2024-11-18 20:31:22,829:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-11-18 20:31:22,829:DEBUG:certbot._internal.main:Arguments: []
2024-11-18 20:31:22,829:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-11-18 20:31:23,605:DEBUG:certbot._internal.log:Root logging level set at 20
2024-11-18 20:31:23,605:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-11-18 20:31:23,645:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x05299FD0> and installer <certbot._internal.cli.cli_utils._Default object at 0x05299FD0>
2024-11-18 20:31:23,689:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-18 20:31:23,972:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-18 20:31:23,973:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is signed by the certificate's issuer.
2024-11-18 20:31:23,977:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD
2024-11-18 20:31:23,985:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:06 UTC.
2024-11-18 20:31:23,985:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:31:23,986:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:31:23,991:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0527AF30>
Prep: True
2024-11-18 20:31:23,992:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0527AF30> and installer None
2024-11-18 20:31:23,992:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-18 20:31:23,997:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-18 20:31:23,998:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-18 20:31:24,001:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-18 20:31:24,456:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-18 20:31:24,457:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:31:18 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "rDpcfCvhxjw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-18 20:31:24,457:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-18 20:31:30,829:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8669_key-certbot.pem
2024-11-18 20:31:36,739:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8667_csr-certbot.pem
2024-11-18 20:31:36,740:DEBUG:acme.client:Requesting fresh nonce
2024-11-18 20:31:36,740:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-18 20:31:36,907:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-18 20:31:36,908:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:31:31 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXs7U9zYS9AUVxhdWEH763Pu2_I4mKsCdplB67100Dyoo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-18 20:31:36,908:DEBUG:acme.client:Storing nonce: usf-jMgXs7U9zYS9AUVxhdWEH763Pu2_I4mKsCdplB67100Dyoo
2024-11-18 20:31:36,908:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-18 20:31:36,914:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hzN1U5ellTOUFVVnhoZFdFSDc2M1B1Ml9JNG1Lc0NkcGxCNjcxMDBEeW9vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "rNFHK5t0bKDW3Z8cWlnxtMVossg6sX4W4y06YKR1holatclfgB1_iWES22PPrVNpLJRw2WRqZagiNHIC-lgT-G__di5S8gEVeYY89rGBuDODYHb3vDt7F4MS8N6r6Ifx_zsqmE62aPJaJE0IKqez9jHtT0Er1zX1uSouuDku_EF8JFmbWufrJZZK5uGuBEd30_6VtvqHKbVddfMijyF2xJg_QI4jPClMr4gUK5lbc4ZB2t2pvpWrBnKbHvrGySzTKrbSgZMwVooSDi-uJQKfP4cXRY9eHwg2CXKXzPWBikAA9FclV64PLS66hdATs_v-nQhYXjuVGQrp_tjqQX7uGg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-18 20:31:37,198:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-11-18 20:31:37,199:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 18 Nov 2024 19:31:31 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322863894397
Replay-Nonce: usf-jMgX2GCIMtR92_SW350Mx5QuzPdyGNRAtWEb-asJqZysi0w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:00:15Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776062317"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322863894397"
}
2024-11-18 20:31:37,199:DEBUG:acme.client:Storing nonce: usf-jMgX2GCIMtR92_SW350Mx5QuzPdyGNRAtWEb-asJqZysi0w
2024-11-18 20:31:37,199:DEBUG:acme.client:JWS payload:
b''
2024-11-18 20:31:37,205:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776062317:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1gyR0NJTXRSOTJfU1czNTBNeDVRdXpQZHlHTlJBdFdFYi1hc0pxWnlzaTB3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYwNjIzMTcifQ",
  "signature": "TJl5XTKMNPM7OBMlyK1UQdZoBELw1YYfhGrRJUyA1Za8Bl0fX2ZzYKmA7pKgNOG1Ps1fyoWbVqwdGym-9f5Q9F9dToS6FpBOCPjZ9jdNYijBWTmCnJ8gXqEsaLaiBXjJOvl7Z2Oa2tkLMjuDan12qg7eVjQARKFKYyOSIla5itgM3IQSHdEE9Gnqe8oqAkYwL1HrzqQqQn_7xHo1NI1g1Joposj3qKBx3knLTDRVE-gS6bsmxB6jASdM0_M6arti8mBTgGEHJXqF0t12y-8l7tl0UuSxySA0U0e-W9R5x6EmztSrQrmoTasOgJbuWRcMeSnZQb0ebfg_GKIgdCHUvw",
  "payload": ""
}
2024-11-18 20:31:37,376:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776062317 HTTP/1.1" 200 810
2024-11-18 20:31:37,377:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:31:31 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXhBdWHlEIv3DI1DDe7B1T1zCbpAi6GeoK6iD5fOvDZhs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:00:15Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/_bn1HA",
      "status": "pending",
      "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/Nohq5w",
      "status": "pending",
      "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/Fppccw",
      "status": "pending",
      "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI"
    }
  ]
}
2024-11-18 20:31:37,377:DEBUG:acme.client:Storing nonce: usf-jMgXhBdWHlEIv3DI1DDe7B1T1zCbpAi6GeoK6iD5fOvDZhs
2024-11-18 20:31:37,378:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-18 20:31:37,378:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-11-18 20:31:37,379:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-18 20:31:37,379:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-18 20:31:37,382:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:31:37,382:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-18 20:31:37,382:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-18 20:31:37,383:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-18 20:31:37,389:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:31:37,432:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-18 20:31:37,692:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-18 20:31:37,693:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-18 20:31:37,694:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-18 20:31:37,699:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:27 UTC.
2024-11-18 20:31:37,699:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:31:37,699:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:31:37,705:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D18850>
Prep: True
2024-11-18 20:31:37,705:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D18850> and installer None
2024-11-18 20:31:37,705:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-18 20:31:37,709:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-18 20:31:37,710:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-18 20:31:37,712:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-18 20:31:38,175:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-18 20:31:38,176:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:31:32 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "lQSYTNBCPcA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-18 20:31:38,176:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-18 20:31:44,076:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8670_key-certbot.pem
2024-11-18 20:31:49,514:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8668_csr-certbot.pem
2024-11-18 20:31:49,515:DEBUG:acme.client:Requesting fresh nonce
2024-11-18 20:31:49,515:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-18 20:31:49,671:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-18 20:31:49,671:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:31:44 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqrPWwBhsbswKsVco-KSuqDCAma7fTmMxM3oRIWFdGUawg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-18 20:31:49,672:DEBUG:acme.client:Storing nonce: JNlwFRqrPWwBhsbswKsVco-KSuqDCAma7fTmMxM3oRIWFdGUawg
2024-11-18 20:31:49,672:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-18 20:31:49,678:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJQV3dCaHNic3dLc1Zjby1LU3VxRENBbWE3ZlRtTXhNM29SSVdGZEdVYXdnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "xbs8yEvG7skuO9MALx9ARqQ65t6yY94NqpGPJlQBCyRv2F-KGtr08fJpbQQb4Nah_3Y3XFGkAM4b_LSTuk-xqLswtixVygOUAH8_EfAZ04AoDwo0veJlQn9MT9oHW5T5FerFIQPh5TvDNh5IgDJTCUllhAYIk_I5BWyyrwj69BPIO5FujJ9nwPeeZYOsp20mLXxRPpFCpRR9s7Vk8slvf-d2X_2N1AVTU1lIcHTJS6xzvOvu2qCxfToewL1DMddjO2Og0qs68gSb4kIB0qFkVPthRFfvDI9XNz7IW501AmqbNWygTOyDG9lOuGS9-wOHVY0lxsYGszL7T6N7RD3Cdg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-18 20:31:49,981:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-11-18 20:31:49,982:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 18 Nov 2024 19:31:44 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322863990237
Replay-Nonce: JNlwFRqrd1oIBgpKVWNnVNQEf0JuIrNaxZnl8ceYsywDuTm_ObI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:00:28Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776191227"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322863990237"
}
2024-11-18 20:31:49,982:DEBUG:acme.client:Storing nonce: JNlwFRqrd1oIBgpKVWNnVNQEf0JuIrNaxZnl8ceYsywDuTm_ObI
2024-11-18 20:31:49,982:DEBUG:acme.client:JWS payload:
b''
2024-11-18 20:31:49,988:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776191227:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJkMW9JQmdwS1ZXTm5WTlFFZjBKdUlyTmF4Wm5sOGNlWXN5d0R1VG1fT2JJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYxOTEyMjcifQ",
  "signature": "lq5W_vyQi53rI7Cev3_YDzw1PUyrpyVnBBX-BhRMovseQQsIrMGld-M-veagA0qXag_PkYmoZR0fRPDf5vO1ICpGQGHaxp7gcAC_66dFpEWTJ405kDemJ_wpSh6HBkPD60aFySo90k1ux-iagjIcnTBVjKxhHjPB-BXXZxpDkE6ICIhjp_RML8jW0Q3Y72n3ccZ-YS4VsnW4kIQEW6LvQjP4M0w7ybhVPLdU8HJ5qSQc2s5Rf0kyvBUvp-pG9ko89dL8zlG_kQyey7s7NgFEmUwqsBrERwbL5q6ZDZQlWdIoGZx6D-HWSQMfzz2gl_TvyU-xGia7FlbFj_p1oD08cw",
  "payload": ""
}
2024-11-18 20:31:50,167:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776191227 HTTP/1.1" 200 804
2024-11-18 20:31:50,168:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:31:44 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqrCEu8YzRskD1hgTTgMdpn0GKFPQNu06z58owYXSw1bKs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:00:28Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/Hvp1ig",
      "status": "pending",
      "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/tag9BQ",
      "status": "pending",
      "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/vZq3rg",
      "status": "pending",
      "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0"
    }
  ]
}
2024-11-18 20:31:50,168:DEBUG:acme.client:Storing nonce: JNlwFRqrCEu8YzRskD1hgTTgMdpn0GKFPQNu06z58owYXSw1bKs
2024-11-18 20:31:50,168:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-18 20:31:50,169:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-11-18 20:31:50,169:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-18 20:31:50,169:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-18 20:31:50,170:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:31:50,170:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-18 20:31:50,170:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-18 20:31:50,171:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-18 20:31:50,172:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:31:50,226:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-18 20:31:50,449:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-18 20:31:50,451:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-11-18 20:31:50,451:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-11-18 20:31:50,456:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:47 UTC.
