RdyLFGoSPGd408pGocXKl15CSGNeyD-r359SUX8XVSulraAOg3GI_1iX_MC9RKXfPwigM6lJ0VfIdypbzBHAVCsuwx-ukcFOwAN_CEdKs9mAOwCCPjsJqrxqKnHeJYv8wwUPXiiHFAy73f0WGRQ",
  "payload": ""
}
2025-02-01 07:00:16,638:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613923815 HTTP/1.1" 200 823
2025-02-01 07:00:16,639:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:59:35 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UvlUZ57PS_9ma5kyAgT7Qwki-HeJfYB4NMfV0kTDYizE1Sjw6iI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-02-06T20:17:32Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/t9VvUw",
      "status": "pending",
      "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/wNRiHQ",
      "status": "pending",
      "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/wvLngQ",
      "status": "pending",
      "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI"
    }
  ]
}
2025-02-01 07:00:16,639:DEBUG:acme.client:Storing nonce: UvlUZ57PS_9ma5kyAgT7Qwki-HeJfYB4NMfV0kTDYizE1Sjw6iI
2025-02-01 07:00:16,640:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-02-01 07:00:16,640:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2025-02-01 07:00:16,640:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-02-01 07:00:16,641:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-02-01 07:00:16,641:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 07:00:16,642:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-02-01 07:00:16,642:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-02-01 07:00:16,642:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-02-01 07:00:16,643:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 07:00:16,681:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2025-02-01 07:00:16,877:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 07:00:16,878:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is signed by the certificate's issuer.
2025-02-01 07:00:16,879:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD
2025-02-01 07:00:16,884:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:15 UTC.
2025-02-01 07:00:16,884:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-02-01 07:00:16,884:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 07:00:16,889:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0456C790>
Prep: True
2025-02-01 07:00:16,889:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0456C790> and installer None
2025-02-01 07:00:16,890:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-02-01 07:00:16,894:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-02-01 07:00:16,895:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-02-01 07:00:16,897:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-02-01 07:00:17,335:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-02-01 07:00:17,336:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:59:36 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "nYcmNruTupE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-02-01 07:00:17,336:INFO:certbot._internal.main:Renewing an existing certificate
2025-02-01 07:00:23,412:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9031_key-certbot.pem
2025-02-01 07:00:29,387:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9029_csr-certbot.pem
2025-02-01 07:00:29,388:DEBUG:acme.client:Requesting fresh nonce
2025-02-01 07:00:29,388:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-02-01 07:00:29,535:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-02-01 07:00:29,535:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:59:48 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: TUC11O6XRMUpRZryKWlYYpmCr6GGGSPqdnU3-pwbtE07oyN_4Hg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-02-01 07:00:29,535:DEBUG:acme.client:Storing nonce: TUC11O6XRMUpRZryKWlYYpmCr6GGGSPqdnU3-pwbtE07oyN_4Hg
2025-02-01 07:00:29,536:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2025-02-01 07:00:29,542:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhSTVVwUlpyeUtXbFlZcG1DcjZHR0dTUHFkblUzLXB3YnRFMDdveU5fNEhnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "bkuAdMZM7C5iWAEQkEfAYMuN866jj5mdlFWfv4YxNIXgMjqbS6JCVWmRZ1DZKnNU5w-vhMHkntw3sAyDszvYhwPvQ2nsBd96kk-mCGU5dKFhKfPbWUSi6c600txmiWewdh_aJAKQhaLSp_wrFga_g7iv94bvujODhQWJE5yRa9klEh0CnjR3D-5pz3G8VJe0Rn75LGkpB9w_Wz43HDeVnfPms1Xl-sDfl_T4IA6lstcKZONLsHN3DqYmXwnNwSF8qxc1k0O-NatoWFG5K1-XFCtrgp2zsodKAas8d6w42ENNtycYMuhimCNmw9JMxxYzwbhiLiBqh-hap4ETbl55zw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-02-01 07:00:29,751:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2025-02-01 07:00:29,752:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 01 Feb 2025 05:59:48 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349604024205
