2024-07-10 05:16:20,385:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-07-10 05:16:20,386:DEBUG:certbot._internal.main:Arguments: []
2024-07-10 05:16:20,386:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-07-10 05:16:21,155:DEBUG:certbot._internal.log:Root logging level set at 20
2024-07-10 05:16:21,156:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-07-10 05:16:21,199:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04BDA4F0> and installer <certbot._internal.cli.cli_utils._Default object at 0x04BDA4F0>
2024-07-10 05:16:21,240:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-10 05:16:21,459:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-10 05:16:21,473:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer.
2024-07-10 05:16:21,478:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD
2024-07-10 05:16:21,486:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC.
2024-07-10 05:16:21,487:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:16:21,487:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-10 05:16:21,492:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x045F27D0>
Prep: True
2024-07-10 05:16:21,492:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x045F27D0> and installer None
2024-07-10 05:16:21,493:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-10 05:16:21,498:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-10 05:16:21,499:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-10 05:16:21,501:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-10 05:16:21,964:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-10 05:16:21,965:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:16:20 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "QJQt7cxQVVc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-10 05:16:21,966:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-10 05:16:26,616:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8317_key-certbot.pem
2024-07-10 05:16:31,147:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8315_csr-certbot.pem
2024-07-10 05:16:31,147:DEBUG:acme.client:Requesting fresh nonce
2024-07-10 05:16:31,147:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-10 05:16:31,298:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-10 05:16:31,298:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:16:29 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW6NFmruFwY8ehBqRMjRPWUakXFlVhwY--dSKtyGYiwNFs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-10 05:16:31,299:DEBUG:acme.client:Storing nonce: oPjXeLW6NFmruFwY8ehBqRMjRPWUakXFlVhwY--dSKtyGYiwNFs
2024-07-10 05:16:31,299:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-10 05:16:31,305:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZORm1ydUZ3WThlaEJxUk1qUlBXVWFrWEZsVmh3WS0tZFNLdHlHWWl3TkZzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "JbK62v6Y7yl2qPSUtghQBsp2uBP-O3byVReELU7MoDhKCfNIlbZaaO3FWn8O_TTafnC24FDTvzPruHQkXf4bIIYzpxbwcDE0B_j_LPRltkBTT30C29BtUEeJin5HDbWESACkwsRUrUfKuj91tYobexltQ9u87YmRHgJthQQI1mwzUoN_uTF_CVLUuVT9K0C0snbgw61NWkwXgEL4eR5nBznWa5lHx8MmFxD5DDeZSyKCyxLOn0RgBihTDToPDv7TNCwOdFCzI3vEQj08u_BHWLx2PoEm3GtY54thkHmnfrn8U9E81EzqGAUZ5rjbmAytE_kBMh4vqeLuVFN6YkG6sA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-10 05:16:31,468:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-07-10 05:16:31,470:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 10 Jul 2024 03:16:29 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963066047
Replay-Nonce: EPg6kJgqUeV_2HqYhzaOlRGHvZ_JSu4R7nl4n0Jl4U490a0DQ5c
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:17:05Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123065917"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963066047"
}
2024-07-10 05:16:31,470:DEBUG:acme.client:Storing nonce: EPg6kJgqUeV_2HqYhzaOlRGHvZ_JSu4R7nl4n0Jl4U490a0DQ5c
2024-07-10 05:16:31,471:DEBUG:acme.client:JWS payload:
b''
2024-07-10 05:16:31,478:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123065917:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FVZVZfMkhxWWh6YU9sUkdIdlpfSlN1NFI3bmw0bjBKbDRVNDkwYTBEUTVjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMwNjU5MTcifQ",
  "signature": "HGFMNH9Tme3oP6wwtkQafnL9S6OJD0V0GsLcfH-z-p_FBhMiBqKvcvmbRgmuVhIPynRiV0Cf5S6wOwqHSZhJUMV8TfW5IwKqeMMgGH5aYzDedO9NZI39i1qU_1OWVwvYAhhKhW8UpArm7xxXwr9szBHKwhsKpxfJf4bH0Mwj0SPfGkCzZyrGnESmCz56B41ug8EJ2cMftxeGFutNsU1rr63N0_2NPaqwffDNfhLl5yai_1ogS393f4qOIYHrfEdsat0M0y7S_dy04VLsKuhyi5vk_jnLoeUSvLFL6zBPzIkWE00dG2Huw-jS3imIRPGuKHOYWaW0lTk6stPCvUS9Cw",
  "payload": ""
}
2024-07-10 05:16:31,631:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123065917 HTTP/1.1" 200 810
2024-07-10 05:16:31,633:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:16:29 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW6AhYNkVt4O-u35K029_kTVAFGkNd8ZGZrolnO3KB4EaU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:17:05Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/AopFCQ",
      "status": "pending",
      "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/xbrZjg",
      "status": "pending",
      "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/2pJhlw",
      "status": "pending",
      "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4"
    }
  ]
}
2024-07-10 05:16:31,633:DEBUG:acme.client:Storing nonce: oPjXeLW6AhYNkVt4O-u35K029_kTVAFGkNd8ZGZrolnO3KB4EaU
2024-07-10 05:16:31,634:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-10 05:16:31,635:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-07-10 05:16:31,636:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-10 05:16:31,636:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-10 05:16:31,640:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:16:31,640:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-10 05:16:31,640:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-10 05:16:31,640:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-10 05:16:31,645:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:16:31,690:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-10 05:16:31,950:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-10 05:16:31,952:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-10 05:16:31,952:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-10 05:16:31,957:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC.
