2024-09-11 19:47:04,534:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-09-11 19:47:04,535:DEBUG:certbot._internal.main:Arguments: []
2024-09-11 19:47:04,535:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-09-11 19:47:05,298:DEBUG:certbot._internal.log:Root logging level set at 20
2024-09-11 19:47:05,298:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-09-11 19:47:05,337:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x047BF130> and installer <certbot._internal.cli.cli_utils._Default object at 0x047BF130>
2024-09-11 19:47:05,379:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-11 19:47:05,650:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:47:05,651:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert11.pem is signed by the certificate's issuer.
2024-09-11 19:47:05,655:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD
2024-09-11 19:47:05,664:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:13 UTC.
2024-09-11 19:47:05,664:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:47:05,664:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:47:05,669:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0423A1F0>
Prep: True
2024-09-11 19:47:05,670:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0423A1F0> and installer None
2024-09-11 19:47:05,670:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-11 19:47:05,675:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-11 19:47:05,676:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-11 19:47:05,679:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-11 19:47:06,128:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-11 19:47:06,129:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:47:06 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "CgfZu9PV1Ho": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-11 19:47:06,129:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-11 19:47:12,921:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8430_key-certbot.pem
2024-09-11 19:47:18,822:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8428_csr-certbot.pem
2024-09-11 19:47:18,822:DEBUG:acme.client:Requesting fresh nonce
2024-09-11 19:47:18,822:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-11 19:47:18,967:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-11 19:47:18,967:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:47:19 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4OmWUlyUP8qz69G0Angs6x1If8ywSDW2FpJ-vTLxTLUm9Q72ZMM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-11 19:47:18,968:DEBUG:acme.client:Storing nonce: 4OmWUlyUP8qz69G0Angs6x1If8ywSDW2FpJ-vTLxTLUm9Q72ZMM
2024-09-11 19:47:18,968:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-11 19:47:18,974:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVQOHF6NjlHMEFuZ3M2eDFJZjh5d1NEVzJGcEotdlRMeFRMVW05UTcyWk1NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "SbWeXz5ipoUbx06iqroPymZ-jGVURzIbTNcygJtlXm2hnKDYMp3gOCg143f6H3K6_m_cgvzSVUG_gWPQBM89gOFr4tBiLe9LIBIYO7LXqEqrMoWzUL5er5QB1u8hoCtBCPJg_hdgukH4NvbGGrXO1ykH1FC1xFyQ4yfZWpiwwCgwEj-MDJyaERBwhKK8B6w--d_GpwLLpFu169SI5oM5LYjGgRkYDUfx_FxutzKtj9x-19m21KOj5w2IVzjHzSVu6jqdvZ57Zj0Slg_Ucl0ONZuzWnXmn_1MRK9DlRvR_C1yhy1yONn_90apkGE5ImDmHastUtB1o2d57XY0p4Qevw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-09-11 19:47:19,263:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-09-11 19:47:19,264:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Sep 2024 17:47:19 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144772916
Replay-Nonce: 4OmWUlyUwiyEI-BPt-GrzH_3PaKqboeb6b7hy-pubpJ0iCTsgt8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:54:30Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122542336"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144772916"
}
2024-09-11 19:47:19,264:DEBUG:acme.client:Storing nonce: 4OmWUlyUwiyEI-BPt-GrzH_3PaKqboeb6b7hy-pubpJ0iCTsgt8
2024-09-11 19:47:19,264:DEBUG:acme.client:JWS payload:
b''
2024-09-11 19:47:19,270:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122542336:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVV3aXlFSS1CUHQtR3J6SF8zUGFLcWJvZWI2YjdoeS1wdWJwSjBpQ1RzZ3Q4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI1NDIzMzYifQ",
  "signature": "PNIfIpylB2X32A4Xf2sX4gL61tdLx8gG_tXEvJKNb9jEMbh6Nlr7LLGWp8aayUUY8oo7Cop3XoAr5yHmGHGeDz1KAja7hvNjdusFCcPsWbXf4bZBC8a6kZfmr3fAVchruqQnDNca2dsVbOmnX748lvYZtpPKlJ9RRdM3Wn1ZnEFaMQDxZEkGJnH7CMF-GWfIS1Q7-D1YS2xCAv5Y_SiSgDTkVC-yZVdFnjjrCNba6JJB-QjOZKzWrUJmIpokZ9NQozyP_91vV-8rC6DELs6pSWkoKuS53lGJn4OOM-csWLPDBHcW4XLsz_bawT3S07Dy-Ci07R2zBgfkuooxmUErKQ",
  "payload": ""
}
2024-09-11 19:47:19,558:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122542336 HTTP/1.1" 200 810
2024-09-11 19:47:19,558:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:47:20 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4OmWUlyUzw5AeWqIZBEwDaDDhxrs1d7mqJmTGFbW6fwlcPskjnI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:54:30Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/yxREqg",
      "status": "pending",
      "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/LP3L_w",
      "status": "pending",
      "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/cyyAdg",
      "status": "pending",
      "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k"
    }
  ]
}
2024-09-11 19:47:19,558:DEBUG:acme.client:Storing nonce: 4OmWUlyUzw5AeWqIZBEwDaDDhxrs1d7mqJmTGFbW6fwlcPskjnI
2024-09-11 19:47:19,559:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-11 19:47:19,559:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-09-11 19:47:19,582:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-11 19:47:19,582:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-11 19:47:19,586:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:47:19,586:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-11 19:47:19,586:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-11 19:47:19,586:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-11 19:47:19,591:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:47:19,632:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-11 19:47:19,825:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:47:19,826:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2024-09-11 19:47:19,827:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2024-09-11 19:47:19,832:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:31 UTC.
2024-09-11 19:47:19,833:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:47:19,833:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:47:19,838:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0417A430>
Prep: True
2024-09-11 19:47:19,838:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0417A430> and installer None
2024-09-11 19:47:19,838:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-11 19:47:19,853:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-11 19:47:19,854:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-11 19:47:19,856:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-11 19:47:20,288:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-11 19:47:20,289:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:47:20 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "dsvnYBESWU4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-11 19:47:20,289:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-11 19:47:26,204:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8431_key-certbot.pem
2024-09-11 19:47:31,652:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8429_csr-certbot.pem
2024-09-11 19:47:31,653:DEBUG:acme.client:Requesting fresh nonce
2024-09-11 19:47:31,653:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-11 19:47:31,797:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-11 19:47:31,798:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:47:32 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQERzRLcAHJnkcCxU8cmvxDB8sGKAMp2rR-YVO0-sRmh8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-11 19:47:31,798:DEBUG:acme.client:Storing nonce: fCBw7MtQERzRLcAHJnkcCxU8cmvxDB8sGKAMp2rR-YVO0-sRmh8
2024-09-11 19:47:31,798:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-11 19:47:31,804:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFFUnpSTGNBSEpua2NDeFU4Y212eERCOHNHS0FNcDJyUi1ZVk8wLXNSbWg4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "s7oaUX1O9BwoQUHmkTQZcfvjGQl38PNtPQel30aPIXhkaJHmmi624sYVK9UEYD6dMqgkuw7nF4PMmI38jtGXDWT9XJabd1vboq1Wvnc1FIVxGnXuJJmmOXvg9gzEuRL1wplqi9fI3TthoVif5M5vnKrzBdTy5UPAiIkeFWwyasQjyIyH8WxaQpoF2x9DsZlRslJPbZBRqSnaBQ8OYCHTh0JqmjVRtuc4q1S9KYdxB3SImwSg25KSG1ogRBJKU-iMphKcm1p10R0kM5Zv400kBKh0F3gOHddx4IXQXGo5rO6m4OFB6JxqK8vQCQ1Isar28MyJWnBIUT4bys_ZKgaAuw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-09-11 19:47:32,103:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-09-11 19:47:32,104:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Sep 2024 17:47:32 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144813576
Replay-Nonce: 4OmWUlyUfwcobvt8I_zlI2RVJMFer5iBpjVftPSojcrptBWsAqY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:54:43Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122604166"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144813576"
}
2024-09-11 19:47:32,104:DEBUG:acme.client:Storing nonce: 4OmWUlyUfwcobvt8I_zlI2RVJMFer5iBpjVftPSojcrptBWsAqY
2024-09-11 19:47:32,104:DEBUG:acme.client:JWS payload:
b''
2024-09-11 19:47:32,110:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122604166:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVmd2NvYnZ0OElfemxJMlJWSk1GZXI1aUJwalZmdFBTb2pjcnB0QldzQXFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI2MDQxNjYifQ",
  "signature": "RMeJdv5KCIpxWUXQLZca-tp39WNPJ2wG9FCHc_kN8HeinM98Tmwlk3bIkKGdzzdDA7MzciXpLxlqmDUTIeqQ5phSmNlhKuGDygCJHkgg1CSpmsNudB8kUS9S66QTpanm-df3wWCMK-iGMFHFg3j8OWtHLlCQQ2tkCFKzOXr6YqtNzJRfjdw4YwtnsiMwY8gST6_MPaiUv4jbXumSf2LevK4Fs1WK2qfuENSM_Wt2G-AJfFeq1Ib_cp8VV8X5aIq4akbzposaQA866-ehlvJHPn2LaK1x1uZlhJYLUsUQg52x01ywT-P0kFY-dDQA4JriVOKMXGVmePmHQ-RMsDT5bg",
  "payload": ""
}
2024-09-11 19:47:32,292:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122604166 HTTP/1.1" 200 804
2024-09-11 19:47:32,293:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:47:32 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQ-MB3x9yJU8srTK6g7oo5uGgy6mWLX4iXt0JXnGDRfLU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:54:43Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/ZP8ZRQ",
      "status": "pending",
      "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/osHCwQ",
      "status": "pending",
      "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/uKF3Wg",
      "status": "pending",
      "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo"
    }
  ]
}
2024-09-11 19:47:32,293:DEBUG:acme.client:Storing nonce: fCBw7MtQ-MB3x9yJU8srTK6g7oo5uGgy6mWLX4iXt0JXnGDRfLU
2024-09-11 19:47:32,294:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-11 19:47:32,295:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-09-11 19:47:32,295:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-11 19:47:32,295:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-11 19:47:32,296:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:47:32,296:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-11 19:47:32,296:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-11 19:47:32,297:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-11 19:47:32,298:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:47:32,339:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-11 19:47:32,570:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:47:32,572:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-09-11 19:47:32,572:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-09-11 19:47:32,577:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:49 UTC.