Replay-Nonce: TUC11O6XCJVP0e22y4Ax4mUxJMIB5RXaF2zYCLSRwM-W2VfL8o4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-02-06T20:17:46Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613992955"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349604024205"
}
2025-02-01 07:00:29,752:DEBUG:acme.client:Storing nonce: TUC11O6XCJVP0e22y4Ax4mUxJMIB5RXaF2zYCLSRwM-W2VfL8o4
2025-02-01 07:00:29,752:DEBUG:acme.client:JWS payload:
b''
2025-02-01 07:00:29,758:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613992955:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhDSlZQMGUyMnk0QXg0bVV4Sk1JQjVSWGFGMnpZQ0xTUndNLVcyVmZMOG80IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM5OTI5NTUifQ",
  "signature": "RdiX3GUajveQRp4YGZfaS6r_mncH2tKYmYdkr_vGmeTbTTQFyahZ2VNH3pjuFLKf6IGtGy4HVQUiaXCoc0eN8u9cYkBr7AbJ1-Y2wLu1ds2bS-K4kVOAabaINE1ULrB1XB9UrXL0cabRzrS1JInpkzL6b-OWbbmgq6QWT3NqLYfBQ7ujhdm0oMxbmk46_R8GzqAfmmRCSTe4CvAldvyz9xQUgnCYCvgJC3w4_aYjZJ1teuAigCHKYbbUUS3YszsDU4MQwhx2yj9dB6OSk47cueln5QWNTmQSsp5FElaZx1JYKkyGlwapCi_vHhVcmv8-kQ6MWmL3R8GnC1-ZdpLK1g",
  "payload": ""
}
2025-02-01 07:00:29,910:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613992955 HTTP/1.1" 200 823
2025-02-01 07:00:29,911:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:59:48 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: TUC11O6XlRKA6Bvm8l2gAfkNepNH0DZ2HNzBKNP52-myjMftKHg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-02-06T20:17:46Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/Sy2Pkg",
      "status": "pending",
      "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/G_4bSw",
      "status": "pending",
      "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/xSdP2A",
      "status": "pending",
      "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw"
    }
  ]
}
2025-02-01 07:00:29,911:DEBUG:acme.client:Storing nonce: TUC11O6XlRKA6Bvm8l2gAfkNepNH0DZ2HNzBKNP52-myjMftKHg
2025-02-01 07:00:29,912:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-02-01 07:00:29,912:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2025-02-01 07:00:29,913:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-02-01 07:00:29,913:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-02-01 07:00:29,914:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 07:00:29,914:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-02-01 07:00:29,914:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-02-01 07:00:29,915:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-02-01 07:00:29,915:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 07:00:29,966:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-02-01 07:00:30,190:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-02-01 07:00:30,192:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2025-02-01 07:00:30,192:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2025-02-01 07:00:30,197:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:38 UTC.
2025-02-01 07:00:30,197:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2025-02-01 07:00:30,197:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-02-01 07:00:30,202:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x045438B0>
Prep: True
2025-02-01 07:00:30,203:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x045438B0> and installer None
2025-02-01 07:00:30,203:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-02-01 07:00:30,207:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2025-02-01 07:00:30,208:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-02-01 07:00:30,210:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-02-01 07:00:30,658:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-02-01 07:00:30,659:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 05:59:49 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Sy6c_WXR358": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-02-01 07:00:30,659:INFO:certbot._internal.main:Renewing an existing certificate
2025-02-01 07:00:36,712:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9032_key-certbot.pem
2025-02-01 07:00:42,686:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9030_csr-certbot.pem