2024-07-10 05:16:31,957:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:16:31,957:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-10 05:16:31,966:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0458B430>
Prep: True
2024-07-10 05:16:31,967:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0458B430> and installer None
2024-07-10 05:16:31,967:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-10 05:16:31,972:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-10 05:16:31,973:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-10 05:16:31,975:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-10 05:16:32,444:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-10 05:16:32,445:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:16:30 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "ZJoNOn4enGU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-10 05:16:32,445:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-10 05:16:37,250:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8318_key-certbot.pem
2024-07-10 05:16:41,856:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8316_csr-certbot.pem
2024-07-10 05:16:41,857:DEBUG:acme.client:Requesting fresh nonce
2024-07-10 05:16:41,857:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-10 05:16:42,013:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-10 05:16:42,014:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:16:40 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zgT1AlV-xdJK2M-Z-jGVyyB5T-ktxbzGhP76edeE_Sq2adFlKSc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-10 05:16:42,014:DEBUG:acme.client:Storing nonce: zgT1AlV-xdJK2M-Z-jGVyyB5T-ktxbzGhP76edeE_Sq2adFlKSc
2024-07-10 05:16:42,015:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-10 05:16:42,020:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi14ZEpLMk0tWi1qR1Z5eUI1VC1rdHhiekdoUDc2ZWRlRV9TcTJhZEZsS1NjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "mBceWe-h_W5wz6tYOANbBiUKNDPkNmWTnKk8j5ujMFCU-XU7gaodDlRlFeeU34NWLU_UMfqGDdAexTCMKf8y4nFWxCMFbQK5xhWXeL54_OykR_joxLUoFF3P1lFvXfQxV5N0eELGDT0OdVKdg09Fm1kCxlsmYepGXpIdmz1PSUpAzICX2F-5LPb5JsWMVKqYB7XdAOsPeH1ehlXBCVC5ZuCiNkeT69kHDPkMERHFWHZcnbL0VUGrTplNoCbA1z2JmD-S7XHGqG-Rr1qlsihoTtHAaT4pZBEeWuyXSX65rYqxc4bMzFa5dvOy6U54ZXR-3S5O07tyvtQnLQ-OKOLvFg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-10 05:16:42,198:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-07-10 05:16:42,200:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 10 Jul 2024 03:16:40 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963103477
Replay-Nonce: eFSVlf8U5MllRicFY4BAB1hWfvYMYzLkmm_EW_nzRFh-VKHEmM8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:17:16Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123121967"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963103477"
}
2024-07-10 05:16:42,200:DEBUG:acme.client:Storing nonce: eFSVlf8U5MllRicFY4BAB1hWfvYMYzLkmm_EW_nzRFh-VKHEmM8
2024-07-10 05:16:42,201:DEBUG:acme.client:JWS payload:
b''
2024-07-10 05:16:42,213:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123121967:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFU1TWxsUmljRlk0QkFCMWhXZnZZTVl6TGttbV9FV19uelJGaC1WS0hFbU04IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMxMjE5NjcifQ",
  "signature": "cQg-OPjGoRkErz4OTAWUJcuuW0M60bcNf5zc6QPmkWX-gIHunlSYHUB3fFMEcuB6fOYN2wX7vuC4ZSMjeBItzga8t12WCXNf3vabR8BPBF8JFFXzBHkMCB0XlyQJX86ZQvTVCRwpAWn08lTLBJ0T7GMnrfcUjmFK1OrVtH6pkKOOupjfBqIjDOL-DvxwBrPZaOkIQ-j6tmkoWBW16GIWCxvmFC49e_nF6Xv5WcpNOB8H0O__ro4_IPhf4oLKNo14MUqeTbieb1lSr_MKh_j2PUnoTEsquBEspmTv-PZ-L5A_QBnCCTM-UoGeJD_nAWPwYWSsLEfIBlBRa-3q4UFqdA",
  "payload": ""
}
2024-07-10 05:16:42,377:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123121967 HTTP/1.1" 200 804
2024-07-10 05:16:42,379:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:16:40 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eFSVlf8UBIyKbj81f1A1KIA1Tgg1mBpfdt5ru1XFkM0i8LHw434
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:17:16Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/Ag883A",
      "status": "pending",
      "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/g4f58w",
      "status": "pending",
      "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/s77iUg",
      "status": "pending",
      "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0"
    }
  ]
}
2024-07-10 05:16:42,379:DEBUG:acme.client:Storing nonce: eFSVlf8UBIyKbj81f1A1KIA1Tgg1mBpfdt5ru1XFkM0i8LHw434
2024-07-10 05:16:42,380:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-10 05:16:42,380:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-07-10 05:16:42,380:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-10 05:16:42,381:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-10 05:16:42,381:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:16:42,382:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-10 05:16:42,382:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-10 05:16:42,382:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-10 05:16:42,383:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:16:42,438:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-10 05:16:42,634:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-10 05:16:42,636:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-07-10 05:16:42,636:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-07-10 05:16:42,641:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC.
