2024-09-12 14:31:01,347:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-09-12 14:31:01,348:DEBUG:certbot._internal.main:Arguments: []
2024-09-12 14:31:01,348:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-09-12 14:31:02,071:DEBUG:certbot._internal.log:Root logging level set at 20
2024-09-12 14:31:02,072:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-09-12 14:31:02,109:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04450F90> and installer <certbot._internal.cli.cli_utils._Default object at 0x04450F90>
2024-09-12 14:31:02,152:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-12 14:31:02,199:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:31:02,200:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert11.pem is signed by the certificate's issuer.
2024-09-12 14:31:02,204:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD
2024-09-12 14:31:02,214:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:13 UTC.
2024-09-12 14:31:02,214:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:31:02,214:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:31:02,220:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03ED7710>
Prep: True
2024-09-12 14:31:02,220:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03ED7710> and installer None
2024-09-12 14:31:02,220:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-12 14:31:02,242:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-12 14:31:02,243:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-12 14:31:02,245:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-12 14:31:02,737:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-12 14:31:02,738:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:31:03 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "xgulqw0aJbQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-09-12 14:31:02,738:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-12 14:31:08,541:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8458_key-certbot.pem
2024-09-12 14:31:13,941:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8456_csr-certbot.pem
2024-09-12 14:31:13,942:DEBUG:acme.client:Requesting fresh nonce
2024-09-12 14:31:13,942:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-12 14:31:14,100:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-12 14:31:14,101:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:31:14 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0Nvv4YStKJD1afZvv-9SKv8GeLbCac7ce4gq9vqvpAHYg8eEG7g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-12 14:31:14,101:DEBUG:acme.client:Storing nonce: 0Nvv4YStKJD1afZvv-9SKv8GeLbCac7ce4gq9vqvpAHYg8eEG7g
2024-09-12 14:31:14,102:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-12 14:31:14,108:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RLSkQxYWZadnYtOVNLdjhHZUxiQ2FjN2NlNGdxOXZxdnBBSFlnOGVFRzdnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "cpToppxn81F6K_lmUaQsB0lce5c_l3ml6HensMecRCQw6Hzj1lPKamur2Y-X7kGkfQl22XM829ZGNK9vIKCI9Zi-oJb34BH83VdbZa1KExMUvhCFKAYbGOvwCYq7pbmSggc5n-jJRzuhlQTjpcda4TJOB1zSyIKigc-A9PHwF-bCXbG04O6oprEUF7Zq49ShZeBla3pE_lp9Y8j-pSdToSE6hcC9ksEdFOyL1zKnjcgIGRrsaWc9FxtzqPOQPUpKK6vd-Wj2q4AyBKu-jPXyB6vrPN1Wjnf30pmGRVcTZnMo4smgBi1Y3uOZKZ1n633zCBveRuuD8OEEKM05ELJz_g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-09-12 14:31:14,313:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-09-12 14:31:14,314:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 12 Sep 2024 12:31:15 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144772916
Replay-Nonce: UAMvsxnwKEr225lkncu7WHIyl5JDFj3LU7Z7ip6okPx4JD3w-WM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:54:30Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122542336"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144772916"
}
2024-09-12 14:31:14,314:DEBUG:acme.client:Storing nonce: UAMvsxnwKEr225lkncu7WHIyl5JDFj3LU7Z7ip6okPx4JD3w-WM
2024-09-12 14:31:14,314:DEBUG:acme.client:JWS payload:
b''
2024-09-12 14:31:14,320:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122542336:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndLRXIyMjVsa25jdTdXSEl5bDVKREZqM0xVN1o3aXA2b2tQeDRKRDN3LVdNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI1NDIzMzYifQ",
  "signature": "WH8YLQRSl-KKsgBzzvyklxe7rXv4LExhRQbI6oKTMvys2koVpLu_HDhslKr78MhJocK6r2Q2WzXCUiGBJ95FX87yoye0ozZi-ASSvk79WTkWiDcbCk7UA2VOcRNX54GAgk2FQwSZGlpAwe8c68vooStV633ILVn8lgRtDBu-xkx5nrwjHbXlq6MfXDG5NvQ2gcBLmDDFIEJyQva5JdYFJhnnN5PLPPEd3-tKARlsHhMZqDJMERMImWQA9mO_NCP5xRtIDdn2QyqHwHOywtWfyIg7jmYjxuo2pO_UXi239ODGYS12ODO9K5i5h0tBgTSm-kY7kUtJyYXnzvKJWjPICg",
  "payload": ""
}
2024-09-12 14:31:14,485:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122542336 HTTP/1.1" 200 810
2024-09-12 14:31:14,494:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:31:15 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwT71vNe5g_x3ZAYxIENVcFyRaM7snyO6MiRLGCSc3OZ4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:54:30Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/yxREqg",
      "status": "pending",
      "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/LP3L_w",
      "status": "pending",
      "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/cyyAdg",
      "status": "pending",
      "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k"
    }
  ]
}
2024-09-12 14:31:14,494:DEBUG:acme.client:Storing nonce: UAMvsxnwT71vNe5g_x3ZAYxIENVcFyRaM7snyO6MiRLGCSc3OZ4
2024-09-12 14:31:14,495:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-12 14:31:14,495:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-09-12 14:31:14,497:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-12 14:31:14,497:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-12 14:31:14,500:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:31:14,500:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-12 14:31:14,500:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-12 14:31:14,501:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-12 14:31:14,505:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:31:14,543:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-12 14:31:14,614:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:31:14,615:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2024-09-12 14:31:14,616:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2024-09-12 14:31:14,621:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:31 UTC.
2024-09-12 14:31:14,621:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:31:14,622:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:31:14,627:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03ED7270>
Prep: True
2024-09-12 14:31:14,627:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03ED7270> and installer None
2024-09-12 14:31:14,627:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-12 14:31:14,632:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-12 14:31:14,633:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-12 14:31:14,635:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-12 14:31:15,061:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-12 14:31:15,062:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:31:15 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "azxkbLV4bLU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-12 14:31:15,062:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-12 14:31:21,606:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8459_key-certbot.pem
2024-09-12 14:31:26,913:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8457_csr-certbot.pem
2024-09-12 14:31:26,914:DEBUG:acme.client:Requesting fresh nonce
2024-09-12 14:31:26,914:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-12 14:31:27,057:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-12 14:31:27,057:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:31:27 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQ0UytdVWfDNAOf6gMrw-Za8rZORnYMoHeVCVP2cnEvpw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-12 14:31:27,057:DEBUG:acme.client:Storing nonce: fCBw7MtQ0UytdVWfDNAOf6gMrw-Za8rZORnYMoHeVCVP2cnEvpw
2024-09-12 14:31:27,058:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-12 14:31:27,063:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFEwVXl0ZFZXZkROQU9mNmdNcnctWmE4clpPUm5ZTW9IZVZDVlAyY25FdnB3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "KLssut7-xxiZ14gXi_OEsISdSuesPIuN_3xSfnpAVvXsCalhc9oa65XMlWGlE-jcXHRxcE6H7CiwLHiZ_-ppGilFDBPsJKwKKvi1JSzM_mOdNqEMdYaP-GJ4qeqhpD4C_v7LSmD51_xehqG0MJeMxO8d27pKdaaIyJI-pDFpUQs9tP82DCPOFFsAgBcu3_tk5-w16FSjvaF4oQGo_rve8_kG61NFxs0KWoCvYakN_SspC26V29VWgzeQgz-0GHZJNU50aSx1pP8Nh2BDFAmy_UDy4UfMDI9UsyAn2odbc2dXh9pvmBYcBn4EUmJKnOGbOWpwHlquCQsS3tM_dHkzxQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-09-12 14:31:27,260:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-09-12 14:31:27,261:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 12 Sep 2024 12:31:28 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144813576
Replay-Nonce: 4OmWUlyUZIfWoYYGcD7KR7aQukETVSZfHkKS2sYJRyxWNjZdPdw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:54:43Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122604166"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144813576"
}
2024-09-12 14:31:27,261:DEBUG:acme.client:Storing nonce: 4OmWUlyUZIfWoYYGcD7KR7aQukETVSZfHkKS2sYJRyxWNjZdPdw
2024-09-12 14:31:27,261:DEBUG:acme.client:JWS payload:
b''
2024-09-12 14:31:27,267:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122604166:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVaSWZXb1lZR2NEN0tSN2FRdWtFVFZTWmZIa0tTMnNZSlJ5eFdOalpkUGR3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI2MDQxNjYifQ",
  "signature": "ZO21ZsPimHe7i5GdejltoEUUOvv7CHQ9mdun7JPV3kZcRp_kVYQOkYYCSqpYVunv7fPImWWoZ7cIsOnbp8MpXlGbg5E8Qzjc22xNKyG4eWc4JuskT3iThjuKdPVLa5VhYlJiiARa2GZf1YVcyNX96Sa48jajcYFzHhkxuF6M468DXy7JHciYFzYYOQS48PmLRI_uNJLXdikWRkY1odpu0visceEQDRMbopvydInvxF0P9VQsM-wLysP3g79m5irVWERQ7JCwlyyDroWxzPGGVZSuDXLJfY0rS3QIy5n7YIwfVmwdIREZm_o2TZKPBqoVyBi3oi6Y-R0d8lLqtoU5Dg",
  "payload": ""
}
2024-09-12 14:31:27,433:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122604166 HTTP/1.1" 200 804
2024-09-12 14:31:27,434:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:31:28 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQlBIeEnaz0mSReVUtBplUvWpZ9GZlHZyYBAoErn5ogAM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:54:43Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/uKF3Wg",
      "status": "pending",
      "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/osHCwQ",
      "status": "pending",
      "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/ZP8ZRQ",
      "status": "pending",
      "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo"
    }
  ]
}
2024-09-12 14:31:27,434:DEBUG:acme.client:Storing nonce: fCBw7MtQlBIeEnaz0mSReVUtBplUvWpZ9GZlHZyYBAoErn5ogAM
2024-09-12 14:31:27,434:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-12 14:31:27,436:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-09-12 14:31:27,436:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-12 14:31:27,436:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-12 14:31:27,437:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:31:27,437:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-12 14:31:27,437:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-12 14:31:27,438:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-12 14:31:27,439:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:31:27,493:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-12 14:31:27,658:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:31:27,659:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-09-12 14:31:27,660:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-09-12 14:31:27,665:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:49 UTC.
