2024-11-22 13:30:47,882:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-11-22 13:30:47,882:DEBUG:certbot._internal.main:Arguments: []
2024-11-22 13:30:47,882:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-11-22 13:30:48,553:DEBUG:certbot._internal.log:Root logging level set at 20
2024-11-22 13:30:48,553:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-11-22 13:30:48,591:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04D26ED0> and installer <certbot._internal.cli.cli_utils._Default object at 0x04D26ED0>
2024-11-22 13:30:48,635:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-22 13:30:48,834:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-22 13:30:48,835:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is signed by the certificate's issuer.
2024-11-22 13:30:48,840:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD
2024-11-22 13:30:48,848:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:06 UTC.
2024-11-22 13:30:48,849:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:30:48,849:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:30:48,854:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04784990>
Prep: True
2024-11-22 13:30:48,855:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04784990> and installer None
2024-11-22 13:30:48,855:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-22 13:30:48,898:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-22 13:30:48,899:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-22 13:30:48,902:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-22 13:30:49,370:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-22 13:30:49,371:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:30:49 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "JFDfHUaSi6g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-22 13:30:49,372:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-22 13:30:55,277:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8767_key-certbot.pem
2024-11-22 13:31:01,145:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8765_csr-certbot.pem
2024-11-22 13:31:01,146:DEBUG:acme.client:Requesting fresh nonce
2024-11-22 13:31:01,146:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-22 13:31:01,295:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-22 13:31:01,296:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:01 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zIaIDaiTCV2yXLh1ytC0RwylC_RTtOTCyBUqLhJhAG2LgR_ViHQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-22 13:31:01,296:DEBUG:acme.client:Storing nonce: zIaIDaiTCV2yXLh1ytC0RwylC_RTtOTCyBUqLhJhAG2LgR_ViHQ
2024-11-22 13:31:01,296:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-22 13:31:01,303:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRDVjJ5WExoMXl0QzBSd3lsQ19SVHRPVEN5QlVxTGhKaEFHMkxnUl9WaUhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "cVLGKwLcysluOF6648itYKUw0mNL59fc3j6NxqaagTbzCFU2cWNnoQvSJzexhODyCgiNr_8Jqe8Sdq1QMVNAEENcSW8tJDe2FQTYZ9_rR51khinJZudWXpTfh47DJPhTqGkXL-vNlCAWNnbrBlBPxt65xLEc7LxQXjte6LVQONpfwmy2sVUAa8baFmx1Zsmt0yRS89PhE7xuY3UtanjBqSeX6iZD2aIUW8q8_RyBr_Fla4gdyU9xcWQo3kInP0drS7X_MOdiNIHMtTBZCbgre4nJwdMyYxRGkofdpDRvbQK3_ZqVFUenBBf1p8baW7aOSo1V6fsrGpcZ11d06X4uQQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-22 13:31:01,467:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356
2024-11-22 13:31:01,467:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 22 Nov 2024 12:31:01 GMT
Content-Type: application/json
Content-Length: 356
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335168147
Replay-Nonce: zIaIDaiTvMfwLqLmCa_-l-pzGrDbMnaZFyAiNPrDmWB8i46UhVM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-28T12:30:42Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385871837"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335168147"
}
2024-11-22 13:31:01,468:DEBUG:acme.client:Storing nonce: zIaIDaiTvMfwLqLmCa_-l-pzGrDbMnaZFyAiNPrDmWB8i46UhVM
2024-11-22 13:31:01,468:DEBUG:acme.client:JWS payload:
b''
2024-11-22 13:31:01,474:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385871837:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVR2TWZ3THFMbUNhXy1sLXB6R3JEYk1uYVpGeUFpTlByRG1XQjhpNDZVaFZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODU4NzE4MzcifQ",
  "signature": "mILJvCBEi5WolwOntzaKq0lbpI1HFnJ0r3ZEo27gQyeuX0g1HoDmMfxK9UANw9xPnNvRSU2w6bpANvRtb_z7rQnfL2NBs_z7bkfUF6BFG-TAQ8ID_LbfS-Jj2N6PRmq4HH-cSeF5CpXJTe7v8CcfLGP0usnLuAdLLTtozIAQopLeTkoosMJjmB0ZG5x7PBq8ZW7rzB72EMMr1e82TE10WL3J2OOdyTIdhuyBAoqlSA1GsWV9P3yahAyahHOhkV71OkJb5YQG7l-1LfA_qHz2geRxcyhrl16C9-mXTwj-bTK4O0skT8U6dTcrjm3v7uwF9_SHcfF9fMiT5s-WEAxcJw",
  "payload": ""
}
2024-11-22 13:31:01,631:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433385871837 HTTP/1.1" 200 828
2024-11-22 13:31:01,632:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:01 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: gtp33icHlvCUk6hyGgFmGb2XJqf9k7xe_eqN_w-8SO_IxbQB0-I
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-28T12:30:42Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385871837/UndPAg",
      "status": "pending",
      "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385871837/lzGNtw",
      "status": "pending",
      "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385871837/08KxfQ",
      "status": "pending",
      "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg"
    }
  ]
}
2024-11-22 13:31:01,632:DEBUG:acme.client:Storing nonce: gtp33icHlvCUk6hyGgFmGb2XJqf9k7xe_eqN_w-8SO_IxbQB0-I
2024-11-22 13:31:01,632:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-22 13:31:01,632:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-11-22 13:31:01,640:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-22 13:31:01,640:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-22 13:31:01,643:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:31:01,643:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-22 13:31:01,643:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-22 13:31:01,644:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-22 13:31:01,648:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:31:01,687:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-22 13:31:01,927:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-22 13:31:01,928:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-22 13:31:01,929:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-22 13:31:01,935:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:27 UTC.
2024-11-22 13:31:01,935:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:31:01,935:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:31:01,940:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D2BE30>
Prep: True
2024-11-22 13:31:01,940:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D2BE30> and installer None
2024-11-22 13:31:01,940:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-22 13:31:01,945:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-22 13:31:01,946:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-22 13:31:01,948:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-22 13:31:02,415:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-22 13:31:02,415:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:02 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "bmLW8Q1p9SI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-22 13:31:02,416:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-22 13:31:08,378:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8768_key-certbot.pem
2024-11-22 13:31:13,971:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8766_csr-certbot.pem
2024-11-22 13:31:13,972:DEBUG:acme.client:Requesting fresh nonce
2024-11-22 13:31:13,972:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-22 13:31:14,128:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-22 13:31:14,128:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:14 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FVNV6H0MFwg5tAt4dpUFftCakmOydxrMqZyKW-_FinjRMozN_1k
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-22 13:31:14,128:DEBUG:acme.client:Storing nonce: FVNV6H0MFwg5tAt4dpUFftCakmOydxrMqZyKW-_FinjRMozN_1k
2024-11-22 13:31:14,129:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-22 13:31:14,135:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1Gd2c1dEF0NGRwVUZmdENha21PeWR4ck1xWnlLVy1fRmlualJNb3pOXzFrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "qYKHkKbPyUiBkmgri_YPTrYwJmMTpkniRMSCf3GhgQgjz28zpcNS9-OUNXzaD3KbajO7LAA55ihGsf6IIUDTzGerkBghxlZOGX6oBn3Wdh-M8Fy12nMAeWk-XgDmv76v79vNPmuAGMKwjVDyArqQb2TxAbv9W1pHUB8ophszGwEYm5NQiPrJN9TDOYeEyPss1afLNwaW5_khEWt3nkwjySBXD92_Fv3-G3bfis5Da_WpLKuvaeY4mNxyOIQ6BO5ZUqs9R6KmeIeRZg6pxDz9PO6jk9McTs7wSuWSN_UZh6thw5-jsa9p3BAMJZWKJUEZdqdFaHOshtti48KgFn7q7g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-22 13:31:14,320:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-11-22 13:31:14,321:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 22 Nov 2024 12:31:14 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335212297
Replay-Nonce: FVNV6H0MXAxhW_G7BI5_UQYijf3k00IjFXKQXnl-jriCwmiT9rc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-28T12:30:55Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385936637"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335212297"
}
2024-11-22 13:31:14,321:DEBUG:acme.client:Storing nonce: FVNV6H0MXAxhW_G7BI5_UQYijf3k00IjFXKQXnl-jriCwmiT9rc
2024-11-22 13:31:14,321:DEBUG:acme.client:JWS payload:
b''
2024-11-22 13:31:14,327:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385936637:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1YQXhoV19HN0JJNV9VUVlpamYzazAwSWpGWEtRWG5sLWpyaUN3bWlUOXJjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODU5MzY2MzcifQ",
  "signature": "LJ-M8r6V_SzBlUg0JQK2Pe28JR52KPoy3BYd-srN-FsXiOv7_MEh97AhiCX8Woozg3OZknmsuriTUZH9k2hEFIxiMgyyZxkuSRTazN6ODdnxxfMK0guWPTCR4oypBPFaT_XfPDqIop8OVbWc3iIpk66JpWqrCZ1WK-rhm79kka9IBh8cKsP_HVldxnqFirbBG1kT7WIaVI_lPPK_-5_G24_THCEMaqaLOcUn7VFDl1ouGIjzR3fuHPH7R-4pVzLakqKn0FGfzmqj-k9k03EzUSQf0957uwf95lcR50Ngd1Ler4xjSdMFNMi0oVSeMlqK3PtH3GZ1Zg8YOXWDQQfVzw",
  "payload": ""
}
2024-11-22 13:31:14,488:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433385936637 HTTP/1.1" 200 822
2024-11-22 13:31:14,489:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:14 GMT
Content-Type: application/json
Content-Length: 822
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FVNV6H0M7QH2PXl3Fp7CAH75AeSwXytheZqQ9913PZCmZQuc8xo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-28T12:30:55Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385936637/Q-td3A",
      "status": "pending",
      "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385936637/bnCyvA",
      "status": "pending",
      "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385936637/UMKluQ",
      "status": "pending",
      "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I"
    }
  ]
}
2024-11-22 13:31:14,489:DEBUG:acme.client:Storing nonce: FVNV6H0M7QH2PXl3Fp7CAH75AeSwXytheZqQ9913PZCmZQuc8xo
2024-11-22 13:31:14,490:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-22 13:31:14,490:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-11-22 13:31:14,490:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-22 13:31:14,490:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-22 13:31:14,491:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:31:14,491:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-22 13:31:14,491:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-22 13:31:14,493:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-22 13:31:14,494:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:31:14,543:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-22 13:31:14,812:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-22 13:31:14,813:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-11-22 13:31:14,814:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-11-22 13:31:14,819:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:47 UTC.