2024-07-10 05:16:42,642:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:16:42,642:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-10 05:16:42,650:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x046542F0>
Prep: True
2024-07-10 05:16:42,650:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x046542F0> and installer None
2024-07-10 05:16:42,651:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-10 05:16:42,655:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-10 05:16:42,656:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-10 05:16:42,658:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-10 05:16:43,110:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-10 05:16:43,111:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:16:41 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "9410jt0Gvi8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-10 05:16:43,111:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-10 05:16:48,435:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8319_key-certbot.pem
2024-07-10 05:16:52,972:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8317_csr-certbot.pem
2024-07-10 05:16:52,972:DEBUG:acme.client:Requesting fresh nonce
2024-07-10 05:16:52,972:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-10 05:16:53,124:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-10 05:16:53,125:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:16:51 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW6nTzctw385I6-TchJQMHoUmrrzOB6H0bPy6Xz189-KTs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-10 05:16:53,125:DEBUG:acme.client:Storing nonce: oPjXeLW6nTzctw385I6-TchJQMHoUmrrzOB6H0bPy6Xz189-KTs
2024-07-10 05:16:53,125:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-10 05:16:53,133:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZuVHpjdHczODVJNi1UY2hKUU1Ib1VtcnJ6T0I2SDBiUHk2WHoxODktS1RzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "rwTceKU0R_1hDBrGE0nsB3B6zGBxYrB-eRnkLsARjQAAudOxAtTd0no5KYstQ8ddvMQNgJjTo0DByIkkOHxdTi1H7qCAHFuhS_KkVbm7vKhoSx7zpCHBvz3G6Ia8GDEJ90eZFAt98lnX0aaxgxRB86g9Jxn2L9W34KNY8tdZ4Mv3lbb5N1Z4rrOKp_edaZZwPTBtNaYE5ROw1pP4VaVaIVslBPv6u8MaEP8GaiLsY_qKhesUBluGYScnzC7g6gN8dJJMYOhvpSckOY1zpZsJ7MxPNOgh9LCc3K5RdpjwVB-w1HEuZQ9SZfm7lW2XMYQu69YyGpCHO-k-vI-wmd7Sdg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-10 05:16:53,297:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-07-10 05:16:53,298:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 10 Jul 2024 03:16:51 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963135847
Replay-Nonce: oPjXeLW6VYMjBlOuyfOKm_CL0fMnXcnTImS9LzNKuYDio2NcZ8c
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:17:27Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123171097"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963135847"
}
2024-07-10 05:16:53,299:DEBUG:acme.client:Storing nonce: oPjXeLW6VYMjBlOuyfOKm_CL0fMnXcnTImS9LzNKuYDio2NcZ8c
2024-07-10 05:16:53,299:DEBUG:acme.client:JWS payload:
b''
2024-07-10 05:16:53,305:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123171097:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZWWU1qQmxPdXlmT0ttX0NMMGZNblhjblRJbVM5THpOS3VZRGlvMk5jWjhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMxNzEwOTcifQ",
  "signature": "uOF8m0Cjz17vhg_wYMCqAhTVXyqFaKQ9uJuOnMkvdYi_nmO9iFMRfaJ71sgZe8OVn5vTAvbQV5sXv5vewKVqh6R5g1a60FO0_OeuwLz7uHgfbVnMthk1E5jesgVklEIQFVsLqAWQ6f1MbKeJvxmIM98j9aVVPZ-bjhPTYZ2ekX-c8YqdDFjmWuHmroPTVlA5pXPs8GW0A2uWqslC9qIDq_9k_xuWjnkr77dfyXP7RdfIj94ffgvtXO0D0kpNvs82JJpofICqQy3-TdBnA9eQY3Lvq_TTg5yuX9zsoQfeh8-gqRmy88oer0d8NFq0yDHYIKXHGyMuPGWRmhcnK74VDA",
  "payload": ""
}
2024-07-10 05:16:53,461:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123171097 HTTP/1.1" 200 807
2024-07-10 05:16:53,462:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:16:51 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgqFq2DeDWoQw4t26hy7ry1-AxnkT0M5yGRK1MwHHaNjtk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:17:27Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/vQZynA",
      "status": "pending",
      "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/XD91Zg",
      "status": "pending",
      "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/qlRt6w",
      "status": "pending",
      "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo"
    }
  ]
}
2024-07-10 05:16:53,462:DEBUG:acme.client:Storing nonce: EPg6kJgqFq2DeDWoQw4t26hy7ry1-AxnkT0M5yGRK1MwHHaNjtk
2024-07-10 05:16:53,462:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-10 05:16:53,463:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-07-10 05:16:53,463:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-10 05:16:53,464:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-10 05:16:53,465:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:16:53,465:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-10 05:16:53,465:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-10 05:16:53,465:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-10 05:16:53,467:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:16:53,517:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-10 05:16:53,724:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-10 05:16:53,725:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-10 05:16:53,727:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-10 05:16:53,730:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC.