2024-09-12 14:31:27,665:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:31:27,665:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:31:27,670:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04450830>
Prep: True
2024-09-12 14:31:27,670:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04450830> and installer None
2024-09-12 14:31:27,671:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-12 14:31:27,674:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-12 14:31:27,675:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-12 14:31:27,677:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-12 14:31:28,141:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-12 14:31:28,141:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:31:28 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Wye8GEKWNyw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-12 14:31:28,142:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-12 14:31:33,865:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8460_key-certbot.pem
2024-09-12 14:31:39,159:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8458_csr-certbot.pem
2024-09-12 14:31:39,160:DEBUG:acme.client:Requesting fresh nonce
2024-09-12 14:31:39,160:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-12 14:31:39,315:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-12 14:31:39,315:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:31:40 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0Nvv4YSt0y4YgOPTGTdYI9S7PE8b5TiSTzOsV88oHBuPiTMplqA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-12 14:31:39,315:DEBUG:acme.client:Storing nonce: 0Nvv4YSt0y4YgOPTGTdYI9S7PE8b5TiSTzOsV88oHBuPiTMplqA
2024-09-12 14:31:39,316:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-12 14:31:39,321:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3QweTRZZ09QVEdUZFlJOVM3UEU4YjVUaVNUek9zVjg4b0hCdVBpVE1wbHFBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "iuG-j92XgwOzgJVR0ByaUqmv_w3VOQbfweaw1gCs3ybefRtv6RuwXbD_yqLcytXDXJ8MgThVH8JXxFBR5rqiPIP80BCZic81FffrIvo5Hg26YCMQD-1QyBnTcwEI71LwmYvIwyri5fZiP1Jlt8ocNKkhB_1zWZX84F5wcN3cd0_MCGBhHa2PKIVdLPgYOKNbCW86UVZa7Ah5lMNtcjlEneT6wBD5xpPiqLCpcQZjz2x9_TRlua7P9lUqN6birw4ubDE6vLL_3IU4f7tRP8SEbR9G_LUcAk-OdkGN-melZDTzqm5w2ugbHJr37ZK2OmydIFtaGAm6k9ivi3ynKcIcBg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-09-12 14:31:39,503:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-09-12 14:31:39,503:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 12 Sep 2024 12:31:40 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144849776
Replay-Nonce: UAMvsxnwjoP1qUTh-l6sY55nx3yOdb9pgarUn7RcAp27bycz5ss
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:54:56Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122659596"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144849776"
}
2024-09-12 14:31:39,504:DEBUG:acme.client:Storing nonce: UAMvsxnwjoP1qUTh-l6sY55nx3yOdb9pgarUn7RcAp27bycz5ss
2024-09-12 14:31:39,504:DEBUG:acme.client:JWS payload:
b''
2024-09-12 14:31:39,510:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122659596:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndqb1AxcVVUaC1sNnNZNTVueDN5T2RiOXBnYXJVbjdSY0FwMjdieWN6NXNzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI2NTk1OTYifQ",
  "signature": "wGBiwrDexlm5qGvUhx4BKjaqELpxiTnah3xJi8iPhjW0iSDWc1Gz9ybMq1QdFWsDkIF4iTuOZgu-uC9UVznWKnal1zONIZ0xQpRzgQJlhbdQzYnqIE5Iy3WQdA_cb1b8ttwHWIm_m-QnxojFL1oXN-FnNh7R4DoQz1xXdeKGcN3fIq_Qr7tdiYP-2XLCfO9zQoDtUcpSXqAQm5JHsuX2c07nWfRn1pBzVuKH5ofVGqx11jiUCZpPNiDP_olD2GVXGT4o1BklPfiXesqhJExMaq3AsRk6zIxV14WPgqcecGUaWM2Ov4pZSHrjOhlwItOzSoj6SG8DnZziE-Wz3BMO5Q",
  "payload": ""
}
2024-09-12 14:31:39,670:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122659596 HTTP/1.1" 200 807
2024-09-12 14:31:39,670:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:31:40 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0Nvv4YStf1A-cbOezst9-rWN0egEaVPmam8pc-XHemioVs8crCc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:54:56Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/2L4MUQ",
      "status": "pending",
      "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/osx5jQ",
      "status": "pending",
      "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/mCb-BA",
      "status": "pending",
      "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM"
    }
  ]
}
2024-09-12 14:31:39,671:DEBUG:acme.client:Storing nonce: 0Nvv4YStf1A-cbOezst9-rWN0egEaVPmam8pc-XHemioVs8crCc
2024-09-12 14:31:39,671:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-12 14:31:39,672:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-09-12 14:31:39,672:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-12 14:31:39,672:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-12 14:31:39,673:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:31:39,673:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-12 14:31:39,673:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-12 14:31:39,674:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-12 14:31:39,675:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:31:39,724:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-09-12 14:31:39,768:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:31:39,769:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert1.pem is signed by the certificate's issuer.
2024-09-12 14:31:39,770:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD
2024-09-12 14:31:39,774:INFO:certbot._internal.renewal:Cert not yet due for renewal
2024-09-12 14:31:39,777:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:31:39,816:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-09-12 14:31:39,845:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:31:39,847:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2024-09-12 14:31:39,847:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2024-09-12 14:31:39,852:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:07 UTC.