2024-09-11 19:47:32,577:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:47:32,578:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:47:32,583:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0468FC90>
Prep: True
2024-09-11 19:47:32,583:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0468FC90> and installer None
2024-09-11 19:47:32,583:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-11 19:47:32,588:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-11 19:47:32,589:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-11 19:47:32,591:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-11 19:47:33,070:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-11 19:47:33,070:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:47:33 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "hm_3RMXkpcA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-11 19:47:33,071:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-11 19:47:38,819:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8432_key-certbot.pem
2024-09-11 19:47:44,301:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8430_csr-certbot.pem
2024-09-11 19:47:44,302:DEBUG:acme.client:Requesting fresh nonce
2024-09-11 19:47:44,302:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-11 19:47:44,462:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-11 19:47:44,462:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:47:45 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwme0V2U1vU_pHhyUlshzIjHq_aZqNjH8alHrazq2PRVU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-11 19:47:44,463:DEBUG:acme.client:Storing nonce: UAMvsxnwme0V2U1vU_pHhyUlshzIjHq_aZqNjH8alHrazq2PRVU
2024-09-11 19:47:44,463:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-11 19:47:44,469:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndtZTBWMlUxdlVfcEhoeVVsc2h6SWpIcV9hWnFOakg4YWxIcmF6cTJQUlZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "CYq13_UkJXcarq59o0Ju1C6yHO9AmRLe6SV9NYkU3_9YtT5aOlw8DyfuyHrc1dDutMKKd45ab48u60oGu6-hO7t10G2vyMGd9Ec1JaaQjzax4Zj0pV3_EWj77_C-AS5Fmz-KmnfxnFK9ksUEyQcxUmPAudb7v-HGEhxXfdDmKwIzuJzROaOR-YvrOwQjOP7squSCnRpC_ORwpW__7nZg460Fb6KyM4XS-k64ZPJ9BOgGfOfVTF5YXU6U4fWburlqKvMCHfFeq4y8hyeNtPBh5kUTpSr1H6NrFsLM2roEiqoQFX_pL5b7ZXj2IMYydVbH62HUxWZHPteo5vpiEKFXkw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-09-11 19:47:44,655:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-09-11 19:47:44,656:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Sep 2024 17:47:45 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144849776
Replay-Nonce: 0Nvv4YStuhEffQudMluHMO44apJx6w1NYVHc33z9jlRL3N3jB9A
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:54:56Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122659596"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144849776"
}
2024-09-11 19:47:44,656:DEBUG:acme.client:Storing nonce: 0Nvv4YStuhEffQudMluHMO44apJx6w1NYVHc33z9jlRL3N3jB9A
2024-09-11 19:47:44,656:DEBUG:acme.client:JWS payload:
b''
2024-09-11 19:47:44,662:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122659596:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3R1aEVmZlF1ZE1sdUhNTzQ0YXBKeDZ3MU5ZVkhjMzN6OWpsUkwzTjNqQjlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI2NTk1OTYifQ",
  "signature": "oHOdc2OnHEVk6-jxSk7DXqXyIj5-6Rq3ZP7qQo_H6ZlLtvGDiiDpI2FYUF5IOYXWKrurdJWgV3FsVg4t-8BtYfZhehP6SKT3bWHx9Sdolq-FGiSHQ6NR6n8MFjy79cneSPNuvNV8NdKXRyYF8h0wyEfxRbT9NRmwLO_owL2_h5auznNjtpqPKO4ntPxDlUG7erThQJWVLDnwqStadLDLwqYL__Ke1bd-QfMnBR1RO5zoWgkPDIVwymQMvwYCJFaIjQ5oEgrDVBWpRYZp-Se9OaE0EOAf0BumJn1buR3g2EfMTUNFX8B6YVbJlwIMfRqmn6cj9BWelNsGeh0SMKyBsg",
  "payload": ""
}
2024-09-11 19:47:44,828:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122659596 HTTP/1.1" 200 807
2024-09-11 19:47:44,829:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:47:45 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0Nvv4YStw0im4H8LK0n8siQhmNINytrDLdr998OV0SajMtOb7aY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:54:56Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/2L4MUQ",
      "status": "pending",
      "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/osx5jQ",
      "status": "pending",
      "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/mCb-BA",
      "status": "pending",
      "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM"
    }
  ]
}
2024-09-11 19:47:44,829:DEBUG:acme.client:Storing nonce: 0Nvv4YStw0im4H8LK0n8siQhmNINytrDLdr998OV0SajMtOb7aY
2024-09-11 19:47:44,830:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-11 19:47:44,830:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-09-11 19:47:44,830:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-11 19:47:44,830:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-11 19:47:44,831:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:47:44,831:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-11 19:47:44,831:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-11 19:47:44,832:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-11 19:47:44,833:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:47:44,882:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-09-11 19:47:45,160:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:47:45,161:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert1.pem is signed by the certificate's issuer.
2024-09-11 19:47:45,162:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD
2024-09-11 19:47:45,166:INFO:certbot._internal.renewal:Cert not yet due for renewal
2024-09-11 19:47:45,168:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:47:45,220:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-09-11 19:47:45,493:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:47:45,494:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2024-09-11 19:47:45,495:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2024-09-11 19:47:45,501:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:07 UTC.