2024-11-22 13:31:14,819:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:31:14,819:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:31:14,824:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04799270>
Prep: True
2024-11-22 13:31:14,825:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04799270> and installer None
2024-11-22 13:31:14,825:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-22 13:31:14,829:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-22 13:31:14,829:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-22 13:31:14,832:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-22 13:31:15,312:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-22 13:31:15,313:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:15 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "3mIefRasXCA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-22 13:31:15,313:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-22 13:31:21,431:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8769_key-certbot.pem
2024-11-22 13:31:27,045:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8767_csr-certbot.pem
2024-11-22 13:31:27,046:DEBUG:acme.client:Requesting fresh nonce
2024-11-22 13:31:27,046:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-22 13:31:27,206:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-22 13:31:27,207:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:27 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eYk8fkgT6WiPrz-jjCCu1ufMlPJ5Epp80QjnUvVh958oGvT7P34
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-22 13:31:27,207:DEBUG:acme.client:Storing nonce: eYk8fkgT6WiPrz-jjCCu1ufMlPJ5Epp80QjnUvVh958oGvT7P34
2024-11-22 13:31:27,207:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-22 13:31:27,213:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1Q2V2lQcnotampDQ3UxdWZNbFBKNUVwcDgwUWpuVXZWaDk1OG9HdlQ3UDM0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "mHpem8lOU4IZP4t3axu1I5ucU6J43VqLVc19zTDQJeZ0LkWsulQyb1i1Y4hZi43N2pVdvdDE_CP8zS6r-pNWUOtoS_AzYgaH74rm__8D_H18bfdrudSu13FgCcIkb1jtRUvK12G1_SkV0zdY5sCDSDdokYYGrpDiSptX_ujkctuREEr_7UtV2BTpAMKYGEcnKqOk3wXWXsb0EgHYf8eQIbsM_Lx21WfpL5oa1P3iu-0g74pW2zk_zeNoGqcB1q664xwqZoxeaJYtLEipOW8Cc3WbX43UlFPEQrH2DYESxvvE0F9_ZNXrMVh1NpX_hE4sMaiL4E-z_MA-VrLbeVAAUg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-22 13:31:27,403:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353
2024-11-22 13:31:27,404:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 22 Nov 2024 12:31:27 GMT
Content-Type: application/json
Content-Length: 353
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335268447
Replay-Nonce: eYk8fkgTAt5G6m-9Ef3tssQ_U50wjetEXP1xUD-ydDymnuJsTOo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-28T12:31:08Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386017137"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335268447"
}
2024-11-22 13:31:27,404:DEBUG:acme.client:Storing nonce: eYk8fkgTAt5G6m-9Ef3tssQ_U50wjetEXP1xUD-ydDymnuJsTOo
2024-11-22 13:31:27,404:DEBUG:acme.client:JWS payload:
b''
2024-11-22 13:31:27,409:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386017137:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RBdDVHNm0tOUVmM3Rzc1FfVTUwd2pldEVYUDF4VUQteWREeW1udUpzVE9vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYwMTcxMzcifQ",
  "signature": "rq4jFFcBJDPmET0ua3Kt1_5K8MwKQOUGAFy-10b_o2M7Bub61PyuqXmRiDsDowdNhWjNAOGC1Rd8JhgI5Tseqhx24FRrwbnI_r1wNVcnm5SyDMfXfyZ4lN_3av-RcTt5sDapw3eO6GPDRllONA-jgcmNc-q5mPLKh8YjVEV31_d9J7JHDWvF8PD2vsVnSry_9Bq9Wt393-MQuX4141F-9HPzqTOoHEY9csJQc9Jg4vP_HFyMkZRi4VWfNq0sR20YOxcCJJt3ZuKZOEy6YDyKVQk1VK3MCdjmCYCF-rxdv0M4Gp3mv06iNkqar5RxXGcwXkwNAX44FhZiuZxvBbV3xQ",
  "payload": ""
}
2024-11-22 13:31:27,575:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386017137 HTTP/1.1" 200 825
2024-11-22 13:31:27,575:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:27 GMT
Content-Type: application/json
Content-Length: 825
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eYk8fkgTl5duAcbhAFsqBqPj21lqvXSfxl2ncQnX2b1R5E4k8PE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-28T12:31:08Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386017137/Q2i4ow",
      "status": "pending",
      "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386017137/4FswZw",
      "status": "pending",
      "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386017137/5ns8sQ",
      "status": "pending",
      "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY"
    }
  ]
}
2024-11-22 13:31:27,576:DEBUG:acme.client:Storing nonce: eYk8fkgTl5duAcbhAFsqBqPj21lqvXSfxl2ncQnX2b1R5E4k8PE
2024-11-22 13:31:27,576:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-22 13:31:27,576:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-11-22 13:31:27,577:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-22 13:31:27,577:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-22 13:31:27,578:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:31:27,578:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-22 13:31:27,578:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-22 13:31:27,579:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-22 13:31:27,579:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:31:27,628:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-22 13:31:27,821:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-22 13:31:27,823:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is signed by the certificate's issuer.
2024-11-22 13:31:27,823:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD
2024-11-22 13:31:27,827:INFO:certbot._internal.renewal:Cert not yet due for renewal
2024-11-22 13:31:27,831:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:31:27,881:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-22 13:31:28,040:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-22 13:31:28,041:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-22 13:31:28,042:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-22 13:31:28,047:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:08 UTC.
