2024-11-15 06:58:53,235:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-11-15 06:58:53,235:DEBUG:certbot._internal.main:Arguments: []
2024-11-15 06:58:53,236:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-11-15 06:58:54,002:DEBUG:certbot._internal.log:Root logging level set at 20
2024-11-15 06:58:54,002:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-11-15 06:58:54,044:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04F6F710> and installer <certbot._internal.cli.cli_utils._Default object at 0x04F6F710>
2024-11-15 06:58:54,090:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-15 06:58:54,266:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-15 06:58:54,267:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is signed by the certificate's issuer.
2024-11-15 06:58:54,272:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD
2024-11-15 06:58:54,281:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:06 UTC.
2024-11-15 06:58:54,281:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 06:58:54,282:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 06:58:54,287:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x049EF9F0>
Prep: True
2024-11-15 06:58:54,288:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x049EF9F0> and installer None
2024-11-15 06:58:54,288:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-15 06:58:54,294:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-15 06:58:54,296:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-15 06:58:54,298:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-15 06:58:54,790:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-15 06:58:54,791:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:58:54 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "vyly8N3YAck": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-11-15 06:58:54,791:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-15 06:59:00,845:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8585_key-certbot.pem
2024-11-15 06:59:06,659:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8583_csr-certbot.pem
2024-11-15 06:59:06,660:DEBUG:acme.client:Requesting fresh nonce
2024-11-15 06:59:06,660:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-15 06:59:06,806:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-15 06:59:06,807:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:06 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXd4iLS3hrhWjmlhEc4FguNEu1p3kINQSpUSz8QlEANeo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-15 06:59:06,807:DEBUG:acme.client:Storing nonce: usf-jMgXd4iLS3hrhWjmlhEc4FguNEu1p3kINQSpUSz8QlEANeo
2024-11-15 06:59:06,807:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-15 06:59:06,814:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hkNGlMUzNocmhXam1saEVjNEZndU5FdTFwM2tJTlFTcFVTejhRbEVBTmVvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "YKYEzDjUZYTA70UbHtI7MG9J6aZq85ic3OeLtjz7JT7eb21OgXdpycxj8cSO9p7gEZFE_xRGcrPP3E9JdNPRA8QVQs-tOO8StV9D8ZYRuTfwNYbeSQBPG0RIuglfGOadqZivdXdEP3m2NPEtCSLm1reVGoVRnowrNhzA6n3gIHDHrFYbz55aqjYgHwJe4KNaNKaWIeV5KzYVuzf0_773veaWBSKJoOMQOVRl7_9aEiDfpI-wA-8PM1BCp4DkF0DzgO80EpdSYHPuEq22CZhGTGFr-nm2HqkAwoIYOqKUBxUfRpxPa5UluD3jI-sWV622Tzl7Pk2BnBHMXyC6SrWByg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-15 06:59:06,983:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-11-15 06:59:06,984:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 15 Nov 2024 05:59:06 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322863894397
Replay-Nonce: usf-jMgXGMMjD2UdZHbCFSW90QbFa8XNinYtL8kUG46i40ooanY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:00:15Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776062317"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322863894397"
}
2024-11-15 06:59:06,984:DEBUG:acme.client:Storing nonce: usf-jMgXGMMjD2UdZHbCFSW90QbFa8XNinYtL8kUG46i40ooanY
2024-11-15 06:59:06,984:DEBUG:acme.client:JWS payload:
b''
2024-11-15 06:59:06,990:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776062317:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hHTU1qRDJVZFpIYkNGU1c5MFFiRmE4WE5pbll0TDhrVUc0Nmk0MG9vYW5ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYwNjIzMTcifQ",
  "signature": "dHhVbNOB3PkYrD7tiodx04PEsYL1jWCBetwkz84k4VBbhOK0BXD6-GsGuVfBzSr5wW5U2_8AkZWMqKgNaDuaGhbzZDHgC5CDQARve36bATdD5l_I5gTBDjA_v1PJi-6Z6snf5twSEKS1LUaBMhpw82E6hrwg0ifz3eGRPYiVQzUtN555cXfuoYGVdvFHd--OAB4LaAknJE9RAsbr2y2o2_qn-DgUS8ADT5AvRjnsrDIr-7YzT6Wh_Q6v3eu6w__5Ef0JC7bBR2-f9DGTDgEj68JB4J1QswhIDkxPVJiZAN5CGYUQXSU9wWfwOWNT8zXBxK9VdCUc8YcdX019JKa7Vg",
  "payload": ""
}
2024-11-15 06:59:07,157:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776062317 HTTP/1.1" 200 810
2024-11-15 06:59:07,158:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:07 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXPpzKDfrKg3vVZGOMz1c2EcgsOvRe2J-Tz4bYDQhc6Uk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:00:15Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/_bn1HA",
      "status": "pending",
      "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/Fppccw",
      "status": "pending",
      "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/Nohq5w",
      "status": "pending",
      "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI"
    }
  ]
}
2024-11-15 06:59:07,158:DEBUG:acme.client:Storing nonce: usf-jMgXPpzKDfrKg3vVZGOMz1c2EcgsOvRe2J-Tz4bYDQhc6Uk
2024-11-15 06:59:07,158:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-15 06:59:07,159:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-11-15 06:59:07,170:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-15 06:59:07,170:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-15 06:59:07,174:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 06:59:07,174:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-15 06:59:07,174:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-15 06:59:07,175:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-15 06:59:07,180:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 06:59:07,224:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-15 06:59:07,447:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-15 06:59:07,448:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-15 06:59:07,449:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-15 06:59:07,454:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:27 UTC.
2024-11-15 06:59:07,455:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 06:59:07,455:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 06:59:07,461:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04464C30>
Prep: True
2024-11-15 06:59:07,461:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04464C30> and installer None
2024-11-15 06:59:07,461:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-15 06:59:07,477:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-15 06:59:07,478:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-15 06:59:07,480:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-15 06:59:07,925:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-15 06:59:07,926:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:07 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "MczSnfsBcAY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-15 06:59:07,926:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-15 06:59:14,026:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8586_key-certbot.pem
2024-11-15 06:59:19,694:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8584_csr-certbot.pem
2024-11-15 06:59:19,695:DEBUG:acme.client:Requesting fresh nonce
2024-11-15 06:59:19,695:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-15 06:59:19,847:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-15 06:59:19,847:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:19 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqrmxniyNVgkOdsT2lwGRTzx2gAVorcafQa2gVmTUxJitw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-15 06:59:19,847:DEBUG:acme.client:Storing nonce: JNlwFRqrmxniyNVgkOdsT2lwGRTzx2gAVorcafQa2gVmTUxJitw
2024-11-15 06:59:19,848:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-15 06:59:19,854:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJteG5peU5WZ2tPZHNUMmx3R1JUengyZ0FWb3JjYWZRYTJnVm1UVXhKaXR3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "el3wipCp0P-Gp7_BqEMAUN9mkeewhBVRFYrr1mtLKuZysrpABIr-xolPzwr3P2Z8bfaOV6n8p5ExTGLf4oX1Q0NLOqkVCQlhr3LURmVDIhIZ7uUog8tUty7-OPKWDXp-5Wm-iCaxwDpGxUw9-rcstxVljgHISGpvvobwJ_qOpM-mRpyGhXbpHU_TrjvY_TZeiNbzKFNdEyatUPoSwKb1n3tB3_WS0jrPahgtaLhf0fKoCmV75H20zLEpyYRpE_BhTibejWDq1GtAZMRzcFvnZJ0PZgM26rOpATmH2307PQZ9LNDh_rHfgLke9PFT3USPYDHsRAdiBGA3SWnxztagvA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-15 06:59:20,033:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-11-15 06:59:20,033:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 15 Nov 2024 05:59:20 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322863990237
Replay-Nonce: JNlwFRqrzxb9WPuY5-F43mMdJm5_3FVELiWO3qNlTLqHDscXbvo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:00:28Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776191227"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322863990237"
}
2024-11-15 06:59:20,034:DEBUG:acme.client:Storing nonce: JNlwFRqrzxb9WPuY5-F43mMdJm5_3FVELiWO3qNlTLqHDscXbvo
2024-11-15 06:59:20,034:DEBUG:acme.client:JWS payload:
b''
2024-11-15 06:59:20,042:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776191227:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJ6eGI5V1B1WTUtRjQzbU1kSm01XzNGVkVMaVdPM3FObFRMcUhEc2NYYnZvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYxOTEyMjcifQ",
  "signature": "LrkZg6FGveJlYRPUk21LpGXw9B5UPYiZ9gQ7rCpiygKO6EcOeGH2rKgl4SXGAqJhEQEUVRc45EJzSZLLH1bvnO5CrDaHJxWLc7t71tylRkQzqhSFIP6X2PsKbXb4e5aWe5EB-xjVVTluO7oXiu7Yd41n0RnGuUs2VwFSbz5isc-zGmkEPlBzmSsaVOFGZ5PPQeTqe7NalThbHZZ5G5QOwzF5R_RJP-6zv_VruAiVsdhY-NrsWDwEM7rWtcM_DSfxtGsw-GGhG717SRVWNZUXVX1G0KqlGrQ7y-c8gCndReO7pISlPIGsbqMRK5su_8nkZBa39RBu20OSTropxnt5Kg",
  "payload": ""
}
2024-11-15 06:59:20,197:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776191227 HTTP/1.1" 200 804
2024-11-15 06:59:20,198:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:20 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqrmaLWYiaAG9hT7kzK6ZPmJ2nPDJ_nfDYHQe70rUgSEqM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:00:28Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/tag9BQ",
      "status": "pending",
      "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/vZq3rg",
      "status": "pending",
      "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/Hvp1ig",
      "status": "pending",
      "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0"
    }
  ]
}
2024-11-15 06:59:20,198:DEBUG:acme.client:Storing nonce: JNlwFRqrmaLWYiaAG9hT7kzK6ZPmJ2nPDJ_nfDYHQe70rUgSEqM
2024-11-15 06:59:20,199:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-15 06:59:20,199:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-11-15 06:59:20,199:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-15 06:59:20,200:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-15 06:59:20,200:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 06:59:20,201:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-15 06:59:20,201:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-15 06:59:20,201:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-15 06:59:20,202:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 06:59:20,247:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-15 06:59:20,428:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-15 06:59:20,430:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-11-15 06:59:20,430:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-11-15 06:59:20,435:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:47 UTC.