2024-07-10 05:16:53,730:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:16:53,730:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-10 05:16:53,736:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0463EB90>
Prep: True
2024-07-10 05:16:53,736:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0463EB90> and installer None
2024-07-10 05:16:53,736:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-10 05:16:53,742:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-10 05:16:53,742:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-10 05:16:53,744:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-10 05:16:54,182:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-10 05:16:54,183:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:16:52 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "oumcUz8pj2k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-10 05:16:54,184:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-10 05:16:59,135:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8320_key-certbot.pem
2024-07-10 05:17:03,686:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8318_csr-certbot.pem
2024-07-10 05:17:03,687:DEBUG:acme.client:Requesting fresh nonce
2024-07-10 05:17:03,687:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-10 05:17:03,833:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-10 05:17:03,834:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:02 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgqKMiz3AyRGqLpVGPEhQoPytBbE5ut4vmPQqOTLL-GhjI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-10 05:17:03,834:DEBUG:acme.client:Storing nonce: EPg6kJgqKMiz3AyRGqLpVGPEhQoPytBbE5ut4vmPQqOTLL-GhjI
2024-07-10 05:17:03,834:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-07-10 05:17:03,840:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FLTWl6M0F5UkdxTHBWR1BFaFFvUHl0QmJFNXV0NHZtUFFxT1RMTC1HaGpJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "JNJQwK-OIISMb-T6U0mRulabhx0ftvrIiUiTOHaSz3gJEGiFU0rEVca4cgns8ywfLqfbIp9JPgGiBYoj4VEVBT8bMkX277c7yMBodMhTguyi74SkeHdIj96r4pTp4MTNz0MjNlDlVFyKdD1jhQb_LamwYzctl75MmFy0d0hZCV4dSx5yIuAONZmoQrRSh5RM8inNs7tcqNpGKabza56JsikSPTHcJVfnS_PhZxfSLySvub3X3HJ_cDOPY8uY0Z3-2AB97q-c_v5r_FQ9ZFZOMHxFPqndv8gJwYBs1F5bYqIIrDedItrXw7Yifp1dc6UKve6aonnKPTkYXNQsC_V4rA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-10 05:17:04,003:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-07-10 05:17:04,003:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 10 Jul 2024 03:17:02 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963164787
Replay-Nonce: oPjXeLW65o01rOXom7TBpjjVkI3ARzZ3PgHNc_DOdeGhkn2k4nM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:17:38Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123214537"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963164787"
}
2024-07-10 05:17:04,004:DEBUG:acme.client:Storing nonce: oPjXeLW65o01rOXom7TBpjjVkI3ARzZ3PgHNc_DOdeGhkn2k4nM
2024-07-10 05:17:04,004:DEBUG:acme.client:JWS payload:
b''
2024-07-10 05:17:04,010:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123214537:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzY1bzAxck9Yb203VEJwampWa0kzQVJ6WjNQZ0hOY19ET2RlR2hrbjJrNG5NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMyMTQ1MzcifQ",
  "signature": "Ppi4y0O_FQHS3dl2BPl3ltppoCMtkOxBDciH8-Zt_vMfLW_Y1NrN5w3RGDSjeyi54dE9kkzcT4VHo1VajHwOh38ThLz5GZskNdswebUFFgtv6iaCgYzCpS4u0WzLjZrEvH2xcERHY0rKOIkSB-_nyZhbW9S0LUUy0210RY9RaLSnrMuJnmHgK8DqY84ElWUO0-I_WTMi99PAFum3xNXQP9Kvy4TpZMVn3puWnOWBWNCUhD3nojOvI_0zQ0r5mVDB5utXm5av_TjsJm82arlkvCuMTjVM45FKWHyjVH0qd0zhyP1lNGQTYZ9YWr01O1CTbu9CQjltbMT8Do39C82qzQ",
  "payload": ""
}
2024-07-10 05:17:04,163:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123214537 HTTP/1.1" 200 801
2024-07-10 05:17:04,163:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:02 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW6EP29KLR6O16mQSrFUGo8TwbSrnGFlGXF4psxHEKMAY8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:17:38Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/FMZRsw",
      "status": "pending",
      "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/6lpfOw",
      "status": "pending",
      "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/gp7pwg",
      "status": "pending",
      "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A"
    }
  ]
}
2024-07-10 05:17:04,164:DEBUG:acme.client:Storing nonce: oPjXeLW6EP29KLR6O16mQSrFUGo8TwbSrnGFlGXF4psxHEKMAY8
2024-07-10 05:17:04,164:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-10 05:17:04,164:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-07-10 05:17:04,166:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-10 05:17:04,166:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-10 05:17:04,167:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:17:04,167:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-10 05:17:04,167:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-10 05:17:04,167:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-10 05:17:04,168:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:17:04,207:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-10 05:17:04,403:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-10 05:17:04,406:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-10 05:17:04,407:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-10 05:17:04,415:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC.
2024-07-10 05:17:04,415:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:17:04,415:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-10 05:17:04,420:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04BA1910>
Prep: True
2024-07-10 05:17:04,420:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04BA1910> and installer None
2024-07-10 05:17:04,421:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-10 05:17:04,429:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-10 05:17:04,430:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-10 05:17:04,433:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-10 05:17:04,882:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-10 05:17:04,883:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:03 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "dNDXUb4rrrM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-10 05:17:04,883:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-10 05:17:10,080:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8321_key-certbot.pem