2025-02-01 07:00:42,687:DEBUG:acme.client:Requesting fresh nonce
2025-02-01 07:00:42,687:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-02-01 07:00:42,836:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-02-01 07:00:42,837:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 06:00:01 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: TUC11O6XsGfi6NKSRKNSqpWW_dWaowEfGTGSyr3JnESYRm4JyGk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-02-01 07:00:42,837:DEBUG:acme.client:Storing nonce: TUC11O6XsGfi6NKSRKNSqpWW_dWaowEfGTGSyr3JnESYRm4JyGk
2025-02-01 07:00:42,837:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2025-02-01 07:00:42,843:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhzR2ZpNk5LU1JLTlNxcFdXX2RXYW93RWZHVEdTeXIzSm5FU1lSbTRKeUdrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "iFGHklaX8wukQR5aUYOPuqrfUrhLU7D8SO1LZVUKIjoj77MIGD14IzOluWtBY8aLZ4SFgqiuFzVOZekuY96ZvZ5WCnRooCtd2QC2-6Lrlr3pBT3Z_UesVQZskrHYiHYHAqDQS_vEg7o4vj1MTE1QuFw9AA4lhucgbAN3GiPA_2OzxdzHSWQABUjPbooxfzng_BfdARAINn6Q47SXQaXmvMrSuMXopYeg6iO9l6RNXwgecfmnTgth2CoOQ31kp-vzWaqUjlEdht65rhvk28LH2396d5lFqEBk__erkw75CIenRkH3EQz4u5XOByQUCZs8SGqWMr3N_fPRgIsg5h_szg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2025-02-01 07:00:43,019:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2025-02-01 07:00:43,020:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 01 Feb 2025 06:00:01 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349604068465
Replay-Nonce: TUC11O6Xj1R-yR47vjr82HXrtg0Ik5MOIbpFc9QuiDMLgolglBQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-02-06T20:18:00Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468614059925"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349604068465"
}
2025-02-01 07:00:43,020:DEBUG:acme.client:Storing nonce: TUC11O6Xj1R-yR47vjr82HXrtg0Ik5MOIbpFc9QuiDMLgolglBQ
2025-02-01 07:00:43,020:DEBUG:acme.client:JWS payload:
b''
2025-02-01 07:00:43,026:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468614059925:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhqMVIteVI0N3ZqcjgySFhydGcwSWs1TU9JYnBGYzlRdWlETUxnb2xnbEJRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTQwNTk5MjUifQ",
  "signature": "ZoFzuwvRJ28phDdGe3d79AePkDMkGKpjre8drVTYHbfBKChaFSubSK86BhDbCO_qCogTRcqsKnpLxVuO0mhEYcZx8rbuZZ7p1mEl_q-kmTC2S1oBiyHyGGtAoikeUEOt3bJAhecFzOfYT0p30Lnj6mxGnLQ42h86PrS_auysXpk1VRHKVULea-YjRsKeyK8RGwcpvNSAYDPG1WKqSooOuTxBTlIxp3soozW8zAkbWBhmMq1fG6fffIet1PUK65uT32QP68GWtw7386InDoVchhbV2Vov601hGAucVtpLlVPR4d5gDTCd-lBjbeludb9tiRhWv7EcR_qbjJjl9OOtTA",
  "payload": ""
}
2025-02-01 07:00:43,188:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468614059925 HTTP/1.1" 200 823
2025-02-01 07:00:43,188:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 01 Feb 2025 06:00:02 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: TUC11O6XGl7CMxDMNloxd3x4yMUHELZ9yenf9E9wQJGmTswwXww
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2025-02-06T20:18:00Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/YrgyBQ",
      "status": "pending",
      "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/f-K6ug",
      "status": "pending",
      "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/B9cGNQ",
      "status": "pending",
      "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks"
    }
  ]
}
2025-02-01 07:00:43,189:DEBUG:acme.client:Storing nonce: TUC11O6XGl7CMxDMNloxd3x4yMUHELZ9yenf9E9wQJGmTswwXww
2025-02-01 07:00:43,189:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-02-01 07:00:43,190:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2025-02-01 07:00:43,190:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2025-02-01 07:00:43,191:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2025-02-01 07:00:43,192:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 07:00:43,192:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-02-01 07:00:43,192:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-02-01 07:00:43,192:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2025-02-01 07:00:43,193:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2025-02-01 07:00:43,194:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2025-02-01 07:00:43,194:ERROR:certbot._internal.renewal:  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2025-02-01 07:00:43,195:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 11 renew failure(s), 0 parse failure(s)
2025-02-01 07:00:43,208:ERROR:certbot._internal.log:11 renew failure(s), 0 parse failure(s)