2024-11-15 06:59:20,436:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 06:59:20,436:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 06:59:20,441:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04F4AD70>
Prep: True
2024-11-15 06:59:20,441:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04F4AD70> and installer None
2024-11-15 06:59:20,441:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-15 06:59:20,446:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-15 06:59:20,447:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-15 06:59:20,449:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-15 06:59:20,916:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-15 06:59:20,916:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:20 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "JUIShA_1c7s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-15 06:59:20,917:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-15 06:59:26,661:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8587_key-certbot.pem
2024-11-15 06:59:32,296:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8585_csr-certbot.pem
2024-11-15 06:59:32,297:DEBUG:acme.client:Requesting fresh nonce
2024-11-15 06:59:32,297:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-15 06:59:32,451:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-15 06:59:32,452:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:32 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: crKnBf1HRMT-rQeABb4wpwvoJsLOf4D7dvOty4jf0xr4gIFUYj0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-15 06:59:32,452:DEBUG:acme.client:Storing nonce: crKnBf1HRMT-rQeABb4wpwvoJsLOf4D7dvOty4jf0xr4gIFUYj0
2024-11-15 06:59:32,453:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-15 06:59:32,459:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhSTVQtclFlQUJiNHdwd3ZvSnNMT2Y0RDdkdk90eTRqZjB4cjRnSUZVWWowIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "C4h6RM8OgkWH8HdSZRMOm5o1ar7gI-wwKz0vJT8g1tZ-7F0a4ymyhR61-2BDMywCgofkoPzywgdn85zsq_LV_gY2MIIZ4deHVBqzmC19WoN5h6NkLpu_gS4vfJn4VfVmy9Ik581pZJupR3bGVBj7GIJ6Umt-NtyDfuiaSHD8Bs9VIhCLKexyzst2jDTC4iPor5YRhtwckNahOm9vdghZdQZevph9KMD8v9PgXE1-uFzi4Jc4mek_KpADO1dnWut343RHvRBg0xl0MjB9aqQDjn5111Lkcjg1MFRoGx1eFBHRCKBuftz1qPQzOZg-87YbXaLAZxtRqY9nb_TgcdMJVA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-15 06:59:32,658:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-11-15 06:59:32,659:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 15 Nov 2024 05:59:32 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864075277
Replay-Nonce: crKnBf1HZ62CO-IerUFuXKU_4wtez18yQgKFqvuswaOKkM-ghEQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:00:41Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776309317"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864075277"
}
2024-11-15 06:59:32,659:DEBUG:acme.client:Storing nonce: crKnBf1HZ62CO-IerUFuXKU_4wtez18yQgKFqvuswaOKkM-ghEQ
2024-11-15 06:59:32,659:DEBUG:acme.client:JWS payload:
b''
2024-11-15 06:59:32,665:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776309317:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhaNjJDTy1JZXJVRnVYS1VfNHd0ZXoxOHlRZ0tGcXZ1c3dhT0trTS1naEVRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYzMDkzMTcifQ",
  "signature": "lnEcjns6vSxoezCwW6tcVK2efyOlPOrbfoKbaO6Ei2FYaPNg6DqFJnrLvBYFvalA_JmdSZO_KyjdwTdLtP8PzpcJeM1I2TXpZguVyt5hqKXj93_m3cFjD0jRCEr1V2Hd1quPC2pvQOVQdMv42g8dQCFx_LYcRFOZj8Dxl0hsxfwScjfTeL1vLzI86y4QiD7Vjx3AsrmdwVcuG4XBqgga0wy236owo3OpNCDbkzVBCVrZR9OVq4ImlAduv_Ga3sJ9eSShLkm7KqkzSKVl5vl4e4I3vL2-_meFqsL6JBjhhBrcOMad3rjH90AToinQSoiHFMa7sfY-Atv1fzEw7c38-w",
  "payload": ""
}
2024-11-15 06:59:32,824:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776309317 HTTP/1.1" 200 807
2024-11-15 06:59:32,825:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:32 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: crKnBf1H-RzQu2cw4fIprcR3DlXlnidPhGD-m0vYrz_xMnRXyvE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:00:41Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/9T0aKw",
      "status": "pending",
      "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/8Wvihw",
      "status": "pending",
      "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/RhhX0A",
      "status": "pending",
      "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo"
    }
  ]
}
2024-11-15 06:59:32,825:DEBUG:acme.client:Storing nonce: crKnBf1H-RzQu2cw4fIprcR3DlXlnidPhGD-m0vYrz_xMnRXyvE
2024-11-15 06:59:32,826:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-15 06:59:32,826:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-11-15 06:59:32,827:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-15 06:59:32,827:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-15 06:59:32,828:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 06:59:32,828:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-15 06:59:32,828:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-15 06:59:32,828:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-15 06:59:32,829:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 06:59:32,870:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-15 06:59:33,074:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-15 06:59:33,075:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is signed by the certificate's issuer.
2024-11-15 06:59:33,076:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD
2024-11-15 06:59:33,080:INFO:certbot._internal.renewal:Cert not yet due for renewal
2024-11-15 06:59:33,085:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 06:59:33,136:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-15 06:59:33,306:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-15 06:59:33,308:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-15 06:59:33,309:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-15 06:59:33,314:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:08 UTC.