2024-11-22 13:31:28,047:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:31:28,047:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:31:28,053:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0478BDD0>
Prep: True
2024-11-22 13:31:28,053:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0478BDD0> and installer None
2024-11-22 13:31:28,053:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-22 13:31:28,058:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-22 13:31:28,059:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-22 13:31:28,061:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-22 13:31:28,546:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-22 13:31:28,546:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:28 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "rYXuYOTKW28": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-22 13:31:28,547:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-22 13:31:34,592:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8770_key-certbot.pem
2024-11-22 13:31:40,228:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8768_csr-certbot.pem
2024-11-22 13:31:40,228:DEBUG:acme.client:Requesting fresh nonce
2024-11-22 13:31:40,229:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-22 13:31:40,389:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-22 13:31:40,390:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:40 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FVNV6H0M6j0eUQynnso-jPEP3ksnL9fG0AbU-b7KUmtFt5_Qo6U
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-22 13:31:40,390:DEBUG:acme.client:Storing nonce: FVNV6H0M6j0eUQynnso-jPEP3ksnL9fG0AbU-b7KUmtFt5_Qo6U
2024-11-22 13:31:40,390:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-11-22 13:31:40,396:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME02ajBlVVF5bm5zby1qUEVQM2tzbkw5ZkcwQWJVLWI3S1VtdEZ0NV9RbzZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "dUFpkqK97_i6vqIl5ZAIx4D0IiwfAO5eVD22QNlMergy4AgK1bQOy6VsKpVlIGTmU3bS9p3zW4ifUCPHMoMbBgb9dd-KoUL3HGL3rdzJdP1Zh9vQw5MPwmAxpZnlFxZILowk4oTCDTxwUYBxqzYvMTCpev9k8Dai5jU0pvcl8Tg8lFrxr7Vtw9xV5nhnOr7mpJx-t-luugzqI_G0dTKstDyGN-ATS9Hm97XfS0qt5a_iyukd-ipBHx2I_zvbB2ePW8R--y-dv-dti2N0bSbpFIwU2EYoQr60cXJiBAQ23tj-LlwikSx7B1kO9BxmKC4PyGy9uAXW7ytVg465V0Tj6w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-22 13:31:40,585:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-11-22 13:31:40,585:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 22 Nov 2024 12:31:40 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335319597
Replay-Nonce: FVNV6H0MsRxqdfQqx9-dy9qxjAL02Xai7S-EmfSEcIoRN5Ap2Y8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-28T12:31:21Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386094387"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335319597"
}
2024-11-22 13:31:40,586:DEBUG:acme.client:Storing nonce: FVNV6H0MsRxqdfQqx9-dy9qxjAL02Xai7S-EmfSEcIoRN5Ap2Y8
2024-11-22 13:31:40,586:DEBUG:acme.client:JWS payload:
b''
2024-11-22 13:31:40,592:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386094387:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1zUnhxZGZRcXg5LWR5OXF4akFMMDJYYWk3Uy1FbWZTRWNJb1JONUFwMlk4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYwOTQzODcifQ",
  "signature": "UNldOt5iScnAhnMTjkxFaTFAFB_GRzI4Bln2nPVbqjdlO_fKBSkWKfmz7RgcJcMfZvFiiTxWU_J94hupJsV1G4alyaAb7PNTywAZxNlxsk8oCF094jp4wjmlHi9IFkgy__XkJp1Oph4a7qnfDw6Rr6C3vq-HmJo1DNMnO4416Q9mzCHzDt3S3HaM2u07RjSr78iD_xV7Z7uSaRHrMhcSqSad7sHso_ndBe0xpSYkC2wDzp8297qtja28xwm_pGwTgOZQSGIkZFPLx7hb9YnXA0FqTS271b3UmLICtZBOptua-Ouw31QhEam6VD5Bnavj8kpM8vLf3gZ1eHDp4HxvZw",
  "payload": ""
}
2024-11-22 13:31:40,757:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386094387 HTTP/1.1" 200 819
2024-11-22 13:31:40,757:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:40 GMT
Content-Type: application/json
Content-Length: 819
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eYk8fkgTTqwvTyuP6KEdDH39cM7qISCezTRAVLAjm9FrmjZn_Q8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-28T12:31:21Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386094387/C_-m4Q",
      "status": "pending",
      "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386094387/GfKRvQ",
      "status": "pending",
      "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386094387/-o13Yw",
      "status": "pending",
      "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE"
    }
  ]
}
2024-11-22 13:31:40,758:DEBUG:acme.client:Storing nonce: eYk8fkgTTqwvTyuP6KEdDH39cM7qISCezTRAVLAjm9FrmjZn_Q8
2024-11-22 13:31:40,758:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-22 13:31:40,759:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-11-22 13:31:40,759:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-22 13:31:40,759:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-22 13:31:40,760:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:31:40,760:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-22 13:31:40,761:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-22 13:31:40,761:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-22 13:31:40,762:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:31:40,801:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-22 13:31:40,999:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-22 13:31:41,001:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-22 13:31:41,001:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-22 13:31:41,007:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:27 UTC.
2024-11-22 13:31:41,007:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:31:41,007:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:31:41,011:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0501D9D0>
Prep: True
2024-11-22 13:31:41,012:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0501D9D0> and installer None
2024-11-22 13:31:41,012:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-22 13:31:41,016:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-22 13:31:41,017:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-22 13:31:41,019:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-22 13:31:41,499:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-22 13:31:41,499:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:41 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "ApTL2Zwwrv8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-22 13:31:41,500:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-22 13:31:47,571:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8771_key-certbot.pem
2024-11-22 13:31:53,197:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8769_csr-certbot.pem
2024-11-22 13:31:53,197:DEBUG:acme.client:Requesting fresh nonce
2024-11-22 13:31:53,198:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-22 13:31:53,357:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-22 13:31:53,358:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:53 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eYk8fkgTXSa0iQUXSts6A1VGleZWIp-gAOuqNDjmD7jfBmN_OM0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-22 13:31:53,358:DEBUG:acme.client:Storing nonce: eYk8fkgTXSa0iQUXSts6A1VGleZWIp-gAOuqNDjmD7jfBmN_OM0
2024-11-22 13:31:53,359:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-22 13:31:53,365:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RYU2EwaVFVWFN0czZBMVZHbGVaV0lwLWdBT3VxTkRqbUQ3amZCbU5fT00wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "euUmx1q2k0mwi5fzhH9qFjL1hW3r7gavL5ekys4jYaCZfUGuFJTbp5zmndunNQjyi2XHxJc5gOsCVXIzTWNMmBaxYnEd7htmojzT3hk6XzhgTiSLwGq71_7DbTd45WCkpiVTLd0Jkh_nKVbbANHQyBoyuhglEtC-jIHZkX2Yx6YayLpoArlmyz8CPdiuc3TPpab-gxFSXWBZWeVIuILai2vT1CUT9DM5RZcv9gWBDEecOdp1R7EciCOiXdYpDs228Kaz2Advc2-CHgaJWaPtgmAZqg1rDyu29WkjGzvKllm4Oo0ORWNf-w4RykaswJLkBNdJxCyApEb8K5ci55kChA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-22 13:31:53,565:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-11-22 13:31:53,566:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 22 Nov 2024 12:31:53 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335362247
Replay-Nonce: eYk8fkgT9AeDVllbDGe0tqYNdnU5YbloJpYTPaKD4M0WBvlVEAI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-28T12:31:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386161497"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335362247"
}
2024-11-22 13:31:53,566:DEBUG:acme.client:Storing nonce: eYk8fkgT9AeDVllbDGe0tqYNdnU5YbloJpYTPaKD4M0WBvlVEAI
2024-11-22 13:31:53,566:DEBUG:acme.client:JWS payload:
b''
2024-11-22 13:31:53,572:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386161497:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1Q5QWVEVmxsYkRHZTB0cVlOZG5VNVlibG9KcFlUUGFLRDRNMFdCdmxWRUFJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYxNjE0OTcifQ",
  "signature": "S-qnECzMAKflYf-C-m1yJlReGLN00XPr4mXGHPmhntevJlgbmp1ZlW24SnYfm2eHEXYVmIFUgap4tlGfy2sevn77cTJWg_wgUVns0rJuOO1k_EyiXK3qGpx_4WDq356G-h8wRCgb-NlCf7vSYOvaW4cUTogXoqjLNE4ywmZL939tFVHxTgon4UdpciYRu-EGoK5YgDJ7toCZe3BvLUuaEkTks5miKZrL0PUVAM2jfR_M7yHGqupEOfq-c3N-8gcSAq9-KAmCP4tqJzJCKTlKYlGR8XVxS3i3Eq_c6tcLCQOR9zEAF8sHdh41SoOkRmbr3Y8WHZsCSz2MR8whYxDBZg",
  "payload": ""
}
2024-11-22 13:31:53,742:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386161497 HTTP/1.1" 200 823
2024-11-22 13:31:53,743:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:53 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FVNV6H0MKV0LdTsejR6q27fxusNFHsI6jUJZU-ZcpLMf5JGGsxk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-28T12:31:34Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386161497/G65eQA",
      "status": "pending",
      "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386161497/SgjmHQ",
      "status": "pending",
      "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386161497/DvhIEA",
      "status": "pending",
      "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI"
    }
  ]
}
2024-11-22 13:31:53,743:DEBUG:acme.client:Storing nonce: FVNV6H0MKV0LdTsejR6q27fxusNFHsI6jUJZU-ZcpLMf5JGGsxk
2024-11-22 13:31:53,743:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-22 13:31:53,744:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-11-22 13:31:53,744:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-22 13:31:53,745:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-22 13:31:53,745:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:31:53,746:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-22 13:31:53,746:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-22 13:31:53,746:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-22 13:31:53,747:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:31:53,797:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-22 13:31:53,994:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-22 13:31:53,995:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-11-22 13:31:53,996:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-11-22 13:31:54,001:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:58 UTC.