2024-11-18 20:31:50,457:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:31:50,458:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:31:50,463:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05280C10>
Prep: True
2024-11-18 20:31:50,463:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05280C10> and installer None
2024-11-18 20:31:50,463:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-18 20:31:50,479:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-18 20:31:50,479:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-18 20:31:50,481:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-18 20:31:50,927:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-18 20:31:50,928:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:31:45 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "RZMah_FxYDM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-18 20:31:50,928:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-18 20:31:56,456:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8671_key-certbot.pem
2024-11-18 20:32:01,764:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8669_csr-certbot.pem
2024-11-18 20:32:01,765:DEBUG:acme.client:Requesting fresh nonce
2024-11-18 20:32:01,765:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-18 20:32:01,918:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-18 20:32:01,919:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:31:56 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqrReFiz6Lsul1zB1HwUhgD8m77v_GnuY1eW53g91beamg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-18 20:32:01,919:DEBUG:acme.client:Storing nonce: JNlwFRqrReFiz6Lsul1zB1HwUhgD8m77v_GnuY1eW53g91beamg
2024-11-18 20:32:01,920:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-18 20:32:01,926:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJSZUZpejZMc3VsMXpCMUh3VWhnRDhtNzd2X0dudVkxZVc1M2c5MWJlYW1nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "clnPchZWAWbvoDKfa6mvTAeqQQF8G9_KvDrPspB8uunhwaH0W6hsWc9tCn7C3T_wLdG78iL8I4S6cBFtAHG9nDe4d6VEJwyq4Raupvl1jeAC2wjyZt7-sKgnefT9smcepI1IoZlrqIdPNbyW9VnIicVhVfH7I-SMZhOojqRgwWpI7CiU1rOiaxLRwuiDOQ0kDB4BxZcOuXAkQHBxxUFe6qp_R63WFfMQe0Gx-TUHbrghc_Cd3gnpLeff6HBiUS4CjH0dsnzgmrjQ97qVqstqz37uyspDYOr5EcONKTrU_gI67GPlRmCisO5F0ZeykU8gHFrqEjPbdu2c1IPHOecyAQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-18 20:32:02,143:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-11-18 20:32:02,144:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 18 Nov 2024 19:31:56 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864075277
Replay-Nonce: usf-jMgXvR6isGd0o1IC5cXXJixMNnhwo5lR_TfL5KOVAhes5xY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:00:41Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776309317"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864075277"
}
2024-11-18 20:32:02,144:DEBUG:acme.client:Storing nonce: usf-jMgXvR6isGd0o1IC5cXXJixMNnhwo5lR_TfL5KOVAhes5xY
2024-11-18 20:32:02,144:DEBUG:acme.client:JWS payload:
b''
2024-11-18 20:32:02,150:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776309317:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1h2UjZpc0dkMG8xSUM1Y1hYSml4TU5uaHdvNWxSX1RmTDVLT1ZBaGVzNXhZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYzMDkzMTcifQ",
  "signature": "mxVBbBq99Wrfbyjwf0KsCuBzriZ4lZrtWeV6LJ20iU6rwxa-TQawWUCAVmKi_x9I03dw9e44cesQVKqYd2_7jO25b0NQxeGJ3-bb6s2-MjeZy2oklLUaIAQKzMH3CtfV5Aj1C4K-YeOk57VvBwskM06NvBFcgggLveb_8hG1MuwJ3ayRjgfI7TYDNcr9ZCywOHNP93zeOhN1uKf4TUCq2z8t61-5ktLf-N-ekJ73uuy380hBhhza1D-mH1f9exKipiYGS9TCcqkgFvPuT--GnJM6RpkJmJhybKTERPYqvU1PanocJUtUiyAoamHjt1IJovxVuU2p20SnngrnR3gu2g",
  "payload": ""
}
2024-11-18 20:32:02,317:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776309317 HTTP/1.1" 200 807
2024-11-18 20:32:02,318:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:31:56 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgX91EUVeRrpin-jxIfBHixGvWNPyRseq8MItYPle_US8w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:00:41Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/8Wvihw",
      "status": "pending",
      "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/RhhX0A",
      "status": "pending",
      "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/9T0aKw",
      "status": "pending",
      "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo"
    }
  ]
}
2024-11-18 20:32:02,318:DEBUG:acme.client:Storing nonce: usf-jMgX91EUVeRrpin-jxIfBHixGvWNPyRseq8MItYPle_US8w
2024-11-18 20:32:02,318:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-18 20:32:02,319:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-11-18 20:32:02,319:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-18 20:32:02,319:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-18 20:32:02,320:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:32:02,320:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-18 20:32:02,320:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-18 20:32:02,321:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-18 20:32:02,322:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:32:02,372:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-18 20:32:02,591:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-18 20:32:02,593:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is signed by the certificate's issuer.
2024-11-18 20:32:02,593:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD
2024-11-18 20:32:02,598:INFO:certbot._internal.renewal:Cert not yet due for renewal
2024-11-18 20:32:02,602:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:32:02,654:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-18 20:32:02,837:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-18 20:32:02,838:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-18 20:32:02,839:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-18 20:32:02,844:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:08 UTC.