2024-11-15 06:59:33,314:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 06:59:33,314:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 06:59:33,319:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0492A4F0>
Prep: True
2024-11-15 06:59:33,319:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0492A4F0> and installer None
2024-11-15 06:59:33,319:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-15 06:59:33,335:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-15 06:59:33,336:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-15 06:59:33,338:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-15 06:59:33,832:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-15 06:59:33,833:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:33 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "131SRl3xLUM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-15 06:59:33,833:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-15 06:59:39,522:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8588_key-certbot.pem
2024-11-15 06:59:45,123:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8586_csr-certbot.pem
2024-11-15 06:59:45,123:DEBUG:acme.client:Requesting fresh nonce
2024-11-15 06:59:45,123:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-15 06:59:45,288:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-15 06:59:45,289:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:45 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: q3AS6Q6n0iubzDbWQuq1SkrIu302Iav35CKVlQ6nQ1GyjFG040Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-15 06:59:45,289:DEBUG:acme.client:Storing nonce: q3AS6Q6n0iubzDbWQuq1SkrIu302Iav35CKVlQ6nQ1GyjFG040Y
2024-11-15 06:59:45,289:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-11-15 06:59:45,295:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm4waXViekRiV1F1cTFTa3JJdTMwMklhdjM1Q0tWbFE2blExR3lqRkcwNDBZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "oy36MdWU7CA_2kD7Wtz5GvQqsun-QC380o87ZbniLl-v0zlgVZJYtO1qM3N4DFHzHXFXvFRYU2svtF9BgjhPmvL7ksU6RQy4_oR12StIdN42B1esuvR3Q8khEUD2YPKDruIeqNXW-DPPc5b_fnsTzA0F1iOgyR3gi5cttG2buTxkKZVVutE2BorgtlhPHhAoOcVe4_saHs_TVCzb759ldMKn97nX-q91LthNAR_pKQnS_3rWKfKxSWhbuzCjFxfe2whmEc1UmZyPoonyp4OKT-DAgMlvGf1XpU4p1aBgHSTBI6rt12tA4-U3p_FpT1brNusm7dh1zepENfSPgfiDag",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-15 06:59:45,474:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-11-15 06:59:45,475:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 15 Nov 2024 05:59:45 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864158237
Replay-Nonce: q3AS6Q6nXDv4cx8jJOU-0XgM0DITMIJ-lsYKLQ7hbpT9gNi5bms
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:00:54Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776432107"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864158237"
}
2024-11-15 06:59:45,475:DEBUG:acme.client:Storing nonce: q3AS6Q6nXDv4cx8jJOU-0XgM0DITMIJ-lsYKLQ7hbpT9gNi5bms
2024-11-15 06:59:45,475:DEBUG:acme.client:JWS payload:
b''
2024-11-15 06:59:45,481:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776432107:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5YRHY0Y3g4akpPVS0wWGdNMERJVE1JSi1sc1lLTFE3aGJwVDlnTmk1Ym1zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY0MzIxMDcifQ",
  "signature": "QJ6kboF8OXkwCY0pdGKXDd4UDN7YR8sRZQ12JaOZdRhm0NwmGC4hMnO82aNl9kgX9YvNNgBYJ67SAhiCmPOQ3F1tb6cIOqSO2NOxtF8_a2LKKNaQj-qEEBYrSVYAooFmVguqYTAf4osJlTiiyflweRArkebs0-ZW2lTp30z2Dq1NpbCZ5WlPNkTeMjH6Hsyw2r5s0vq1XHZHalOc4RootYbbTa4UARHCECGEF7JGxJJEt1UpCRLzwA0PPQBGR_7hQmCm3lFxGJMpNtJ4XLIgaqfHZha4MQkRS4XYOBZ6iNOi2gVjW4xVXbT0z6_pZHe1SAq6n-vc5CmG4jD0ESIooA",
  "payload": ""
}
2024-11-15 06:59:45,663:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776432107 HTTP/1.1" 200 801
2024-11-15 06:59:45,664:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:45 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: q3AS6Q6nJJYFM3r6oFvjElDc0rPh_EZ9f9dAXmbSSQMHDTmPnpM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:00:54Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/U1YmAg",
      "status": "pending",
      "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/Wk_i8A",
      "status": "pending",
      "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/iWIilA",
      "status": "pending",
      "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA"
    }
  ]
}
2024-11-15 06:59:45,664:DEBUG:acme.client:Storing nonce: q3AS6Q6nJJYFM3r6oFvjElDc0rPh_EZ9f9dAXmbSSQMHDTmPnpM
2024-11-15 06:59:45,665:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-15 06:59:45,665:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-11-15 06:59:45,666:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-15 06:59:45,666:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-15 06:59:45,667:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 06:59:45,667:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-15 06:59:45,667:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-15 06:59:45,668:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-15 06:59:45,669:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 06:59:45,724:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-15 06:59:45,896:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-15 06:59:45,898:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-15 06:59:45,898:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-15 06:59:45,903:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:27 UTC.
2024-11-15 06:59:45,904:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 06:59:45,904:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 06:59:45,910:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E36B30>
Prep: True
2024-11-15 06:59:45,910:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E36B30> and installer None
2024-11-15 06:59:45,910:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-15 06:59:45,914:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-15 06:59:45,915:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-15 06:59:45,918:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-15 06:59:46,385:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-15 06:59:46,385:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:46 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "-P6u8e4NyEo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-15 06:59:46,386:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-15 06:59:52,012:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8589_key-certbot.pem
2024-11-15 06:59:57,595:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8587_csr-certbot.pem
2024-11-15 06:59:57,596:DEBUG:acme.client:Requesting fresh nonce
2024-11-15 06:59:57,596:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-15 06:59:57,753:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-15 06:59:57,753:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:57 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: crKnBf1H1y3U-1H4tVQYlwF5_tkqyePVvJkC9xLqOqVsOvTVUhA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-15 06:59:57,753:DEBUG:acme.client:Storing nonce: crKnBf1H1y3U-1H4tVQYlwF5_tkqyePVvJkC9xLqOqVsOvTVUhA
2024-11-15 06:59:57,754:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-15 06:59:57,759:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUgxeTNVLTFINHRWUVlsd0Y1X3RrcXllUFZ2SmtDOXhMcU9xVnNPdlRWVWhBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "CD7LYDF5XZTZO4NwhF4YzZVfgWAfSRtLQzss9qbFjCzzpkTDpHNPp1_q-Cc_GmmK_KGQXYV9t4L2zFpenTjfWGgfwOhqzGewdEndvL4zHVOtW1sjRouDmdO6jet-T5W_bhwPFKe69ayVS9VT3esyCbVAaAKutWFhKWXRkHjTCpdP1tBjQxRlQefA5xptBD0Y5tdulmd90uUYSd4JGo6IEIz1m9fX-mdPExLcQADn6hw4bUdtJ3FsCHIN5VtFlFm2g9ki2ewZIprWtDoY4exUP2Yh-KkgM3DfvG3tzvlkrKGQ4OSxeRs-Oo_TeLbRZGvOTLBK4os02O-GOw-B3LEeNQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-15 06:59:57,944:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-11-15 06:59:57,944:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 15 Nov 2024 05:59:57 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864248527
Replay-Nonce: crKnBf1HQheXF-BJHr-PaWBgEZlki-7FK2uyL6gEcFyHZDC0_-I
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:01:07Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776561677"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864248527"
}
2024-11-15 06:59:57,945:DEBUG:acme.client:Storing nonce: crKnBf1HQheXF-BJHr-PaWBgEZlki-7FK2uyL6gEcFyHZDC0_-I
2024-11-15 06:59:57,945:DEBUG:acme.client:JWS payload:
b''
2024-11-15 06:59:57,951:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776561677:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhRaGVYRi1CSkhyLVBhV0JnRVpsa2ktN0ZLMnV5TDZnRWNGeUhaREMwXy1JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY1NjE2NzcifQ",
  "signature": "hd9e91-LMzCtW5CRaGYLbewXxGIQ6vt214HOhuZm4UoujKUNEDr11gLgiuKfnsHz5W83HB1w_lh7gNUIzLxtI-bSdaDHf0z7SNBV1l2HJkdZTtdH_hJZoQPF2NveLjzzmqICwLV0GGcyRuX8nPJv9A0bBOS4SvGS2IVismWzCatnumE3bdEDQBE10aeWdUro-DDpPrQRyg_Bmz0jIwZ2jn3wh4Hm0j45A6aVj0Lt54QW6KiH1I7obkGNjEu0ijiJs_CwaIDJYlivdPCJunkxlVySlEjK1zsyP-IenB6YrSWTzRO01mHdg_t-t8aKehQRSOuUXpXHAJ3pM0Ve2f7Mrg",
  "payload": ""
}
2024-11-15 06:59:58,111:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776561677 HTTP/1.1" 200 805
2024-11-15 06:59:58,112:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:58 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: crKnBf1HQVNIXdWOhLbTD_VhkTTiSXzcFxdr85v5sxPOvEjHsI8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:01:07Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/QOkASw",
      "status": "pending",
      "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/S4Po3g",
      "status": "pending",
      "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/kvNskw",
      "status": "pending",
      "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I"
    }
  ]
}
2024-11-15 06:59:58,112:DEBUG:acme.client:Storing nonce: crKnBf1HQVNIXdWOhLbTD_VhkTTiSXzcFxdr85v5sxPOvEjHsI8
2024-11-15 06:59:58,113:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-15 06:59:58,113:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-11-15 06:59:58,114:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-15 06:59:58,114:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-15 06:59:58,115:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 06:59:58,115:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-15 06:59:58,115:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-15 06:59:58,115:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-15 06:59:58,117:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 06:59:58,170:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-15 06:59:58,353:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-15 06:59:58,354:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-11-15 06:59:58,355:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-11-15 06:59:58,359:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:58 UTC.