2024-09-11 19:47:45,501:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:47:45,501:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:47:45,506:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04242590>
Prep: True
2024-09-11 19:47:45,507:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04242590> and installer None
2024-09-11 19:47:45,507:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-11 19:47:45,516:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-11 19:47:45,517:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-11 19:47:45,519:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-11 19:47:46,002:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-11 19:47:46,003:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:47:46 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "wXEdtGkt110": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-09-11 19:47:46,004:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-11 19:47:52,047:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8433_key-certbot.pem
2024-09-11 19:47:57,483:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8431_csr-certbot.pem
2024-09-11 19:47:57,484:DEBUG:acme.client:Requesting fresh nonce
2024-09-11 19:47:57,484:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-11 19:47:57,644:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-11 19:47:57,644:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:47:58 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwSJrc5yzA-7PAlHs4EeINbF7XCv2F6c0yZxYkUhrzMGU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-11 19:47:57,645:DEBUG:acme.client:Storing nonce: UAMvsxnwSJrc5yzA-7PAlHs4EeINbF7XCv2F6c0yZxYkUhrzMGU
2024-09-11 19:47:57,645:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-09-11 19:47:57,651:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndTSnJjNXl6QS03UEFsSHM0RWVJTmJGN1hDdjJGNmMweVp4WWtVaHJ6TUdVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "SxTwtKpP6zeBiR73u6t0MGDEbSqCBtqjEsg0YeuTJesd56CqsX73TOkQqGrns3x9JVUysDLqf6a9u_6DNGnjrWeJa7CfWB1Kiitu6cWDSXIWCMZGWDAIcSmE01YjOF7CQ4Rd2s8s1ojRJI7vxkm2IGYWjs4-E9BrQbZHsJVwwm-ikXvRPGqh7DCTdBS_9c7jFo5cTCUskl3LXe34-eVNBzxw-r3fWPZmhBFCFEUICSrUaRcZHyK4MR4kqnyLNCi8odZGN6V_t9IPWbCe87aKQHRmq2M_0CwPA5rdkAbRW3bTX906QyUqeMegmfGF8xThE1NXiOxaJfcslfojDRV1wg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-09-11 19:47:57,837:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-09-11 19:47:57,837:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Sep 2024 17:47:58 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144900966
Replay-Nonce: 0Nvv4YStBbUCPgP3QG9HXJ4OrLM_7OZv-UlkkiWY5nM9_EpUeLI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:55:08Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122729086"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144900966"
}
2024-09-11 19:47:57,837:DEBUG:acme.client:Storing nonce: 0Nvv4YStBbUCPgP3QG9HXJ4OrLM_7OZv-UlkkiWY5nM9_EpUeLI
2024-09-11 19:47:57,838:DEBUG:acme.client:JWS payload:
b''
2024-09-11 19:47:57,844:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122729086:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RCYlVDUGdQM1FHOUhYSjRPckxNXzdPWnYtVWxra2lXWTVuTTlfRXBVZUxJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI3MjkwODYifQ",
  "signature": "jTEqbREzK_0Qpdkmp40u8bF_wrExuT27rYmhpmPEMtGkYyggyyfDUXlOnCq6ml0ZZbpy51RL0wgtEG0CGuCGxajKXvf1xARF3wUG56dXjosnHlmhMCiLtzdSDf-VdAgQUjXZAA9idBPxXF5FCHzNlHt4Aiqq9HXjq_RnfuZ5P3PLWsOsgzaedi6CYgoswSOuPkBMi4WwoWCHr3zSIyw_QaWoK0cXcAwVankHQ3rUUQhESpQc3v-smajeUG7_LeqpcstnIMSy_ykmk7WZTCAfpByPJwp_2_-omIyhLsqsaUFpi8hvM1PV9WztvXm360Io16bh4Gp3LHSEglKJfqDu6A",
  "payload": ""
}
2024-09-11 19:47:58,006:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122729086 HTTP/1.1" 200 801
2024-09-11 19:47:58,007:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:47:58 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwgLeB5X0n0TiLoW9pTLvV-EnyzRVU-YXbRjTZk01_qdU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:55:08Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/ShHY7A",
      "status": "pending",
      "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/ch6DzQ",
      "status": "pending",
      "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/e_W2mQ",
      "status": "pending",
      "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c"
    }
  ]
}
2024-09-11 19:47:58,007:DEBUG:acme.client:Storing nonce: UAMvsxnwgLeB5X0n0TiLoW9pTLvV-EnyzRVU-YXbRjTZk01_qdU
2024-09-11 19:47:58,007:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-11 19:47:58,008:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-09-11 19:47:58,008:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-11 19:47:58,009:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-11 19:47:58,009:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:47:58,009:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-11 19:47:58,010:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-11 19:47:58,010:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-11 19:47:58,011:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:47:58,061:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-11 19:47:58,282:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:47:58,284:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2024-09-11 19:47:58,284:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2024-09-11 19:47:58,289:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:25 UTC.
2024-09-11 19:47:58,289:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:47:58,290:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:47:58,295:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04AB6E50>
Prep: True
2024-09-11 19:47:58,295:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04AB6E50> and installer None
2024-09-11 19:47:58,295:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-11 19:47:58,310:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-11 19:47:58,311:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-11 19:47:58,313:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-11 19:47:58,779:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-11 19:47:58,780:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:47:59 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "pIN24dAVMRM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-11 19:47:58,780:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-11 19:48:04,227:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8434_key-certbot.pem
2024-09-11 19:48:09,597:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8432_csr-certbot.pem
2024-09-11 19:48:09,597:DEBUG:acme.client:Requesting fresh nonce
2024-09-11 19:48:09,598:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-11 19:48:09,752:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-11 19:48:09,753:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:48:10 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwDHtedljy-woVRTnvtXCcq8-Ccg4IqLC5kwIyXVe5_n8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-11 19:48:09,753:DEBUG:acme.client:Storing nonce: UAMvsxnwDHtedljy-woVRTnvtXCcq8-Ccg4IqLC5kwIyXVe5_n8
2024-09-11 19:48:09,754:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-11 19:48:09,759:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndESHRlZGxqeS13b1ZSVG52dFhDY3E4LUNjZzRJcUxDNWt3SXlYVmU1X244IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "QG9nLtj-p51zTUE57S1KaHPbbn9q6_hXWq19e_nQHNSweDSbucT4jfyh3X8XH3aIxwYSPjdcOh485-zlfEGWvJpD39-Q8Q-UWStylzdYGGIkCieVa41Ijf3rST9VG62wXWdEOpK8xbay02OAv6zR4q4Tt2Ft3DELcg9HOAPRumpuUbKvHB2J9QzqcezUl9ccAtlkYVeQiI6u29ROizeEKesvN-tKv2OZkq1iiPXQQmPkMiQrceZ0hilDAJU0mq5a-o7x1fyIF-APhqBZ_Y1qaqbdsuTIdpMDydRs5Cc8EAZ5FjsuspeOHYyOT4l9Bh02zhs0qnqiqcE5zBFysMc-Tw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-09-11 19:48:09,948:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-09-11 19:48:09,949:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Sep 2024 17:48:10 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144940076
Replay-Nonce: UAMvsxnwhTnm_AmAmMgA2caCSKPtUVnWMStPlhb9IogJoCT__uE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:55:20Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122790136"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144940076"
}
2024-09-11 19:48:09,949:DEBUG:acme.client:Storing nonce: UAMvsxnwhTnm_AmAmMgA2caCSKPtUVnWMStPlhb9IogJoCT__uE
2024-09-11 19:48:09,949:DEBUG:acme.client:JWS payload:
b''
2024-09-11 19:48:09,955:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122790136:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndoVG5tX0FtQW1NZ0EyY2FDU0tQdFVWbldNU3RQbGhiOUlvZ0pvQ1RfX3VFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI3OTAxMzYifQ",
  "signature": "CNeG74ua0Xsw3FHqOsCntUKCcsZVQ3krLMUq4qoct9AehebMODVLmUwLpHvV2Kr_RfFG1Na8CpgQ0bFpMIx1DNZOTufrpCw3CtPM9qAAobDElJkjFkyO7vVJTXGhTfegTk_zOcSy0m_jJSOeuykX0X4GSWdU0Rf1-oKBsN4Fj62onS6PdGOF_JCgmyJ1XaTNZbbCPNh2Qba__Per0GlSvuvGj6tm0OEBYTFsatyn_1jnaFbfnNjRwdaROOEL7FLAUPUpBSE3zHXTeUvBXu3jjb0QrTNGF-v94ppeIqMPqjUFo-Gx6TkhYbyxfIhzA8fGptoPKd0X-YSCF2byfOlN1Q",
  "payload": ""
}
2024-09-11 19:48:10,124:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122790136 HTTP/1.1" 200 805
2024-09-11 19:48:10,125:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:48:10 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwKfLndPwwgsJVSLlj0v695nMf1nYNvQ3V_x3nwf-nfEo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:55:20Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/HbiFxg",
      "status": "pending",
      "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/fCm5hA",
      "status": "pending",
      "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/X2nDCw",
      "status": "pending",
      "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4"
    }
  ]
}
2024-09-11 19:48:10,125:DEBUG:acme.client:Storing nonce: UAMvsxnwKfLndPwwgsJVSLlj0v695nMf1nYNvQ3V_x3nwf-nfEo
2024-09-11 19:48:10,125:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-11 19:48:10,126:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-09-11 19:48:10,126:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-11 19:48:10,127:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-11 19:48:10,127:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:48:10,128:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-11 19:48:10,128:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-11 19:48:10,128:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-11 19:48:10,129:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:48:10,178:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-09-11 19:48:10,383:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:48:10,384:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-09-11 19:48:10,385:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-09-11 19:48:10,389:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:43 UTC.