2024-11-18 20:32:02,844:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:32:02,845:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:32:02,850:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05280A70>
Prep: True
2024-11-18 20:32:02,850:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05280A70> and installer None
2024-11-18 20:32:02,850:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-18 20:32:02,855:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-18 20:32:02,856:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-18 20:32:02,858:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-18 20:32:03,306:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-18 20:32:03,307:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:31:57 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "RbrYQjE540c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-18 20:32:03,307:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-18 20:32:08,874:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8672_key-certbot.pem
2024-11-18 20:32:14,202:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8670_csr-certbot.pem
2024-11-18 20:32:14,202:DEBUG:acme.client:Requesting fresh nonce
2024-11-18 20:32:14,203:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-18 20:32:14,366:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-18 20:32:14,367:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:32:08 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXTvoLOLdjYAxJEY9JkjfGpCSA8OivT-oadC53SrWpJFc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-18 20:32:14,367:DEBUG:acme.client:Storing nonce: usf-jMgXTvoLOLdjYAxJEY9JkjfGpCSA8OivT-oadC53SrWpJFc
2024-11-18 20:32:14,367:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-11-18 20:32:14,373:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hUdm9MT0xkallBeEpFWTlKa2pmR3BDU0E4T2l2VC1vYWRDNTNTcldwSkZjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "UISQP0q1xJyQj6pqJoNU0qGMHGpXWP8r0EgpyPpZIxFl6yjpwctChD_OZNS2fjhZEZ-O4x1UGUWdjUenMqTcXAzv9suaNh-cEmYAEZn9vrlvoAuOzQKhLzosEfv9GvMJOCIg4iON05UI_bJdwRHEXeSPTKSDTwNZ6fFbKRfIRXnzFYCZeKurizBiPEqHRfhA6CjcqcXu5xk-00tszuVVZAaDtb1VP4ZBB-ehkL4YoCOPajp9jtCzNiGo9IcUNVBCJL8ebQhhp325FWQkYPuCXH6twPkLmFtjb90oAwuos5dstUPFC2eK4OIHtqLhRYOyy-xqLku7CyJkSdsFXdIO-g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-18 20:32:14,743:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-11-18 20:32:14,744:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 18 Nov 2024 19:32:09 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864158237
Replay-Nonce: JNlwFRqrvbMedaLa2aWc80e2c9yQIgsMY4pkGFchijGrg1RmY5M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:00:54Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776432107"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864158237"
}
2024-11-18 20:32:14,744:DEBUG:acme.client:Storing nonce: JNlwFRqrvbMedaLa2aWc80e2c9yQIgsMY4pkGFchijGrg1RmY5M
2024-11-18 20:32:14,744:DEBUG:acme.client:JWS payload:
b''
2024-11-18 20:32:14,750:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776432107:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJ2Yk1lZGFMYTJhV2M4MGUyYzl5UUlnc01ZNHBrR0ZjaGlqR3JnMVJtWTVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY0MzIxMDcifQ",
  "signature": "bNFPJMXWFPEh0AnzKWv5xpZTGSoP7sc_6Sje3dcOmqb0M5YvHEt6VhqhrG2GId0WQ3mWjJ9OlTuIRik6Hj0NXcwWNr-jF2vZEuCf5_BQrrrjROoOhRDnbODtrEuWbSNRH40axV2bG84kwK7JGYuHsjMFWX4ei77O8mKUs4v5UqtOx17yeqbZGshMKWWkBvIkWa0_k7HmgnDKlOYx69ORg_dEACb9BI5Jrt96hUmeaUL1KDqAZserVmPSoXzYhd-1noYCWl3xCyrQHp-5JhYX5k7DU46gaOtI5Dv42Qa9luTUZOdX9WyVPj47tvJg3__k6hvC3JcM-LDAejjCQCaaVQ",
  "payload": ""
}
2024-11-18 20:32:14,918:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776432107 HTTP/1.1" 200 801
2024-11-18 20:32:14,919:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:32:09 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXtu-Y2L3Ihi4pjZGgsKywbupHnzqQs-7DDqXNMEzFA4s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:00:54Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/iWIilA",
      "status": "pending",
      "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/Wk_i8A",
      "status": "pending",
      "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/U1YmAg",
      "status": "pending",
      "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA"
    }
  ]
}
2024-11-18 20:32:14,919:DEBUG:acme.client:Storing nonce: usf-jMgXtu-Y2L3Ihi4pjZGgsKywbupHnzqQs-7DDqXNMEzFA4s
2024-11-18 20:32:14,920:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-18 20:32:14,920:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-11-18 20:32:14,921:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-18 20:32:14,921:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-18 20:32:14,922:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:32:14,922:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-18 20:32:14,922:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-18 20:32:14,922:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-18 20:32:14,924:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:32:14,975:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-18 20:32:15,480:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-18 20:32:15,481:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-18 20:32:15,482:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-18 20:32:15,487:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:27 UTC.
2024-11-18 20:32:15,487:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:32:15,488:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:32:15,493:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x055945D0>
Prep: True
2024-11-18 20:32:15,493:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x055945D0> and installer None
2024-11-18 20:32:15,493:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-18 20:32:15,498:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-18 20:32:15,499:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-18 20:32:15,501:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-18 20:32:15,948:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-18 20:32:15,948:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:32:10 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "B3iqjnh0Brg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-18 20:32:15,949:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-18 20:32:21,343:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8673_key-certbot.pem
2024-11-18 20:32:26,644:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8671_csr-certbot.pem
2024-11-18 20:32:26,644:DEBUG:acme.client:Requesting fresh nonce
2024-11-18 20:32:26,644:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-18 20:32:26,819:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-18 20:32:26,819:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:32:21 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqrU-mzfUtJTqjveVixs5G9ufBCgFmK-lWCYvqnqd0wEIs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-18 20:32:26,820:DEBUG:acme.client:Storing nonce: JNlwFRqrU-mzfUtJTqjveVixs5G9ufBCgFmK-lWCYvqnqd0wEIs
2024-11-18 20:32:26,820:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-18 20:32:26,826:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJVLW16ZlV0SlRxanZlVml4czVHOXVmQkNnRm1LLWxXQ1l2cW5xZDB3RUlzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "MNFkGHuFoPRIQ24S_soqbPINXtnjhIp6jo2kF1emRsvA9bbODaDGli51SV5koV3kMHHp-55Iu2UmImfwEUL8Ez-wcBtbtByQ9eu03KQzjcUq-P-2bNMg5q3nggGBFC9t0UGSd20kRnXsqIDxH2-d47j8vKW7hGFhfNs_A_xFAODiiGMGnSKBdgYKeKehlDyih95v4sgId1i7jKhJgHs4fayURG6W8lJJbveMAHC2fJJ4M58yWSubQTk-D4onT7rf1IraMYqPBdOAZrUkVVnJ1pbMbfpThO4iYMCMutRZgmBDib23k5_9Bh6_G-XLQEet4HA_H1aI2Ao8kqbgxLT0sw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-18 20:32:27,034:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-11-18 20:32:27,035:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 18 Nov 2024 19:32:21 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864248527
Replay-Nonce: usf-jMgXM0lyd5uP864du-6PpZl2HNnxaOsIc8PlYLbMgw2oLXY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:01:07Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776561677"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864248527"
}
2024-11-18 20:32:27,035:DEBUG:acme.client:Storing nonce: usf-jMgXM0lyd5uP864du-6PpZl2HNnxaOsIc8PlYLbMgw2oLXY
2024-11-18 20:32:27,035:DEBUG:acme.client:JWS payload:
b''
2024-11-18 20:32:27,043:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776561677:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hNMGx5ZDV1UDg2NGR1LTZQcFpsMkhObnhhT3NJYzhQbFlMYk1ndzJvTFhZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY1NjE2NzcifQ",
  "signature": "mI4KI7GKp--SI1-6TedaQ1fOF5jjx46UUeHlJei65BJYF6CwWVP6UKHCresUtCCAr7vzdoeZ-5W8OQ2V6DXVEZE_VpAbM8gi-mcONsmDqPpLyVTuSf5umHv_RsOynm4fmH7-4maPG7ApTEW-cPPmOPw8NZ1bF_CixdToLHvJTJZd4TVZimxYf4tIaWOIOYTghAZgag8rHcDvEmg7FqcHK66ZX3K_jyJWVjY7EB99AqK-y_fiLuURyfVtLmILvwO-f6xJAcrZPhkYqG1_jX1hEeuaIaE4pNgF57TOPy8maDAOEuHzbmJzTA62bp9pRXj7qqBAK3YEnDgEY1y7_gOddw",
  "payload": ""
}
2024-11-18 20:32:27,296:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776561677 HTTP/1.1" 200 805
2024-11-18 20:32:27,297:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:32:21 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXc4aYH92LJW6G8Z1plWoeDLF6d1B9uPvbWqUkoR6zX5M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:01:07Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/QOkASw",
      "status": "pending",
      "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/S4Po3g",
      "status": "pending",
      "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/kvNskw",
      "status": "pending",
      "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I"
    }
  ]
}
2024-11-18 20:32:27,297:DEBUG:acme.client:Storing nonce: usf-jMgXc4aYH92LJW6G8Z1plWoeDLF6d1B9uPvbWqUkoR6zX5M
2024-11-18 20:32:27,298:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-18 20:32:27,298:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-11-18 20:32:27,298:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-18 20:32:27,299:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-18 20:32:27,299:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:32:27,300:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-18 20:32:27,300:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-18 20:32:27,300:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-18 20:32:27,301:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:32:27,350:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-18 20:32:29,086:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 512
2024-11-18 20:32:29,098:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-11-18 20:32:29,098:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-11-18 20:32:29,103:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:58 UTC.