2024-11-15 06:59:58,359:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 06:59:58,361:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 06:59:58,366:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x049D6250>
Prep: True
2024-11-15 06:59:58,367:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x049D6250> and installer None
2024-11-15 06:59:58,367:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-15 06:59:58,372:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-15 06:59:58,373:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-15 06:59:58,374:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-15 06:59:58,834:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-15 06:59:58,835:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 05:59:58 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Gyg6k-v9x4I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-15 06:59:58,836:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-15 07:00:04,719:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8590_key-certbot.pem
2024-11-15 07:00:10,228:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8588_csr-certbot.pem
2024-11-15 07:00:10,228:DEBUG:acme.client:Requesting fresh nonce
2024-11-15 07:00:10,228:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-15 07:00:10,382:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-15 07:00:10,383:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:00:10 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgX7L2ytcuqjxwKSklVR4JAa3LtKCJThiKZEbI6KWypdes
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-15 07:00:10,383:DEBUG:acme.client:Storing nonce: usf-jMgX7L2ytcuqjxwKSklVR4JAa3LtKCJThiKZEbI6KWypdes
2024-11-15 07:00:10,383:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-15 07:00:10,389:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1g3TDJ5dGN1cWp4d0tTa2xWUjRKQWEzTHRLQ0pUaGlLWkViSTZLV3lwZGVzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "N9bc8imYmPvyaDmY0DL-5QYQRDsRUeGa59GuYZ03yL38uveSmEwOHsV7XW-DH85yCyCDcG9CAdC-zcb6H_5dx6_Q77BcmEFt66FcOQve2vNf5RkQri4tsbWbi9xBDqnUMW2tcC8kDAAMoWm_ICr_ncYrmwhvh2bXWF3DDleG7zde3il6nuSY2_EtNQ1trXxuewauLLEgufgLEYD0bodyx3I0gH2Srjaq9zO4Glpo3eTgviXPbdq4pNRq1NQgm-Pjqc6AdrjSDBShYqILZ7iJ39VqkX-gE6u4v0L0dcy69PJQcrPLoH4iTCaoTq14Wc0UW41rS9QVm6BOlmfzAi9C6g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-11-15 07:00:10,590:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-11-15 07:00:10,590:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 15 Nov 2024 06:00:10 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864332297
Replay-Nonce: usf-jMgX1r6HXrN3bGLO49ZqjpQxxg631Tt5wjr8VZyXalViYyo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:01:20Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776685657"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864332297"
}
2024-11-15 07:00:10,591:DEBUG:acme.client:Storing nonce: usf-jMgX1r6HXrN3bGLO49ZqjpQxxg631Tt5wjr8VZyXalViYyo
2024-11-15 07:00:10,591:DEBUG:acme.client:JWS payload:
b''
2024-11-15 07:00:10,597:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776685657:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1gxcjZIWHJOM2JHTE80OVpxanBReHhnNjMxVHQ1d2pyOFZaeVhhbFZpWXlvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY2ODU2NTcifQ",
  "signature": "SbcdqOvAe-DPvadh2fc4fLbDn0ZyMol2BbZmtrOnCzHRgSUyNvuRNU-B_EWbNfh0GKEue6Ff4CTsHKjWYAEKVEssncRKPC1PXnuGzFKa7j1ymmKjqOXbGkK9eDixzly6kp4YbNE0P2UFFc4_hbcVGI31VlIdTIQipzM0LD5ESSXPKIv11s5tywXDKgSP3ZVysmfKB6VIrxhoI5mBRHOlAMGCSELkBzo6IDp6sT6fRUQEsFsKzNhSCbZplGzU3-iZPSO59v1VEgTx4qOowj1tjnA-jBUxV1X9I8SUrPYY5hUVZm412AFqnKA3hQktYYu_gOe4Wzvuo33ziM99Fw07cA",
  "payload": ""
}
2024-11-15 07:00:10,757:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776685657 HTTP/1.1" 200 809
2024-11-15 07:00:10,757:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:00:10 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgX5oWREcEPJvnUIr8RqhEuCys-WcBXzbfMzebgHQy0Qok
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:01:20Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/s3nu5w",
      "status": "pending",
      "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/DgbGnw",
      "status": "pending",
      "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/BBENhw",
      "status": "pending",
      "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg"
    }
  ]
}
2024-11-15 07:00:10,758:DEBUG:acme.client:Storing nonce: usf-jMgX5oWREcEPJvnUIr8RqhEuCys-WcBXzbfMzebgHQy0Qok
2024-11-15 07:00:10,758:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-15 07:00:10,758:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-11-15 07:00:10,758:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-15 07:00:10,758:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-15 07:00:10,759:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:00:10,760:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-15 07:00:10,760:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-15 07:00:10,760:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-15 07:00:10,761:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:00:10,812:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-15 07:00:11,078:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-15 07:00:11,079:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is signed by the certificate's issuer.
2024-11-15 07:00:11,080:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD
2024-11-15 07:00:11,085:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:15 UTC.
2024-11-15 07:00:11,085:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 07:00:11,085:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 07:00:11,091:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04F73D90>
Prep: True
2024-11-15 07:00:11,091:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04F73D90> and installer None
2024-11-15 07:00:11,092:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-15 07:00:11,097:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-15 07:00:11,098:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-15 07:00:11,100:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-15 07:00:11,532:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-15 07:00:11,532:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:00:11 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "gRhpbqMokR0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-15 07:00:11,533:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-15 07:00:17,369:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8591_key-certbot.pem
2024-11-15 07:00:22,893:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8589_csr-certbot.pem
2024-11-15 07:00:22,893:DEBUG:acme.client:Requesting fresh nonce
2024-11-15 07:00:22,893:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-15 07:00:23,042:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-15 07:00:23,043:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:00:23 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqrnxAsvl2BUMAJhM8ZTCCqNGoBAcjS2JqENELgw2k3d0U
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-15 07:00:23,043:DEBUG:acme.client:Storing nonce: JNlwFRqrnxAsvl2BUMAJhM8ZTCCqNGoBAcjS2JqENELgw2k3d0U
2024-11-15 07:00:23,043:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "helix.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-15 07:00:23,050:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJueEFzdmwyQlVNQUpoTThaVENDcU5Hb0JBY2pTMkpxRU5FTGd3MmszZDBVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "UNe8DF918VYsdW4AlHmZZXiPrd94b3yyHlkDlptAth4tCv9hFZpXQx3uOCjjVZvnEw4NHaCOpdIzPmTIrEFadnvYWuLfJ235qsNCpCIXOuicka9-YD8OsGwpHJw5BAUdeBeCRAksMGzCOOq3g5RDfnMivSruu1pguVVFJl9T0ecT6qKsAFqR9jfN1s3XrhzojPyTWcrs9qC4Q4bigOjHyU9VPvhukDiTb8WlcC7GdiFr6O31Ka8nW3qC6H3cSxujwuhBpqOdb9STVaqGcU23uJ8rOpQv4g2y6PrRIUFvdGhJOLOb2rG-vPKB6_ypSOTQqoSUGMq0j7smXtE8y1I66w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-15 07:00:23,232:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-11-15 07:00:23,232:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 15 Nov 2024 06:00:23 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864408807
Replay-Nonce: JNlwFRqrakgdQNkM7URr-J7s3H235r8cjMOErq7aoUDDjPfN3Go
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:01:33Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "helix.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776800527"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864408807"
}
2024-11-15 07:00:23,232:DEBUG:acme.client:Storing nonce: JNlwFRqrakgdQNkM7URr-J7s3H235r8cjMOErq7aoUDDjPfN3Go
2024-11-15 07:00:23,233:DEBUG:acme.client:JWS payload:
b''
2024-11-15 07:00:23,239:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776800527:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJha2dkUU5rTTdVUnItSjdzM0gyMzVyOGNqTU9FcnE3YW9VRERqUGZOM0dvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY4MDA1MjcifQ",
  "signature": "a2iMwWgHGtpsF72F2qU_mkmRpOLBKPvA6_5O3nF1LePwYZS4rNHT5CGpjdyONJIPQZ57y64kkf1_qDcfk-3fBuqlam-dK2AuYh4maNZtgJXjmRyHWyRTREMFVKhuD2obQ9HA4MRBBESq1IzIr2V0Tf0qxsUdb5A-1RcwPazAhWrca4FbbB4raKKwxXu86kCMGJhYJjGRZuxmokrUGpyRbyT8Sp6muVij1558wPUDAMpyfECwaBohw8X55DVTmyEYXjZNOdn88XLlDEnlHDHttU5vxXNrY2FTxuXpk5EcX2RB9wBwebzrLppO4pWXRmexliHjuemQw7ya5fDj6bUpxw",
  "payload": ""
}
2024-11-15 07:00:23,388:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776800527 HTTP/1.1" 200 807
2024-11-15 07:00:23,388:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:00:23 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXHKTlGGB_avPGAiY4VTMFhJr5yMimNjwSvs-5kvm_YzM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "helix.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:01:33Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/uHoKaA",
      "status": "pending",
      "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/B8BcEw",
      "status": "pending",
      "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/yjXnZA",
      "status": "pending",
      "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o"
    }
  ]
}
2024-11-15 07:00:23,389:DEBUG:acme.client:Storing nonce: usf-jMgXHKTlGGB_avPGAiY4VTMFhJr5yMimNjwSvs-5kvm_YzM
2024-11-15 07:00:23,389:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-15 07:00:23,390:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl
2024-11-15 07:00:23,390:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-15 07:00:23,390:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-15 07:00:23,391:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:00:23,391:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-15 07:00:23,392:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-15 07:00:23,392:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-15 07:00:23,393:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:00:23,444:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-15 07:00:23,609:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-15 07:00:23,610:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-15 07:00:23,611:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-15 07:00:23,616:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:37 UTC.