2024-09-12 14:31:39,852:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:31:39,853:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:31:39,859:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03EDC0D0>
Prep: True
2024-09-12 14:31:39,859:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03EDC0D0> and installer None
2024-09-12 14:31:39,859:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-12 14:31:39,864:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-12 14:31:39,865:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-12 14:31:39,867:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-12 14:31:40,344:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-12 14:31:40,344:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:31:41 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "pYHyo5zrp7o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-12 14:31:40,345:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-12 14:31:45,986:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8461_key-certbot.pem
2024-09-12 14:31:51,367:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8459_csr-certbot.pem
2024-09-12 14:31:51,368:DEBUG:acme.client:Requesting fresh nonce
2024-09-12 14:31:51,368:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-12 14:31:51,528:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-12 14:31:51,528:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:31:52 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0Nvv4YStTSuIaH6VFsfH9uwJNzCC_OwsiEOrM-6H1-ulot7Efak
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-12 14:31:51,528:DEBUG:acme.client:Storing nonce: 0Nvv4YStTSuIaH6VFsfH9uwJNzCC_OwsiEOrM-6H1-ulot7Efak
2024-09-12 14:31:51,529:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-09-12 14:31:51,534:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RUU3VJYUg2VkZzZkg5dXdKTnpDQ19Pd3NpRU9yTS02SDEtdWxvdDdFZmFrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "jhraJf-VlJW-3my8LHkirifatfPjPJr3KDFjJcGscK-WsrRZ14c1gFBftkz0UAH2o1vy_LEIbjyeNApHhWu5wVMhKGdDPG3f3VqeLbVtOxyPT4Ti6dHRF-ot9O10WMlDfzvtVlFsV3vaRKckUm-R2R9eli6bFrA_8hLSf5d5YvNUjfdryQ6UZM8FOOm3jmfhAgBZni6qHh93ynLn7bK9GuOSlqKXyPvPUn7odhigAVSKwJNHjKdtGCd0_C8LjccQ0vvot3sBdD4jdYRxbJNjtn86Cm7bG2ROX1JZh1bWGrSzv4_kng8PP73I6xoxArmbYb2_QqKii67EQQBtfcLW9A",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-09-12 14:31:51,721:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-09-12 14:31:51,722:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 12 Sep 2024 12:31:52 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144900966
Replay-Nonce: 0Nvv4YStbDqbDcxqdmQwRWEljEcqZ6B0_F0fPS8V7yFM6LOdNWk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:55:08Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122729086"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144900966"
}
2024-09-12 14:31:51,722:DEBUG:acme.client:Storing nonce: 0Nvv4YStbDqbDcxqdmQwRWEljEcqZ6B0_F0fPS8V7yFM6LOdNWk
2024-09-12 14:31:51,723:DEBUG:acme.client:JWS payload:
b''
2024-09-12 14:31:51,728:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122729086:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RiRHFiRGN4cWRtUXdSV0VsakVjcVo2QjBfRjBmUFM4Vjd5Rk02TE9kTldrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI3MjkwODYifQ",
  "signature": "cJcqxgZpDWGItf8FxOQ3L5fmNpAv8hKCYXrrncvf4O06S18sFGOKAwqMw6OR4k3j3bjd9Ln2fclSGQa8WdlVgfppnfCJHs_0eEkQw1IFwTkv9xwz28O0wZMLMdPqqAqDFO0TW8m8VVcA1_B4bX-S6m4CYyDYhPwJ-linjJ7I03a1R5FD9K2WrJMeLfzC5X470HrwBmCyAEUG6FfJeC4-_5yuD-OUr-ZzJiGnRXoCLlAuHuSdHnFAz_qOqMmKW52QaeESuv-fR5iEFlIpGEJ9X4U2-e0su160YBmqPE6Fdf88fjWs8WRsEUNV8T-Q1JbIMy-F1Z6QH2yoE1oAbdLyUg",
  "payload": ""
}
2024-09-12 14:31:51,904:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122729086 HTTP/1.1" 200 801
2024-09-12 14:31:51,905:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:31:52 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0Nvv4YStEEA6qAqYYxshWnVa1yiEAZlcugJXHVadDfIC70YacsI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:55:08Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/ch6DzQ",
      "status": "pending",
      "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/ShHY7A",
      "status": "pending",
      "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/e_W2mQ",
      "status": "pending",
      "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c"
    }
  ]
}
2024-09-12 14:31:51,905:DEBUG:acme.client:Storing nonce: 0Nvv4YStEEA6qAqYYxshWnVa1yiEAZlcugJXHVadDfIC70YacsI
2024-09-12 14:31:51,905:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-12 14:31:51,906:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-09-12 14:31:51,906:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-12 14:31:51,907:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-12 14:31:51,907:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:31:51,907:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-12 14:31:51,908:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-12 14:31:51,909:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-12 14:31:51,910:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:31:51,958:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-12 14:31:51,997:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:31:51,998:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2024-09-12 14:31:51,999:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2024-09-12 14:31:52,003:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:25 UTC.
2024-09-12 14:31:52,004:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:31:52,004:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:31:52,009:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0474F430>
Prep: True
2024-09-12 14:31:52,009:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0474F430> and installer None
2024-09-12 14:31:52,009:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-12 14:31:52,014:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-12 14:31:52,015:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-12 14:31:52,017:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-12 14:31:52,495:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-12 14:31:52,496:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:31:53 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "DotcMomsfZ4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-12 14:31:52,496:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-12 14:31:58,082:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8462_key-certbot.pem
2024-09-12 14:32:03,334:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8460_csr-certbot.pem
2024-09-12 14:32:03,335:DEBUG:acme.client:Requesting fresh nonce
2024-09-12 14:32:03,335:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-12 14:32:03,494:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-12 14:32:03,495:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:04 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0Nvv4YSt4FesQ6ilWThjiaT2GsCBER1TpEdUrUANVd7Ugcvn2Gw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-12 14:32:03,495:DEBUG:acme.client:Storing nonce: 0Nvv4YSt4FesQ6ilWThjiaT2GsCBER1TpEdUrUANVd7Ugcvn2Gw
2024-09-12 14:32:03,495:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-12 14:32:03,501:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3Q0RmVzUTZpbFdUaGppYVQyR3NDQkVSMVRwRWRVclVBTlZkN1VnY3ZuMkd3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "cacBoC0Lkz4xG42cECtY1dfFDRs7t3nQsOoipQ-zPXJdGPokpvqLOgHvGta7fFhaicXw2D3KeimH0sFHprW65Es-xmtUlzaQwYP9RilVnHKNMn7qjKmWK2H4fHKxja--G65k11ernLRWZVLxsADCfc1o-5JlF3fI7fpMUqIWQi_r-jwDATRWB-OjmlSQRLFJt76UkIUbI7brIi4lOpKt3GQQGMxAQGbFBxcj58Sx5Haa_yBkczcvMQmg5inx_jxWxTRIpeONb4SPDDzWPg4IqSGZSrdIZhEFXzFhWC2gTJSXtc-cmcrm9uSJI1Fkv7X57RCj5v9yymZMZxTTL_F_oQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-09-12 14:32:03,711:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-09-12 14:32:03,712:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 12 Sep 2024 12:32:04 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144940076
Replay-Nonce: UAMvsxnwqk4Tg8X2cqZ1idPPRYUI2FqeVgNjEJLLJSx1CaxQOPE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:55:20Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122790136"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144940076"
}
2024-09-12 14:32:03,712:DEBUG:acme.client:Storing nonce: UAMvsxnwqk4Tg8X2cqZ1idPPRYUI2FqeVgNjEJLLJSx1CaxQOPE
2024-09-12 14:32:03,712:DEBUG:acme.client:JWS payload:
b''
2024-09-12 14:32:03,718:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122790136:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndxazRUZzhYMmNxWjFpZFBQUllVSTJGcWVWZ05qRUpMTEpTeDFDYXhRT1BFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI3OTAxMzYifQ",
  "signature": "vORSdIcofb6DXCGeYkL_QFlv3eFLDYeK_MBsNYtAJD8qWGfVkf0Gnkpk9j5ELcJGqtncdhfnv0VaH5JdwLGgrszrxCYDyxmSi-RS4OckTH8NuZKsgfaM2gCPObaBDWX_lHH2R-qQB9rhYntSBCTea9cxWNclDuDsX3zdrlO8fDRUFxPjoWGViqbk0F949mokz-Ob_0vbjHpY5Rhb7EqoFB0v2sh-VXhmEeqJvGRkxqzAc312H9LwJzQLzvKozco6xTqH8DbfpDlgZruVnKcpjcYv3h1Am1W5urWWfrRdkQwVa6dVpArsUAn76qRgxhyZY_LB41QIwsVl2Z_GEWiKrg",
  "payload": ""
}
2024-09-12 14:32:03,883:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122790136 HTTP/1.1" 200 805
2024-09-12 14:32:03,884:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:04 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwKY5uraIMWSeiI5TsZ8fUJyrjevvEOZidDVuRy4S8bXQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:55:20Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/fCm5hA",
      "status": "pending",
      "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/HbiFxg",
      "status": "pending",
      "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/X2nDCw",
      "status": "pending",
      "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4"
    }
  ]
}
2024-09-12 14:32:03,884:DEBUG:acme.client:Storing nonce: UAMvsxnwKY5uraIMWSeiI5TsZ8fUJyrjevvEOZidDVuRy4S8bXQ
2024-09-12 14:32:03,885:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-12 14:32:03,885:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-09-12 14:32:03,886:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-12 14:32:03,886:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-12 14:32:03,887:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:32:03,887:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-12 14:32:03,887:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-12 14:32:03,888:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-12 14:32:03,889:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:32:03,928:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-09-12 14:32:04,108:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:32:04,109:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-09-12 14:32:04,109:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-09-12 14:32:04,114:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:43 UTC.