2024-11-22 13:31:54,001:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:31:54,002:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:31:54,007:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0502CF10>
Prep: True
2024-11-22 13:31:54,008:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0502CF10> and installer None
2024-11-22 13:31:54,008:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-22 13:31:54,024:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-22 13:31:54,025:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-22 13:31:54,027:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-22 13:31:54,499:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-22 13:31:54,499:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:31:54 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "GncGF_fHO0w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-22 13:31:54,500:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-22 13:32:00,411:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8772_key-certbot.pem
2024-11-22 13:32:05,990:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8770_csr-certbot.pem
2024-11-22 13:32:05,990:DEBUG:acme.client:Requesting fresh nonce
2024-11-22 13:32:05,990:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-22 13:32:06,147:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-22 13:32:06,148:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:06 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FVNV6H0M2kGGPQzI5urf8N1aIyWUwcxNXoQMD6qQ0xeJV4UGLLM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-22 13:32:06,148:DEBUG:acme.client:Storing nonce: FVNV6H0M2kGGPQzI5urf8N1aIyWUwcxNXoQMD6qQ0xeJV4UGLLM
2024-11-22 13:32:06,149:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-22 13:32:06,155:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME0ya0dHUFF6STV1cmY4TjFhSXlXVXdjeE5Yb1FNRDZxUTB4ZUpWNFVHTExNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "jYYmyRtNE9hhB88BzUjbJHj72tr3KksNynWIjVtx9uiJVceMjUwxPAtzA8cfvbo8EqOZP7n8x3ze42wVIdfuGJh_SplDQQxs2x_-rFBW5Fk5P4hi7yT6pAxeMEpY7ogS-Ub0YH1WAX-sgClR71E-08YnsW8mAMo5NJcWh-LKFfNsMOb8c8kJZD_AT_9PUbZNNl7TFY8TIm7oauYlmZBQUEss_HNKv_DJmEdxBQ25gScDbOkzbkE2tK5yJAbKayXpb7lWkbd6l3yhWetHygNu4OqMB3oIV4zSNtVyURrMGNYJHXs-oYHs-yKAyD7DGDvbGKFy6E3DACFH_Pn6-YBp3g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-11-22 13:32:06,352:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355
2024-11-22 13:32:06,353:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 22 Nov 2024 12:32:06 GMT
Content-Type: application/json
Content-Length: 355
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335405237
Replay-Nonce: eYk8fkgTimDz3EZrZmYkHw6FoIqf1RPGFuRokqAOd87D34QAfas
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-28T12:31:47Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386225357"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335405237"
}
2024-11-22 13:32:06,353:DEBUG:acme.client:Storing nonce: eYk8fkgTimDz3EZrZmYkHw6FoIqf1RPGFuRokqAOd87D34QAfas
2024-11-22 13:32:06,353:DEBUG:acme.client:JWS payload:
b''
2024-11-22 13:32:06,359:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386225357:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RpbUR6M0VaclptWWtIdzZGb0lxZjFSUEdGdVJva3FBT2Q4N0QzNFFBZmFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYyMjUzNTcifQ",
  "signature": "sCJX5rvkvN3sdgIVAtw-tdvnuwOkHoWD3Ed5C-HFjV9dtfQN9RWb0jkDmagr349UftQUJPIqfmIsWBm1Sqyq_mFk-DXQ6Ni6d18nDIO9T3md60rfZjcpCjD4WPkQR12SdVkdgkrN0T_JG-KOvrt0naQF-ZcqVfVQMTcE7lByf1GJpE5uDHoAjXFZc_PUWy84mrCS-q-GJGwHJ7UrS_YnJ1R4fDKD0z9UdWmQ3_iPlFYJPhQGLAMg3Ui12npGjtmmu-TsJW5fQXwmlkoQulyRbmdWqLWRaN-umeenwo7q-1aWkCPqMJ8kg-E3bGpg80nRD1LZflF0y-SgQBdU46UKIg",
  "payload": ""
}
2024-11-22 13:32:06,521:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386225357 HTTP/1.1" 200 827
2024-11-22 13:32:06,522:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:06 GMT
Content-Type: application/json
Content-Length: 827
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eYk8fkgT3KwHIS-r-hnAYsR65VCxBUtbWzmwo7MXyjB6WTXpO2Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-28T12:31:47Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386225357/ZOgoCA",
      "status": "pending",
      "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386225357/bpWWxw",
      "status": "pending",
      "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386225357/rcFeQQ",
      "status": "pending",
      "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU"
    }
  ]
}
2024-11-22 13:32:06,522:DEBUG:acme.client:Storing nonce: eYk8fkgT3KwHIS-r-hnAYsR65VCxBUtbWzmwo7MXyjB6WTXpO2Y
2024-11-22 13:32:06,524:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-22 13:32:06,525:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-11-22 13:32:06,525:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-22 13:32:06,525:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-22 13:32:06,526:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:32:06,526:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-22 13:32:06,526:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-22 13:32:06,527:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-22 13:32:06,528:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:32:06,565:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-22 13:32:06,748:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-22 13:32:06,749:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is signed by the certificate's issuer.
2024-11-22 13:32:06,750:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD
2024-11-22 13:32:06,753:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:15 UTC.
2024-11-22 13:32:06,753:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:32:06,754:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:32:06,759:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0501DD30>
Prep: True
2024-11-22 13:32:06,759:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0501DD30> and installer None
2024-11-22 13:32:06,760:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-22 13:32:06,764:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-22 13:32:06,765:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-22 13:32:06,767:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-22 13:32:07,222:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-22 13:32:07,223:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:07 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "H5nfhk1zfH4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-22 13:32:07,224:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-22 13:32:13,091:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8773_key-certbot.pem
2024-11-22 13:32:18,705:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8771_csr-certbot.pem
2024-11-22 13:32:18,705:DEBUG:acme.client:Requesting fresh nonce
2024-11-22 13:32:18,705:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-22 13:32:18,854:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-22 13:32:18,854:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:19 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: gtp33icHX8OWz-mpzWF5gFYQXkcGmwgSq5OrB6212xVioU324sg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-22 13:32:18,855:DEBUG:acme.client:Storing nonce: gtp33icHX8OWz-mpzWF5gFYQXkcGmwgSq5OrB6212xVioU324sg
2024-11-22 13:32:18,855:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "helix.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-22 13:32:18,861:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0hYOE9Xei1tcHpXRjVnRllRWGtjR213Z1NxNU9yQjYyMTJ4VmlvVTMyNHNnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "m0GHex6AlSqyCSbV7jINHASDU5FhuSFgiZ66W-JF1W1u10-vHlVZmiP2Z0iNsxxk3R7xqZ2nzjVeXd1_TMjyb7AVaLWtDGRoRxFwqXYb8ZjKXvXvzIB3GKMc84HkEXw_uVGnfNh8qVlYJADz1F3K4Z8rwrPrh5CgQ0l-g8JbEvNcj_x3N4ewwONH3FzbZM6JZ2Pa0Tx8-AQTo03KGZ8giNuAfMk9a4B-DyMJPU40DdC0hc4c2bvEGwKz1ve0c4rFJq4m8tDjFGmrahbp0QSEZ3IV89zoN6LukAKySQwZXrMmG2d7Rz4jclTx5h-RAupMqDCfsJYNxYoR-HbthSFTbg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-22 13:32:19,104:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353
2024-11-22 13:32:19,105:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 22 Nov 2024 12:32:19 GMT
Content-Type: application/json
Content-Length: 353
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335446687
Replay-Nonce: gtp33icHoj05lOUH0nzWqOjjD8KOIuDt4qFJa2xBcSrCG78KySI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-28T12:31:59Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "helix.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386288977"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335446687"
}
2024-11-22 13:32:19,105:DEBUG:acme.client:Storing nonce: gtp33icHoj05lOUH0nzWqOjjD8KOIuDt4qFJa2xBcSrCG78KySI
2024-11-22 13:32:19,105:DEBUG:acme.client:JWS payload:
b''
2024-11-22 13:32:19,111:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386288977:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0hvajA1bE9VSDBueldxT2pqRDhLT0l1RHQ0cUZKYTJ4QmNTckNHNzhLeVNJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYyODg5NzcifQ",
  "signature": "hXqAEvybmDpaF4_6-VyJjdDyxZim9MqK2zVKzqBU0dG57Ov47rsR8hL0mqci3MH41H32bHAShZWytf22L8n7NSllrWt-hW8o2BeAkbSX4bYBcB0mLe7HdmXa2H78CTY9tezjdsqi33iMSgSPZfxmDwU539CRfgYewj1wtgRzP4jtqRfXIyLBRKeqsiYCPbCb3V4yIKkUo3KWQSbP_3JUpsJPzUlYxhTTVNArE49xU-ONWM4QO_VbuWnW7ac-_EgoRpB79AF1qw6QPlAS9D8mhJJMXjAvGuYYnQQZxyes6-icMwei5pRbiQh598tQSMm3NabMJbkXQEztdz1AWAbMJA",
  "payload": ""
}
2024-11-22 13:32:19,266:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386288977 HTTP/1.1" 200 825
2024-11-22 13:32:19,266:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:19 GMT
Content-Type: application/json
Content-Length: 825
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: gtp33icHpuJBHrMN37ochq_Bl0iTX8YpyR-IYzVwZuyud92cz0E
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "helix.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-28T12:31:59Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386288977/jzYzOg",
      "status": "pending",
      "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386288977/74HdZw",
      "status": "pending",
      "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386288977/qrrE6g",
      "status": "pending",
      "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE"
    }
  ]
}
2024-11-22 13:32:19,267:DEBUG:acme.client:Storing nonce: gtp33icHpuJBHrMN37ochq_Bl0iTX8YpyR-IYzVwZuyud92cz0E
2024-11-22 13:32:19,268:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-22 13:32:19,269:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl
2024-11-22 13:32:19,269:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-22 13:32:19,270:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-22 13:32:19,270:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:32:19,270:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-22 13:32:19,271:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-22 13:32:19,271:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-22 13:32:19,272:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:32:19,321:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-22 13:32:19,505:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-22 13:32:19,506:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-22 13:32:19,507:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-22 13:32:19,511:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:37 UTC.