2024-09-11 19:48:10,389:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:48:10,390:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:48:10,395:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x042335F0>
Prep: True
2024-09-11 19:48:10,395:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x042335F0> and installer None
2024-09-11 19:48:10,395:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-11 19:48:10,400:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-11 19:48:10,401:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-11 19:48:10,403:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-11 19:48:10,846:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-11 19:48:10,847:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:48:11 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "MGTrXXBehEY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-11 19:48:10,847:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-11 19:48:16,488:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8435_key-certbot.pem
2024-09-11 19:48:21,838:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8433_csr-certbot.pem
2024-09-11 19:48:21,838:DEBUG:acme.client:Requesting fresh nonce
2024-09-11 19:48:21,839:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-11 19:48:21,985:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-11 19:48:21,985:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:48:22 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQo58uJxaC-Q8-8lrl9O17Jf04TeSK0QgSzbvl7FHkHms
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-11 19:48:21,986:DEBUG:acme.client:Storing nonce: fCBw7MtQo58uJxaC-Q8-8lrl9O17Jf04TeSK0QgSzbvl7FHkHms
2024-09-11 19:48:21,986:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-11 19:48:21,992:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFvNTh1SnhhQy1ROC04bHJsOU8xN0pmMDRUZVNLMFFnU3pidmw3RkhrSG1zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ub1pPpi-_i_Ql4CljAlXqeK3C7zbJMXF3hQOd_bBUpdKLddcXt4iRyhDUIGiwkBjcZnihfAZw8KCI1LkMhtXjWoN6uPb6vnjxNWcyS4bJfmi15NT8Dw8R-UNk6NeOFK3hCTk-nNK13XH8C8BWriTyj8toci6tWoqjhDJ4IXQnh2EnrkeykPaS9t3NVqsHiiAFHWNuir5I2ZmNyVagsUM1r3kFWAU1myfyeLxXJnBry_dyZHtwCwHyoHf1a46lcYo2nnSfJaev5zX2ZDZnM7RYobJUbWNqzU0lPEKE90hhWHn5sMMhTEX_bWdWK51O4RF8D69SWf2r2rZ2C899qf87Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-09-11 19:48:22,305:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-09-11 19:48:22,306:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Sep 2024 17:48:22 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144979426
Replay-Nonce: fCBw7MtQHje2ooeYA7Kd1PLNeiH9iuMJLCxfmlMUDeituA3ZTks
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:55:33Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122851136"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144979426"
}
2024-09-11 19:48:22,306:DEBUG:acme.client:Storing nonce: fCBw7MtQHje2ooeYA7Kd1PLNeiH9iuMJLCxfmlMUDeituA3ZTks
2024-09-11 19:48:22,306:DEBUG:acme.client:JWS payload:
b''
2024-09-11 19:48:22,312:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122851136:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFIamUyb29lWUE3S2QxUExOZWlIOWl1TUpMQ3hmbWxNVURlaXR1QTNaVGtzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI4NTExMzYifQ",
  "signature": "vdnmzkFRCMKmbK4fbXhZM3oWsTdNE35bTQ4jezP47nMFwXnYmQs4TfyHpW47lft7WYEPCBb5hC0iZIqRJwGbfs_v2TUnedgYODBkR6Ef45-bRchHqPkyVflh0eAT4WcbUTUCzm7Ab0J5M7k5A_EbNN2zMXl3j-l6gI-VdsCi3W0-wWiz3kOPy0RIhfoiYlSdAsPZkuviSePaHluOccayKqm7JfmonOuDH8F0nyU9S_9RMsB5NQoRhBGPaKtSKXEQ5S0Pjsa3lf7h2tH3QZDggFw1zGXd94np4S05IAPlmb81TwqB87t0GxuWAR-oDnVwsFHztTbOVr7NvSi1f0dVJQ",
  "payload": ""
}
2024-09-11 19:48:22,496:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122851136 HTTP/1.1" 200 809
2024-09-11 19:48:22,497:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:48:23 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQ13rHU2ktEqvJrXtUcvty-SC6EwiMURKenCyNSopf03Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:55:33Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/Kdwo9g",
      "status": "pending",
      "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/nTAn0w",
      "status": "pending",
      "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/kuyLHA",
      "status": "pending",
      "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY"
    }
  ]
}
2024-09-11 19:48:22,497:DEBUG:acme.client:Storing nonce: fCBw7MtQ13rHU2ktEqvJrXtUcvty-SC6EwiMURKenCyNSopf03Y
2024-09-11 19:48:22,499:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-11 19:48:22,500:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-09-11 19:48:22,500:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-11 19:48:22,500:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-11 19:48:22,501:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:48:22,501:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-11 19:48:22,501:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-11 19:48:22,502:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-11 19:48:22,503:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:48:22,550:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-09-11 19:48:22,745:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:48:22,746:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert2.pem is signed by the certificate's issuer.
2024-09-11 19:48:22,747:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD
2024-09-11 19:48:22,751:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:14 UTC.
2024-09-11 19:48:22,751:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:48:22,751:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:48:22,756:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04AB68F0>
Prep: True
2024-09-11 19:48:22,756:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04AB68F0> and installer None
2024-09-11 19:48:22,756:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-11 19:48:22,761:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-11 19:48:22,762:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-11 19:48:22,764:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-11 19:48:23,233:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-11 19:48:23,234:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:48:23 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "_FSWeBGIWbU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-11 19:48:23,235:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-11 19:48:28,695:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8436_key-certbot.pem
2024-09-11 19:48:33,907:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8434_csr-certbot.pem
2024-09-11 19:48:33,907:DEBUG:acme.client:Requesting fresh nonce
2024-09-11 19:48:33,907:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-11 19:48:34,063:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-11 19:48:34,064:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:48:34 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwA7TFYmc14hdDEACpUDdSKOUIWcHEHl0zpCA6118YSzw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-11 19:48:34,064:DEBUG:acme.client:Storing nonce: UAMvsxnwA7TFYmc14hdDEACpUDdSKOUIWcHEHl0zpCA6118YSzw
2024-09-11 19:48:34,064:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "helix.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-11 19:48:34,070:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndBN1RGWW1jMTRoZERFQUNwVURkU0tPVUlXY0hFSGwwenBDQTYxMThZU3p3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "x-KdPqs518WXX1EgVrLmO9mVkauLwed0-BgR9LFgZSX6nbSa4pDbJ5Jj7NPgMXDOyicQT7yRVozQWyDyU7OlQ4qgoSXv8_sVBTqw2_OTp2Jpi6tUwd82Pird4ImGOdXTpEE-oHrrASNZeNo2lAReD2AsoJnr94eYLLCKzlRiCw7AoBLNViGjsYPu6I5kaZZaJ0FHZMd6emFhbGVg_gxFiQJ3u4zYs7_SYouGvOhh-1IdsGvLolOBuKBUVC6H5jtWYQucxq1KNtUE86s_PLdtoQJio97dxOSjof384BCCT8m3O13nk-fO8E559tNjLeGZMBt7JGoZdn-uFRNBrL_RTA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-09-11 19:48:34,252:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-09-11 19:48:34,252:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Sep 2024 17:48:34 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145018096
Replay-Nonce: 0Nvv4YStfg6rsK7bbEF-4Pl8yFgHJMf8EUb7QAvS4DD1g2Gio88
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:55:45Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "helix.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122910996"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145018096"
}
2024-09-11 19:48:34,252:DEBUG:acme.client:Storing nonce: 0Nvv4YStfg6rsK7bbEF-4Pl8yFgHJMf8EUb7QAvS4DD1g2Gio88
2024-09-11 19:48:34,253:DEBUG:acme.client:JWS payload:
b''
2024-09-11 19:48:34,259:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122910996:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RmZzZyc0s3YmJFRi00UGw4eUZnSEpNZjhFVWI3UUF2UzRERDFnMkdpbzg4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI5MTA5OTYifQ",
  "signature": "Yb6v41f5qw_jfhlHv3mvX53NBpORoX0VxEE64NOys06J2LG2TdIHUDgORUDRS8YL67_i7IErfeeiuN5eRXvAWIvZkxRfufzX9BTdg35kEWH9Cece3d_iV0-TQ3Wv3kqQjj_EAmlUizp6KEzz2rFITvaczsfXEe0oRjvfdnDkKXVMtXWdGbkpUPT9LkscYV7eW3lMdhhunGW2OMGzgl0gNSaooQUgTgxVbUuXu27Mwt3LfSqji5Z97xrYT4xNQDzIb1pGsPxd8xUU-54fgOXwvD9UEZYhIcWn0pO0BS834oZOBX8oqxpey1k1gkJjgd_pwOJo4bW32Wjx2K2WHUDFgw",
  "payload": ""
}
2024-09-11 19:48:34,423:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122910996 HTTP/1.1" 200 807
2024-09-11 19:48:34,423:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:48:35 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwop2fvgR1AvxnMsYklwO9dwJqmWq6FldkJQXcYxFLv4w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "helix.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:55:45Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/QNmv8g",
      "status": "pending",
      "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/4_hHkg",
      "status": "pending",
      "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/Xg0Zog",
      "status": "pending",
      "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k"
    }
  ]
}
2024-09-11 19:48:34,424:DEBUG:acme.client:Storing nonce: UAMvsxnwop2fvgR1AvxnMsYklwO9dwJqmWq6FldkJQXcYxFLv4w
2024-09-11 19:48:34,425:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-11 19:48:34,426:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl
2024-09-11 19:48:34,426:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-11 19:48:34,426:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-11 19:48:34,427:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:48:34,427:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-11 19:48:34,427:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-11 19:48:34,428:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-11 19:48:34,429:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:48:34,479:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-09-11 19:48:34,686:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:48:34,687:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2024-09-11 19:48:34,688:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2024-09-11 19:48:34,692:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:33 UTC.