2024-09-12 14:32:04,114:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:32:04,114:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:32:04,119:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03EC4830>
Prep: True
2024-09-12 14:32:04,119:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03EC4830> and installer None
2024-09-12 14:32:04,120:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-12 14:32:04,124:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-12 14:32:04,125:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-12 14:32:04,127:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-12 14:32:04,562:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-12 14:32:04,563:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:05 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "XIqdmdVmiIA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-12 14:32:04,563:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-12 14:32:09,998:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8463_key-certbot.pem
2024-09-12 14:32:15,237:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8461_csr-certbot.pem
2024-09-12 14:32:15,238:DEBUG:acme.client:Requesting fresh nonce
2024-09-12 14:32:15,238:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-12 14:32:15,382:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-12 14:32:15,383:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:16 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQUwIroE_drAtSS-jkRvQrxO4QwpjaP26whg1NKq3EqQU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-12 14:32:15,383:DEBUG:acme.client:Storing nonce: fCBw7MtQUwIroE_drAtSS-jkRvQrxO4QwpjaP26whg1NKq3EqQU
2024-09-12 14:32:15,383:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-12 14:32:15,390:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFVd0lyb0VfZHJBdFNTLWprUnZRcnhPNFF3cGphUDI2d2hnMU5LcTNFcVFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "bMVqGJW3ueanZr3ZjGVUxjaUO0RN5SmMM7OFMvpCm3WErloxf_pBJDd24DSK4gg1zFxo8ykeVLnuC46QYSeHrmKZTRbt6BhDRFnmXnofUEy0UF8GifYDH1peSl9yLbaG1Tv8HyvRgzcar-5tR2SMQYAH1VptIjdfqVueN1OYHYn_KJn8QKW-CVcCQ5Z-yAAXcgY4bXIRG2iqmGkCGTMwsocmrM5EN9e4I2UptPHx_s5col3GGbCNcImrIAg1OCLAtKxqP8sZKIFNigSAP9tnxxS1P-27hQzP9Hbu1i-T0zELjN3O3fQ2ni0N3n90HHi-Syw8gbYK91UB4vnLKPRsPw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-09-12 14:32:15,595:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-09-12 14:32:15,595:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 12 Sep 2024 12:32:16 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144979426
Replay-Nonce: 4OmWUlyUqZjR2S4Bb29e7v9qHXFN2sraXJ-J0S6Ta1OQWgAc9Cg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:55:33Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122851136"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144979426"
}
2024-09-12 14:32:15,596:DEBUG:acme.client:Storing nonce: 4OmWUlyUqZjR2S4Bb29e7v9qHXFN2sraXJ-J0S6Ta1OQWgAc9Cg
2024-09-12 14:32:15,596:DEBUG:acme.client:JWS payload:
b''
2024-09-12 14:32:15,602:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122851136:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVxWmpSMlM0QmIyOWU3djlxSFhGTjJzcmFYSi1KMFM2VGExT1FXZ0FjOUNnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI4NTExMzYifQ",
  "signature": "N0_I5X_GSnx8ATxccv4eQC2ff42Q7bGiYSTThFyijJBMG2IMqa9RPXk6SacqxXzuvCbX6CPeqS2cdsCjkUdbDxTAfmIbsZxWun3dKDOfNGxS3xY7mr8VVNQ-8XT5mZhxAVt4nCwXFzan1GbeBZOCWp_Mmz2Zt_GAtGZVOXXXhq_e1sOrkr3KiaF0317xn6VSjaxQFTD7-1AKUI0fnAyfE1xw6Y1IjzWRwbqmP-wcd0N1Z09U3T_eU5eRsCbtwyTFDEVd2V---Ff6yMoTAyaC81Z2mebP1-_EcAENTRgK_7LKRUl6cGhlHJJCYgWkOZIDrhkydWlytOoXXI4SNurtvA",
  "payload": ""
}
2024-09-12 14:32:15,765:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122851136 HTTP/1.1" 200 809
2024-09-12 14:32:15,766:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:16 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4OmWUlyUBT5i9REClGK_vVZ-tvNY3oGq6mPJql2KaJUf19b3HkA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:55:33Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/nTAn0w",
      "status": "pending",
      "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/Kdwo9g",
      "status": "pending",
      "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/kuyLHA",
      "status": "pending",
      "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY"
    }
  ]
}
2024-09-12 14:32:15,766:DEBUG:acme.client:Storing nonce: 4OmWUlyUBT5i9REClGK_vVZ-tvNY3oGq6mPJql2KaJUf19b3HkA
2024-09-12 14:32:15,768:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-12 14:32:15,768:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-09-12 14:32:15,769:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-12 14:32:15,769:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-12 14:32:15,770:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:32:15,770:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-12 14:32:15,770:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-12 14:32:15,770:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-12 14:32:15,772:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:32:15,816:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-09-12 14:32:15,887:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:32:15,888:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert2.pem is signed by the certificate's issuer.
2024-09-12 14:32:15,889:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD
2024-09-12 14:32:15,893:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:14 UTC.
2024-09-12 14:32:15,893:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:32:15,893:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:32:15,898:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0474FE90>
Prep: True
2024-09-12 14:32:15,898:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0474FE90> and installer None
2024-09-12 14:32:15,899:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-12 14:32:15,903:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-12 14:32:15,904:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-12 14:32:15,906:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-12 14:32:16,383:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-12 14:32:16,384:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:17 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "C8gZ9kFWcHs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-12 14:32:16,384:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-12 14:32:21,840:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8464_key-certbot.pem
2024-09-12 14:32:27,084:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8462_csr-certbot.pem
2024-09-12 14:32:27,085:DEBUG:acme.client:Requesting fresh nonce
2024-09-12 14:32:27,085:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-12 14:32:27,245:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-12 14:32:27,246:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:28 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwjmufRyYbsEDkzkBoiN3ArAsVpE48KWKb2t26cXJYWY0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-12 14:32:27,246:DEBUG:acme.client:Storing nonce: UAMvsxnwjmufRyYbsEDkzkBoiN3ArAsVpE48KWKb2t26cXJYWY0
2024-09-12 14:32:27,246:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "helix.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-12 14:32:27,252:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndqbXVmUnlZYnNFRGt6a0JvaU4zQXJBc1ZwRTQ4S1dLYjJ0MjZjWEpZV1kwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "xkeJMY_rW4RKYKzqXESjx9p0GqWCfS7rEn7AJzj3g0Zi9u6QI0WxcsMVtdrCVCsOjT-xqGy7joMCYdYTRhxKJlokdY7Af79dzWPVJWu5XyDcsrQhvXr5fjhKjkoKUifDQopIJ84DlMzG5_qfQuubhx0RXjEHkdGiii8kSZGfCK_X2BWTuGHJbfs9FSRRBwZnOG9vY5duvY61oxN-G-Yuq4iRvbsDjvdpYFYURZIgmENYVjfV7WWB2Xoz14rjA_ghpBL2d4nda6ck7jrAkjSzCFpeM57omJKbO2EjD7_JbEFFO5UzVSSG8L4jevfDPe_JtWNLT_9poIcNPJqfGBTDuw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-09-12 14:32:27,440:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-09-12 14:32:27,441:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 12 Sep 2024 12:32:28 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145018096
Replay-Nonce: UAMvsxnwu1uva-alUfaIOuhZhnRxXhRiYpMLiLNuW9c4xwWjMYk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:55:45Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "helix.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122910996"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145018096"
}
2024-09-12 14:32:27,441:DEBUG:acme.client:Storing nonce: UAMvsxnwu1uva-alUfaIOuhZhnRxXhRiYpMLiLNuW9c4xwWjMYk
2024-09-12 14:32:27,441:DEBUG:acme.client:JWS payload:
b''
2024-09-12 14:32:27,447:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122910996:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bnd1MXV2YS1hbFVmYUlPdWhaaG5SeFhoUmlZcE1MaUxOdVc5YzR4d1dqTVlrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI5MTA5OTYifQ",
  "signature": "RDfU_j5CVEWjqPqPMbKCHM3nezimBP81wl-BJNSHEVVhaqqU2WOxNhoLAjLe6ecQvMjTcza2hrEQCwvI7S0KLFIBid9-nbOVvCR3T5XcmZVor1gWCB29teUr6WkdS-J4s1r5ICfwVOsX3Fd4fxRw9O_VgObTCPFJ4qn_dM2rytkJBV34t1uNfqPpFUqSz3VRvexh-V8gqgSuoGucKtOrmSAqjAuHepjiwuUXP2heXeQ7UVP9CVf7yonavJyQF7YksKy7iZDNHYQOmutixwHeyBeIXx1j5jJCf68CZzY312Z4f9WQRCL6qQZNQ5ykiR0t7navCzKxEeicxa2G94URWw",
  "payload": ""
}
2024-09-12 14:32:27,627:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122910996 HTTP/1.1" 200 807
2024-09-12 14:32:27,628:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:28 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwyb2-XmWVQsncta_tKYLF3JoK335fbwymN-7mK6nr-eA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "helix.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:55:45Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/QNmv8g",
      "status": "pending",
      "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/4_hHkg",
      "status": "pending",
      "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/Xg0Zog",
      "status": "pending",
      "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k"
    }
  ]
}
2024-09-12 14:32:27,628:DEBUG:acme.client:Storing nonce: UAMvsxnwyb2-XmWVQsncta_tKYLF3JoK335fbwymN-7mK6nr-eA
2024-09-12 14:32:27,630:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-12 14:32:27,630:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl
2024-09-12 14:32:27,630:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-12 14:32:27,631:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-12 14:32:27,631:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:32:27,632:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-12 14:32:27,632:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-12 14:32:27,632:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-12 14:32:27,634:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:32:27,681:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-09-12 14:32:27,789:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:32:27,790:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2024-09-12 14:32:27,791:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2024-09-12 14:32:27,795:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:33 UTC.