2024-11-15 07:00:23,616:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 07:00:23,617:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 07:00:23,622:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0525EAD0>
Prep: True
2024-11-15 07:00:23,623:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0525EAD0> and installer None
2024-11-15 07:00:23,623:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-15 07:00:23,638:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-15 07:00:23,639:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-15 07:00:23,641:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-15 07:00:24,103:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-15 07:00:24,104:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:00:24 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "PbUTWBQwn_E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-15 07:00:24,104:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-15 07:00:29,888:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8592_key-certbot.pem
2024-11-15 07:00:35,420:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8590_csr-certbot.pem
2024-11-15 07:00:35,420:DEBUG:acme.client:Requesting fresh nonce
2024-11-15 07:00:35,420:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-15 07:00:35,574:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-15 07:00:35,575:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:00:35 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgXvWeZWiyG1_WAFzkHJpZHUSCXz-9SJpmrSG99yX-mbT8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-15 07:00:35,575:DEBUG:acme.client:Storing nonce: usf-jMgXvWeZWiyG1_WAFzkHJpZHUSCXz-9SJpmrSG99yX-mbT8
2024-11-15 07:00:35,576:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-15 07:00:35,582:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1h2V2VaV2l5RzFfV0FGemtISnBaSFVTQ1h6LTlTSnBtclNHOTl5WC1tYlQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "hH2lZV3_XmIOmLLvo2RyWRmx-EbHiH9eGYo_focqDpFEP7SLiCc-jq-BX8MaAgnIcnmWEB2R7hAyLYq5URPnXnPZ2fqNdUJMisnPVqALXv72DSQJc7EpFn2QQBVFpU9kskeQPdUjhXkel0MNI6OJxg4kTZoMslLjRsRDWp_QYlxAemIRvRo03uUi0bj8gmpKr6rzvYzNn_CLjJ6g7YYFe8PoCd2doacRPmOANKBMK6j9G2XESdZuT15tZtfMWp0v9EUNS2POTIh2YOrNxxxkbDGjPbgWTDOtZp0voKEjKb5dNK-YMndCkLhRiDQyowK7sk1wj1-aYVzc_gvlnzi5cA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-11-15 07:00:35,764:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-11-15 07:00:35,765:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 15 Nov 2024 06:00:35 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864481367
Replay-Nonce: JNlwFRqr7qz247IPUc7UXKmFGVi2v2gk9yuq4O0F6ZE-f_Prn0g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:01:46Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776908267"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864481367"
}
2024-11-15 07:00:35,765:DEBUG:acme.client:Storing nonce: JNlwFRqr7qz247IPUc7UXKmFGVi2v2gk9yuq4O0F6ZE-f_Prn0g
2024-11-15 07:00:35,765:DEBUG:acme.client:JWS payload:
b''
2024-11-15 07:00:35,771:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776908267:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXI3cXoyNDdJUFVjN1VYS21GR1ZpMnYyZ2s5eXVxNE8wRjZaRS1mX1BybjBnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY5MDgyNjcifQ",
  "signature": "UsqA8BJXr8yL6S2uZjC6dMzcCaR4jJOiIWAPZii5l1z8vKbifJW5VCoP5dq3I3btPWONjCmZ21PI2m4_JGc3VvmtZR2rBKkuflV1rjY-x470WGfau6gMzh23NgZT3YhI1btQJ0VLSPYa-Ka0GuKdlGWTNmEeDoYV9p3OG4B9JVd13wnQ1SfIN5pE7poIToTKyDfRdJUuzWMV5KpRKPQZBoXoUl18ESck81YTvhqTuzkxx46PHnERGYpycAqrSkrm116E7AJZUqLuZ2G9qOhohGtX3vF3oNgukg6U6-nDCC9v-8xbuPvKrQgsHy9xp3ZpOnJnn1ANTXiDdt75tqNkwg",
  "payload": ""
}
2024-11-15 07:00:35,930:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776908267 HTTP/1.1" 200 806
2024-11-15 07:00:35,930:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:00:35 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqre12EC2vvYId9ra53DgqZbUo0_He7f6iGy2BKaeGgdfQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:01:46Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/PhZSOw",
      "status": "pending",
      "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/pzyROQ",
      "status": "pending",
      "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/tMqdPg",
      "status": "pending",
      "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o"
    }
  ]
}
2024-11-15 07:00:35,931:DEBUG:acme.client:Storing nonce: JNlwFRqre12EC2vvYId9ra53DgqZbUo0_He7f6iGy2BKaeGgdfQ
2024-11-15 07:00:35,931:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-15 07:00:35,932:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-11-15 07:00:35,933:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-15 07:00:35,933:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-15 07:00:35,934:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:00:35,934:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-15 07:00:35,934:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-15 07:00:35,935:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-15 07:00:35,936:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:00:35,985:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-11-15 07:00:35,985:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 07:00:35,985:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-11-15 07:00:35,994:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-11-15 07:00:35,997:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-11-15 07:00:35,997:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-11-15 07:00:35,997:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-11-15 07:00:35,997:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-11-15 07:00:35,999:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-11-15 07:00:36,040:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-15 07:00:36,228:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-15 07:00:36,229:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-15 07:00:36,230:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-15 07:00:36,235:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:56 UTC.
2024-11-15 07:00:36,235:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 07:00:36,236:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 07:00:36,241:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04994F50>
Prep: True
2024-11-15 07:00:36,242:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04994F50> and installer None
2024-11-15 07:00:36,242:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-15 07:00:36,246:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-15 07:00:36,247:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-15 07:00:36,249:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-15 07:00:36,697:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-15 07:00:36,698:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:00:36 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "ndlAEWEdldE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-15 07:00:36,699:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-15 07:00:42,265:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8593_key-certbot.pem
2024-11-15 07:00:47,637:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8591_csr-certbot.pem
2024-11-15 07:00:47,638:DEBUG:acme.client:Requesting fresh nonce
2024-11-15 07:00:47,638:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-15 07:00:47,788:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-15 07:00:47,789:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:00:47 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: JNlwFRqrOJocxK8l_ZDKLFuyP21TFSh2Ga5DQzzC2D4xm9RVfRk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-15 07:00:47,789:DEBUG:acme.client:Storing nonce: JNlwFRqrOJocxK8l_ZDKLFuyP21TFSh2Ga5DQzzC2D4xm9RVfRk
2024-11-15 07:00:47,789:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-15 07:00:47,795:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJPSm9jeEs4bF9aREtMRnV5UDIxVEZTaDJHYTVEUXp6QzJENHhtOVJWZlJrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "CE99BLhfdNN8huWgxWtiCFH5mDP_jvAkoNN-aLTcxHB_r5oR4JxKks4NKmiR5F4kIqS5J66iX_eT5Oo6Ip5rzXGRn6nfwm_f-FE3779Nwgu4LienF8bnZ6FTatqZxu-AK7auYwWXwTRkkrFhhFll20ll38ejiOSrkngK242w9gzijmXIggbmMYBzyv674Oo8h8HJQvc6qSgqBLop1AlPe1XSNG_53LEE-VPZoYGWDu9gsEutOuWF-jM7Y2HfFSoau8A58XhOXDBl34LBv7jqriGklTLepzw_TVa3tJfl4ij57AtXWKDiDu5Ay_T7c28X8abjOEmpJHkJq-zNjOBE3w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-15 07:00:47,987:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-11-15 07:00:47,987:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 15 Nov 2024 06:00:47 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864554417
Replay-Nonce: usf-jMgXDMC4BL9qSARWPqD6zJ3xxl7-tXwtJtNETi0NEp7crMQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:01:59Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777016797"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864554417"
}
2024-11-15 07:00:47,987:DEBUG:acme.client:Storing nonce: usf-jMgXDMC4BL9qSARWPqD6zJ3xxl7-tXwtJtNETi0NEp7crMQ
2024-11-15 07:00:47,988:DEBUG:acme.client:JWS payload:
b''
2024-11-15 07:00:47,994:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777016797:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hETUM0Qkw5cVNBUldQcUQ2ekozeHhsNy10WHd0SnRORVRpME5FcDdjck1RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcwMTY3OTcifQ",
  "signature": "R6zqp2_Aa4gE5zm6sda1eA8BTYpXhCd3kEsIP4uMDxaRNRxS-kpyHWoqyPUDjB0tX21t_dVe52DpjHWrklk8-D6ZWu7ClNveUdZTqpDoZHRs1FrzVhP1Pv4VBQz6uR42qQpgN8kcWGbH3rWAfUJv7040WbcCK1W5_ixKwR6UipFSbr7HML5F5zfGclNjVZBcdJAwL7GbItVfF_b5gnh8OkkeFMhpvYmhO9AcsbFxXBjpZE_sOA7nuvJyfcX79csztNGZo5PxczEBTJc45-2WKCdkE1mk3XWp43TFtobPUdYlwHmKzATyTLU2kHInyCuXuEZWzkwfoXRo3pCcRD5sZg",
  "payload": ""
}
2024-11-15 07:00:48,163:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777016797 HTTP/1.1" 200 811
2024-11-15 07:00:48,164:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:00:48 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: usf-jMgX8omAR12tINrQO9zm8zCD1Q5JMs418Qo8leopY1F-s6I
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:01:59Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/C4H6lQ",
      "status": "pending",
      "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/tKio5w",
      "status": "pending",
      "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/uNkVbw",
      "status": "pending",
      "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE"
    }
  ]
}
2024-11-15 07:00:48,164:DEBUG:acme.client:Storing nonce: usf-jMgX8omAR12tINrQO9zm8zCD1Q5JMs418Qo8leopY1F-s6I
2024-11-15 07:00:48,164:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-15 07:00:48,165:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-11-15 07:00:48,165:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-15 07:00:48,166:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-15 07:00:48,166:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:00:48,167:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-15 07:00:48,167:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-15 07:00:48,167:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-15 07:00:48,168:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:00:48,222:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-15 07:00:48,406:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-15 07:00:48,408:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-15 07:00:48,408:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-15 07:00:48,413:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:15 UTC.