2024-09-11 19:48:34,693:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:48:34,693:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:48:34,698:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04AC1290>
Prep: True
2024-09-11 19:48:34,698:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04AC1290> and installer None
2024-09-11 19:48:34,698:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-11 19:48:34,703:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-11 19:48:34,704:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-11 19:48:34,706:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-11 19:48:35,143:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-11 19:48:35,143:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:48:35 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "v-PhsN2fJwg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-09-11 19:48:35,143:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-11 19:48:41,156:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8437_key-certbot.pem
2024-09-11 19:48:46,598:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8435_csr-certbot.pem
2024-09-11 19:48:46,599:DEBUG:acme.client:Requesting fresh nonce
2024-09-11 19:48:46,599:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-11 19:48:46,749:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-11 19:48:46,749:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:48:47 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQ-EEvHBY1KouX6Gqz8z0sHiE6XGlabrU3qWxUo4i2OL0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-11 19:48:46,749:DEBUG:acme.client:Storing nonce: fCBw7MtQ-EEvHBY1KouX6Gqz8z0sHiE6XGlabrU3qWxUo4i2OL0
2024-09-11 19:48:46,750:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-11 19:48:46,755:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFEtRUV2SEJZMUtvdVg2R3F6OHowc0hpRTZYR2xhYnJVM3FXeFVvNGkyT0wwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "XOsl1-L1gHxKk7kvBeyJ4vDtyDtNbFMJqSdjTXKMd_JnGMoQ2DBJ-YNQ0A6ervgtCV0MpAWIEEKGB0QBCoYVJ_c1Zl3gAH4Z5pyPGVAlliKrMxFaCXlZxhU82ssjSPWg-jc6LOulO7rBKe7adKMR9m1YfsKfJblm1f32G_TRQGZJQXRbz3FagTSLBx4a-Nzwfb8e3EUUKkBISmB8FhCeTjCPRb4CSb6ylJY2wEk-2sZ88qMp9wGwWwtxUHwSCgUCKwAFs6_zqjnGYfTtiXC-7KR4UhOetfX7IvBCeLSafXK_9s-G2YtDqATB1LoSbcbZvSLspjIDvp7Czn7VfW5tkQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-09-11 19:48:47,042:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-09-11 19:48:47,043:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Sep 2024 17:48:47 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145056036
Replay-Nonce: 4OmWUlyUd6vSsjcROvMFFQO3X_U4R-3INSAgbQKOY_wOFrZosQI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:55:58Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122966996"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145056036"
}
2024-09-11 19:48:47,043:DEBUG:acme.client:Storing nonce: 4OmWUlyUd6vSsjcROvMFFQO3X_U4R-3INSAgbQKOY_wOFrZosQI
2024-09-11 19:48:47,043:DEBUG:acme.client:JWS payload:
b''
2024-09-11 19:48:47,049:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122966996:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVkNnZTc2pjUk92TUZGUU8zWF9VNFItM0lOU0FnYlFLT1lfd09Gclpvc1FJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI5NjY5OTYifQ",
  "signature": "hFgUAG2vC5K3Dm4Myl-glEKfQOTuNoNLorUxT4ZfuBA-oQI1XKju861fG5VcnY0YTw33Zdnr1zToME-_BH0KH6mRXM7mJSORmsgvP-YI37e4OHOLq86riRoWuI3zRU-fWilVXm4myKbuhZbinXSctAvy-jWTTeJN7iwFCK60lo1v1mbOolPWvIxmYS3I1bgvcpHRwMjk1s56OgFCeOdkQLeW7sfcSixX7iQOwnEyQ1mBfTnwFS1h_XmNggprcYvRy8smuQpSigBxS8D4djWVBxZkN79yQ90DmqgwNLbEb4KmZM2834GHSafb94o1NxhJsGXc9jdndC-Vcdbn6xLgyA",
  "payload": ""
}
2024-09-11 19:48:47,240:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122966996 HTTP/1.1" 200 806
2024-09-11 19:48:47,241:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:48:47 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4OmWUlyUvcjx7B56JiQLQO0ksmpyLJq6pdHTsBnxllb9s45pxj0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:55:58Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/RuQu8g",
      "status": "pending",
      "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/lsTunA",
      "status": "pending",
      "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/9cCtaA",
      "status": "pending",
      "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM"
    }
  ]
}
2024-09-11 19:48:47,241:DEBUG:acme.client:Storing nonce: 4OmWUlyUvcjx7B56JiQLQO0ksmpyLJq6pdHTsBnxllb9s45pxj0
2024-09-11 19:48:47,243:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-11 19:48:47,243:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-09-11 19:48:47,244:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-11 19:48:47,244:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-11 19:48:47,245:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:48:47,245:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-11 19:48:47,245:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-11 19:48:47,246:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-11 19:48:47,247:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:48:47,285:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-09-11 19:48:47,285:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:48:47,286:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-09-11 19:48:47,292:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-09-11 19:48:47,294:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-09-11 19:48:47,294:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-09-11 19:48:47,294:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-09-11 19:48:47,295:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-09-11 19:48:47,296:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-09-11 19:48:47,338:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-11 19:48:47,572:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:48:47,573:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2024-09-11 19:48:47,574:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2024-09-11 19:48:47,579:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:53 UTC.
2024-09-11 19:48:47,579:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:48:47,579:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:48:47,584:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0417A4B0>
Prep: True
2024-09-11 19:48:47,584:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0417A4B0> and installer None
2024-09-11 19:48:47,585:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-11 19:48:47,600:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-11 19:48:47,601:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-11 19:48:47,603:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-11 19:48:48,080:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-11 19:48:48,080:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:48:48 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "buA9YzEL2D8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-11 19:48:48,081:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-11 19:48:54,583:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8438_key-certbot.pem
2024-09-11 19:48:59,854:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8436_csr-certbot.pem
2024-09-11 19:48:59,854:DEBUG:acme.client:Requesting fresh nonce
2024-09-11 19:48:59,854:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-11 19:49:00,014:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-11 19:49:00,014:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:00 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwQ2pn5GX_69I49B8T3Klvq4xY2SP771rnyDglHQLzznI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-11 19:49:00,014:DEBUG:acme.client:Storing nonce: UAMvsxnwQ2pn5GX_69I49B8T3Klvq4xY2SP771rnyDglHQLzznI
2024-09-11 19:49:00,015:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-11 19:49:00,021:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndRMnBuNUdYXzY5STQ5QjhUM0tsdnE0eFkyU1A3NzFybnlEZ2xIUUx6em5JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "jG5nTKqHbByIwN1Es3LtWudV7n7oVS6929Icv0qexMZTKzNQ47bUHjv990qYRS2egokZIl6c1qUiyDiRelhbB-12uw2D7v4k2X9FMpjAvJRTnp9oR8kflpDS_gy6LAR2nlgjXIMZNvMhdsowh3CZPXKsXIPqPtk7qhyzUjLrDak61y12060q_2TucZdprhka6t6jxrManYmtKKSASfGONkb9gzilV8W3sBGmHsz9mUKF9lujEqNpbapyciJhRGxl_0KMQrwGLTZ7EHCDbop61yBiBqrZbZBmIb91TWxiMIIisSlUXyKW0imlefp3l7V1fUNjMcy5TtnTaTPWoGfy7Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-09-11 19:49:00,209:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-09-11 19:49:00,210:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Sep 2024 17:49:00 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145110166
Replay-Nonce: UAMvsxnwXp_khAIm_AaP47EGcrhdC7tYsZHzC4NrVk8ViVHuC70
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:56:11Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123043486"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145110166"
}
2024-09-11 19:49:00,210:DEBUG:acme.client:Storing nonce: UAMvsxnwXp_khAIm_AaP47EGcrhdC7tYsZHzC4NrVk8ViVHuC70
2024-09-11 19:49:00,210:DEBUG:acme.client:JWS payload:
b''
2024-09-11 19:49:00,216:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123043486:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndYcF9raEFJbV9BYVA0N0VHY3JoZEM3dFlzWkh6QzROclZrOFZpVkh1QzcwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMwNDM0ODYifQ",
  "signature": "Rv3cOH6SgAxq17pe6UuYgk5oEjHj36NuvY27xp_0h9bJccz_IeCJugbkuqF7nS8XKPLebFVO46yoAo8-G51Q2ActdAdfXFNwGFp_GqvdAy2SXq1_e_FU5xM5JLQ4u5Mi9PVJXxWy_pWjXMa62INFeSzTNT_s2UNt-xBzJY85nd_7ZrXygB7v1Met--aatl-dHX1lbM4z_QojfzkRiGgBF2jLv98TkMyG39ZlDws3lujzJphjHsIn-BZX_N-FzMs8DSsFvW4rEqCf0k6XrxhoOZMT09vsDEQmxozeU5q1pb5FZF5gbpTRUiALnXvH_oozFJk0cCeXKol_8pCTsvz0qg",
  "payload": ""
}
2024-09-11 19:49:00,387:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123043486 HTTP/1.1" 200 811
2024-09-11 19:49:00,387:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:00 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwqXNxbIf-ptm8QwR4BQ-M68pokubORdqecyg3x_yk7ls
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:56:11Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/6UDG0g",
      "status": "pending",
      "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/5SnKCA",
      "status": "pending",
      "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/oHWByA",
      "status": "pending",
      "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk"
    }
  ]
}
2024-09-11 19:49:00,387:DEBUG:acme.client:Storing nonce: UAMvsxnwqXNxbIf-ptm8QwR4BQ-M68pokubORdqecyg3x_yk7ls
2024-09-11 19:49:00,388:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-11 19:49:00,389:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-09-11 19:49:00,389:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-11 19:49:00,389:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-11 19:49:00,390:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:49:00,390:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-11 19:49:00,390:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-11 19:49:00,391:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-11 19:49:00,392:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:49:00,440:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80
2024-09-11 19:49:00,663:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:49:00,664:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2024-09-11 19:49:00,664:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2024-09-11 19:49:00,671:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:20 UTC.