2024-09-12 14:32:27,796:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:32:27,796:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:32:27,801:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04462050>
Prep: True
2024-09-12 14:32:27,801:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04462050> and installer None
2024-09-12 14:32:27,801:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-12 14:32:27,806:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-12 14:32:27,806:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-12 14:32:27,808:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-12 14:32:28,239:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-12 14:32:28,240:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:29 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "edAPnIfFEqE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-12 14:32:28,240:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-12 14:32:33,582:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8465_key-certbot.pem
2024-09-12 14:32:38,849:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8463_csr-certbot.pem
2024-09-12 14:32:38,850:DEBUG:acme.client:Requesting fresh nonce
2024-09-12 14:32:38,850:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-12 14:32:38,994:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-12 14:32:39,001:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:39 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4OmWUlyUpY15qdulgZBZPGoIIEiRJ6ewbawi2Mf0h4KGl75mkhM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-12 14:32:39,001:DEBUG:acme.client:Storing nonce: 4OmWUlyUpY15qdulgZBZPGoIIEiRJ6ewbawi2Mf0h4KGl75mkhM
2024-09-12 14:32:39,001:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-12 14:32:39,007:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVwWTE1cWR1bGdaQlpQR29JSUVpUko2ZXdiYXdpMk1mMGg0S0dsNzVta2hNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "EaPJ1UWZMmuPkvm0BgHIP0wQ5EbDiEncNv8R7-3jlIk_I-WtG8Za7SyermCE87k-gkmfEweCij_JGeJwY100H6b5WVKFrPm0tYxzy0cpqMECLWlLolSU3PARerCcNbu_4DmO-ulcgFARAZEskllZujFtwDlCbg84rlnJZwZqn2kq3pgT1mlNpUUzCMi69MUH8RJpugVhFPigDg-6p_NRolrqJCpOtltJ4isnmb3u2RLCf-Ky4UpvBqtQa13jBYa-_oBaFScAZ2i6zvicfO5fJN48bklaja8KQCAsHQQPtJ3T4ll-v80hLwtZoU-oHIaSm4cH7yuNdpuxudeEfnsw6g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-09-12 14:32:39,169:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-09-12 14:32:39,170:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 12 Sep 2024 12:32:40 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145056036
Replay-Nonce: fCBw7MtQ38INJ65qkv32FC3_r6Yh3As8TE7ETUBjl-MJ8EN4rBE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:55:58Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122966996"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145056036"
}
2024-09-12 14:32:39,170:DEBUG:acme.client:Storing nonce: fCBw7MtQ38INJ65qkv32FC3_r6Yh3As8TE7ETUBjl-MJ8EN4rBE
2024-09-12 14:32:39,171:DEBUG:acme.client:JWS payload:
b''
2024-09-12 14:32:39,176:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122966996:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFEzOElOSjY1cWt2MzJGQzNfcjZZaDNBczhURTdFVFVCamwtTUo4RU40ckJFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI5NjY5OTYifQ",
  "signature": "XNWf-BTzQjBbamyEooG_e8NXplN2njYYH6RXrQBK4qXZH_r5bP_K9bwqC2KQ06Z0jurnR3V13dnV4UfP8_SNaeB5a5r1tR4Fbngc7OZtYSDOGvVBHCr01CNK4z7UzCn4SMtbbdZVVJ2L8SCqARbxfnUr17uvhDM3sA1cSx0ci9ImXsxK_PuQu3yS61lMH8STV9gxg1hQCPfQ5aL45-pd4Ta3vzxNRj-M4-s90DfOGAznn07XAvolG8VCBmhGzGDHLFDUVegf_VIapPOpTjCmBLO7hvqg_Ur1CKXdOKGOkXI6rSfVkT0HrNIvNxFz9phqktEpAKv3Bbp-5R8DNKIdNA",
  "payload": ""
}
2024-09-12 14:32:39,340:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122966996 HTTP/1.1" 200 806
2024-09-12 14:32:39,342:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:40 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQZSWamvoGr5Xyh31erzSnSlB-S94JKrQ59hmqU2dgPao
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:55:58Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/9cCtaA",
      "status": "pending",
      "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/RuQu8g",
      "status": "pending",
      "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/lsTunA",
      "status": "pending",
      "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM"
    }
  ]
}
2024-09-12 14:32:39,342:DEBUG:acme.client:Storing nonce: fCBw7MtQZSWamvoGr5Xyh31erzSnSlB-S94JKrQ59hmqU2dgPao
2024-09-12 14:32:39,344:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-12 14:32:39,344:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-09-12 14:32:39,344:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-12 14:32:39,345:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-12 14:32:39,345:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:32:39,346:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-12 14:32:39,346:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-12 14:32:39,346:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-12 14:32:39,347:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:32:39,395:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-09-12 14:32:39,396:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:32:39,396:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-09-12 14:32:39,402:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-09-12 14:32:39,404:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-09-12 14:32:39,404:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-09-12 14:32:39,404:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-09-12 14:32:39,405:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-09-12 14:32:39,406:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-09-12 14:32:39,447:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-12 14:32:39,492:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:32:39,493:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2024-09-12 14:32:39,493:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2024-09-12 14:32:39,498:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:53 UTC.
2024-09-12 14:32:39,498:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:32:39,499:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:32:39,504:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03EC49D0>
Prep: True
2024-09-12 14:32:39,504:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03EC49D0> and installer None
2024-09-12 14:32:39,505:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-12 14:32:39,509:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-12 14:32:39,510:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-12 14:32:39,512:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-12 14:32:39,977:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-12 14:32:39,977:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:40 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "sZ2yuUOD57g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-09-12 14:32:39,978:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-12 14:32:45,714:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8466_key-certbot.pem
2024-09-12 14:32:50,953:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8464_csr-certbot.pem
2024-09-12 14:32:50,954:DEBUG:acme.client:Requesting fresh nonce
2024-09-12 14:32:50,954:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-12 14:32:51,109:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-12 14:32:51,114:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:51 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0Nvv4YStNTNKPqESwJ0s5d_8SIb0yqjxYTnLM1oka2LMtI-jbmo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-12 14:32:51,116:DEBUG:acme.client:Storing nonce: 0Nvv4YStNTNKPqESwJ0s5d_8SIb0yqjxYTnLM1oka2LMtI-jbmo
2024-09-12 14:32:51,119:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-12 14:32:51,126:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3ROVE5LUHFFU3dKMHM1ZF84U0liMHlxanhZVG5MTTFva2EyTE10SS1qYm1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "jeDVah7zPVlHGTKopAjw7nsZV9jGfwiAwpp1Nppzov1EVbbY2n3n8uxrgxNAdqsxDUA_vrNwjtpoIG6PJN9hdpoQhiK8cqZJq9o7G94zhfSaO3LUBLog_m8xTfhlxKPgZQ01tVcMH4ffdVRDNfmuNLdKVtjAoxjLAs5aOQ2-wzwC16uErhQc9MOIQMksd85vVQWI9JSmzeHayGmsmIHQDu4P-CO9THE54DOEv7YaEBdJ6GuQZrBkwKmj89W-9XVQ7-R48ekhJIwmhWbZ0njuLd4DejPDD-Gid1a2rXC3ClVrsTPCerakuUMeBBRkf-7kXF_KXvbzlDJxaM6cejvV2w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-09-12 14:32:51,307:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-09-12 14:32:51,308:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 12 Sep 2024 12:32:52 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145110166
Replay-Nonce: 0Nvv4YStXjy9AYbjj6vvtqM8jd6cNlzkaHklkJBK85JqZE-ekTc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:56:11Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123043486"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145110166"
}
2024-09-12 14:32:51,308:DEBUG:acme.client:Storing nonce: 0Nvv4YStXjy9AYbjj6vvtqM8jd6cNlzkaHklkJBK85JqZE-ekTc
2024-09-12 14:32:51,308:DEBUG:acme.client:JWS payload:
b''
2024-09-12 14:32:51,314:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123043486:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RYank5QVliamo2dnZ0cU04amQ2Y05semthSGtsa0pCSzg1SnFaRS1la1RjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMwNDM0ODYifQ",
  "signature": "u9rXGkoMcPI0gRLZFSmQwwbw1dUuBHOW0_xJK3TFxFGV5EnQ3dfLPIbnX_CpBvM1YnPuHGlDc5EI4Whyz5ZFGpc4xU2By6ftmcI8fAvy7KbUciWCEQhVvHyZvKBBtNnvEPgQcC-FnBloBJ6wpw1017E-j7xeZmuDVTXBou1UxH100JBS1b9MvHr0BijUOTNqJVfc0iRuAiMt_rdIoxL88h8n7xp3BYXlryXZy8jsp4FY7FlSyl3opG5sC4uvzTc2OdAaXYjTJVaELbaAUVmaD8uliHulS0oRRKEyFK2abuQ_isDbrRCGg_EVGykxu3r2H4HlDOkHUmyE888oeOd7Fg",
  "payload": ""
}
2024-09-12 14:32:51,472:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123043486 HTTP/1.1" 200 811
2024-09-12 14:32:51,473:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:52 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwpWv_pl2bVf9dziEaGn687ecslHxlcthP3UWQnBA5QC4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:56:11Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/oHWByA",
      "status": "pending",
      "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/6UDG0g",
      "status": "pending",
      "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/5SnKCA",
      "status": "pending",
      "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk"
    }
  ]
}
2024-09-12 14:32:51,473:DEBUG:acme.client:Storing nonce: UAMvsxnwpWv_pl2bVf9dziEaGn687ecslHxlcthP3UWQnBA5QC4
2024-09-12 14:32:51,473:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-12 14:32:51,474:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-09-12 14:32:51,474:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-12 14:32:51,475:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-12 14:32:51,475:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:32:51,476:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-12 14:32:51,476:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-12 14:32:51,476:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-12 14:32:51,477:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:32:51,517:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-09-12 14:32:51,639:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:32:51,640:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2024-09-12 14:32:51,641:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2024-09-12 14:32:51,645:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:20 UTC.