2024-11-18 20:32:29,103:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:32:29,103:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:32:29,109:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0559EF50>
Prep: True
2024-11-18 20:32:29,109:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0559EF50> and installer None
2024-11-18 20:32:29,109:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-18 20:32:29,114:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-18 20:32:29,115:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-18 20:32:29,117:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-18 20:32:29,570:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-18 20:32:29,571:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:32:23 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "eoE_wOGC0Y4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-18 20:32:29,571:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-18 20:32:35,375:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8674_key-certbot.pem
2024-11-18 20:32:40,759:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8672_csr-certbot.pem
2024-11-18 20:32:40,760:DEBUG:acme.client:Requesting fresh nonce
2024-11-18 20:32:40,760:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-18 20:32:40,931:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-18 20:32:40,933:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:32:35 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqrn84li3zYcoulg8pVhyHc8l15wFVCMMk4BY22zUNAY-U
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-18 20:32:40,933:DEBUG:acme.client:Storing nonce: JNlwFRqrn84li3zYcoulg8pVhyHc8l15wFVCMMk4BY22zUNAY-U
2024-11-18 20:32:40,933:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-18 20:32:40,939:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJuODRsaTN6WWNvdWxnOHBWaHlIYzhsMTV3RlZDTU1rNEJZMjJ6VU5BWS1VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "jDvuuLLqwVJiGvEOnJcxfetJ54X3maKaOwF4KCb-fAMuXJt7Kakl7ZgxKSYN3RPUghn1prXLh3X9cGn4hc1zjM8bnIQzohfLGwVn_z_UXxhIqISzZNLf7EGT7iHNtDgB-eDKkYqTPbghrza9zaOktfarE4N1Yq6aAjEt1ZuBf-VM0yc1l0dggadupKOixP7ngOeQaDT62hI35awWXj60Ns7e_z6GAJy8kzhUZ0F0DPpEFmM-RqRU8DhWrIA51tgGc0bZWwTkLPXFb90T0o7ItoTJYrVry8O3GVW9zeW2uB86l1X64OLlb4B4e7HnYHqZRb7O_gxhIO8zGgKIUPjq8A",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-11-18 20:32:41,256:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-11-18 20:32:41,257:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 18 Nov 2024 19:32:35 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864332297
Replay-Nonce: JNlwFRqrv5TBHJ829MzjrrY6KLYs0PY0f1eF9Cfn8YqbVnGf_I8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:01:20Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776685657"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864332297"
}
2024-11-18 20:32:41,257:DEBUG:acme.client:Storing nonce: JNlwFRqrv5TBHJ829MzjrrY6KLYs0PY0f1eF9Cfn8YqbVnGf_I8
2024-11-18 20:32:41,257:DEBUG:acme.client:JWS payload:
b''
2024-11-18 20:32:41,263:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776685657:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJ2NVRCSEo4MjlNempyclk2S0xZczBQWTBmMWVGOUNmbjhZcWJWbkdmX0k4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY2ODU2NTcifQ",
  "signature": "PwnvO7Bs6LlHr9TFcswegz9tpNJQ9eRX4VsUapffTUjp0wPI9F5lKRn-nTd2jOsogp_drG5kBDLjRXr5yeCCydgFBM6JEsQy6fXWUSc7V5VMqhZrmHGDrW5YJQbwBaw3CScuj5x5KWSeWfPYHqNfwp4Py0deCwAv1RldfF14Y1tmnzvWwLBqZ3-S8HjQQjRl4h95mjYP96P8OcZB5NVcjf1XW00pLOvSI3AvtenP6v7CzGAxYXpy4ewqGhza09Tbu8CArHMUZk2f9m53u9WwCmMuLwNFIELbxtXerD8rsWxfIXBbm2473IcoYHMVuZatL7H4uAPAdo8bFOy40qF2Fw",
  "payload": ""
}
2024-11-18 20:32:41,528:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776685657 HTTP/1.1" 200 809
2024-11-18 20:32:41,529:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:32:35 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXrLxi4dn2QYMZb1IFROkXJVcdcrkjAfFXRxtg0D149qo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:01:20Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/s3nu5w",
      "status": "pending",
      "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/BBENhw",
      "status": "pending",
      "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/DgbGnw",
      "status": "pending",
      "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg"
    }
  ]
}
2024-11-18 20:32:41,529:DEBUG:acme.client:Storing nonce: usf-jMgXrLxi4dn2QYMZb1IFROkXJVcdcrkjAfFXRxtg0D149qo
2024-11-18 20:32:41,531:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-18 20:32:41,531:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-11-18 20:32:41,532:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-18 20:32:41,532:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-18 20:32:41,533:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:32:41,533:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-18 20:32:41,533:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-18 20:32:41,533:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-18 20:32:41,534:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:32:41,572:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-18 20:32:41,964:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-18 20:32:41,965:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is signed by the certificate's issuer.
2024-11-18 20:32:41,966:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD
2024-11-18 20:32:41,970:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:15 UTC.
2024-11-18 20:32:41,970:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:32:41,970:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:32:41,975:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05594170>
Prep: True
2024-11-18 20:32:41,976:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05594170> and installer None
2024-11-18 20:32:41,976:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-18 20:32:41,981:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-18 20:32:41,982:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-18 20:32:41,984:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-18 20:32:42,442:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-18 20:32:42,442:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:32:36 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "hhxKr8LsRtI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-18 20:32:42,443:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-18 20:32:48,805:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8675_key-certbot.pem
2024-11-18 20:32:54,250:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8673_csr-certbot.pem
2024-11-18 20:32:54,250:DEBUG:acme.client:Requesting fresh nonce
2024-11-18 20:32:54,250:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-18 20:32:54,423:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-18 20:32:54,424:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:32:48 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXqw8tzKy4tp0lpKFGKfrnOpAc4malXt6wYRoypUP7ixo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-18 20:32:54,424:DEBUG:acme.client:Storing nonce: usf-jMgXqw8tzKy4tp0lpKFGKfrnOpAc4malXt6wYRoypUP7ixo
2024-11-18 20:32:54,424:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "helix.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-18 20:32:54,430:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hxdzh0ekt5NHRwMGxwS0ZHS2Zybk9wQWM0bWFsWHQ2d1lSb3lwVVA3aXhvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "wBowBaMTivmV3N2eknckY0Au3rzhinsmSaHk00PFdCs1GmVxtg_4JOy8vBcK1C-D-J8bYmMYVn-XbaPxJuXXDkrhMr2N-L-WErT0qU1sQGYuCymf70bn3EV-_nIA1VtmgZbV30sTicek6gOPKjrFvFLnKAuiMMnVQJVyclA65hnWw1tF8tr4HMJBgoWEhd3OQl9bHXmYmFncdBYnQquzZRcRDq8yKT3lyaEd6HDcHcA0WYAqiW2EW13TOvR0n1fS_OuLbd0S6PRCyJG4K8zcUwXA0s7lbldHKtymfO9P_ab2AwbaiIkPRhs5_zQpJsP74MfPz5VE-aJK2vR08Q9QjA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-18 20:32:54,774:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-11-18 20:32:54,775:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 18 Nov 2024 19:32:49 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864408807
Replay-Nonce: JNlwFRqrPhbaibNNQRZvRUKZ4giBfNmr0WkZ3EgonxDS0fLdkOE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:01:33Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "helix.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776800527"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864408807"
}
2024-11-18 20:32:54,775:DEBUG:acme.client:Storing nonce: JNlwFRqrPhbaibNNQRZvRUKZ4giBfNmr0WkZ3EgonxDS0fLdkOE
2024-11-18 20:32:54,775:DEBUG:acme.client:JWS payload:
b''
2024-11-18 20:32:54,781:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776800527:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJQaGJhaWJOTlFSWnZSVUtaNGdpQmZObXIwV2taM0Vnb254RFMwZkxka09FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY4MDA1MjcifQ",
  "signature": "osqx5k-TW_-R3MtD12s6hYs8lexQuut6c6wFNoN4Ec_9-yvWvgFqvo5ScnhKCqyGRMY_Zty88fjGemHYOv29puDsmtmgh1TMmptNOv82vKO8cFdp3k039LaB8M9kTnsQX4jemZt-1axmi_agTX2vhjpeaWs_q_LPpSBjCby66YnFnfhm-NnSCXt5doWJ8l1K-iBK1gvN_GvblJg5OV965T4BOpahQJgNE_LNXRFoWuiYdm-Br_7uTui8f-Z6xLqW-TKq3VNUnCxg14QRcWXwNGVvuFxAwcwAWvrKA7JS1G_W4TzQmg49Aq1CmZbSt7OLNVSTUMfRo6PSoarPHuOjfA",
  "payload": ""
}
2024-11-18 20:32:54,970:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776800527 HTTP/1.1" 200 807
2024-11-18 20:32:54,970:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:32:49 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXSgxWHco1SMfGbG3ipX-9jpJI4vqsXQj-fSG6MvTNUYk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "helix.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:01:33Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/yjXnZA",
      "status": "pending",
      "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/B8BcEw",
      "status": "pending",
      "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/uHoKaA",
      "status": "pending",
      "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o"
    }
  ]
}
2024-11-18 20:32:54,970:DEBUG:acme.client:Storing nonce: usf-jMgXSgxWHco1SMfGbG3ipX-9jpJI4vqsXQj-fSG6MvTNUYk
2024-11-18 20:32:54,972:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-18 20:32:54,972:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl
2024-11-18 20:32:54,973:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-18 20:32:54,973:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-18 20:32:54,974:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:32:54,974:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-18 20:32:54,974:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-18 20:32:54,975:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-18 20:32:54,976:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:32:55,026:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-18 20:32:55,435:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-18 20:32:55,436:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-18 20:32:55,437:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-18 20:32:55,442:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:37 UTC.