2024-09-11 19:49:00,671:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:49:00,672:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:49:00,676:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04AC70D0>
Prep: True
2024-09-11 19:49:00,677:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04AC70D0> and installer None
2024-09-11 19:49:00,677:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-11 19:49:00,681:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-11 19:49:00,682:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-11 19:49:00,684:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-11 19:49:01,113:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-11 19:49:01,114:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:01 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "pYd9IUAQaAQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-11 19:49:01,115:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-11 19:49:06,623:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8439_key-certbot.pem
2024-09-11 19:49:11,868:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8437_csr-certbot.pem
2024-09-11 19:49:11,869:DEBUG:acme.client:Requesting fresh nonce
2024-09-11 19:49:11,869:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-11 19:49:12,013:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-11 19:49:12,014:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:12 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4OmWUlyUjBcQE6zGMPzIQUfnPGc5iV0iVWcd5_mKExatFABQj0A
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-11 19:49:12,014:DEBUG:acme.client:Storing nonce: 4OmWUlyUjBcQE6zGMPzIQUfnPGc5iV0iVWcd5_mKExatFABQj0A
2024-09-11 19:49:12,014:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-11 19:49:12,022:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVqQmNRRTZ6R01QeklRVWZuUEdjNWlWMGlWV2NkNV9tS0V4YXRGQUJRajBBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "S2P6fzpiCxJI45gqYV76ItuSjCIj4isXQJYrvvhdjRhn_Z3RdI4hsikAxIHD_nbt8ErUbsUGpBhA7Mdx7zf-NPdDOSps6C2EwIML0Seuc6XcEoB1FVKM_NgXXNcxnJnNZuFVJr6SVfkE-b5bcNvYw2fDJZJbdXptrVKkIt-zg2HOVlPCOIEoi35wV5NINoxS6uFqTWpl9yoNq8O-57SHib2DqhXnVtgDM3_W-gxoDjU0GG13Og8sFvJKsCF44Tl7RvuXx_AZDHtG2bOvuivDtIBtKlZJuIzG5oiyPQumjXhKfI3z09V7wQ9pbQoYlYZkOc3MsfbiFnC0fRpQjLEwuw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-09-11 19:49:12,356:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-09-11 19:49:12,357:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Sep 2024 17:49:12 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145156016
Replay-Nonce: 4OmWUlyULVwPrJcODr36YiI76BcBi-QSsvSdgBu2uB8i4Fct4Wg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:56:24Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123114366"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145156016"
}
2024-09-11 19:49:12,357:DEBUG:acme.client:Storing nonce: 4OmWUlyULVwPrJcODr36YiI76BcBi-QSsvSdgBu2uB8i4Fct4Wg
2024-09-11 19:49:12,357:DEBUG:acme.client:JWS payload:
b''
2024-09-11 19:49:12,363:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123114366:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVMVndQckpjT0RyMzZZaUk3NkJjQmktUVNzdlNkZ0J1MnVCOGk0RmN0NFdnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMxMTQzNjYifQ",
  "signature": "fdyeMWVeA2SVUG_D1ixrpQBj4GhrRzK_7Gev-OoKpM66SzLg-Hy7MYCPIpskTYHgjIUSZ7pGm4ziX6LbQn3IYR6lx1lHpmy0bSe-vQD-3EqyN1XeVigUXZ5HkmOXMAVfOpQKnphhPkEt4HnrE5mis3avAheuygR0eMfQQ7GNkIkB9hvk79i7UeE_MSsZp0f-lzLaANbsa8vUoP46m9frMlU_5I5ggjceRHPzMFKsPswx-XqSy9YCuNgLi9IloZal9Qm3UOpHj1CgQcE2BI2OUjBFMVDsBLIANh6rFw91yAmW4lVa5gUhJXGq11-Ky-RsyKZUjSLdPItdb9_lNJFRmw",
  "payload": ""
}
2024-09-11 19:49:12,554:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123114366 HTTP/1.1" 200 810
2024-09-11 19:49:12,555:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:13 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4OmWUlyU-FrMV0TDUDHmAzKn7VlKbgUUL06cbkuhqT9A5CxBMoc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:56:24Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/0k48SQ",
      "status": "pending",
      "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/hpZofw",
      "status": "pending",
      "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/K6FLfA",
      "status": "pending",
      "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A"
    }
  ]
}
2024-09-11 19:49:12,555:DEBUG:acme.client:Storing nonce: 4OmWUlyU-FrMV0TDUDHmAzKn7VlKbgUUL06cbkuhqT9A5CxBMoc
2024-09-11 19:49:12,555:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-11 19:49:12,556:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-09-11 19:49:12,556:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-11 19:49:12,557:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-11 19:49:12,557:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:49:12,558:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-11 19:49:12,558:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-11 19:49:12,558:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-11 19:49:12,559:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:49:12,607:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-11 19:49:12,833:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:49:12,834:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-09-11 19:49:12,835:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-09-11 19:49:12,839:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:39 UTC.