2024-09-12 14:32:51,646:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:32:51,646:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:32:51,651:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04765DF0>
Prep: True
2024-09-12 14:32:51,651:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04765DF0> and installer None
2024-09-12 14:32:51,651:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-12 14:32:51,656:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-12 14:32:51,657:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-12 14:32:51,659:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-12 14:32:52,099:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-12 14:32:52,100:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:32:52 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "wG7wn038XAE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-09-12 14:32:52,100:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-12 14:32:57,561:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8467_key-certbot.pem
2024-09-12 14:33:02,838:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8465_csr-certbot.pem
2024-09-12 14:33:02,838:DEBUG:acme.client:Requesting fresh nonce
2024-09-12 14:33:02,839:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-12 14:33:02,986:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-12 14:33:02,987:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:33:03 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4OmWUlyUNITm0Hx4WwnxB14TyLulrRlE8_eZD4SEkQFtK1LdbXc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-12 14:33:02,987:DEBUG:acme.client:Storing nonce: 4OmWUlyUNITm0Hx4WwnxB14TyLulrRlE8_eZD4SEkQFtK1LdbXc
2024-09-12 14:33:02,987:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-12 14:33:02,994:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVOSVRtMEh4NFd3bnhCMTRUeUx1bHJSbEU4X2VaRDRTRWtRRnRLMUxkYlhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "cIbdhJ5i4e502Ugy8Qi2Jhsnd-869g6hfseCdsTS3OqyZE5sxkQrlNYIJ8uXmHf5skN-sikfKckNwiLEqTvgFjc1BIAvt_D_d7kGqORZ8YSmqut0M_uiGL5vZ7qpr3XWghxKj-PxoHHLdnhvRjP0NyjjHe_7bQdQyUiSu6Fb_Oo75itfdULdOx27d3a9HQusw3j8E4lhlS1Dp9VM_frpRabAyF_1vSUnuLnih8S6O19EbBOxXyrsO_cWlLJhU_varLxunGiT8neCEKEReZqyK2oL6bWAd-Ih-g5jbUwtfPcUg0Q5iz2QtVM-y9Of6mkSB4JwXWlG_fWLmAttefazmg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-09-12 14:33:03,182:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-09-12 14:33:03,183:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 12 Sep 2024 12:33:04 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145156016
Replay-Nonce: 4OmWUlyU5zgfyUix_lZxKx3u1AdDeMd-Sky_GAJ5VVCw-puh9WU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:56:24Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123114366"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145156016"
}
2024-09-12 14:33:03,183:DEBUG:acme.client:Storing nonce: 4OmWUlyU5zgfyUix_lZxKx3u1AdDeMd-Sky_GAJ5VVCw-puh9WU
2024-09-12 14:33:03,183:DEBUG:acme.client:JWS payload:
b''
2024-09-12 14:33:03,189:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123114366:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVU1emdmeVVpeF9sWnhLeDN1MUFkRGVNZC1Ta3lfR0FKNVZWQ3ctcHVoOVdVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMxMTQzNjYifQ",
  "signature": "fqIXzJn05k437yRxMcZGXegMG1vSEjL0WKSQeylr0iRBuqPe8OrcKO-jXzjt-Bp1e6BkUmYou8BKPoo6_t_C7ASTqeJ8gUr8yVwHmhr7OLhWqh_8YPfGLa51rJYRRmb7rR2lxsrWTTpZFIjmSFJjk8ereGwxxXkpuQ9ZZPdYtrU5fioD_Ei6L-W_qoqsWBMzmMtbF1GTZMinsKUqth8EEzzoYFiG6BprqVFXLuaSDLY8GlsKsRVz2plRZ-snz3cfnXgWNFEGZChe5gjbL3jiRNWoabrU8NZHUKpiZLy-rNhnZLdOuWqaAKiXxyU_JSmmqDqHJwfHCQM0pMqow3GL6Q",
  "payload": ""
}
2024-09-12 14:33:03,361:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123114366 HTTP/1.1" 200 810
2024-09-12 14:33:03,361:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:33:04 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQo0FgQRzEuzt1Wb_THGsMY_4XI44er12qkftgsLatFvA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:56:24Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/hpZofw",
      "status": "pending",
      "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/0k48SQ",
      "status": "pending",
      "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/K6FLfA",
      "status": "pending",
      "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A"
    }
  ]
}
2024-09-12 14:33:03,361:DEBUG:acme.client:Storing nonce: fCBw7MtQo0FgQRzEuzt1Wb_THGsMY_4XI44er12qkftgsLatFvA
2024-09-12 14:33:03,362:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-12 14:33:03,362:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-09-12 14:33:03,363:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-12 14:33:03,363:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-12 14:33:03,364:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:33:03,364:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-12 14:33:03,364:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-12 14:33:03,365:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-12 14:33:03,366:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:33:03,412:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-12 14:33:03,608:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:33:03,609:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-09-12 14:33:03,610:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-09-12 14:33:03,614:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:39 UTC.