2024-07-10 05:17:14,647:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8319_csr-certbot.pem
2024-07-10 05:17:14,647:DEBUG:acme.client:Requesting fresh nonce
2024-07-10 05:17:14,648:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-10 05:17:14,799:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-10 05:17:14,800:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:13 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgqNdBojh-JQ_Qng85CnM5mQt75V9ffFaYiy1VorMg1Qn4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-10 05:17:14,801:DEBUG:acme.client:Storing nonce: EPg6kJgqNdBojh-JQ_Qng85CnM5mQt75V9ffFaYiy1VorMg1Qn4
2024-07-10 05:17:14,801:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-10 05:17:14,811:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FOZEJvamgtSlFfUW5nODVDbk01bVF0NzVWOWZmRmFZaXkxVm9yTWcxUW40IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ErnH4MZGdnvCf6PRPkJ01STlA4O-8-7LWJ1e9fQSeGhgpl4o_R2RTa0S69sLaTNbjPabDoEnBDeAAuG2bVWvK3HzayCj6gW0fAvGo8n6yvz4cG0OLv8IQlBqOaKqRzbLE0EGO5X3pGQsCBuAEC-YHkr2IuiZJEneBCMQJ2EfrI7WgtDRGal-ummb9a-LU_uj6AY0JWRN7QLbumBZp5VEc8pcRny64ngwNnkX9zEfO04KAwFKCR4zK4lJG1H5N6_4o04ZTvMpDgPnA2wrmXq_FSvtAWH17EU6BeJ7zxxePzvCcjHGoSu1KL71P0Bq8GcdjTB1Z_eb3mTCRYQfoRhIbQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-10 05:17:14,979:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-07-10 05:17:14,980:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 10 Jul 2024 03:17:13 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963193117
Replay-Nonce: oPjXeLW6NVeJhL-wIkxDZFfzEG2vT5ls0doCqVcImcDltLbVyWA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:17:49Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123258277"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963193117"
}
2024-07-10 05:17:14,980:DEBUG:acme.client:Storing nonce: oPjXeLW6NVeJhL-wIkxDZFfzEG2vT5ls0doCqVcImcDltLbVyWA
2024-07-10 05:17:14,981:DEBUG:acme.client:JWS payload:
b''
2024-07-10 05:17:14,990:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123258277:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZOVmVKaEwtd0lreERaRmZ6RUcydlQ1bHMwZG9DcVZjSW1jRGx0TGJWeVdBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMyNTgyNzcifQ",
  "signature": "aPVU1kLj0QrKFq-rSlYy4TsX8cUMP1KP7kEH47FUfQQ74IrZ2qHAWidJZNS77RaAwi068uHBHRhKDrHtEBNmuH34RrBNsSK4--9yEHFZ2M7f3azt37LAaFUh2A4h-vyJYLVV8YW95PxkENcE-IK2XchJO1By8JQVq-iEYD9v8vKH4ytuB89JXGV-jAZFq-CT4anEwxKIB4i5susTmiVttCbuFhmz_w0NXoXI9rGNE3gSszVdoe4RlYEZuG9ieAOXIORFqLjjlDQUmGq0rB2jOICvB5rY-pBAfmQzQNj4Oeecak6ryQFjmX8ASoLjNqyDV8eVBts8Q1b6WpXzc9uD6A",
  "payload": ""
}
2024-07-10 05:17:15,146:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123258277 HTTP/1.1" 200 805
2024-07-10 05:17:15,148:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:13 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW66LCf4VDhOC4mxodXUUVKMor6yVOr_VhNrmNW2Unlj0k
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:17:49Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/7Y8QQA",
      "status": "pending",
      "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/6IRQnQ",
      "status": "pending",
      "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/ZS_Kuw",
      "status": "pending",
      "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400"
    }
  ]
}
2024-07-10 05:17:15,149:DEBUG:acme.client:Storing nonce: oPjXeLW66LCf4VDhOC4mxodXUUVKMor6yVOr_VhNrmNW2Unlj0k
2024-07-10 05:17:15,150:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-10 05:17:15,151:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-07-10 05:17:15,151:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-10 05:17:15,151:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-10 05:17:15,152:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:17:15,152:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-10 05:17:15,152:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-10 05:17:15,153:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-10 05:17:15,154:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:17:15,205:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-10 05:17:15,396:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-10 05:17:15,398:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-07-10 05:17:15,400:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-07-10 05:17:15,408:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC.
2024-07-10 05:17:15,408:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:17:15,408:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-10 05:17:15,419:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04BBCD10>
Prep: True
2024-07-10 05:17:15,420:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04BBCD10> and installer None
2024-07-10 05:17:15,420:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-10 05:17:15,425:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-10 05:17:15,426:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-10 05:17:15,428:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-10 05:17:15,882:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-10 05:17:15,883:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:14 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "wawoL7AD53I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-07-10 05:17:15,884:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-10 05:17:20,670:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8322_key-certbot.pem
2024-07-10 05:17:25,274:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8320_csr-certbot.pem
2024-07-10 05:17:25,274:DEBUG:acme.client:Requesting fresh nonce
2024-07-10 05:17:25,274:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-10 05:17:25,425:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-10 05:17:25,426:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:23 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgqApvLPxXYNdhDp8u7Ty1_7D5rq7_hA-wP1pT5vrt8ewY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-10 05:17:25,426:DEBUG:acme.client:Storing nonce: EPg6kJgqApvLPxXYNdhDp8u7Ty1_7D5rq7_hA-wP1pT5vrt8ewY