2024-11-18 20:32:55,442:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:32:55,442:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:32:55,447:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0559ECD0>
Prep: True
2024-11-18 20:32:55,447:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0559ECD0> and installer None
2024-11-18 20:32:55,447:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-18 20:32:55,462:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-18 20:32:55,463:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-18 20:32:55,465:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-18 20:32:55,913:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-18 20:32:55,914:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:32:50 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "j3KQHafqBWY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-18 20:32:55,914:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-18 20:33:01,630:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8676_key-certbot.pem
2024-11-18 20:33:07,103:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8674_csr-certbot.pem
2024-11-18 20:33:07,104:DEBUG:acme.client:Requesting fresh nonce
2024-11-18 20:33:07,104:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-18 20:33:07,257:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-18 20:33:07,258:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:01 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqr7KlWs1q8SlVdF_CCeYWTD34S9TgZDp-1gexEGC0mAhM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-18 20:33:07,258:DEBUG:acme.client:Storing nonce: JNlwFRqr7KlWs1q8SlVdF_CCeYWTD34S9TgZDp-1gexEGC0mAhM
2024-11-18 20:33:07,258:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-18 20:33:07,264:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXI3S2xXczFxOFNsVmRGX0NDZVlXVEQzNFM5VGdaRHAtMWdleEVHQzBtQWhNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "wEZeYr6mSKaqJUxeAPUic_rkEq2CZOjjXKK8WVLnf-2rXcqAbY7U_mhvvPhqdZ6x_Tip4YHCv3TwsC-ERrtDphoQ9xMaLtrY6SptgyJw47Sp2h95GoF1ie64AlC9GJuHXd8r4I5kfDUERuxnxvVls3RSiuMLRT3gYbanuKjzU_U_DNte20SfLyCjc8wk2rbHB4oeeqKBDYsMqo78TnTanxje3DifUDj3oCHDs9wR6eOsmHjxt4GNFn4CP7iiu8InV3neLkan7fa-3Kt16b314TtkzOvzDxub-7bVP4CXJ88MlFRfZd2smc5masJ27HkcN8JUrxyda5uvBnuEYen9zA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-11-18 20:33:07,468:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-11-18 20:33:07,469:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 18 Nov 2024 19:33:01 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864481367
Replay-Nonce: usf-jMgX9sP_KFqaCvOoTLHDtikHJ4NpgTcXqyAXWb-pkZZTO_c
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:01:46Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776908267"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864481367"
}
2024-11-18 20:33:07,470:DEBUG:acme.client:Storing nonce: usf-jMgX9sP_KFqaCvOoTLHDtikHJ4NpgTcXqyAXWb-pkZZTO_c
2024-11-18 20:33:07,470:DEBUG:acme.client:JWS payload:
b''
2024-11-18 20:33:07,477:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776908267:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1g5c1BfS0ZxYUN2T29UTEhEdGlrSEo0TnBnVGNYcXlBWFdiLXBrWlpUT19jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY5MDgyNjcifQ",
  "signature": "RM2CjYmuxyJlE7Ljszf5dIk0_Cvra5VEWVG2wFeSF4AEgiWpcAh84aEP_zmfX-Mw0Q6MiNjqtSEJl_DMjMjkXsg7Ud_7Mi7k_0g8fWr8tFxT8QjWrc0xAMr-l-WKmsFTWr-VcGokkHS_rh4ztnqqa0RP3qkXrE_4J1Me-zZQoRWgFCq109MbMK1gWHlZTxKGLhIBAgR5doA7n1JN0TWrH82c-urxhyf0U_5EvWnAiryp4prp7XOVizudBl_yyykMwiPn2AS8_nYYyObjWR5rOITuu-ujwFIxjUxKbji2mfd7NyUWkD7HeSp5ChR0k7tNf4gCwHRLbeOeXvVMSeclAQ",
  "payload": ""
}
2024-11-18 20:33:07,727:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776908267 HTTP/1.1" 200 806
2024-11-18 20:33:07,728:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:02 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXZH7P6fM2rrgBbKvvbBKf9DkuBnL1uo-sWHqQwB24Ffs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:01:46Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/tMqdPg",
      "status": "pending",
      "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/pzyROQ",
      "status": "pending",
      "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/PhZSOw",
      "status": "pending",
      "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o"
    }
  ]
}
2024-11-18 20:33:07,728:DEBUG:acme.client:Storing nonce: usf-jMgXZH7P6fM2rrgBbKvvbBKf9DkuBnL1uo-sWHqQwB24Ffs
2024-11-18 20:33:07,730:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-18 20:33:07,730:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-11-18 20:33:07,730:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-18 20:33:07,731:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-18 20:33:07,731:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:33:07,732:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-18 20:33:07,732:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-18 20:33:07,732:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-18 20:33:07,733:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:33:07,782:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-11-18 20:33:07,782:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:33:07,782:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-11-18 20:33:07,789:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-11-18 20:33:07,791:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-11-18 20:33:07,791:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-11-18 20:33:07,791:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-11-18 20:33:07,792:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-11-18 20:33:07,793:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-11-18 20:33:07,837:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-18 20:33:08,190:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-18 20:33:08,191:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-18 20:33:08,192:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-18 20:33:08,197:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:56 UTC.
2024-11-18 20:33:08,197:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:33:08,198:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:33:08,203:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D18130>
Prep: True
2024-11-18 20:33:08,203:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D18130> and installer None
2024-11-18 20:33:08,203:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-18 20:33:08,218:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-18 20:33:08,219:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-18 20:33:08,221:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-18 20:33:08,665:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-18 20:33:08,665:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:03 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "8Y2IrHYZPx8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-18 20:33:08,666:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-18 20:33:14,852:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8677_key-certbot.pem
2024-11-18 20:33:20,490:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8675_csr-certbot.pem
2024-11-18 20:33:20,490:DEBUG:acme.client:Requesting fresh nonce
2024-11-18 20:33:20,490:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-18 20:33:20,639:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-18 20:33:20,639:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:14 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqrtliC6QSH0RYWgKMLy23_-Fi-Wsh6BAcTD85QByBfMNA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-18 20:33:20,640:DEBUG:acme.client:Storing nonce: JNlwFRqrtliC6QSH0RYWgKMLy23_-Fi-Wsh6BAcTD85QByBfMNA
2024-11-18 20:33:20,640:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-18 20:33:20,646:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJ0bGlDNlFTSDBSWVdnS01MeTIzXy1GaS1Xc2g2QkFjVEQ4NVFCeUJmTU5BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "hsIvUk9THbgaVhn62k2gsXJTG6WDaVzuK7TIqoPArg6GkAKrhhJEY17vWKcVngZv5LHBcoRG3oQn8jM9G_fo5_rLYTHbO0AtWZoWOnqkVhtfWrsfTrk846xY8cOyz8cuusofP9UY58hBTVffph7u68nwr-XrwfMAomPghUH5FzqOCDtgLD_noJo1wWwXqDMyvB82tjJSWD3LKu2RBmbeyPKnY92n-7HdQDRwvoLnCwURPNVEs0CJ0eoAoHnvOgrjOCERCdiOJkKu-b3hMXvByzMrkXtyApaMVuXQz9yCF_8zstzLe3EttRHQ4y6wv2QPtyeICEr43PZ7NBW5A7g-dQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-18 20:33:20,848:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-11-18 20:33:20,849:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 18 Nov 2024 19:33:15 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864554417
Replay-Nonce: JNlwFRqrkWJdI7kEmZU_NFzzFouwSpT2OROnl5EZkWQg3PywN-M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:01:59Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777016797"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864554417"
}
2024-11-18 20:33:20,849:DEBUG:acme.client:Storing nonce: JNlwFRqrkWJdI7kEmZU_NFzzFouwSpT2OROnl5EZkWQg3PywN-M
2024-11-18 20:33:20,849:DEBUG:acme.client:JWS payload:
b''
2024-11-18 20:33:20,855:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777016797:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJrV0pkSTdrRW1aVV9ORnp6Rm91d1NwVDJPUk9ubDVFWmtXUWczUHl3Ti1NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcwMTY3OTcifQ",
  "signature": "ssODr6iAV9bKO9AOxiYxFcS9dbEakr_RWgD21QxUxxprrTtN62aVPFQVhNO3WcD2SqpW7SVRPB7R_V10isAEzQbW0BOUu5H8YrsDHc2qfTMv40Wz-OSLTUgMZsh1aBXQFnhCQCZ6qk1J7jSdvV52SYUsIqlqK-al5Jnm59edd2HIWft3VSzakWgZLKbztVvo76H0BHtsXnwYWJQGOcLkcLNvT_EUxF1bn819RFY97WoU_AGxkPzAJ_nz4qLKOj_23qeecPe21C9z-q7ejTHxDoGdiomG6dcShipmNgoAfuQM0AmpCo9wuHPftDyB2bIVEJzlLWRtcOJ3yN0VWDvzJw",
  "payload": ""
}
2024-11-18 20:33:21,052:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777016797 HTTP/1.1" 200 811
2024-11-18 20:33:21,053:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:15 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqru9xrPFMaW3wz_8ZdHL79SykOOSgLIAxSNrj00j7QnMI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:01:59Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/uNkVbw",
      "status": "pending",
      "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/tKio5w",
      "status": "pending",
      "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/C4H6lQ",
      "status": "pending",
      "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE"
    }
  ]
}
2024-11-18 20:33:21,053:DEBUG:acme.client:Storing nonce: JNlwFRqru9xrPFMaW3wz_8ZdHL79SykOOSgLIAxSNrj00j7QnMI
2024-11-18 20:33:21,054:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-18 20:33:21,054:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-11-18 20:33:21,055:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-18 20:33:21,055:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-18 20:33:21,056:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:33:21,056:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-18 20:33:21,056:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-18 20:33:21,057:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-18 20:33:21,058:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:33:21,098:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-18 20:33:22,909:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-18 20:33:22,910:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-18 20:33:22,911:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-18 20:33:22,915:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:15 UTC.