2024-11-15 07:00:48,414:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 07:00:48,414:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 07:00:48,420:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04F50370>
Prep: True
2024-11-15 07:00:48,420:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04F50370> and installer None
2024-11-15 07:00:48,420:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-15 07:00:48,425:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-15 07:00:48,426:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-15 07:00:48,428:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-15 07:00:48,916:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-15 07:00:48,917:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:00:48 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "fSTzXS4tCIA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-15 07:00:48,917:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-15 07:00:54,315:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8594_key-certbot.pem
2024-11-15 07:00:59,669:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8592_csr-certbot.pem
2024-11-15 07:00:59,670:DEBUG:acme.client:Requesting fresh nonce
2024-11-15 07:00:59,670:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-15 07:00:59,831:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-15 07:00:59,831:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:00:59 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: q3AS6Q6n6r_coEY62RLktF6qObtiy0T3ZPDzzjlBWrSQashYUp4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-15 07:00:59,831:DEBUG:acme.client:Storing nonce: q3AS6Q6n6r_coEY62RLktF6qObtiy0T3ZPDzzjlBWrSQashYUp4
2024-11-15 07:00:59,832:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-15 07:00:59,838:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm42cl9jb0VZNjJSTGt0RjZxT2J0aXkwVDNaUER6empsQldyU1Fhc2hZVXA0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "kWSbiN_3rM3dd6u6sFnsTif-7VEbE6ZxzmG1KcLCfaPaLMThamMzKjgb4oXKhVk-osqIDBUhV1zDb0pdkSqR5e60zGFAZ-Ypf85TFQDLE7tMT90nxWS2qDwYqqhNSL72NSoPiYevW63YGztvLaslEzsCiQc7FgAUBqI_gpJ_Q46DSm6aJYS9T_zc_nMizq6YvRiq3so-31JyElbMgh6Hv0AFQetoRwLLenNrfmDJxcF3di7UhZwvVxDacaRItVmRroELge87Opwu_edfGPMPAfXw93cdr5nvjp5Ctpfx67CM4S7Q6gbzSqA3Mv-KUeqzsJQMYeJGUXL31rTInbZwpA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-11-15 07:01:00,044:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-11-15 07:01:00,045:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 15 Nov 2024 06:01:00 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864646067
Replay-Nonce: q3AS6Q6nf5EoHFLubBh74KK4P6zVLDhlFKL4zGIJBv1V0bhraKU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:02:12Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777143667"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864646067"
}
2024-11-15 07:01:00,045:DEBUG:acme.client:Storing nonce: q3AS6Q6nf5EoHFLubBh74KK4P6zVLDhlFKL4zGIJBv1V0bhraKU
2024-11-15 07:01:00,045:DEBUG:acme.client:JWS payload:
b''
2024-11-15 07:01:00,051:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777143667:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5mNUVvSEZMdWJCaDc0S0s0UDZ6VkxEaGxGS0w0ekdJSkJ2MVYwYmhyYUtVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcxNDM2NjcifQ",
  "signature": "v8Ggaz1xrEdpP7gdVGajiyrl7FwheOmK8TZH3EsEGN7jhCtYFFd7OeveeBL6xAYdWURnuhRpZEaEhEJ4SIrPt6QN0YrEgyPYZkTWldTOp8P7HFiF1GdhgOBMfl5VKTcjtNR8hhP51FBjttUb647Im5xLpWZmuGoD8qrZgIWR9Weu1hm9rm4o-BrGNSNSQyxThnJ4sacukL7Q4SRO0UlIegATM2zLmV0IOjmVicWhMpZhbzNkZ2EjjNFh4aobnLMUpg2g65cvCmeK5IT1TfIiPOC1K1TfTWoqjGMtE1q0v_dKUh1OzOZrjXGh-CkSPlfsx4D0mtzIvFfagDXNXkhCbA",
  "payload": ""
}
2024-11-15 07:01:00,217:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777143667 HTTP/1.1" 200 810
2024-11-15 07:01:00,218:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:01:00 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: q3AS6Q6nO5qgAD7n_JdnMliYPoMN_2iLUDS31OB787H427z-UX8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:02:12Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/9bNT8Q",
      "status": "pending",
      "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/Ttq2kg",
      "status": "pending",
      "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/I07SEw",
      "status": "pending",
      "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao"
    }
  ]
}
2024-11-15 07:01:00,218:DEBUG:acme.client:Storing nonce: q3AS6Q6nO5qgAD7n_JdnMliYPoMN_2iLUDS31OB787H427z-UX8
2024-11-15 07:01:00,219:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-15 07:01:00,219:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-11-15 07:01:00,220:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-15 07:01:00,220:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-15 07:01:00,221:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:01:00,221:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-15 07:01:00,221:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-15 07:01:00,221:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-15 07:01:00,223:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:01:00,273:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-11-15 07:01:00,464:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-15 07:01:00,465:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-11-15 07:01:00,466:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-11-15 07:01:00,470:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:32 UTC.
2024-11-15 07:01:00,471:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 07:01:00,471:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 07:01:00,476:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0525E370>
Prep: True
2024-11-15 07:01:00,477:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0525E370> and installer None
2024-11-15 07:01:00,477:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-15 07:01:00,482:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-15 07:01:00,483:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-15 07:01:00,485:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-15 07:01:00,954:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-15 07:01:00,954:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:01:00 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "XIdD6Au3f-c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-15 07:01:00,954:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-15 07:01:06,480:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8595_key-certbot.pem
2024-11-15 07:01:11,929:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8593_csr-certbot.pem
2024-11-15 07:01:11,930:DEBUG:acme.client:Requesting fresh nonce
2024-11-15 07:01:11,930:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-15 07:01:12,086:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-15 07:01:12,087:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:01:12 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: crKnBf1H7lyW2LskF2P4TIGAFZ0Rc4Z-m8JV7gDINVUsWVNpOao
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-15 07:01:12,087:DEBUG:acme.client:Storing nonce: crKnBf1H7lyW2LskF2P4TIGAFZ0Rc4Z-m8JV7gDINVUsWVNpOao
2024-11-15 07:01:12,087:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-15 07:01:12,095:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUg3bHlXMkxza0YyUDRUSUdBRlowUmM0Wi1tOEpWN2dESU5WVXNXVk5wT2FvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Rsv4RRfk5gLpUgayCYV5JdQ9Lcs5cuYx0AebuA0l6zVbc8pwWrx71RtFvrMGudpTVNhnch0sf5IcQFFFsitdUBkzqcGEqT2mC6YQaUyfHwmS3U4imlot4v4l2FrgY7UQHw-_l4-Dm3vhfmmc5E-5YKwZMLarCaw3YUyzoA-IFHjK9P_0sd-y_C2wzIbtmI7SH4jikBfsHD-WL5WbhOIFIRhHjQlnmxV_YokL-6YzYz3RrCntkVS5ypBsONJ6R0dsOjyH0BWWkTibvtWKLxbsJeI-n5KKmU6gYJTXEZhUNANHIVnJFEO2xiG8SbFqbz5UUpCl7fIK5Ga7vO6OwLJ9YA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-11-15 07:01:12,282:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-11-15 07:01:12,283:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 15 Nov 2024 06:01:12 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864723967
Replay-Nonce: q3AS6Q6n2lmSoP0T6lsktf99-KYpgpNfTr0iKytA7fNwp6pxZLs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:02:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777258277"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864723967"
}
2024-11-15 07:01:12,283:DEBUG:acme.client:Storing nonce: q3AS6Q6n2lmSoP0T6lsktf99-KYpgpNfTr0iKytA7fNwp6pxZLs
2024-11-15 07:01:12,284:DEBUG:acme.client:JWS payload:
b''
2024-11-15 07:01:12,290:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777258277:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm4ybG1Tb1AwVDZsc2t0Zjk5LUtZcGdwTmZUcjBpS3l0QTdmTndwNnB4WkxzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcyNTgyNzcifQ",
  "signature": "QZpLygQ1haOmBDCkZLgGg2GMmxr-BZJAG1Iy2GcB0yo5CAViR4UUg0YGnETjOBQYk3nkF8qjiRztnPRXQ3Zx9Iz5JN7ywIob_eYWD18rqc5ditwQ2jm6LGa3eP26po83rvOWF3WpdbR-SP5sW0j-3-MdBL1h0Ff5gRlXOrkR7bqA8uTz02ts5Udz_yvSQTea20_f3IsQ1DAv3sEY5mx1jV_1PXPMcKStr2GBdfml3IEUQCsNacl_z3GAhhQ_OA6K2E2KF0hOm8l2E0uqTgWM6SNH1MUAMViOdpl4EAljOaSGhSqG-Vuul7i1CqTJ41gq1y_SmJ0b_CV-B9k2nnzZjA",
  "payload": ""
}
2024-11-15 07:01:12,452:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777258277 HTTP/1.1" 200 809
2024-11-15 07:01:12,453:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:01:12 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: q3AS6Q6nqwKTvfzYwaUdSdcx_5uCF0bcl9ZKdbHaM5KEPO_czFM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:02:25Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/cBbQvQ",
      "status": "pending",
      "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/GfFFvQ",
      "status": "pending",
      "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/dLzeEg",
      "status": "pending",
      "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o"
    }
  ]
}
2024-11-15 07:01:12,453:DEBUG:acme.client:Storing nonce: q3AS6Q6nqwKTvfzYwaUdSdcx_5uCF0bcl9ZKdbHaM5KEPO_czFM
2024-11-15 07:01:12,453:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-15 07:01:12,454:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-11-15 07:01:12,454:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-15 07:01:12,455:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-15 07:01:12,455:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:01:12,456:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-15 07:01:12,456:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-15 07:01:12,456:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-15 07:01:12,458:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:01:12,500:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-15 07:01:12,705:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-15 07:01:12,706:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-11-15 07:01:12,707:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-11-15 07:01:12,712:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:52 UTC.