2024-07-10 05:17:25,426:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-10 05:17:25,433:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FBcHZMUHhYWU5kaERwOHU3VHkxXzdENXJxN19oQS13UDFwVDV2cnQ4ZXdZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ZwFPwPDHV34m8Irf2Ul8VcPWaU1NYVXy-ZBQATNHlTUg37Odst092ziikRwgDU9tkpZmO5xTYGj2A0qjgOYBmPUi7-lDH_9IW-EX0euFnRw7SfDfYFzg798BznujRLAJjOknp_xhnqCJmwH74FevkElo9qNbmxYPPnvoZ1MJ6xYaRfE83FCiopU9rGU4IVOKqUfv51InZVUQOmbR1Cqx1-EMltWMZdYFOOjJJBsok5iJ8m0ZHMjS2y_sMuWIBkQehGiQUYpkOmGkguw_yxRLH1L3XJTFRaYHFTcQZPbmVe81TdfFLJ4Zut8kyQB9ENmngyTxllMh9FSIbVhsWrjIIA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-07-10 05:17:25,607:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-07-10 05:17:25,608:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 10 Jul 2024 03:17:23 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963222697
Replay-Nonce: oPjXeLW6Jza9_e6fz387ora5SKQgTL0iL931ERLTxyF-IuQaqAw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:17:59Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123301867"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963222697"
}
2024-07-10 05:17:25,608:DEBUG:acme.client:Storing nonce: oPjXeLW6Jza9_e6fz387ora5SKQgTL0iL931ERLTxyF-IuQaqAw
2024-07-10 05:17:25,608:DEBUG:acme.client:JWS payload:
b''
2024-07-10 05:17:25,614:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123301867:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZKemE5X2U2ZnozODdvcmE1U0tRZ1RMMGlMOTMxRVJMVHh5Ri1JdVFhcUF3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMzMDE4NjcifQ",
  "signature": "JNesfSauN1ElJ7D8meap5gfhxCPUErrEfn5TdScX_OFB5hxTuwrvwJU0gTSqZHBY5BIxjRP1CmDwC7nTZJJSTMv9TB4IhWDE4FptXBQWQ43G6lLDRG3kGU0GX_uJ5jBVZZhkgZaAYG4m9NbVcyEl2d_gZO85iLoQcu2rYrb0yfYIFw1zH1LmFbXGMLf2bCNUjDGM5rFLCP9RBfT1Q7KSjZhpTJrtsmXZIMJwxifuSkkii0jh1kQuv8o-FbUNvJCiqutAPgNV9fhAt4HBKLXONoO14RsSmvsX_xp8aWGpw-3W-JLxOneD9TyWgVC4tAQkCjzRxY0JG7qBpnFd2xKOHA",
  "payload": ""
}
2024-07-10 05:17:25,770:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123301867 HTTP/1.1" 200 809
2024-07-10 05:17:25,771:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:24 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgqSRv-sBH1zGAlv7ey6TOOCBvJ8dv9XwbaZrdXVor-v0o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:17:59Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/VjMp2w",
      "status": "pending",
      "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/GGZVqQ",
      "status": "pending",
      "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/GI9X-A",
      "status": "pending",
      "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94"
    }
  ]
}
2024-07-10 05:17:25,771:DEBUG:acme.client:Storing nonce: EPg6kJgqSRv-sBH1zGAlv7ey6TOOCBvJ8dv9XwbaZrdXVor-v0o
2024-07-10 05:17:25,771:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-10 05:17:25,772:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-07-10 05:17:25,772:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-10 05:17:25,772:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-10 05:17:25,773:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:17:25,773:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-10 05:17:25,773:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-10 05:17:25,774:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-10 05:17:25,775:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:17:25,821:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-10 05:17:26,089:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-10 05:17:26,090:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer.
2024-07-10 05:17:26,091:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD
2024-07-10 05:17:26,095:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-08-06 23:03:56 UTC.
2024-07-10 05:17:26,095:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:17:26,096:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-10 05:17:26,101:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0463BD30>
Prep: True
2024-07-10 05:17:26,101:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0463BD30> and installer None
2024-07-10 05:17:26,101:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-10 05:17:26,106:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-10 05:17:26,107:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-10 05:17:26,109:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-10 05:17:26,583:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-10 05:17:26,584:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:24 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "rsK8KzDdu8o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-07-10 05:17:26,585:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-10 05:17:31,277:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8323_key-certbot.pem
2024-07-10 05:17:35,803:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8321_csr-certbot.pem
2024-07-10 05:17:35,803:DEBUG:acme.client:Requesting fresh nonce
2024-07-10 05:17:35,803:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-10 05:17:35,960:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-10 05:17:35,962:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:34 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zgT1AlV-hmFi5ih1are5YPrOwJc1G-RwqBd_798YkIvTkQa5FBc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-10 05:17:35,962:DEBUG:acme.client:Storing nonce: zgT1AlV-hmFi5ih1are5YPrOwJc1G-RwqBd_798YkIvTkQa5FBc
2024-07-10 05:17:35,963:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "helix.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-10 05:17:35,975:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1obUZpNWloMWFyZTVZUHJPd0pjMUctUndxQmRfNzk4WWtJdlRrUWE1RkJjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "fB9T4ZOweAi5HXRWU7MJJ6Na4BB00TrFEygR1Mnjd9I_YG97qL7H1xj7mE84rYSstsxfZC51wPPBsAyMhNk3_qKLc8W5fUX95eF1vV0xXzE0oV6OjAqZ2Ou58h6MDUG7Hvn2bExVW0Gtt7HIauNta9oyjPWEzE-9ylI_qi2gH7SG6BYFkqnGMZKe8deMIIewqtc5Dez6vVm4XKRO3kFo8O0G2NLGKPMqP1LTX1YZTWba6DKGJ0zS4FtW1VIQ7hI9AOgUuvzYFPeyho66WfGKyOk1eXlA3YRQem_nPm1p64QnJr6MNPp_C1TNs929yjDAwf79kFdDdZLsC-Q0IjV3IQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-10 05:17:36,160:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-07-10 05:17:36,161:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 10 Jul 2024 03:17:34 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/285341919627