2024-11-22 13:32:19,511:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:32:19,512:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:32:19,517:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0501D450>
Prep: True
2024-11-22 13:32:19,517:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0501D450> and installer None
2024-11-22 13:32:19,517:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-22 13:32:19,522:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-22 13:32:19,523:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-22 13:32:19,526:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-22 13:32:19,971:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-22 13:32:19,972:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:20 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "XaiCn1BnwsY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-22 13:32:19,972:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-22 13:32:25,736:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8774_key-certbot.pem
2024-11-22 13:32:31,364:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8772_csr-certbot.pem
2024-11-22 13:32:31,365:DEBUG:acme.client:Requesting fresh nonce
2024-11-22 13:32:31,365:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-22 13:32:31,514:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-22 13:32:31,514:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:31 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zIaIDaiT5-eks2UQHpXKsfa0HiJ3-U77PLq3D2bnkb1YI93JrXA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-22 13:32:31,515:DEBUG:acme.client:Storing nonce: zIaIDaiT5-eks2UQHpXKsfa0HiJ3-U77PLq3D2bnkb1YI93JrXA
2024-11-22 13:32:31,515:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-22 13:32:31,521:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVQ1LWVrczJVUUhwWEtzZmEwSGlKMy1VNzdQTHEzRDJibmtiMVlJOTNKclhBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "BlxeuOyvB0TAAF_Gfz94VkPjMTMNhOm04zLs_fn9fAyf7G9XQLPI16ykc_epVWcGIcPnGF9iTQVufUoj0WzlIIfq09qB3vLhSX88UjnpiFGoRBp6uEQmYutzy_fIVugUThK2Q9oa0IySb1r6Xs30JY6nbUesAhNKUnVoYZIWC6C0_nP0FeBW_aFtgm8WD7dxvg5HMlNd6ntK0YUw9E0v6Q8dHa2WDJ9-k6IvdnC9z6oI39fPyrTzp3a15tOGPgDHG_Sl0A06IffbCsaNfpaPjlvEHnQtekcp7p8C0OmGTBFZKpZJLb0fGgHPjh6oOfT9WBonvRhYpJiJ5ksbgaSLaQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-11-22 13:32:31,703:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352
2024-11-22 13:32:31,703:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 22 Nov 2024 12:32:31 GMT
Content-Type: application/json
Content-Length: 352
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335505847
Replay-Nonce: zIaIDaiTIhK5RcC4d_jSNE8NG6GWi2QiJ2W1vAM2qd-foVPQUaE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-28T12:32:12Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386373457"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335505847"
}
2024-11-22 13:32:31,703:DEBUG:acme.client:Storing nonce: zIaIDaiTIhK5RcC4d_jSNE8NG6GWi2QiJ2W1vAM2qd-foVPQUaE
2024-11-22 13:32:31,704:DEBUG:acme.client:JWS payload:
b''
2024-11-22 13:32:31,710:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386373457:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRJaEs1UmNDNGRfalNORThORzZHV2kyUWlKMlcxdkFNMnFkLWZvVlBRVWFFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYzNzM0NTcifQ",
  "signature": "q_RCBJ2hJcLOzNkUCqVARyoY4wNlkVv5cz0qB8Mbd6-clA_BjBcNyh6Oy8-AfNiY20y77si0AbMi_g7Ht72DJMh3Aqx_LoNqh2MsXaqfS_1Bjzw5fXrL18efnW3j5iRl5ND8epnm98LE4odJcm3utjqsXd4Wl9BGsyZwp82Kq1YW3zVZ372CiWKG9PGYD4prYb6Y_k18gSLvgChtJBQQ6Y8ww7VyIXSSY1r8Fo04_8dOBCRwiJmNve4E4ZMplGhRUu_w7qObEuDVMJRHweWeMX4qV2EFxRQInMiCqDvRpeS_SdcMT-yzj58dceocUuqSjmtqwRmsIdVNGa0PjZTDZg",
  "payload": ""
}
2024-11-22 13:32:31,863:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386373457 HTTP/1.1" 200 824
2024-11-22 13:32:31,864:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:32 GMT
Content-Type: application/json
Content-Length: 824
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zIaIDaiTPQu3BX6TDjFilb6Bf-J5Rn1seMrYuFNftCCmjMcYZIk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-28T12:32:12Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386373457/CBmaOg",
      "status": "pending",
      "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386373457/d3Fmcw",
      "status": "pending",
      "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386373457/JJFsqQ",
      "status": "pending",
      "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI"
    }
  ]
}
2024-11-22 13:32:31,864:DEBUG:acme.client:Storing nonce: zIaIDaiTPQu3BX6TDjFilb6Bf-J5Rn1seMrYuFNftCCmjMcYZIk
2024-11-22 13:32:31,866:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-22 13:32:31,867:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-11-22 13:32:31,867:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-22 13:32:31,867:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-22 13:32:31,868:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:32:31,868:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-22 13:32:31,868:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-22 13:32:31,869:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-22 13:32:31,870:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:32:31,917:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-11-22 13:32:31,918:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:32:31,918:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-11-22 13:32:31,925:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-11-22 13:32:31,927:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-11-22 13:32:31,928:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-11-22 13:32:31,928:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-11-22 13:32:31,928:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-11-22 13:32:31,930:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-11-22 13:32:31,974:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-22 13:32:32,174:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-22 13:32:32,176:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-22 13:32:32,176:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-22 13:32:32,182:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:56 UTC.
2024-11-22 13:32:32,182:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:32:32,182:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:32:32,188:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x046BCF30>
Prep: True
2024-11-22 13:32:32,188:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x046BCF30> and installer None
2024-11-22 13:32:32,188:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-22 13:32:32,193:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-22 13:32:32,194:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-22 13:32:32,196:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-22 13:32:32,682:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-22 13:32:32,682:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:32 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "_Ij8VvvIOX0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-22 13:32:32,683:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-22 13:32:38,288:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8775_key-certbot.pem
2024-11-22 13:32:43,860:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8773_csr-certbot.pem
2024-11-22 13:32:43,861:DEBUG:acme.client:Requesting fresh nonce
2024-11-22 13:32:43,861:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-22 13:32:44,022:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-22 13:32:44,023:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:44 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FVNV6H0MGjieCbpCW1I69T5yW9y9ARkqXnQ3PtmUwBHxtFIsmlI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-22 13:32:44,023:DEBUG:acme.client:Storing nonce: FVNV6H0MGjieCbpCW1I69T5yW9y9ARkqXnQ3PtmUwBHxtFIsmlI
2024-11-22 13:32:44,024:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-22 13:32:44,030:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1HamllQ2JwQ1cxSTY5VDV5Vzl5OUFSa3FYblEzUHRtVXdCSHh0RklzbWxJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "pfLMIDAiGVtL3mMvRZ2-COph2Ma1BDZK1tbtrP4ciPpdTCs7qcCHjvoAwtfpOOXko9Va7I6UL2s-oCS_-H8PsD5a7lVZJzGKl5WUPc2Y77T2MrEb88LkB8zeG7jkK9fvsLApfwSdroNpPkC_zGy-FtfybbCP-zkjh3_M-Ii_X6ReFxe-N_doWtsHgVSnkgwRPrn19SZeamRQ6W8yOQr0jKjcKqr8Rxl5O4qVmkNU_g-pR6LO512zJSj4ETldCZSIXgGmQ9B9SSaCahvpMPvKVjAZJBK9M4D3yRN7YKqOfRQbWNYiqX6U8K4jYuIzWjtUX22qxNBcu9J4qUsYP1KHVQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-22 13:32:44,219:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357
2024-11-22 13:32:44,220:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 22 Nov 2024 12:32:44 GMT
Content-Type: application/json
Content-Length: 357
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335553997
Replay-Nonce: FVNV6H0MBvH0LuhhL6O96-sJJP4jCIHlrxq08nDQA5N8Di-g_E8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-28T12:32:24Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386447927"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335553997"
}
2024-11-22 13:32:44,220:DEBUG:acme.client:Storing nonce: FVNV6H0MBvH0LuhhL6O96-sJJP4jCIHlrxq08nDQA5N8Di-g_E8
2024-11-22 13:32:44,221:DEBUG:acme.client:JWS payload:
b''
2024-11-22 13:32:44,227:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386447927:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1CdkgwTHVoaEw2Tzk2LXNKSlA0akNJSGxyeHEwOG5EUUE1TjhEaS1nX0U4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY0NDc5MjcifQ",
  "signature": "V2RxTsLgYiQbfuVuQw87V3Cx86_Hq3DrU9OsVXhuDhNyXImVp_LhJefHWsHRXkDcgPkmmvQVEt1TNOHCZPt1-DFH4PD7k6AiFNI2pfzCFOS1hHad4V4TqhZMFwQPxPtLGQjJEAx9kUBUpRrpzrRmxtxzBu2FmyCvR9ESwR73lGJf9hEHjDUwYL1InyQAAa_WfezmSqcIWqfgZ3bZgvicgKQ0r4YEAKiSE3bb4hXmyEaIKlUTL9q0G5vnfHbXYc1-j_zVSd7lweagNx5MauX0gYcSMB5DfydARUtdIu8U1FQs8XkZ8oPx7IFTRGTzgN4CCpi-IRvc3BewjIHhgRDMfA",
  "payload": ""
}
2024-11-22 13:32:44,390:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386447927 HTTP/1.1" 200 829
2024-11-22 13:32:44,391:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:44 GMT
Content-Type: application/json
Content-Length: 829
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eYk8fkgTKLbEdvNRvKKz6YflQ_I2bBJj0g5n8VzSyi-YATEDmbQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-28T12:32:24Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386447927/PLs0Mg",
      "status": "pending",
      "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386447927/lliEPw",
      "status": "pending",
      "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386447927/eNwFHQ",
      "status": "pending",
      "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY"
    }
  ]
}
2024-11-22 13:32:44,391:DEBUG:acme.client:Storing nonce: eYk8fkgTKLbEdvNRvKKz6YflQ_I2bBJj0g5n8VzSyi-YATEDmbQ
2024-11-22 13:32:44,392:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-22 13:32:44,392:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-11-22 13:32:44,393:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-22 13:32:44,393:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-22 13:32:44,394:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:32:44,394:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-22 13:32:44,394:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-22 13:32:44,395:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-22 13:32:44,396:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:32:44,435:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-22 13:32:44,634:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-22 13:32:44,635:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-22 13:32:44,636:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-22 13:32:44,641:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:15 UTC.