2024-09-11 19:49:12,839:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:49:12,839:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:49:12,844:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04AC1B30>
Prep: True
2024-09-11 19:49:12,845:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04AC1B30> and installer None
2024-09-11 19:49:12,845:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-11 19:49:12,850:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-11 19:49:12,851:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-11 19:49:12,853:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-11 19:49:13,320:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-11 19:49:13,320:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:13 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "TDPkaHcZMrI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-11 19:49:13,321:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-11 19:49:18,777:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8440_key-certbot.pem
2024-09-11 19:49:24,004:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8438_csr-certbot.pem
2024-09-11 19:49:24,004:DEBUG:acme.client:Requesting fresh nonce
2024-09-11 19:49:24,005:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-11 19:49:24,160:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-11 19:49:24,161:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:24 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnwXKVQ1tKrbWaGV0UC6FUZHQCJbCi9D2csXChQx7neg7o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-11 19:49:24,161:DEBUG:acme.client:Storing nonce: UAMvsxnwXKVQ1tKrbWaGV0UC6FUZHQCJbCi9D2csXChQx7neg7o
2024-09-11 19:49:24,161:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-11 19:49:24,167:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndYS1ZRMXRLcmJXYUdWMFVDNkZVWkhRQ0piQ2k5RDJjc1hDaFF4N25lZzdvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "vPp9zahrb0CnYZZuaCumuX7Y4e9UyFznn_Rswvlp5B0xdED-LBJu4Rvx2Zoh6c3Lm6FPMW32sC4MtHrg9Ge3SiUf9_Jiz6ZA30h9uHOZLf2Lt7E6x1y8FG3OXBEteVc3tWJiJTULpJYEbNcMYbzK-nnhN_8ZTxsePX6W-jEBI-ByZ5A9YdHF2O5MOclF9LmLBCIrEr-BBStdb1ORaEEt2KaptNoMHQarp3fvgHCDTn7uxs8LGfs2-cS_82F4yw75gI4SZ1NNvz6XkPnM8PlZHljwaM1PQTXEGIbf9-hlkgRBM9GSLN89yeUU46GGyoRbnDUs8ZRHnYowxtyCOrYh2w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-09-11 19:49:24,349:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-09-11 19:49:24,350:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Sep 2024 17:49:24 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145193816
Replay-Nonce: 0Nvv4YStFPETH8me42KG-x-HVSZdu18zokdL4yj0qvHxq1hOu6E
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:56:37Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123173286"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145193816"
}
2024-09-11 19:49:24,350:DEBUG:acme.client:Storing nonce: 0Nvv4YStFPETH8me42KG-x-HVSZdu18zokdL4yj0qvHxq1hOu6E
2024-09-11 19:49:24,350:DEBUG:acme.client:JWS payload:
b''
2024-09-11 19:49:24,356:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123173286:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RGUEVUSDhtZTQyS0cteC1IVlNaZHUxOHpva2RMNHlqMHF2SHhxMWhPdTZFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMxNzMyODYifQ",
  "signature": "NnVhDk6fk82Cr0QS96cniSeT8S3VoN3gsUt6EIBOesifByGA45bcPPUo_9JQHVVHoDOJqAIMPpB_2l2cUpfRVAGuoh7zsVg1FZn0S1IhoiHeAGGArKzBjr4AdqbKhQD0_jUquizGRqsRsag7QVDaQR4122WN3EDyEP5DOO6sfU6AoREy6l47LwmHbS5yWPR2zXR16ZfI1aS8fHvFlPv3bEewNUZbDWbmFAkUDX-BEP5e9pJOJ30y8ta0k3vR_XyDtKT6OC_KID2ax05BLspGaPTgxzKIHkI0n73-tLr5y-gMqaRWYhzDwQg5M-lMuFBbf4LGktIyQYBMawykVmY4Ow",
  "payload": ""
}
2024-09-11 19:49:24,517:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123173286 HTTP/1.1" 200 809
2024-09-11 19:49:24,518:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:25 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnw26ObMpmpdbbxZDJ7PQFTCZ-iMiWKHK9be0GZbJmKmXk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:56:37Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/xZ9qpw",
      "status": "pending",
      "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/QeJIqg",
      "status": "pending",
      "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/S6yiLg",
      "status": "pending",
      "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4"
    }
  ]
}
2024-09-11 19:49:24,518:DEBUG:acme.client:Storing nonce: UAMvsxnw26ObMpmpdbbxZDJ7PQFTCZ-iMiWKHK9be0GZbJmKmXk
2024-09-11 19:49:24,518:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-11 19:49:24,519:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-09-11 19:49:24,519:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-11 19:49:24,520:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-11 19:49:24,520:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:49:24,520:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-11 19:49:24,521:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-11 19:49:24,521:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-11 19:49:24,522:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:49:24,573:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-11 19:49:24,839:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:49:24,840:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-09-11 19:49:24,841:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-09-11 19:49:24,846:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:57 UTC.
2024-09-11 19:49:24,846:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:49:24,846:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:49:24,851:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x00A43FF0>
Prep: True
2024-09-11 19:49:24,851:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x00A43FF0> and installer None
2024-09-11 19:49:24,851:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-11 19:49:24,856:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-11 19:49:24,857:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-11 19:49:24,859:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-11 19:49:25,284:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-11 19:49:25,285:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:25 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "8ut41o3WhMA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-11 19:49:25,285:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-11 19:49:30,647:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8441_key-certbot.pem
2024-09-11 19:49:35,856:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8439_csr-certbot.pem
2024-09-11 19:49:35,856:DEBUG:acme.client:Requesting fresh nonce
2024-09-11 19:49:35,856:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-11 19:49:36,000:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-11 19:49:36,000:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:36 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQQmtBb_LLEAiMqcsW8zsnxgeZlKKGeYRlShW84hfVsGs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-11 19:49:36,001:DEBUG:acme.client:Storing nonce: fCBw7MtQQmtBb_LLEAiMqcsW8zsnxgeZlKKGeYRlShW84hfVsGs
2024-09-11 19:49:36,001:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-11 19:49:36,007:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFRbXRCYl9MTEVBaU1xY3NXOHpzbnhnZVpsS0tHZVlSbFNoVzg0aGZWc0dzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "AQtJEpKXwFBrW3k60bRzHCVligEzgO0gLTgQOWhF20C6uExPY4odoeOqbrK44BJPeDvEU1rRdxNxrBbp-ByuV8R7sFyPxV6sQUNz1bLH8c5Jkn9lfg-hUeY0exLJ7owYk42M9WvkFOoQ-6KznYbUPVhhgss1Lf8RbxFusSUlBFKQMUFY_lkGNpdqDKHd-BlYCt8a8e9bNMgKGpXA3sltbdFKHYTmp7qKK6vEacUTlnIklkGoWWH71pXcD7HzIYxyZsxVTmj5GBbGQR8dg9X4EQOiHNaZTltjd9Tsm0PNdXa_cFm_wbFjxNn7y6R_yb9srzbAjgUjb2EDG2M-6O1UAQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-09-11 19:49:36,283:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-09-11 19:49:36,284:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Sep 2024 17:49:36 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145229456
Replay-Nonce: fCBw7MtQmGnr0kJljC0BlxHCW37vwnKitRZnEZC-6QUnHkaDF-4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:56:49Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123229506"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145229456"
}
2024-09-11 19:49:36,284:DEBUG:acme.client:Storing nonce: fCBw7MtQmGnr0kJljC0BlxHCW37vwnKitRZnEZC-6QUnHkaDF-4
2024-09-11 19:49:36,284:DEBUG:acme.client:JWS payload:
b''
2024-09-11 19:49:36,290:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123229506:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFtR25yMGtKbGpDMEJseEhDVzM3dnduS2l0UlpuRVpDLTZRVW5Ia2FERi00IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMyMjk1MDYifQ",
  "signature": "okN0ydTI5nYZmsdE7i9f3pJCS8LIvIsdaXSS1JcO8wbFCfNdzmtx-1MypHhmIUP0vbqYqxmPfF3MOP11GvliDMJRXaX4s1L5Z2OsxJ_pN3wGULjBNmxLUa3u-WzfUQKp7VgAUMd1o2MHi98I-TY963mRdC7WHSP8gP07YjW7m7ZMaiGTSXcbRpjMyKhsFmdIfseEvzbn290tQ_IQzPpJrOxA4i2eKGIWrZQ_QLoAHcOVMjss2zmBx-B79lEkNGUOo1vHZf8xr_o1Qq09_jU-4i4ERsSG9kVRIu9qvY57zm6xu4HZS35aeX9T2RA1mA7v6wb143-aVdEloSz1hQhsaw",
  "payload": ""
}
2024-09-11 19:49:36,480:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123229506 HTTP/1.1" 200 805
2024-09-11 19:49:36,481:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:37 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQSCgRFX4OWbcCg_bGZ42Zar5C8j5xrmKJ88uc8Tl9jrg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:56:49Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/gbt7DA",
      "status": "pending",
      "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/K5UDEQ",
      "status": "pending",
      "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/yzBBsQ",
      "status": "pending",
      "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA"
    }
  ]
}
2024-09-11 19:49:36,481:DEBUG:acme.client:Storing nonce: fCBw7MtQSCgRFX4OWbcCg_bGZ42Zar5C8j5xrmKJ88uc8Tl9jrg
2024-09-11 19:49:36,481:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-11 19:49:36,482:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-09-11 19:49:36,482:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-11 19:49:36,483:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-11 19:49:36,484:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:49:36,484:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-11 19:49:36,484:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-11 19:49:36,484:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-11 19:49:36,486:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:49:36,535:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-11 19:49:36,756:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:49:36,758:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert19.pem is signed by the certificate's issuer.
2024-09-11 19:49:36,758:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD
2024-09-11 19:49:36,763:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:38:15 UTC.