Replay-Nonce: eFSVlf8UQnhlenBcqwwT2mKOlg2ES6geuH1OYykM0fw1Hr-m5PI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-15T04:13:07Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "helix.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/374150202447"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/285341919627"
}
2024-07-10 05:17:36,161:DEBUG:acme.client:Storing nonce: eFSVlf8UQnhlenBcqwwT2mKOlg2ES6geuH1OYykM0fw1Hr-m5PI
2024-07-10 05:17:36,161:DEBUG:acme.client:JWS payload:
b''
2024-07-10 05:17:36,167:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/374150202447:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVRbmhsZW5CY3F3d1QybUtPbGcyRVM2Z2V1SDFPWXlrTTBmdzFIci1tNVBJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzQxNTAyMDI0NDcifQ",
  "signature": "s6s7oj7zVLaEC1TjYS8IgYYkZmVzq9yzBEgM_BtVvAozfzYeLzn8r5zJQjQsfAT_D0By4Z-y1gIpZj0nfnM0CddLjs0T_bvI9bP6sLdLKFxYnvNfa_fmDVgf6OnWfQjq3XiVN7ytEqiawFWwN2XH53InbsOL6HlywCD8hT5xP7RBw30EbQ2S5L8hxjSgfP2Em91YvOEYVCYfqDIZ9HnW5hzSqd7ZgrZU1wTJU3wvt8tfPBRNW2IPviC4zsKBydz7gYMsejz9SI9JY4EuX32tpJPgWTdu0pXPKG2gRyt9i7TzoC-R-_aMBTNHpnIMn3kzViYocFoBwvAiT7LveCfCkQ",
  "payload": ""
}
2024-07-10 05:17:36,340:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/374150202447 HTTP/1.1" 200 807
2024-07-10 05:17:36,341:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:34 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eFSVlf8UwxaJv7aTdng0KXvpE9ivaUXtG09oP3OsTaiaZJEByCQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "helix.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-15T04:13:07Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/NY8rUA",
      "status": "pending",
      "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/R0qBhg",
      "status": "pending",
      "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/2vSv0A",
      "status": "pending",
      "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU"
    }
  ]
}
2024-07-10 05:17:36,341:DEBUG:acme.client:Storing nonce: eFSVlf8UwxaJv7aTdng0KXvpE9ivaUXtG09oP3OsTaiaZJEByCQ
2024-07-10 05:17:36,342:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-10 05:17:36,342:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl
2024-07-10 05:17:36,343:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-10 05:17:36,344:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-10 05:17:36,345:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:17:36,346:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-10 05:17:36,346:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-10 05:17:36,346:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-10 05:17:36,348:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:17:36,399:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-10 05:17:36,660:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-10 05:17:36,661:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-10 05:17:36,662:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-10 05:17:36,667:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC.
2024-07-10 05:17:36,667:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:17:36,667:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-10 05:17:36,673:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04BDE790>
Prep: True
2024-07-10 05:17:36,673:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04BDE790> and installer None
2024-07-10 05:17:36,673:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-10 05:17:36,678:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-10 05:17:36,679:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-10 05:17:36,681:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-10 05:17:37,153:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-10 05:17:37,154:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:35 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "4D0WrZ18lhs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-10 05:17:37,154:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-10 05:17:41,769:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8324_key-certbot.pem
2024-07-10 05:17:46,374:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8322_csr-certbot.pem
2024-07-10 05:17:46,374:DEBUG:acme.client:Requesting fresh nonce
2024-07-10 05:17:46,375:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-10 05:17:46,532:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-10 05:17:46,533:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:44 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eFSVlf8UPW43Z0jMXfAKlSUvKhGiEXZYg9nOfQ77SWFu7inPKto
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-10 05:17:46,533:DEBUG:acme.client:Storing nonce: eFSVlf8UPW43Z0jMXfAKlSUvKhGiEXZYg9nOfQ77SWFu7inPKto
2024-07-10 05:17:46,534:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-10 05:17:46,546:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVQVzQzWjBqTVhmQUtsU1V2S2hHaUVYWllnOW5PZlE3N1NXRnU3aW5QS3RvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "VrlCUT0MLE5E2czFCJ0wb0xtTr7p43uWcJ5L0EScrUpGKOJycriNTLgKUFtq-De2Wqc3QRtYkR3LRmHw0rDVteY5FbQM3u0TRNgzdmbPGsG5nfQXz2U5YSLoLmv2jCczYikDcwJo4Wk_66mTYnxikinbg7azolTvQHAqXnINouq5W9KAohR59A_fbdiS2PVq1vhCc6W3TEVCjuBImPgOJr34HNoWKIAOnjmJq3EcDKSBppKl2wYonLBj4qaj8KZk9U-myRQTpG6IJWay07Hqci4-b1zPOHfb72bkr8fNubM0a_L_6JbvOJtFd1lLNv4u5REAozBA_Bukr2WecthR6w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-07-10 05:17:46,727:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-07-10 05:17:46,728:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 10 Jul 2024 03:17:45 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963261767
Replay-Nonce: zgT1AlV-BjP1h3Lu64z_eJflBK_r5X9oOSXOVQORViSToAcyLag
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:18:10Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123357867"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963261767"
}
2024-07-10 05:17:46,728:DEBUG:acme.client:Storing nonce: zgT1AlV-BjP1h3Lu64z_eJflBK_r5X9oOSXOVQORViSToAcyLag
2024-07-10 05:17:46,728:DEBUG:acme.client:JWS payload:
b''
2024-07-10 05:17:46,734:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123357867:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1CalAxaDNMdTY0el9lSmZsQktfcjVYOW9PU1hPVlFPUlZpU1RvQWN5TGFnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMzNTc4NjcifQ",