2024-11-22 13:32:44,641:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:32:44,641:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:32:44,646:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D2BE50>
Prep: True
2024-11-22 13:32:44,646:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D2BE50> and installer None
2024-11-22 13:32:44,646:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-22 13:32:44,651:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-22 13:32:44,652:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-22 13:32:44,654:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-22 13:32:45,134:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-22 13:32:45,135:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:45 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "MKD-zlOGm4s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-22 13:32:45,136:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-22 13:32:50,995:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8776_key-certbot.pem
2024-11-22 13:32:56,527:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8774_csr-certbot.pem
2024-11-22 13:32:56,528:DEBUG:acme.client:Requesting fresh nonce
2024-11-22 13:32:56,528:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-22 13:32:56,687:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-22 13:32:56,688:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:56 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FVNV6H0MSt8VqJpba-N__wJdrVL8QzuJ1ZJptHb26hxOdL-Jpjg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-22 13:32:56,688:DEBUG:acme.client:Storing nonce: FVNV6H0MSt8VqJpba-N__wJdrVL8QzuJ1ZJptHb26hxOdL-Jpjg
2024-11-22 13:32:56,688:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-22 13:32:56,696:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1TdDhWcUpwYmEtTl9fd0pkclZMOFF6dUoxWkpwdEhiMjZoeE9kTC1KcGpnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "St-QvIr1-ixZKS8_pnU9PPIfESKUx4gl7p5jI-Ex2OgVgAKa80DNIhimXPHnOFN8p5uSMJ58Uy-uvQVz538C4ZyCCgSbyG3XpH3103VCXVSLX0oURPf2qykDNyDjAM951zEg2Q1OKz-sJx1NUpG9Zcqt-vzDRL4_iTr27zC-0HeZZHiZ9zC0TxFGmeiIbJBAQHaWXx3Y_5HWB1LGQAcVzpdymFKyjONff78jTCyCuPEu9FyNFVO6-Wt56_w2rT0p22bKRWfFRIfcGHHXzS61HwZEERjUxGyPiesmr65pyPSVBhTrpMCAk7WqdO5mhRUJb3UztGqaSi8NN4PRqRz3Gw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-22 13:32:56,901:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356
2024-11-22 13:32:56,902:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 22 Nov 2024 12:32:57 GMT
Content-Type: application/json
Content-Length: 356
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335602617
Replay-Nonce: FVNV6H0MuNrEgP2skyFB27SI7CrbkjkjS981A1iql38whnPOMAw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-28T12:32:37Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386519187"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335602617"
}
2024-11-22 13:32:56,902:DEBUG:acme.client:Storing nonce: FVNV6H0MuNrEgP2skyFB27SI7CrbkjkjS981A1iql38whnPOMAw
2024-11-22 13:32:56,902:DEBUG:acme.client:JWS payload:
b''
2024-11-22 13:32:56,908:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386519187:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME11TnJFZ1Ayc2t5RkIyN1NJN0NyYmtqa2pTOTgxQTFpcWwzOHdoblBPTUF3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY1MTkxODcifQ",
  "signature": "M2TpTy7_RIQNHR4sWurkaoVwFlBG-OYG47hPRDlxeKz_SsfQMnKk6iTH8clgcnJaZBmGcFuEtFyK-ka0PHY38IgD851ALyY3NjLx4eZMzbX1xR5KRu-Zdfa1aJj7CM7knHRNPI45OeaiFsJCIDnDd_zBT9w2fea5_dzu8_Yu6_bRkI7WEheoKikHmgDIXGDEAh_JKT-B8MrrIl2sJDg2fSzLFuXi-dG10uuQCLFb7PihSu5Jz0QH0zi18npg1Q4FSKHA2q6UB1COZ8WUU0phZJwEe0zKGDjhxz4lYqloHfj_LBx-H9OJRgXkbaI5HRWxaoV2q1MyQYgnpnfqnkVo0Q",
  "payload": ""
}
2024-11-22 13:32:57,074:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386519187 HTTP/1.1" 200 828
2024-11-22 13:32:57,075:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:57 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eYk8fkgTGpU78qByZoDEq-cACiKR0vSyhuqZciSokByOg1xkmaI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-28T12:32:37Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386519187/XcgphA",
      "status": "pending",
      "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386519187/XHeZAA",
      "status": "pending",
      "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386519187/-jLYlg",
      "status": "pending",
      "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk"
    }
  ]
}
2024-11-22 13:32:57,075:DEBUG:acme.client:Storing nonce: eYk8fkgTGpU78qByZoDEq-cACiKR0vSyhuqZciSokByOg1xkmaI
2024-11-22 13:32:57,075:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-22 13:32:57,076:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-11-22 13:32:57,076:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-22 13:32:57,076:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-22 13:32:57,077:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:32:57,077:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-22 13:32:57,078:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-22 13:32:57,078:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-22 13:32:57,079:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:32:57,122:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-22 13:32:57,295:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-22 13:32:57,296:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-11-22 13:32:57,297:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-11-22 13:32:57,302:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:32 UTC.