2024-11-18 20:33:22,916:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:33:22,916:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:33:22,921:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x055A72D0>
Prep: True
2024-11-18 20:33:22,921:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x055A72D0> and installer None
2024-11-18 20:33:22,921:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-18 20:33:22,937:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-18 20:33:22,938:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-18 20:33:22,940:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-18 20:33:23,387:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-18 20:33:23,388:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:17 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Ojm7HPB6CRU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-18 20:33:23,388:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-18 20:33:29,246:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8678_key-certbot.pem
2024-11-18 20:33:34,849:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8676_csr-certbot.pem
2024-11-18 20:33:34,849:DEBUG:acme.client:Requesting fresh nonce
2024-11-18 20:33:34,850:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-18 20:33:35,001:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-18 20:33:35,002:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:29 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXYth9PmtSkYhJHiYOE0rfZVGiqh8ntVQaV3jntLnHfn0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-18 20:33:35,002:DEBUG:acme.client:Storing nonce: usf-jMgXYth9PmtSkYhJHiYOE0rfZVGiqh8ntVQaV3jntLnHfn0
2024-11-18 20:33:35,003:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-18 20:33:35,010:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hZdGg5UG10U2tZaEpIaVlPRTByZlpWR2lxaDhudFZRYVYzam50TG5IZm4wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ukqr1JVQ_62pK86nuBYi46Abcic0isMO5cydpz0jMMJ2OQXgKxVhIuKGB8JtUao1VCHK6-dyqHfinrpd74elMpM19AWTu-8N4_5aA8KELiDOlVrTJXCdmnrMFvBSY9ADwzX4mbcYRYl7KMgvdWjXgFxgxETGYHU71rlVeEHBT4XYEoJz0e8IdLvYsyRqvhASvt5ULGL6mbWdQwk_GcXnQ21ieLtlY4VpZjFR8sOPG6VurcHb-WMV9blOP61qjhSlesaqJwSwK3Q-q7TnkPIFduPnBXf9unYbA3pd9EeIqxqKMHmx_xvzkPmgRSNZhI1mYQKTcXZcXOJK067hNCZHcQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-18 20:33:35,333:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-11-18 20:33:35,334:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 18 Nov 2024 19:33:29 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864646067
Replay-Nonce: usf-jMgX-hL6PJ-huvng_KDjSQmxK8-5K-s9NznbgpD1c_tL0to
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:02:12Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777143667"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864646067"
}
2024-11-18 20:33:35,334:DEBUG:acme.client:Storing nonce: usf-jMgX-hL6PJ-huvng_KDjSQmxK8-5K-s9NznbgpD1c_tL0to
2024-11-18 20:33:35,334:DEBUG:acme.client:JWS payload:
b''
2024-11-18 20:33:35,340:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777143667:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1gtaEw2UEotaHV2bmdfS0RqU1FteEs4LTVLLXM5TnpuYmdwRDFjX3RMMHRvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcxNDM2NjcifQ",
  "signature": "X-9jiRfHqKOK7f_uU54kYujxeODpY0e7WuiJNVd0LnQBMPs63d8E8L_Fguyt03RgEPAyLkEw9OvRt4mJ9XJ3if27Gf7AnOHUrEgP_60HCT_Mry_MeNnQRK5GLhrMpg1CI17V3Ma0AeqJMaEQSeJBUoo3B-qyjFMvSV-AMUWuclpthyuSLr9psSyZg19-eAKHGmllXba0JX5fW4GyIyMOpHzGnI5o1Tw4EzDB1n1Oniu51hcbfk492HQpW5Qtb3lZ-L5P9BJzJfj32E3sJ45-AlUvnqdOfTE0boe6v9ISCljghzq1J8vlw_qRpK0KgPcn8-MXY_2giS0R6Ds7Ss6jIQ",
  "payload": ""
}
2024-11-18 20:33:35,526:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777143667 HTTP/1.1" 200 810
2024-11-18 20:33:35,527:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:29 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqrtWClvS98saNPfVfcw9jjbezZqFO1dKhxRWiCITGpOkU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:02:12Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/I07SEw",
      "status": "pending",
      "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/Ttq2kg",
      "status": "pending",
      "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/9bNT8Q",
      "status": "pending",
      "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao"
    }
  ]
}
2024-11-18 20:33:35,527:DEBUG:acme.client:Storing nonce: JNlwFRqrtWClvS98saNPfVfcw9jjbezZqFO1dKhxRWiCITGpOkU
2024-11-18 20:33:35,527:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-18 20:33:35,528:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-11-18 20:33:35,528:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-18 20:33:35,529:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-18 20:33:35,529:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:33:35,530:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-18 20:33:35,530:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-18 20:33:35,530:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-18 20:33:35,531:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:33:35,582:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-18 20:33:35,767:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-18 20:33:35,768:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-11-18 20:33:35,769:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-11-18 20:33:35,773:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:32 UTC.