2024-11-15 07:01:12,712:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 07:01:12,712:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 07:01:12,718:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04F50C70>
Prep: True
2024-11-15 07:01:12,718:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04F50C70> and installer None
2024-11-15 07:01:12,718:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-15 07:01:12,723:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-15 07:01:12,724:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-15 07:01:12,726:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-15 07:01:13,205:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-15 07:01:13,206:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:01:13 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "UUedT3O9bqg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-15 07:01:13,207:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-15 07:01:18,696:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8596_key-certbot.pem
2024-11-15 07:01:24,106:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8594_csr-certbot.pem
2024-11-15 07:01:24,107:DEBUG:acme.client:Requesting fresh nonce
2024-11-15 07:01:24,107:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-15 07:01:24,268:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-15 07:01:24,269:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:01:24 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: crKnBf1H_-ExuK8Hy62YU_2Dj-eynn1XN4Y84aEbH9oVcY4PMx4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-15 07:01:24,269:DEBUG:acme.client:Storing nonce: crKnBf1H_-ExuK8Hy62YU_2Dj-eynn1XN4Y84aEbH9oVcY4PMx4
2024-11-15 07:01:24,270:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-15 07:01:24,276:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhfLUV4dUs4SHk2MllVXzJEai1leW5uMVhONFk4NGFFYkg5b1ZjWTRQTXg0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Kf3Ze-az4SwzPrHGV6c3gdP2zNu8YNGF3f9OvxN2lOxecjat9OfYCclntZllS_sgtt9t6ZLJlDqGTZjREZU5NV8P8YJA4rbzPYhRWjB0nVxTgWuyyqgu_YwMZmq9V1yl38A1djs5kq5DU5nh0CiLHKQqj6XaJ4Yzme-loqZtRI8bisJYW8W1fDZxV0AKIz7kQeLWCaJpm0vmXpvl-mUJtU9Xqdovp4x3RQ_z85h-kMVEeyRHzBCVRF9prqhfWz6YoJgbTzm2Vw_QKy95TIbhfCyPwJs2-apLOQgGb8dfFOL8DIRxSqWpVBiB0cxSs0-QTPsL0fDr9i_-_nXwaruGBw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-15 07:01:24,450:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-11-15 07:01:24,451:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 15 Nov 2024 06:01:24 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864794357
Replay-Nonce: q3AS6Q6nnmMTMjTSGkqWjuJ4L6aoMrbWerIV1XOJA9dN1j6CRE8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:02:38Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777360557"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864794357"
}
2024-11-15 07:01:24,451:DEBUG:acme.client:Storing nonce: q3AS6Q6nnmMTMjTSGkqWjuJ4L6aoMrbWerIV1XOJA9dN1j6CRE8
2024-11-15 07:01:24,452:DEBUG:acme.client:JWS payload:
b''
2024-11-15 07:01:24,458:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777360557:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5ubU1UTWpUU0drcVdqdUo0TDZhb01yYldlcklWMVhPSkE5ZE4xajZDUkU4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzczNjA1NTcifQ",
  "signature": "ofJJ4wos10WD2JCTUzaPmArEoHApUpwKY2DXV165JTWncSScQ-EnfqWUg2xKzR5Wzb5wzE8OBakjWMCSMDkqqLONVh8fsvRBlzsZc0LXw4IxqJuDWWSHEoEEzzOmYrS1DERZGOcaQRb7KqsMUABTLMs5KXZxZ6AFrL945wMT8KZSGw8zriN6EipAd_mhMN0W_COYpVpVyr7qVuPq3a4vzodQtWkLJgrd89Bd8jOSLfq4UqEN278F-E_eHQUFYMSCRNZIkWqXYhPQzBUkoFQxjesFHQAE0YS7cJT4U154vo1KGVJcdZn9ZQzYdFdBf0gUQ7dy_GLXYp7bDqjsw-8VRA",
  "payload": ""
}
2024-11-15 07:01:24,622:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777360557 HTTP/1.1" 200 805
2024-11-15 07:01:24,623:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:01:24 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: crKnBf1HzdgL_MlY3xgc7unHYYZIsQYYkQIXsCVRch34VqiACB8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:02:38Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/gUrOCA",
      "status": "pending",
      "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/vSGH9w",
      "status": "pending",
      "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/Ggc8vg",
      "status": "pending",
      "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg"
    }
  ]
}
2024-11-15 07:01:24,623:DEBUG:acme.client:Storing nonce: crKnBf1HzdgL_MlY3xgc7unHYYZIsQYYkQIXsCVRch34VqiACB8
2024-11-15 07:01:24,624:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-15 07:01:24,624:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-11-15 07:01:24,625:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-15 07:01:24,625:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-15 07:01:24,626:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:01:24,626:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-15 07:01:24,626:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-15 07:01:24,627:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-15 07:01:24,628:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:01:24,670:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-15 07:01:24,881:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-11-15 07:01:24,882:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is signed by the certificate's issuer.
2024-11-15 07:01:24,883:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD
2024-11-15 07:01:24,888:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:10 UTC.