2024-11-22 13:32:57,302:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:32:57,302:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:32:57,307:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D31250>
Prep: True
2024-11-22 13:32:57,308:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D31250> and installer None
2024-11-22 13:32:57,308:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-22 13:32:57,312:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-22 13:32:57,313:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-22 13:32:57,316:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-22 13:32:58,073:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-22 13:32:58,074:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:32:58 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "_3J3DCk4QTo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-22 13:32:58,074:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-22 13:33:04,036:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8777_key-certbot.pem
2024-11-22 13:33:09,671:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8775_csr-certbot.pem
2024-11-22 13:33:09,671:DEBUG:acme.client:Requesting fresh nonce
2024-11-22 13:33:09,672:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-22 13:33:09,820:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-22 13:33:09,821:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:33:10 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zIaIDaiTfc0H1CUp6PsshxXyD1UezfVkbyQd_abjaN5g-T3dJCw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-22 13:33:09,821:DEBUG:acme.client:Storing nonce: zIaIDaiTfc0H1CUp6PsshxXyD1UezfVkbyQd_abjaN5g-T3dJCw
2024-11-22 13:33:09,821:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-22 13:33:09,827:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRmYzBIMUNVcDZQc3NoeFh5RDFVZXpmVmtieVFkX2FiamFONWctVDNkSkN3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "FvnZ7aqCBfg2ky0cs_H3y6S2Hqf5gFERH0QdLQiVfgk9OPZEa35ajgX8sUXtBiZdk-YgvqIBJqeArCXL7i0tQ7LoKgC4t_47LuNIGi4iF1PWd14JGMKx3Ilhl4PLc9an73OVsV9GeWHR8wTUy1nyBFdcmnlL0SJDixUzVjjZcRq463ZEglsYxa-5eL2BPs90dErvtXGSFCMYoZ_eBtiEaPhWC8IwDMYdt6t13FBdrGoY8qZg4eNwjEXpH3zEGuwVm5mdWHMqy69d1dNhrB7ALxOXFRoef03KpQzG2lbT9Yr5fXOL913B6bRsX5WFe1FlOW1-gd8j4a3JflJRUvUL4Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-11-22 13:33:10,014:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355
2024-11-22 13:33:10,015:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 22 Nov 2024 12:33:10 GMT
Content-Type: application/json
Content-Length: 355
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335648247
Replay-Nonce: gtp33icHVP8ANY2LfStQXCDWbkDmn48QJD6_hdRdbntNH7oMFbA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-28T12:32:49Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386588377"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335648247"
}
2024-11-22 13:33:10,015:DEBUG:acme.client:Storing nonce: gtp33icHVP8ANY2LfStQXCDWbkDmn48QJD6_hdRdbntNH7oMFbA
2024-11-22 13:33:10,015:DEBUG:acme.client:JWS payload:
b''
2024-11-22 13:33:10,021:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386588377:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0hWUDhBTlkyTGZTdFFYQ0RXYmtEbW40OFFKRDZfaGRSZGJudE5IN29NRmJBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY1ODgzNzcifQ",
  "signature": "RccwJY9J934vtaGcWSkmWQxY9Z46lm9rG6Y8g3WDrTTMjsJ6hZkFFfC01ivbmt_QICz0Cev2fct46AMa2IBLTz4yGrPxnhoCwQ8Ddljjceh5Su0f27X4cm0Xhhh6oWsK0kR9lfvMi3aG-lc2Eza7mXKCNDaFQuSTvFy2LWg75hZgCZtJiRgWZuNzQ98dMEU_FdXlVzTt8uQz8TwoibnOQR5DfB6kcPplsYJ74nIAmiozhNs91Dkh4XKx5uFPk-q0NeIlOQvhxmGFtohBm1oPtVsZbTYBtIJMuqYPhKeDnjMJGN6koZxzCGN45QugaT84UaFzdyCn3dUHh0naYVZpSg",
  "payload": ""
}
2024-11-22 13:33:10,174:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386588377 HTTP/1.1" 200 827
2024-11-22 13:33:10,175:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:33:10 GMT
Content-Type: application/json
Content-Length: 827
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zIaIDaiTvxrSQRSK7xsn4WqjVLabwBIONFKf8kzXdbeVvQgzpyU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-28T12:32:49Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386588377/67ZXmA",
      "status": "pending",
      "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386588377/mNBDgA",
      "status": "pending",
      "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386588377/hneKNA",
      "status": "pending",
      "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ"
    }
  ]
}
2024-11-22 13:33:10,175:DEBUG:acme.client:Storing nonce: zIaIDaiTvxrSQRSK7xsn4WqjVLabwBIONFKf8kzXdbeVvQgzpyU
2024-11-22 13:33:10,176:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-22 13:33:10,176:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-11-22 13:33:10,177:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-22 13:33:10,177:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-22 13:33:10,178:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:33:10,178:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-22 13:33:10,178:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-22 13:33:10,179:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-22 13:33:10,180:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:33:10,231:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-22 13:33:10,433:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-22 13:33:10,434:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-11-22 13:33:10,435:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-11-22 13:33:10,440:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:52 UTC.
2024-11-22 13:33:10,440:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:33:10,440:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:33:10,445:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x047643B0>
Prep: True
2024-11-22 13:33:10,445:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x047643B0> and installer None
2024-11-22 13:33:10,445:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-22 13:33:10,450:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-22 13:33:10,451:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-22 13:33:10,453:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-22 13:33:10,907:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-22 13:33:10,908:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:33:11 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "s-CX9EKbCBg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-11-22 13:33:10,909:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-22 13:33:17,231:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8778_key-certbot.pem
2024-11-22 13:33:22,850:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8776_csr-certbot.pem
2024-11-22 13:33:22,851:DEBUG:acme.client:Requesting fresh nonce
2024-11-22 13:33:22,851:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-22 13:33:23,000:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-22 13:33:23,001:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:33:23 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zIaIDaiTGWC00JyHEe_soUrcbxiAS92o3za20fu3ZI3PG8fUeDE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-22 13:33:23,001:DEBUG:acme.client:Storing nonce: zIaIDaiTGWC00JyHEe_soUrcbxiAS92o3za20fu3ZI3PG8fUeDE
2024-11-22 13:33:23,001:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-22 13:33:23,007:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRHV0MwMEp5SEVlX3NvVXJjYnhpQVM5Mm8zemEyMGZ1M1pJM1BHOGZVZURFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "dONapsX02ZQojshjSWnd1IQcF42TkcpuYdspTruAgDE4mQwDOUNweSLp4ie9bnyuff_lA8PE9XFxfiBFlTBV0Oe8-LeFRGZYYozEmMgsIlRS2POTMrVs_tjemFLQx0-AsKIju1pf4czHwU4fgazIz7EodZIE9NRZRQxZ8tQPEWnsriNDGOZ5HSjnjTUwnz5HlqbvMhquluMz4js7ckmKUNrN_RX5cIN3zUYerEpMlYcNtryzg6em0KNcWQUhX4R7ny2NdOMZqBvWeKFVqP7Jow_GKiuH35Gvqvi7GB3e3wHbFYou3JQDZ8XsPDMteFeN1qFYgcVvWPXEZrzicsZlxQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-22 13:33:23,200:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-11-22 13:33:23,201:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 22 Nov 2024 12:33:23 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335696957
Replay-Nonce: gtp33icH0EQDR3xyYeplq_u1Bw5zgfdHeza8-BmUNCvDCr_3txQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-28T12:33:02Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386660297"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335696957"
}
2024-11-22 13:33:23,201:DEBUG:acme.client:Storing nonce: gtp33icH0EQDR3xyYeplq_u1Bw5zgfdHeza8-BmUNCvDCr_3txQ
2024-11-22 13:33:23,201:DEBUG:acme.client:JWS payload:
b''
2024-11-22 13:33:23,209:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386660297:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0gwRVFEUjN4eVllcGxxX3UxQnc1emdmZEhlemE4LUJtVU5DdkRDcl8zdHhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY2NjAyOTcifQ",
  "signature": "l0kcndtgKF5vXZ-R8rYERNoDkYO-BNV7EpJK8mX-OLzONMLOovHzYg-1SO565JsKQRfm-LMdrXHD9Y8buU39DW2B-MeCwbkhsEKQC4Yi2c_EzZIKh0xn76qM42ZCc6-8f4aFIBlnuxBtUgqC6394F80YIkDfCaqtCF7X0JhGPoRR7Gub2qpzI3TyuSUXyScj9t2Z7lef110ZTv7uXscYXPE-2XwKrG-0fH_8ADk48hhpXKFNlwsQNdSs4CulrmkkAu6AmALhgSctdWjho3xUXd8yU4pcUNe8v-NEw8_7MqyzhB8N00RPlY92l0qX3w0JoCDXAEj0skDxvwJr47xDKw",
  "payload": ""
}
2024-11-22 13:33:23,364:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386660297 HTTP/1.1" 200 823
2024-11-22 13:33:23,365:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:33:23 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: gtp33icHfuhp6Kj1KhOTT88jF_blRft_EExaZbfQlfGyj4uO9t4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-28T12:33:02Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386660297/9adDwA",
      "status": "pending",
      "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386660297/hz_bKw",
      "status": "pending",
      "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386660297/Jd3mYQ",
      "status": "pending",
      "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM"
    }
  ]
}
2024-11-22 13:33:23,365:DEBUG:acme.client:Storing nonce: gtp33icHfuhp6Kj1KhOTT88jF_blRft_EExaZbfQlfGyj4uO9t4
2024-11-22 13:33:23,366:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-22 13:33:23,366:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-11-22 13:33:23,367:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-22 13:33:23,367:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-22 13:33:23,368:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:33:23,368:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-22 13:33:23,368:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-22 13:33:23,369:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-22 13:33:23,370:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:33:23,419:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-22 13:33:23,607:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-22 13:33:23,608:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-22 13:33:23,609:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-22 13:33:23,614:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:10 UTC.