2024-09-11 19:49:36,763:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:49:36,763:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:49:36,768:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04AB6D90>
Prep: True
2024-09-11 19:49:36,769:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04AB6D90> and installer None
2024-09-11 19:49:36,769:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-11 19:49:36,773:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-11 19:49:36,774:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-11 19:49:36,776:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-11 19:49:37,203:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-11 19:49:37,203:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:37 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "cVvmeWfaVZE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-09-11 19:49:37,204:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-11 19:49:42,631:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8442_key-certbot.pem
2024-09-11 19:49:48,041:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8440_csr-certbot.pem
2024-09-11 19:49:48,041:DEBUG:acme.client:Requesting fresh nonce
2024-09-11 19:49:48,041:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-11 19:49:48,186:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-11 19:49:48,187:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:48 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fCBw7MtQ_Zzf0lQjzHJwz8vL3pXGxXFnyCDBVKwzJzyn-pRceMg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-11 19:49:48,187:DEBUG:acme.client:Storing nonce: fCBw7MtQ_Zzf0lQjzHJwz8vL3pXGxXFnyCDBVKwzJzyn-pRceMg
2024-09-11 19:49:48,187:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-11 19:49:48,194:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFfWnpmMGxRanpISnd6OHZMM3BYR3hYRm55Q0RCVkt3ekp6eW4tcFJjZU1nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "NoL7vML1tJO_COXSymjIY_O8qZN-ggqUiuSffNuShsyjdUzpeoY6HcDs48K1RetDXGmJS8TMbculehM_3hy8yfr6yMjcmBU-IvL0kz2J4k0JqV17J9i-MLdE_uAkzbmqF_d_O5S_WEWgmYimeNKr5McH8d4zGNgQhPBWU18EglvPNyWBBGuLV_X_k6uyQ6BKrPwkaVcAgD33dYNYHLQWHUCEDbFMotZUTxTPRo3MlC0ObwtPEHp32x51032LJNXjPKNMqeAnFtdBfcJbnDNtEV3yEjJNNjk9a6gfk_teDNt-GacV_VvmpqjFdiTcq1wXtSKVgv3nWA_PEk0BJvIHkg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-09-11 19:49:48,484:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-09-11 19:49:48,484:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Sep 2024 17:49:49 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145265276
Replay-Nonce: 4OmWUlyUcPirdYRwie78kXTQzt5a_dmS1flgugFsJn5CwzIiK9g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:57:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123286586"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145265276"
}
2024-09-11 19:49:48,484:DEBUG:acme.client:Storing nonce: 4OmWUlyUcPirdYRwie78kXTQzt5a_dmS1flgugFsJn5CwzIiK9g
2024-09-11 19:49:48,485:DEBUG:acme.client:JWS payload:
b''
2024-09-11 19:49:48,491:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123286586:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVjUGlyZFlSd2llNzhrWFRRenQ1YV9kbVMxZmxndWdGc0puNUN3eklpSzlnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMyODY1ODYifQ",
  "signature": "Du2mnaTXtQ3Tgcfh90O5v5y2JaVcxN5HU2pDOGl9pZDHNG_OrFIhB-Cw3wbkUNHtLcYk09QT3ZnOtRXZO487rXszRCOTPrAKINfrCrVLlAVSxwRLHTY-U73eC5UC_ufhyThLbap6EEFanWuJJjtnyB-g1Zf70OjpqaKoZ0LDR72Q8ycbnIlLIkVhGQY823y0XAAQ2YR8XfAJRPLPxx0r7nkaKvZrrbBQttErVFFpkWa7Pk9_cRWSjGFemr07AD-WK4UEHTZdayDCiiMA9zrqQXGW-z3Vc40yk7mYMC07Nd6hTT6lYf67r72eT5n9KANVUqdyMzHfM-mRQ0zVP6Dgdg",
  "payload": ""
}
2024-09-11 19:49:48,663:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123286586 HTTP/1.1" 200 805
2024-09-11 19:49:48,664:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:49 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4OmWUlyU1kQAbty9tTzUKlP5T-EJFSPonGLxbghYHofahCKv428
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:57:01Z",
  "challenges": [
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/B20YQg",
      "status": "pending",
      "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/dinKKw",
      "status": "pending",
      "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/S9gNtg",
      "status": "pending",
      "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU"
    }
  ]
}
2024-09-11 19:49:48,664:DEBUG:acme.client:Storing nonce: 4OmWUlyU1kQAbty9tTzUKlP5T-EJFSPonGLxbghYHofahCKv428
2024-09-11 19:49:48,664:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-11 19:49:48,665:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-09-11 19:49:48,665:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-11 19:49:48,666:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-11 19:49:48,666:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:49:48,667:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-11 19:49:48,667:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-11 19:49:48,667:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-11 19:49:48,668:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:49:48,707:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2024-09-11 19:49:48,904:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2024-09-11 19:49:48,905:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-09-11 19:49:48,906:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-09-11 19:49:48,910:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:38:30 UTC.
2024-09-11 19:49:48,910:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-09-11 19:49:48,911:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-09-11 19:49:48,916:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x00A43630>
Prep: True
2024-09-11 19:49:48,916:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x00A43630> and installer None
2024-09-11 19:49:48,916:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-09-11 19:49:48,921:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-09-11 19:49:48,922:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-09-11 19:49:48,924:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-09-11 19:49:49,404:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-09-11 19:49:49,405:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:49:49 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "sRFH96Nc5U0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-09-11 19:49:49,406:INFO:certbot._internal.main:Renewing an existing certificate
2024-09-11 19:49:54,848:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8443_key-certbot.pem
2024-09-11 19:50:00,158:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8441_csr-certbot.pem
2024-09-11 19:50:00,159:DEBUG:acme.client:Requesting fresh nonce
2024-09-11 19:50:00,159:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-09-11 19:50:00,314:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-09-11 19:50:00,315:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:50:00 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0Nvv4YStUx_JipEnL7vMd43lCoOOnXAE_Qma8o6XdIuwzpp2EFU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-09-11 19:50:00,315:DEBUG:acme.client:Storing nonce: 0Nvv4YStUx_JipEnL7vMd43lCoOOnXAE_Qma8o6XdIuwzpp2EFU
2024-09-11 19:50:00,315:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-09-11 19:50:00,321:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RVeF9KaXBFbkw3dk1kNDNsQ29PT25YQUVfUW1hOG82WGRJdXd6cHAyRUZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "tk_iq8otdUaF3Rk5b4STM9Wz36Ot8VLAhpSyhgOr490vfeaF3_0fiK3QiCGo4x4ruKzkRlIpQwxDo-Sl7KPtD6XTXDo_5aGlfqHcXlLsMdVxW8ijcYu_9laZYhpopBOwk6skXPG8EhcOMMgX7DMriIamvi9ma3vSLkwC9n6d1nW-gBX_GaMSbuS5-Tkqqj61ONxaeHkPdn8ynTQ_gywTJQSledz6_c-iel9uNOFx8ZaR-RDdm_25BLQ8aZzuNZOVNTHQeb7L1yeSUeW8oo6Q3F_fpqsxz0oPy6e9zLF8yRfEPG4_gIkhT6jx8cBOaWteglvvGIUF14HZGA_xE2LVcw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-09-11 19:50:00,506:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-09-11 19:50:00,507:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Sep 2024 17:50:01 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145319296
Replay-Nonce: UAMvsxnwVxOAadc6NwDOiXmv_rvCxysQalTpmmhrl1Y_3fQAgO8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-09-18T04:57:14Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123364606"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145319296"
}
2024-09-11 19:50:00,507:DEBUG:acme.client:Storing nonce: UAMvsxnwVxOAadc6NwDOiXmv_rvCxysQalTpmmhrl1Y_3fQAgO8
2024-09-11 19:50:00,507:DEBUG:acme.client:JWS payload:
b''
2024-09-11 19:50:00,513:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123364606:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndWeE9BYWRjNk53RE9pWG12X3J2Q3h5c1FhbFRwbW1ocmwxWV8zZlFBZ084IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMzNjQ2MDYifQ",
  "signature": "Jbl58DJxL_bCcwkNPZKV67wXPlSkSJCrpG03LUlRDYLS5BTHq4tbUAsHn4PHW_OTfIXw-gfElGkUKJEa1NA-c5A0qCsYjekfQKC9Kw1wclhRyQyxpdVqLGOLm4M6uza-FxiIS0A_P6e1bDzAY-uJLE43_qc3lMll6YGox2WOeUpS-fsxYoBOZVY9ZaNl7_EBzMHFGQB3b7rQWzhZ_fZ2LfqQ5FOxEbf9fMl6ogv9x62RbBsfIwiUTHz3pzAvGcv_GfEziGZyeAsZyolkkqDrg4fGKSPFnixs1ZUvcJwlYA-4qQynlcyip7KSRqhrO1v0nOg4Irppblb0hGjPj3o9TQ",
  "payload": ""
}
2024-09-11 19:50:00,674:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123364606 HTTP/1.1" 200 805
2024-09-11 19:50:00,675:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Sep 2024 17:50:01 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: UAMvsxnw2-fJGAzWkTkEU3GitxRSS_5Qvv1lLJ1Aw0W_AiWfMQk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-09-18T04:57:14Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/LOiTWA",
      "status": "pending",
      "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/ndw7tA",
      "status": "pending",
      "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/DMnfUA",
      "status": "pending",
      "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw"
    }
  ]
}
2024-09-11 19:50:00,675:DEBUG:acme.client:Storing nonce: UAMvsxnw2-fJGAzWkTkEU3GitxRSS_5Qvv1lLJ1Aw0W_AiWfMQk
2024-09-11 19:50:00,675:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-09-11 19:50:00,676:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-09-11 19:50:00,677:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-09-11 19:50:00,677:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-09-11 19:50:00,678:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:50:00,678:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-09-11 19:50:00,678:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-09-11 19:50:00,678:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-09-11 19:50:00,679:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-09-11 19:50:00,679:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-09-11 19:50:00,679:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-09-11 19:50:00,691:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 15 renew failure(s), 0 parse failure(s)
2024-09-11 19:50:00,693:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)