2024-11-15 07:01:24,889:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 07:01:24,889:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 07:01:24,894:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04F6FFB0>
Prep: True
2024-11-15 07:01:24,895:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04F6FFB0> and installer None
2024-11-15 07:01:24,895:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-15 07:01:24,911:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-15 07:01:24,912:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-15 07:01:24,914:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-15 07:01:25,396:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-15 07:01:25,397:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:01:25 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "B3V2Y8zmvNg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-15 07:01:25,397:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-15 07:01:31,223:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8597_key-certbot.pem
2024-11-15 07:01:36,717:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8595_csr-certbot.pem
2024-11-15 07:01:36,718:DEBUG:acme.client:Requesting fresh nonce
2024-11-15 07:01:36,718:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-15 07:01:36,878:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-15 07:01:36,879:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:01:36 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: crKnBf1HeAUcnFO_xB2lWC_FTCUtB2iu3X1R5qDpISnRZqGb8Xw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-15 07:01:36,879:DEBUG:acme.client:Storing nonce: crKnBf1HeAUcnFO_xB2lWC_FTCUtB2iu3X1R5qDpISnRZqGb8Xw
2024-11-15 07:01:36,879:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-15 07:01:36,885:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhlQVVjbkZPX3hCMmxXQ19GVENVdEIyaXUzWDFSNXFEcElTblJacUdiOFh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "WNMUjlk9WAUJMhZ6oB7LDzaw366lRmgmWKBVJi3Skww9ITiJFGASjw5f-TSVRGkYmo-ZuNCg-UQpTiVSiFoH113AHTOurhDxcEmuuAYbkL6PpBChAnHiOzojx8h-YiPYCV3OTaM-Pec98RsFiKjxmLmXhXfEOBioryu2oPfALTvMWPj5kJ07vF8k5Z8sll_f_2z6s37s7raHqilaY7PbboQeeDkQvDPccTtuit4lXWutoVUtY-yiGO0WKoUfIRtnZFkv0sJTslXD9_D77ou-UHtE7riHZCvzRabXUi-HZSsXJBXkeEkR-OG69twUPj3RqIM8TWevc58O7kWdVGXmiQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-15 07:01:37,063:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-11-15 07:01:37,063:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 15 Nov 2024 06:01:37 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864862747
Replay-Nonce: q3AS6Q6nlQ9XJL4WE_poh3u49zqd9Zisbw3Ls6rT7BGJjtMORFA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:02:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777460087"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864862747"
}
2024-11-15 07:01:37,064:DEBUG:acme.client:Storing nonce: q3AS6Q6nlQ9XJL4WE_poh3u49zqd9Zisbw3Ls6rT7BGJjtMORFA
2024-11-15 07:01:37,064:DEBUG:acme.client:JWS payload:
b''
2024-11-15 07:01:37,070:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777460087:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5sUTlYSkw0V0VfcG9oM3U0OXpxZDlaaXNidzNMczZyVDdCR0pqdE1PUkZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3Nzc0NjAwODcifQ",
  "signature": "YmfQYfo8VCXlXbY3h2fS89qcpNv4iO3EsQVnFkbdtyE-Yb4ZELOKH1hwnvQLqlfgMzkCAEkv40MtQT38eSl2PSSLeb0r66VROO07k02ilC3iHj6mY4oaOYLEgMZo3dm0qZGELNOXfraQ6peg2TwVPxY5pYZbgEyLzepuKl4UmyGfWNxkhX3rZRWPL6Vz2xSyXw8SdJWB98fxEarN7wPKVwCmIMIyfgw-NqoqnYwjvoHvgxAPHAdyPLaXseMc3wP0xqHbFeBN2yADAznRFCGBV4Mt7eVtQ5Y-3f4G9Tv90FkXiINOZtcxaUOp6hLB7h1F0IFNjXsAIo5uvCYxbOSN-w",
  "payload": ""
}
2024-11-15 07:01:37,233:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777460087 HTTP/1.1" 200 805
2024-11-15 07:01:37,234:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:01:37 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: crKnBf1HG99rOLxG0UmYZ3LIkMqHpOsX2HCcyg0HK6vk-DCLKvU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:02:52Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/f3c_WA",
      "status": "pending",
      "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/ASfKTA",
      "status": "pending",
      "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/tsh-iw",
      "status": "pending",
      "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8"
    }
  ]
}
2024-11-15 07:01:37,234:DEBUG:acme.client:Storing nonce: crKnBf1HG99rOLxG0UmYZ3LIkMqHpOsX2HCcyg0HK6vk-DCLKvU
2024-11-15 07:01:37,235:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-15 07:01:37,235:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-11-15 07:01:37,236:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-15 07:01:37,236:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-15 07:01:37,237:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:01:37,237:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-15 07:01:37,237:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-15 07:01:37,237:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-15 07:01:37,238:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:01:37,289:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-11-15 07:01:37,622:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 514
2024-11-15 07:01:37,625:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-11-15 07:01:37,625:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-11-15 07:01:37,630:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:32 UTC.
2024-11-15 07:01:37,631:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-11-15 07:01:37,631:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-11-15 07:01:37,636:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x013CEF90>
Prep: True
2024-11-15 07:01:37,636:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x013CEF90> and installer None
2024-11-15 07:01:37,637:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-11-15 07:01:37,641:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-11-15 07:01:37,642:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-11-15 07:01:37,645:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-11-15 07:01:38,138:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-11-15 07:01:38,138:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:01:38 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "SQXY0117cZM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-11-15 07:01:38,139:INFO:certbot._internal.main:Renewing an existing certificate
2024-11-15 07:01:44,061:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8598_key-certbot.pem
2024-11-15 07:01:49,733:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8596_csr-certbot.pem
2024-11-15 07:01:49,734:DEBUG:acme.client:Requesting fresh nonce
2024-11-15 07:01:49,734:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-11-15 07:01:49,898:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-11-15 07:01:49,899:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:01:49 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: crKnBf1H9DlJc_7zVYdvdv169caUewRAShiN3PQVbktuP15Itws
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-11-15 07:01:49,899:DEBUG:acme.client:Storing nonce: crKnBf1H9DlJc_7zVYdvdv169caUewRAShiN3PQVbktuP15Itws
2024-11-15 07:01:49,899:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-11-15 07:01:49,907:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUg5RGxKY183elZZZHZkdjE2OWNhVWV3UkFTaGlOM1BRVmJrdHVQMTVJdHdzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "rnu4RmRw_NlYMrr5_-hzVP1qAcCaVs1rRHNjsLimh4VCb-aXif6T1v8YrA_FYpM0ksoGUwLNSsIQ-Yv8bCyJS85c2WkBc6aVk6Cm3HdBF55p1SjDnMoFe2PgwNOtSdLjgVKj2Xpj7YHwALBzeJS3cBObBrnbUT6F-Phnr0l_-Td8aglSAmxS07g3uBcsSQd3eDk3CvlObgPwriQm7HnT9s5ggk8rjLj87sG_KF-HiLZrb_d27_z7j4UvUKWtKvKicLdEMbzzoJ1zZTB8x97Sk34l5lu1OoNEscdUbpVKKNKSQvpp3HzyTDGyXHyVHT-mjpBWH5YJ7dQBtDmmhg_0Xg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-11-15 07:01:50,113:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-11-15 07:01:50,113:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 15 Nov 2024 06:01:50 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864943797
Replay-Nonce: q3AS6Q6nAMTOmCi4rcg6S24KWKO60LCj4xIWC3ceKJs2uDLHWpA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-11-21T00:03:05Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777572397"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864943797"
}
2024-11-15 07:01:50,114:DEBUG:acme.client:Storing nonce: q3AS6Q6nAMTOmCi4rcg6S24KWKO60LCj4xIWC3ceKJs2uDLHWpA
2024-11-15 07:01:50,114:DEBUG:acme.client:JWS payload:
b''
2024-11-15 07:01:50,120:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777572397:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5BTVRPbUNpNHJjZzZTMjRLV0tPNjBMQ2o0eElXQzNjZUtKczJ1RExIV3BBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3Nzc1NzIzOTcifQ",
  "signature": "JLbiS9e0PazOLIgHVZgGKlUudVf92ClWnU1ytv-uFVMJcHR6jOLOv-aL1C6FB8IjVI8-hCQuotvZ8SYeXV45YBYnOLEM19MZ-xQZa3oOl1ARRsFgIPM159a0aIDkvF-2xwPSkJJmRreAni6PkTGfwMd1zWd3YRZjejDmspGrh-caY4zOGqLcRV1OeF8vj34237dyOXEY2bDORpZ5w-vf63uJ9LVBotzlBXA3ToQFQVXh_ZAAo_kBYW86w1DoCAxwlrHDO-QwqEAFp4qXHfjtpuQId2u_nkAvCLlpcMrdRrqbDFmhXax953wgJLdHzKKJQn2-D-vIkz7FYUPGPFAy9Q",
  "payload": ""
}
2024-11-15 07:01:50,291:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777572397 HTTP/1.1" 200 805
2024-11-15 07:01:50,292:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 15 Nov 2024 06:01:50 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: q3AS6Q6nqu3r6EfPxj9J2D4u1i3ber3hz7lo410VA6UbeH-625M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-11-21T00:03:05Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/qQ1QMQ",
      "status": "pending",
      "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/HIxR5w",
      "status": "pending",
      "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/avR61Q",
      "status": "pending",
      "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o"
    }
  ]
}
2024-11-15 07:01:50,292:DEBUG:acme.client:Storing nonce: q3AS6Q6nqu3r6EfPxj9J2D4u1i3ber3hz7lo410VA6UbeH-625M
2024-11-15 07:01:50,293:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-11-15 07:01:50,293:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-11-15 07:01:50,294:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-11-15 07:01:50,294:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-11-15 07:01:50,295:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:01:50,295:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-11-15 07:01:50,295:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-11-15 07:01:50,296:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-11-15 07:01:50,297:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-11-15 07:01:50,297:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-11-15 07:01:50,297:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-11-15 07:01:50,299:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 15 renew failure(s), 0 parse failure(s)
2024-11-15 07:01:50,300:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)