2024-09-12 14:33:03,614:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:33:03,615:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:33:03,620:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0445A3B0>
Prep: True
2024-09-12 14:33:03,620:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0445A3B0> and installer None
2024-09-12 14:33:03,620:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-12 14:33:03,625:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-12 14:33:03,625:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-12 14:33:03,627:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-12 14:33:04,074:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-12 14:33:04,075:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:33:04 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "TDk9CFkGdno": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-12 14:33:04,075:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-12 14:33:09,530:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8468_key-certbot.pem
2024-09-12 14:33:14,780:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8466_csr-certbot.pem
2024-09-12 14:33:14,781:DEBUG:acme.client:Requesting fresh nonce
2024-09-12 14:33:14,781:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-12 14:33:14,927:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-12 14:33:14,928:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:33:15 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQP59khS_xsQOzrj3BQkjjee-RcaT0xxDuf8FfN0zw7nE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-12 14:33:14,928:DEBUG:acme.client:Storing nonce: fCBw7MtQP59khS_xsQOzrj3BQkjjee-RcaT0xxDuf8FfN0zw7nE
2024-09-12 14:33:14,929:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-12 14:33:14,935:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFQNTlraFNfeHNRT3pyajNCUWtqamVlLVJjYVQweHhEdWY4RmZOMHp3N25FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "q11Kf4ABZvoRSUJMHARmCa-4lAzdsuoC7flXMdesypdJqoesqjB9oabx3PnhIhfmtSavVJkSAWKMkPNl7RGHHb1BjFmQH340eKoUg-J2X11oYCQkRR2ypMA4SOEjeuJAtjkqHAKFqVBZRJvzN77tGJQZ3AxAUJ3NZD7KUJQROZBXO0h6b5n_VpSSJb6f7G35gRlibj7JVWzpQd6B0X6DrnKS9mPnJ6GYJBYm9OBBNa288GAM54rs1onEAPbgTLDa_xmmzvxOZIsiRZ-1wAzJlI6BjFa9_qv0Q5ROfdxWuu4Lyf5QeeJY5zkXuWEkyBO1bk4CatGIYB5UFUyRBjbFjQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-09-12 14:33:15,161:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-09-12 14:33:15,162:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 12 Sep 2024 12:33:16 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145193816
Replay-Nonce: fCBw7MtQJUXylHvQhOOC5F9nZMSmuQQPA7PuWsb9YUXdjdRZolw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:56:37Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123173286"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145193816"
}
2024-09-12 14:33:15,162:DEBUG:acme.client:Storing nonce: fCBw7MtQJUXylHvQhOOC5F9nZMSmuQQPA7PuWsb9YUXdjdRZolw
2024-09-12 14:33:15,162:DEBUG:acme.client:JWS payload:
b''
2024-09-12 14:33:15,168:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123173286:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFKVVh5bEh2UWhPT0M1RjluWk1TbXVRUVBBN1B1V3NiOVlVWGRqZFJab2x3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMxNzMyODYifQ",
  "signature": "ySZEf2SNNsIXb0PS1fmHhJRZXVZ27dGbIexvO_ZONCeVotHKYQ8tUa6JqxBUm0QTfGLS1rWDwQQ9zdeM8lGDFm4VHZVh-iHf1iLjT5_15g3a6VgbbgrPlAGcUYpsKueroDokTvpS4xXMcskY9HYIY3p3FC67abyOAeXvADFrHjhpr95ZPBkK88sLqfVLXhMf1Hk_j7AweAfhIUUyVnNd42E5bJChGAWTqwEXgzcgqtTxRtmM_RlU1Uu7yVLASQ9dFAYBrgXni9qtpKG6789nTfkqcO4qFW8w2m9lVUmP7N2l7UJAwAgKEkTNU9fMLgFJV4BedwY7sGapHOiqcH6eOw",
  "payload": ""
}
2024-09-12 14:33:15,334:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123173286 HTTP/1.1" 200 809
2024-09-12 14:33:15,335:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:33:16 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQwCQCWOsxXYCB7mAd29xydxqqhKI4jTcI99357TkVo-E
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:56:37Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/S6yiLg",
      "status": "pending",
      "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/QeJIqg",
      "status": "pending",
      "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/xZ9qpw",
      "status": "pending",
      "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4"
    }
  ]
}
2024-09-12 14:33:15,335:DEBUG:acme.client:Storing nonce: fCBw7MtQwCQCWOsxXYCB7mAd29xydxqqhKI4jTcI99357TkVo-E
2024-09-12 14:33:15,335:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-12 14:33:15,336:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-09-12 14:33:15,336:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-12 14:33:15,336:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-12 14:33:15,337:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:33:15,337:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-12 14:33:15,337:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-12 14:33:15,338:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-12 14:33:15,339:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:33:15,379:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-12 14:33:15,556:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:33:15,558:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-09-12 14:33:15,558:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-09-12 14:33:15,563:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:57 UTC.
2024-09-12 14:33:15,563:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:33:15,564:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:33:15,569:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0474F510>
Prep: True
2024-09-12 14:33:15,570:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0474F510> and installer None
2024-09-12 14:33:15,570:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-12 14:33:15,574:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-12 14:33:15,575:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-12 14:33:15,578:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-12 14:33:16,010:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-12 14:33:16,010:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:33:16 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "AlwaRzGj2Oo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-12 14:33:16,011:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-12 14:33:21,576:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8469_key-certbot.pem
2024-09-12 14:33:26,962:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8467_csr-certbot.pem
2024-09-12 14:33:26,962:DEBUG:acme.client:Requesting fresh nonce
2024-09-12 14:33:26,962:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-12 14:33:27,104:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-12 14:33:27,104:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:33:27 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4OmWUlyUlDLjpYWYVNv8bdqFvkWIPaKl8rbAtx0-JP5hBdQxEWk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-12 14:33:27,104:DEBUG:acme.client:Storing nonce: 4OmWUlyUlDLjpYWYVNv8bdqFvkWIPaKl8rbAtx0-JP5hBdQxEWk
2024-09-12 14:33:27,105:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-12 14:33:27,111:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVsRExqcFlXWVZOdjhiZHFGdmtXSVBhS2w4cmJBdHgwLUpQNWhCZFF4RVdrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Civzgri5-YZIhipJbLfnczhtmp5-YkqZE576sYAxnuF1BcwxplzSPJ5RvBtJXM7J91Iy2ONDIfrS0aq4a43GzKRzSl3X3hFcLKZZRH_8xJg6A4KLCFCvCXXNmr6tnuH5Gu7DEwsDD_RHuTOwpajFEcDLnPseAd5N80ViBBNSNuy5-0ziSWqEMUaz2yrk34HNdt_8MpyPdgKwu8PC6DVfAez3DzRqPcPNkZDV7RVIJGMmYUOSGBkMtOMQYEIsiR7mN7jkgphqAlbTxZJSIaOudC4pnjH2sJD3OQ358TMDy4lb0Bq9mup3lo778N2vUpd6d5mUDqxVKLuC11z_KSJGFQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-09-12 14:33:27,296:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-09-12 14:33:27,297:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 12 Sep 2024 12:33:28 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145229456
Replay-Nonce: fCBw7MtQm0z07H5FYppR3paXb50EMgZor8PU6kokRXKpXm2h1_I
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:56:49Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123229506"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145229456"
}
2024-09-12 14:33:27,297:DEBUG:acme.client:Storing nonce: fCBw7MtQm0z07H5FYppR3paXb50EMgZor8PU6kokRXKpXm2h1_I
2024-09-12 14:33:27,298:DEBUG:acme.client:JWS payload:
b''
2024-09-12 14:33:27,303:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123229506:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFtMHowN0g1RllwcFIzcGFYYjUwRU1nWm9yOFBVNmtva1JYS3BYbTJoMV9JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMyMjk1MDYifQ",
  "signature": "L7lDd2UPHB8rXskWKZBTstx0p-bIeuTZQJTLg_LTtmnG8zqYNB4IgWzdBBrtqbfNhAV01nr0QYkuenB5tHhjLp_rjNaxghp9CP9lGdyTCzYA1o_mWv_D_zDsmM3yyBig-sI4F9kB98U4b2dlKIEqQgcxtNGynBJar0kY7Z5Vy4belMEP8FTnt16ggh4VEd2GMESLZaka6o4zCOLrTB4xnOAv9tzL2aLkum1lvvt3gHwmB4pPDSNYfWN5wCZOAGUU5GnMP9MjHxjdlSi_66eiRQgK_3s7iOWcql8yJlvhFrrGBkR1lSAIhmXHUxpSsFglP9KuzDSwU7FU0BGSySNbsg",
  "payload": ""
}
2024-09-12 14:33:27,463:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123229506 HTTP/1.1" 200 805
2024-09-12 14:33:27,464:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:33:28 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4OmWUlyUXZ2bYj8cwq1-pN8fPTuR0TnVq_Pfug9UQBZVRf3j_Ds
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:56:49Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/gbt7DA",
      "status": "pending",
      "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/K5UDEQ",
      "status": "pending",
      "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/yzBBsQ",
      "status": "pending",
      "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA"
    }
  ]
}
2024-09-12 14:33:27,464:DEBUG:acme.client:Storing nonce: 4OmWUlyUXZ2bYj8cwq1-pN8fPTuR0TnVq_Pfug9UQBZVRf3j_Ds
2024-09-12 14:33:27,465:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-12 14:33:27,465:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-09-12 14:33:27,466:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-12 14:33:27,466:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-12 14:33:27,467:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:33:27,467:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-12 14:33:27,467:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-12 14:33:27,468:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-12 14:33:27,469:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:33:27,516:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-12 14:33:27,732:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:33:27,733:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2024-09-12 14:33:27,733:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2024-09-12 14:33:27,738:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:38:15 UTC.