2024-11-18 20:33:35,774:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:33:35,774:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:33:35,779:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0559ED50>
Prep: True
2024-11-18 20:33:35,779:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0559ED50> and installer None
2024-11-18 20:33:35,780:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-18 20:33:35,785:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-18 20:33:35,786:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-18 20:33:35,788:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-18 20:33:36,358:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-18 20:33:36,359:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:30 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Jue2w3Eg5e4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-18 20:33:36,359:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-18 20:33:42,030:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8679_key-certbot.pem
2024-11-18 20:33:47,645:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8677_csr-certbot.pem
2024-11-18 20:33:47,645:DEBUG:acme.client:Requesting fresh nonce
2024-11-18 20:33:47,645:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-18 20:33:47,796:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-18 20:33:47,797:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:42 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqrCxYnj3ieyAaS0-5IDOnHsdP4MG0CYp5ouLRFKi3axGw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-18 20:33:47,797:DEBUG:acme.client:Storing nonce: JNlwFRqrCxYnj3ieyAaS0-5IDOnHsdP4MG0CYp5ouLRFKi3axGw
2024-11-18 20:33:47,797:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-18 20:33:47,803:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJDeFluajNpZXlBYVMwLTVJRE9uSHNkUDRNRzBDWXA1b3VMUkZLaTNheEd3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "tjhqqoHx3AkiijsXHUauoYTdwtVDsR9T4Kc0cSqaYhop3shyR2F_sY5_DHvNrjXTroJQggfP6yGxC3qAGdynC2trl8CY0K75oFlYdISi3gbAgjEnrlU-pbFqGRRDCs5dU7QZXGTAYKLJZFhNWU7uADBLaqigYbhY33rQTBUMetPounDtZ2HUqDVysNCrj7M0HBiGyaJAz0xNHAiQgT2SusoB2UgnZeFlD0xaNgqJDv4k2IXbsFRfPLz5EJLPcvsYZuDZJclOI8DTQpBGMtrCjjDa_vjvOTQJ6wHEKsfB_EQS9tuED4ISsIw3-Y8A9Fw8c6XfIzkpVIRLaMghg2rLTg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-11-18 20:33:48,092:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-11-18 20:33:48,093:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 18 Nov 2024 19:33:42 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864723967
Replay-Nonce: JNlwFRqrWvW-pT7A4B6UXC_Gmr6oP1ShTXc0TXUhUYvTCZdCpgQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:02:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777258277"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864723967"
}
2024-11-18 20:33:48,093:DEBUG:acme.client:Storing nonce: JNlwFRqrWvW-pT7A4B6UXC_Gmr6oP1ShTXc0TXUhUYvTCZdCpgQ
2024-11-18 20:33:48,093:DEBUG:acme.client:JWS payload:
b''
2024-11-18 20:33:48,099:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777258277:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJXdlctcFQ3QTRCNlVYQ19HbXI2b1AxU2hUWGMwVFhVaFVZdlRDWmRDcGdRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcyNTgyNzcifQ",
  "signature": "hPLRnZh2x6A6VjENvpN49Fhs4b0WzxO5GUzlLRXC1RaOjPHr8HD4Nbee0qRx7f-a2P-OrPDt-jzleJH-1V0Ip8WMAUhnsL4OGJfchsVVX6h6UKVU1q0rKRgndpklYA84_qu7nXfas6FLxxfMc3glbaN2fxDR-6mqqSPRikZ-KbTJJuy4GlsTuktg5aC663UA5ILguwx1E88-72-Nhj-GKWEVEaYNfoRHqHnAdjWnLlEzqMroTcAm0e7YfcQgEaUUYhqr926md3dW_mOLTbH2uY8N4vtbEFlFgnrDkW1Emz6j8Iv0P9pQ3O7AXVlXKp5WFEZf2rUhISHiWfoK4JZWLQ",
  "payload": ""
}
2024-11-18 20:33:48,280:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777258277 HTTP/1.1" 200 809
2024-11-18 20:33:48,280:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:42 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgX4zVESGT6Mdha9U95lBidt3wtVWPOBnNfg44GtgH0U1U
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:02:25Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/cBbQvQ",
      "status": "pending",
      "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/dLzeEg",
      "status": "pending",
      "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/GfFFvQ",
      "status": "pending",
      "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o"
    }
  ]
}
2024-11-18 20:33:48,281:DEBUG:acme.client:Storing nonce: usf-jMgX4zVESGT6Mdha9U95lBidt3wtVWPOBnNfg44GtgH0U1U
2024-11-18 20:33:48,281:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-18 20:33:48,282:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-11-18 20:33:48,282:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-18 20:33:48,283:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-18 20:33:48,283:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:33:48,284:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-18 20:33:48,284:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-18 20:33:48,284:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-18 20:33:48,285:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:33:48,343:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-18 20:33:48,531:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-18 20:33:48,532:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-11-18 20:33:48,533:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-11-18 20:33:48,538:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:52 UTC.
2024-11-18 20:33:48,538:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:33:48,538:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:33:48,544:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0529EF70>
Prep: True
2024-11-18 20:33:48,544:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0529EF70> and installer None
2024-11-18 20:33:48,544:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-18 20:33:48,566:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-18 20:33:48,567:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-18 20:33:48,569:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-18 20:33:49,014:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-18 20:33:49,015:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:43 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "A8hPaBqoiZQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-18 20:33:49,015:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-18 20:33:54,670:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8680_key-certbot.pem
2024-11-18 20:34:00,160:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8678_csr-certbot.pem
2024-11-18 20:34:00,160:DEBUG:acme.client:Requesting fresh nonce
2024-11-18 20:34:00,160:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-18 20:34:00,311:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-18 20:34:00,311:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:54 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXukLKi8dxhgvhw_BV1NIU5FcEMgtJ-20V4-Nf465EwUY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-18 20:34:00,312:DEBUG:acme.client:Storing nonce: usf-jMgXukLKi8dxhgvhw_BV1NIU5FcEMgtJ-20V4-Nf465EwUY
2024-11-18 20:34:00,312:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-18 20:34:00,318:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1h1a0xLaThkeGhndmh3X0JWMU5JVTVGY0VNZ3RKLTIwVjQtTmY0NjVFd1VZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "k8jtwOY6Ql_GBXRDUfKV-bb_S06PzE7mXHSr8LWNJKO1U4M1hU_8fBMllOyvTpUwHfu0RFSEpoRUGvmjujVoa9edrmbBcbg-O7dXmrLCXt-zu38xvRIeZ-vZxFgMZ8ejU-OkW39Z1C9nOeyK9pCFPirDltCKtxJjyoImMFT6l6sOj4767JWfSKmRmWOBOPKOvL0qEMqWWtEK71CLekFwFFAnrCliCpMK1dxInmlWVv-2xuCFvlDJdZF0rtHZMhb49gw2bYS4NIJNu3uUftOOZEgtLqLh9KQQ73UQCRFhIZvvcQrtru9yFU_9tsF5DAwVqzHzeVJclzSje5PH2g6DFQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-18 20:34:00,580:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-11-18 20:34:00,581:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 18 Nov 2024 19:33:54 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864794357
Replay-Nonce: JNlwFRqriVEikybde77gqXUzCl7mA1p820jjwCRNHC0gE5WVBmI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:02:38Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777360557"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864794357"
}
2024-11-18 20:34:00,581:DEBUG:acme.client:Storing nonce: JNlwFRqriVEikybde77gqXUzCl7mA1p820jjwCRNHC0gE5WVBmI
2024-11-18 20:34:00,581:DEBUG:acme.client:JWS payload:
b''
2024-11-18 20:34:00,589:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777360557:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJpVkVpa3liZGU3N2dxWFV6Q2w3bUExcDgyMGpqd0NSTkhDMGdFNVdWQm1JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzczNjA1NTcifQ",
  "signature": "gJPB4TXoSHrmjmgXqBSZYfEmKHZWQXyQ_F5wEcv9-RDIv7JSvM1j3R1UMjaq4wZEaLPw1fFUeQd4fIR5niE1Am4RnYWgQ-DbJD6WoJm--OUjyux0JNO2pLPPFaxNEB-EuO7U5Yz3LJ6MYOw7D3xYZUlguzdMwDuSo3fdHJpdp3ZTq7yNuYJ7GcbMq7IpeStvCxuo243C3kMeHwtw-ODxYkE6kpBlkbPmdEVJclwmrmvvqg1ZKecrQsSz0St-F82mAnVi2_YrWG8nkpXdknGnwP_DN-svl3ZdVqFYeCGr8l-e0Mkgr6tmXnrseGrA0DqHbY0-ooXif16e-ahWz9zOlQ",
  "payload": ""
}
2024-11-18 20:34:00,823:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777360557 HTTP/1.1" 200 805
2024-11-18 20:34:00,824:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:55 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgX4EJpnKoConX_pgggiLM9A3XIzMQ-4AhVHmBkL5UZ8lI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:02:38Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/gUrOCA",
      "status": "pending",
      "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/vSGH9w",
      "status": "pending",
      "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/Ggc8vg",
      "status": "pending",
      "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg"
    }
  ]
}
2024-11-18 20:34:00,824:DEBUG:acme.client:Storing nonce: usf-jMgX4EJpnKoConX_pgggiLM9A3XIzMQ-4AhVHmBkL5UZ8lI
2024-11-18 20:34:00,824:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-18 20:34:00,825:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-11-18 20:34:00,825:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-18 20:34:00,826:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-18 20:34:00,826:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:34:00,827:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-18 20:34:00,827:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-18 20:34:00,827:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-18 20:34:00,828:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:34:00,878:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-18 20:34:01,201:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-18 20:34:01,202:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-18 20:34:01,203:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-18 20:34:01,208:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:10 UTC.