2024-11-22 13:33:23,614:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:33:23,614:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:33:23,619:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0501E3D0>
Prep: True
2024-11-22 13:33:23,619:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0501E3D0> and installer None
2024-11-22 13:33:23,619:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-22 13:33:23,625:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-22 13:33:23,626:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-22 13:33:23,628:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-22 13:33:24,097:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-22 13:33:24,098:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:33:24 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "kM4IS3ilA4o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-22 13:33:24,098:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-22 13:33:30,361:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8779_key-certbot.pem
2024-11-22 13:33:35,963:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8777_csr-certbot.pem
2024-11-22 13:33:35,964:DEBUG:acme.client:Requesting fresh nonce
2024-11-22 13:33:35,964:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-22 13:33:36,120:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-22 13:33:36,121:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:33:36 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eYk8fkgT7uzcFYj0TK4QnIAOS7BYdznpWSVB9coFSmzVeB4poGM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-22 13:33:36,121:DEBUG:acme.client:Storing nonce: eYk8fkgT7uzcFYj0TK4QnIAOS7BYdznpWSVB9coFSmzVeB4poGM
2024-11-22 13:33:36,121:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-22 13:33:36,129:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1Q3dXpjRllqMFRLNFFuSUFPUzdCWWR6bnBXU1ZCOWNvRlNtelZlQjRwb0dNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "UzvTssXSIg_pd1Mo4cMFvCeH3K7ZPjEbKY7YretHbxu6IplDP6NYwKA0tAZzVZ9dFwGoVv3Jid5HHgAFAoKS7jDxZcwXT199MU6L8Hu3Ni-JPVhxW1IgAPiFcsTbQzbm5P-lYzukn63oORwGEzq2Xs1fH4QMWL_5c-HTWY8ZFF_0AoiHhU-2csD0YjxJrqaY1XHOzZZhmNAEGirWdHAOWvGbnR-0RJWyhDrjFJFeC4I07imabcqg404Fr9lYTrfY8O36CTCLf7SAYrprqq33bNm2fIifScxWsHP8Hmo3pS0iYyf2i_mZbOWZInjcO7TRvWu3VK27t5yCGtQZkt9Rng",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-22 13:33:36,323:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-11-22 13:33:36,324:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 22 Nov 2024 12:33:36 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335757157
Replay-Nonce: FVNV6H0M1Vvy6Ik7M2iLBLRjJJnwJNJI4NTpvE0EDilrdf-MVy4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-28T12:33:15Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386749437"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335757157"
}
2024-11-22 13:33:36,324:DEBUG:acme.client:Storing nonce: FVNV6H0M1Vvy6Ik7M2iLBLRjJJnwJNJI4NTpvE0EDilrdf-MVy4
2024-11-22 13:33:36,324:DEBUG:acme.client:JWS payload:
b''
2024-11-22 13:33:36,330:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386749437:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME0xVnZ5NklrN00yaUxCTFJqSkpud0pOSkk0TlRwdkUwRURpbHJkZi1NVnk0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY3NDk0MzcifQ",
  "signature": "A0RI5FIFfDyFPgugScg6Ot-POmM9UDOiXn5Je56KfbPDB0HAoDzsYMVGNVAaIzlWh3p7i54CDsimFyMYosbbSQ8JtUA4aNsfmIE0aWwEqYd7W-Z1tpsTTLo4DTl3F0BvdZG7C7jkvcWdJZCSbmiZGhpDL1SvmVPENIkb8Ffym7836jA-PDrJ6V0haILBcfkcpHEA9uRE6khT-rclnv07Xu3kcy95mEFSmc6I8tpSNY1_CFcDlXwoNtKxTXfF5VE5rDyxd0FWkteHm356YyYOT-_GCMP8MXFGyCrJtPm4gZJiutxGf1GaaH-vy0ZIPFbsybaObnV_KGxh8QlkY3LzmA",
  "payload": ""
}
2024-11-22 13:33:36,493:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386749437 HTTP/1.1" 200 823
2024-11-22 13:33:36,494:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:33:36 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FVNV6H0MEB52hyVWl6BLFSQtz1Nl0upQHS4uQo4nLdMcI4_DF8Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-28T12:33:15Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386749437/RcBV3Q",
      "status": "pending",
      "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386749437/hizs-Q",
      "status": "pending",
      "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386749437/ODSfIw",
      "status": "pending",
      "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0"
    }
  ]
}
2024-11-22 13:33:36,494:DEBUG:acme.client:Storing nonce: FVNV6H0MEB52hyVWl6BLFSQtz1Nl0upQHS4uQo4nLdMcI4_DF8Y
2024-11-22 13:33:36,494:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-22 13:33:36,494:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-11-22 13:33:36,495:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-22 13:33:36,495:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-22 13:33:36,496:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:33:36,496:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-22 13:33:36,496:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-22 13:33:36,497:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-22 13:33:36,498:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:33:36,548:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-22 13:33:36,861:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 514
2024-11-22 13:33:36,873:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-11-22 13:33:36,874:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-11-22 13:33:36,879:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:32 UTC.
2024-11-22 13:33:36,879:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-22 13:33:36,879:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-22 13:33:36,884:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0478BFB0>
Prep: True
2024-11-22 13:33:36,885:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0478BFB0> and installer None
2024-11-22 13:33:36,885:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-22 13:33:36,891:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-22 13:33:36,891:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-22 13:33:36,894:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-22 13:33:37,372:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-22 13:33:37,372:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:33:37 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "5dY9pPp5pY8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-22 13:33:37,373:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-22 13:33:43,049:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8780_key-certbot.pem
2024-11-22 13:33:48,575:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8778_csr-certbot.pem
2024-11-22 13:33:48,576:DEBUG:acme.client:Requesting fresh nonce
2024-11-22 13:33:48,576:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-22 13:33:48,736:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-22 13:33:48,737:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:33:48 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FVNV6H0M82nyaG6MJmeB9P5pQk9TfKdWZsyjqlX3kMasUCowI-o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-22 13:33:48,737:DEBUG:acme.client:Storing nonce: FVNV6H0M82nyaG6MJmeB9P5pQk9TfKdWZsyjqlX3kMasUCowI-o
2024-11-22 13:33:48,737:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-22 13:33:48,743:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME04Mm55YUc2TUptZUI5UDVwUWs5VGZLZFdac3lqcWxYM2tNYXNVQ293SS1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "tcdb8vXidwEJowjmQPo9ZuAygLz2MwFqvnbaqJNqvNKnK0H_zBKGxN7P6PGSCVE86X7q3xRV82Ut0cKiZx5V180AjUH0rn8pyzuOGuO5Wsj2hO4qVyUXwMeabdT9MO9ifr30qDXj1Xk5DRR7DdSZrzs0I6RhYm8vEeLo-rYteXV17ywlE3fP5iF00R6NJqJC1RyL5z48ifCRY-q_w0KnC8cb2h-W-UnsD7yIDlQYjfXNawYUratFB2a24AMBlB_S9vITaL4m2q-oReKm7N5Bbfkka1ULT7LWSFeO1czfJIxzFJxLTpJH8cFTKZ-r0FXNVgIv45TXG4Vygi7kJh71dg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-22 13:33:48,940:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-11-22 13:33:48,941:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 22 Nov 2024 12:33:49 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335805657
Replay-Nonce: FVNV6H0MxRQ4PiPns_C63sR-Q7U-aD6PvzR1bN7Pu6gpu-hBYIw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-28T12:33:28Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386819677"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335805657"
}
2024-11-22 13:33:48,941:DEBUG:acme.client:Storing nonce: FVNV6H0MxRQ4PiPns_C63sR-Q7U-aD6PvzR1bN7Pu6gpu-hBYIw
2024-11-22 13:33:48,941:DEBUG:acme.client:JWS payload:
b''
2024-11-22 13:33:48,947:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386819677:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME14UlE0UGlQbnNfQzYzc1ItUTdVLWFENlB2elIxYk43UHU2Z3B1LWhCWUl3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY4MTk2NzcifQ",
  "signature": "ZD44CgAg0D5JDgdN9BSHZSOsNVmXG_YcgvAp99jedRQUa0rooFl625scHm0feY_u9WFInPy5nT5JONNsC39kZu6nLVlWsnBn89s0E6fSObCO9-Eg9NUOO_t5ANqhuXjVHGfT6adUzB_0_20RI49TeyfhB03UuaQDjrU0ycIPSYD5_vU6NL-XyjLA2zEDFW6baZACMuBfunjqUDHRSb-qputo7bBK5UIjbZtbLBm209GG-NGx46s_AKKGdbcy2p4o7bxqxqlw_0ywiVjn5OY-Pz9zcIv8XZU-gxcZ2KoLocj-QiPVKU8hagiH8iUYA-id7mKZ28yxQLZxWhaUBnUpuQ",
  "payload": ""
}
2024-11-22 13:33:49,110:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386819677 HTTP/1.1" 200 823
2024-11-22 13:33:49,110:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 22 Nov 2024 12:33:49 GMT
Content-Type: application/json
Content-Length: 823
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FVNV6H0M9e6m2Qy4RO6StFQ3yCmuOQHZaG4FeKDndM9oqPvVFLo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-28T12:33:28Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386819677/-G9CyQ",
      "status": "pending",
      "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386819677/7gZi0Q",
      "status": "pending",
      "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386819677/-esrVQ",
      "status": "pending",
      "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU"
    }
  ]
}
2024-11-22 13:33:49,111:DEBUG:acme.client:Storing nonce: FVNV6H0M9e6m2Qy4RO6StFQ3yCmuOQHZaG4FeKDndM9oqPvVFLo
2024-11-22 13:33:49,111:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-22 13:33:49,112:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-11-22 13:33:49,112:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-22 13:33:49,112:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-22 13:33:49,113:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:33:49,113:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-22 13:33:49,113:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-22 13:33:49,114:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-22 13:33:49,115:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-22 13:33:49,115:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-11-22 13:33:49,116:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-11-22 13:33:49,127:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 15 renew failure(s), 0 parse failure(s)
2024-11-22 13:33:49,128:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)