2024-09-12 14:33:27,738:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:33:27,738:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:33:27,743:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x00890B30>
Prep: True
2024-09-12 14:33:27,743:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x00890B30> and installer None
2024-09-12 14:33:27,744:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-12 14:33:27,748:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-12 14:33:27,749:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-12 14:33:27,751:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-12 14:33:28,238:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-12 14:33:28,238:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:33:29 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "XO9lbLLEQ-M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-12 14:33:28,239:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-12 14:33:33,788:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8470_key-certbot.pem
2024-09-12 14:33:39,109:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8468_csr-certbot.pem
2024-09-12 14:33:39,110:DEBUG:acme.client:Requesting fresh nonce
2024-09-12 14:33:39,110:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-12 14:33:39,267:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-12 14:33:39,268:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:33:40 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0Nvv4YStVQdnuoVJXYsBKsBv3rmg4uxWAdmMehADRO6_59gYgxY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-12 14:33:39,268:DEBUG:acme.client:Storing nonce: 0Nvv4YStVQdnuoVJXYsBKsBv3rmg4uxWAdmMehADRO6_59gYgxY
2024-09-12 14:33:39,269:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-12 14:33:39,276:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RWUWRudW9WSlhZc0JLc0J2M3JtZzR1eFdBZG1NZWhBRFJPNl81OWdZZ3hZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "KZqtnftEghuS_XxpFPMhfsknaE0EPnb50rtUr1ATJzDU0aO25bO_5xV5JYSFoHUlULj0kw1MegrYffB2qM5ULfYyZM8Q2DZLrtepkm73nvkgXJjHRnllu5zUcolZetUZZFEONa5fAGglLLsjOe6Y30tGtmOjX6y5QZXZ2-DnqY3vZqCVG1qKvmQRgY4_eHdZyoTs3JoylbZ76qMMYFaLmWap64GlK3qEWcmh7ximrsJB7ATldudEtpOKF0eYpp_enrfJSpDq3kHRUHDlm-VzCjsrWSEd-jz_Z7buDisKkst2HiVxW23sjkZCdy2yEuOF5Mx2rKqxyYmbVZ6XjHUejQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-09-12 14:33:39,458:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-09-12 14:33:39,459:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 12 Sep 2024 12:33:40 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145265276
Replay-Nonce: 0Nvv4YStaBiyksw39oRdW3jkMdqh8mSWVgmYHH5Q_spJOQUCFdU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:57:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123286586"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145265276"
}
2024-09-12 14:33:39,459:DEBUG:acme.client:Storing nonce: 0Nvv4YStaBiyksw39oRdW3jkMdqh8mSWVgmYHH5Q_spJOQUCFdU
2024-09-12 14:33:39,459:DEBUG:acme.client:JWS payload:
b''
2024-09-12 14:33:39,465:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123286586:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RhQml5a3N3MzlvUmRXM2prTWRxaDhtU1dWZ21ZSEg1UV9zcEpPUVVDRmRVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMyODY1ODYifQ",
  "signature": "w6LITMhZT7EFMVmW2ckuWnzMGNSaqfvBCusiWBgh9IIStmYFZyEPwDM_oT1s1iRgZLHT7qmbBZyLUPGrMpdbPTA1kt0L2zolgJY26Uy4OFNyDLZUWakoQ3EmcBEau2H8r-jPeWQQKs5eZROUo7VV8wOSXVZR_FsnoiLFI23E3GPHXemYwHHzdAidBrN0qYvvJrAfGz9Iv2dK2pWcw_xqJiCfniI4T4wQZl7JNnG7kekaGYDT-KHLV7d1XIHbqZP9xBCPXbkjPxL-1ttAz3ELLZ3ar8-pnjjngYLIoIE1t1khCqiPoABX37JmlH3l2w8n7ls5bHzMnKlbBUPul2TQPQ",
  "payload": ""
}
2024-09-12 14:33:39,630:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123286586 HTTP/1.1" 200 805
2024-09-12 14:33:39,631:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:33:40 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwJYzNXqD2tHvroXztN-yzdBTGhPJO6lm1nyi_mfpplNQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:57:01Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/B20YQg",
      "status": "pending",
      "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/S9gNtg",
      "status": "pending",
      "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/dinKKw",
      "status": "pending",
      "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU"
    }
  ]
}
2024-09-12 14:33:39,631:DEBUG:acme.client:Storing nonce: UAMvsxnwJYzNXqD2tHvroXztN-yzdBTGhPJO6lm1nyi_mfpplNQ
2024-09-12 14:33:39,632:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-12 14:33:39,632:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-09-12 14:33:39,632:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-12 14:33:39,633:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-12 14:33:39,633:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:33:39,634:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-12 14:33:39,634:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-12 14:33:39,634:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-12 14:33:39,635:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:33:39,682:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-12 14:33:39,889:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-12 14:33:39,891:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-09-12 14:33:39,891:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-09-12 14:33:39,896:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:38:30 UTC.
2024-09-12 14:33:39,896:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-12 14:33:39,896:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-12 14:33:39,901:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x008906B0>
Prep: True
2024-09-12 14:33:39,902:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x008906B0> and installer None
2024-09-12 14:33:39,902:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-12 14:33:39,906:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-12 14:33:39,907:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-12 14:33:39,909:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-12 14:33:40,336:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-12 14:33:40,337:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:33:41 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Wu7jjxfWyV4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-12 14:33:40,337:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-12 14:33:45,890:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8471_key-certbot.pem
2024-09-12 14:33:51,321:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8469_csr-certbot.pem
2024-09-12 14:33:51,322:DEBUG:acme.client:Requesting fresh nonce
2024-09-12 14:33:51,322:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-12 14:33:51,464:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-12 14:33:51,465:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:33:52 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4OmWUlyUSxZCjPmKSXdCBeEMmxX2CBYUnsUt6wd5SyXOBX2v6DQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-12 14:33:51,465:DEBUG:acme.client:Storing nonce: 4OmWUlyUSxZCjPmKSXdCBeEMmxX2CBYUnsUt6wd5SyXOBX2v6DQ
2024-09-12 14:33:51,465:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-12 14:33:51,471:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVTeFpDalBtS1NYZENCZUVNbXhYMkNCWVVuc1V0NndkNVN5WE9CWDJ2NkRRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "YMjKk8saQbPDbxndJK90ik9MAnEaVkDraCQcxwEcjpz2lUcX06fC0w6WgEztA92Rz8DFJmem4jLM3K5OlDRKni3o2fGz2gDsGtfUX4_I7x__WwZEdfePY5E_T1CqAVn6JeNOYS40Kj5W6BBfWb8yVZ4ZZ8KQqPzwQIllwOU3UlYDvXhy5zN-5lOKXk6jOVlRRjTboEo-REMh0beyZBPaVl3AAG94HxxRdy0-37-7PMtIVVlXfg4aA7j2KkZLpN55lsaT1uQex3PNalx3g7-TiPeYLE1mVV0AxnPXuQgXfPDeV6TPZhOxzRAA6f2hlKHSAg26IM7XLRcI0u2FYiQGGg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-09-12 14:33:51,665:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-09-12 14:33:51,666:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 12 Sep 2024 12:33:52 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145319296
Replay-Nonce: fCBw7MtQgb_Nb719NX3yOdQo0GNKnDxT2ejVygK9XkC5AvIcxas
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:57:14Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123364606"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145319296"
}
2024-09-12 14:33:51,666:DEBUG:acme.client:Storing nonce: fCBw7MtQgb_Nb719NX3yOdQo0GNKnDxT2ejVygK9XkC5AvIcxas
2024-09-12 14:33:51,666:DEBUG:acme.client:JWS payload:
b''
2024-09-12 14:33:51,672:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123364606:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFnYl9OYjcxOU5YM3lPZFFvMEdOS25EeFQyZWpWeWdLOVhrQzVBdkljeGFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMzNjQ2MDYifQ",
  "signature": "fP-Qt0nUKpMiwjH6HXNJ-rtjuMpaRx21YIqaCW_giWOHFuERqBg9nhM4kmxH-34ezRJgYy3fOseleGfgtAkOYMw1CXQvsFnj8bHHy3bRIsRCCoxdp_CGEr4-yJG73hdkNdJVIovccGlTCiiTz8-KszV4jstXXX0uOU6JnguwAtnMBYq-KCUUqT5Y271ImJNRp-hU017jrvLoaeyVy1thw2QaJ4pgJHkOjNQWLpCNH9V-o2ROPhZx42lVwxg74wy7tRTDCkxYmio7_nE9nwFQJ8EPeVIlJpDr3Ye8IRU9MeMo9w-ZYxXxeFbl7DNYqXc67UzY_Iyvdsn2D-EhA10L_g",
  "payload": ""
}
2024-09-12 14:33:51,825:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123364606 HTTP/1.1" 200 805
2024-09-12 14:33:51,826:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 12 Sep 2024 12:33:52 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4OmWUlyUlXFbbJGqYHCKiDzYG2e2aFr5D2xnWNesa9wEaGr_6ew
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:57:14Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/LOiTWA",
      "status": "pending",
      "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/ndw7tA",
      "status": "pending",
      "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/DMnfUA",
      "status": "pending",
      "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw"
    }
  ]
}
2024-09-12 14:33:51,826:DEBUG:acme.client:Storing nonce: 4OmWUlyUlXFbbJGqYHCKiDzYG2e2aFr5D2xnWNesa9wEaGr_6ew
2024-09-12 14:33:51,827:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-12 14:33:51,827:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-09-12 14:33:51,828:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-12 14:33:51,828:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-12 14:33:51,829:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:33:51,829:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-12 14:33:51,829:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-12 14:33:51,829:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-12 14:33:51,830:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-12 14:33:51,831:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-09-12 14:33:51,831:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-09-12 14:33:51,831:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 15 renew failure(s), 0 parse failure(s)
2024-09-12 14:33:51,833:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)