2024-11-18 20:34:01,208:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:34:01,208:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:34:01,213:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x052A56D0>
Prep: True
2024-11-18 20:34:01,213:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x052A56D0> and installer None
2024-11-18 20:34:01,214:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-18 20:34:01,230:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-18 20:34:01,230:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-18 20:34:01,233:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-18 20:34:01,672:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-18 20:34:01,673:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:33:56 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "X2MTAUSWUBo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-18 20:34:01,674:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-18 20:34:07,396:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8681_key-certbot.pem
2024-11-18 20:34:12,901:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8679_csr-certbot.pem
2024-11-18 20:34:12,901:DEBUG:acme.client:Requesting fresh nonce
2024-11-18 20:34:12,902:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-18 20:34:13,051:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-18 20:34:13,051:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:34:07 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXzsP08lUl8thq-KB0oc_VanJJ6mkteWqsdMG2gsXC-Es
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-18 20:34:13,052:DEBUG:acme.client:Storing nonce: usf-jMgXzsP08lUl8thq-KB0oc_VanJJ6mkteWqsdMG2gsXC-Es
2024-11-18 20:34:13,052:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-18 20:34:13,059:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1h6c1AwOGxVbDh0aHEtS0Iwb2NfVmFuSko2bWt0ZVdxc2RNRzJnc1hDLUVzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "x634SrmIwBVI1xCEPaA37JQ9eRRHZ2thkG7H_v--CD7zayxMvxja4MbIf0aowgc4zEfhaN4hbjAk-NutmRZ9qgMEmjX4Pl6_7nS9EAzGJDTTAAy9vb21C2zjOaOGZk28SlSh9HOMKElymR5imIR-1ffFyrreyAPoUYSKZ7FS2BdK3X8ApJweVvlJwaz0IzpgkiL6jGWVxixqUmWX1qnFA2LyAhN09T6VM4pyPy5xFwWyaJs3bU2v0AK3dfClAEu_kDfdz3jKFJmMReKiNQup-eydQ7JujXcJdUubAw7IN5LFEFatz9MIWkL8EKcqUdFdlIw2hLOgICGEPfNug6hu4g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-18 20:34:13,285:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-11-18 20:34:13,286:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 18 Nov 2024 19:34:07 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864862747
Replay-Nonce: usf-jMgXAGYsOzwK7qRaXKNh7WH99-jqYTcQmIPwP_3EPYn7ERc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:02:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777460087"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864862747"
}
2024-11-18 20:34:13,286:DEBUG:acme.client:Storing nonce: usf-jMgXAGYsOzwK7qRaXKNh7WH99-jqYTcQmIPwP_3EPYn7ERc
2024-11-18 20:34:13,286:DEBUG:acme.client:JWS payload:
b''
2024-11-18 20:34:13,292:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777460087:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hBR1lzT3p3SzdxUmFYS05oN1dIOTktanFZVGNRbUlQd1BfM0VQWW43RVJjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3Nzc0NjAwODcifQ",
  "signature": "D6-NG9NjUozwpEWDcXE9SiA6rI6LXunveGC3jP4EYhwO_RTucqh1HsrndWSY9GyTPgozUZxsgxKZuZ5YemmLvGJSv6-rlHE_L94dKbyPKdxH34FtZ_c36ty0WUtIYJWEk7DDftKeC2EnVgzfXHQEVpOP1ul1vM4xqM0qkXaqy88FfUbfTi0Af4lLC8GE8Z7AIJzyC54wAHX7B1lHPZrjLXvwM1wKo-ZXFa7p6IkXJxOlWZ8gCHFYvG9Jc7tSdU0rI3nwt2rpHtKVbOKCBOT1uDGHIsMLPAahyOPuVN2TEhBNEBeeQMaGZd-roy5Yw8rp8aHy9BO0KfsS9jGx4ZTAqA",
  "payload": ""
}
2024-11-18 20:34:13,545:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777460087 HTTP/1.1" 200 805
2024-11-18 20:34:13,546:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:34:07 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXsava-4pXUvjmEeM-NFxE61sq-FgK0S1Oo4GrXVrGplY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:02:52Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/tsh-iw",
      "status": "pending",
      "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/f3c_WA",
      "status": "pending",
      "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/ASfKTA",
      "status": "pending",
      "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8"
    }
  ]
}
2024-11-18 20:34:13,546:DEBUG:acme.client:Storing nonce: usf-jMgXsava-4pXUvjmEeM-NFxE61sq-FgK0S1Oo4GrXVrGplY
2024-11-18 20:34:13,546:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-18 20:34:13,547:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-11-18 20:34:13,547:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-18 20:34:13,548:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-18 20:34:13,548:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:34:13,549:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-18 20:34:13,549:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-18 20:34:13,549:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-18 20:34:13,550:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:34:13,590:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-18 20:34:13,821:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-18 20:34:13,822:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-11-18 20:34:13,823:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-11-18 20:34:13,828:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:32 UTC.
2024-11-18 20:34:13,829:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-18 20:34:13,829:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-18 20:34:13,835:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x015180F0>
Prep: True
2024-11-18 20:34:13,835:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x015180F0> and installer None
2024-11-18 20:34:13,835:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-18 20:34:13,850:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-18 20:34:13,851:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-18 20:34:13,853:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-18 20:34:14,301:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-18 20:34:14,301:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:34:08 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "6I5zZt1Bibo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-18 20:34:14,302:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-18 20:34:20,155:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8682_key-certbot.pem
2024-11-18 20:34:25,640:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8680_csr-certbot.pem
2024-11-18 20:34:25,640:DEBUG:acme.client:Requesting fresh nonce
2024-11-18 20:34:25,640:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-18 20:34:25,787:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-18 20:34:25,788:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:34:20 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgX3-XSeu8kQiAhhaXYySVi7NJ3ui0h0wQfiFOG-x8U1Xc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-18 20:34:25,788:DEBUG:acme.client:Storing nonce: usf-jMgX3-XSeu8kQiAhhaXYySVi7NJ3ui0h0wQfiFOG-x8U1Xc
2024-11-18 20:34:25,788:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-18 20:34:25,794:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1gzLVhTZXU4a1FpQWhoYVhZeVNWaTdOSjN1aTBoMHdRZmlGT0cteDhVMVhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ravZ-oTa4rIZgGvwd_2y_yU9ZS6oL95-5Apjy-UcUtPhIc8I3zauit1p3wr_N6W4QvZ6Z5yZpnVKgPNtWLA3IyZ6MhlxaBD7X1Wgs6_joY6Uceoij-ao6ohJwijZ25KX8kvcq5HuZ36X7LUHge1LQacDPR4PRIhgiYF0fc-8c-rIm6bFGHj7JaD0-0TuJJS47oL84CAAqSwWx2_1111Q9VmesAUw-ORls0p4j-HZGlSoldn_83HH3lGOS5gkOmIJj4tzlkqmUFhCv67f3v13MKn_pFcFW042Rqyt1PQZAD1Pozgo27PrkxL0sd3Zkn3Y8vnxh0fbl0S61W2jIHNPsw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-18 20:34:25,976:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-11-18 20:34:25,977:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 18 Nov 2024 19:34:20 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864943797
Replay-Nonce: usf-jMgXDsfEulXB8F_0wT1x5r4PIsQSzeovMWbOTjFvcxwtEhM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:03:05Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777572397"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864943797"
}
2024-11-18 20:34:25,977:DEBUG:acme.client:Storing nonce: usf-jMgXDsfEulXB8F_0wT1x5r4PIsQSzeovMWbOTjFvcxwtEhM
2024-11-18 20:34:25,977:DEBUG:acme.client:JWS payload:
b''
2024-11-18 20:34:25,983:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777572397:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hEc2ZFdWxYQjhGXzB3VDF4NXI0UElzUVN6ZW92TVdiT1RqRnZjeHd0RWhNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3Nzc1NzIzOTcifQ",
  "signature": "hMMcp4gw3a8gyA5LAvdJ5elL07E5ccxt-_M4UN-_xXpJy4D-i4RvefrkVzHrWYg2Ou343DYMq_Wxc7Q3Fud94KvWJo_PbJP1OUwgximPRBmg70cEDp44-bvkPbcT--jr88FlNXJAqIjYrsCCiXgkzt4hfGvqoyDTFZ3K_VO4QjmUYRR0g4d36a8t-xHURuQMj2PMgMDOzJoX8E1ezY5NNdupkS_M4DNoXjn0lgSxEZN6vXmkGxIGjOwl2xkku8NAbvajy7t7ALln8D-zRaA8uQgBqqLeXl8amqCdZNXgO1M1nOkwg6uVshpTG7X5bTb9u7-x4nSRze46TKPNeNReSA",
  "payload": ""
}
2024-11-18 20:34:26,142:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777572397 HTTP/1.1" 200 805
2024-11-18 20:34:26,143:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 18 Nov 2024 19:34:20 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqrHEaNTZGOXJJX1l24dCLBrrT3H0wLo1LXf67LnklgRJI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:03:05Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/HIxR5w",
      "status": "pending",
      "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/avR61Q",
      "status": "pending",
      "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/qQ1QMQ",
      "status": "pending",
      "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o"
    }
  ]
}
2024-11-18 20:34:26,143:DEBUG:acme.client:Storing nonce: JNlwFRqrHEaNTZGOXJJX1l24dCLBrrT3H0wLo1LXf67LnklgRJI
2024-11-18 20:34:26,143:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-18 20:34:26,144:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-11-18 20:34:26,145:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-18 20:34:26,145:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-18 20:34:26,146:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:34:26,146:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-18 20:34:26,146:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-18 20:34:26,147:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-18 20:34:26,148:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-18 20:34:26,148:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-11-18 20:34:26,148:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-11-18 20:34:26,160:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 15 renew failure(s), 0 parse failure(s)
2024-11-18 20:34:26,161:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)