  "signature": "AHDHFo2DzszrhF8y4j-lwhII4LwwJ4UkmV_6I2QHQ4opj05hKhEXPwi1c_Fk1tZy7jUJ4qWSNLTOOzxwEkqVEsWr77SydL1QumeUh92-_uGURqueGQcoWs3KXLpTC71DWf0VrlvNQz5SqM3PNPToQ9V8vGuitGSlipf74PnuHJxV-5raL-hKhEkwluIGq1wm6WKVs2wF9DFbhhaZ2CmRPYXWsCVChIAX21U-55X9reZPaFjXXLtMdDQhWn1rUCHm6x5oEWZHVzODYEeruQHHNtfaendTFOV0WLo-twQTN-f0ZoDQ7QrrnHW1-2ul1_pROvvSpMUkyWDmYFdXMaR25Q",
  "payload": ""
}
2024-07-10 05:17:46,894:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123357867 HTTP/1.1" 200 806
2024-07-10 05:17:46,896:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:45 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zgT1AlV-zHltSN2LRg3YkMx3stRUPCIeC1PWOs-6fNDXO7ZZH8I
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:18:10Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/mRUn6w",
      "status": "pending",
      "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/Flovww",
      "status": "pending",
      "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/ejtuAg",
      "status": "pending",
      "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU"
    }
  ]
}
2024-07-10 05:17:46,896:DEBUG:acme.client:Storing nonce: zgT1AlV-zHltSN2LRg3YkMx3stRUPCIeC1PWOs-6fNDXO7ZZH8I
2024-07-10 05:17:46,897:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-10 05:17:46,898:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-07-10 05:17:46,899:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-10 05:17:46,899:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-10 05:17:46,901:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:17:46,901:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-10 05:17:46,901:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-10 05:17:46,902:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-10 05:17:46,904:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:17:46,942:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-07-10 05:17:46,943:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:17:46,943:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-07-10 05:17:46,950:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-07-10 05:17:46,952:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-07-10 05:17:46,952:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-07-10 05:17:46,953:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-07-10 05:17:46,953:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-07-10 05:17:46,954:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-07-10 05:17:46,996:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-10 05:17:47,242:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-10 05:17:47,243:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-10 05:17:47,244:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-10 05:17:47,249:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC.
2024-07-10 05:17:47,249:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:17:47,249:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-10 05:17:47,254:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04ED6670>
Prep: True
2024-07-10 05:17:47,255:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04ED6670> and installer None
2024-07-10 05:17:47,255:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-10 05:17:47,259:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-10 05:17:47,260:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-10 05:17:47,262:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-10 05:17:47,696:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-10 05:17:47,698:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:46 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Tk90oSPOY5A": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-10 05:17:47,699:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-10 05:17:52,533:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8325_key-certbot.pem
2024-07-10 05:17:57,021:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8323_csr-certbot.pem
2024-07-10 05:17:57,021:DEBUG:acme.client:Requesting fresh nonce
2024-07-10 05:17:57,021:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-10 05:17:57,166:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-10 05:17:57,166:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:55 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW6yp0nXGM-I0YQtV0AdKit0RjTMJsLENz3pzJAke80JKw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-10 05:17:57,167:DEBUG:acme.client:Storing nonce: oPjXeLW6yp0nXGM-I0YQtV0AdKit0RjTMJsLENz3pzJAke80JKw
2024-07-10 05:17:57,167:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-10 05:17:57,182:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZ5cDBuWEdNLUkwWVF0VjBBZEtpdDBSalRNSnNMRU56M3B6SkFrZTgwSkt3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "KoWc5zcjKdE-cnDiccm3i0c01h3ctfKLu14-v5kWrcO7g7ru9tQqzDWIWimL3S-CBYCbyJ1w0By1CzxaCCyun5RE4ZQMpa9HDqtgDyTSzPvJVyZ7ngFgBny0MQQYmwax6jsb6qnpK6XNBizwaDhCjCXPth_5G4N1btFb8zXErMMgG_-_Dvfq0MMVrV6EOzrCsWET9OunM3fWLutN9L-EJtZwYVJJs4fK4EOC61-0gKUGI6tu--BJh8I_S6Ejd7v_eol4SoUPTnqpEPekbeHzBWTY7OxhzPJiyJMCF-n9SfzCwZNP9WqgxE7LQeELhVhp4_Cz78MSaANoMvr1B8LCcw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-10 05:17:57,349:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-07-10 05:17:57,350:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 10 Jul 2024 03:17:55 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963292297
Replay-Nonce: oPjXeLW6tkha1gcPJpzJn4gNzgZTcfhAAsl-g1vPYKWqPJu1o-g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:18:20Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123407597"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963292297"
}
2024-07-10 05:17:57,350:DEBUG:acme.client:Storing nonce: oPjXeLW6tkha1gcPJpzJn4gNzgZTcfhAAsl-g1vPYKWqPJu1o-g
2024-07-10 05:17:57,350:DEBUG:acme.client:JWS payload:
b''
2024-07-10 05:17:57,356:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123407597:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZ0a2hhMWdjUEpwekpuNGdOemdaVGNmaEFBc2wtZzF2UFlLV3FQSnUxby1nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0MDc1OTcifQ",
  "signature": "NThKhrnaJGnmCX3Jz8iW9uipZMfS6x_sZoQnBNZzQ0XePa0PtUiSJxAifctcZzdR2gSM3B_5L4vyADA3ZMy_TCUUz4Th5DDIRA0oxSDN83p1Iv351xATfAjgCM2t8k_A5bQ5k5IPeHbnFCHMg_HnG1Nj-2vIWvCemf-g5ewL1Vl0FXn4YSztr9I-BSgU5RanHjwnpcwo_C6B8shcvDU2-YeD0_seFWCeh_0f9c046WUzgANL09PQR0aAMNdZ_otkhxr1INjkS61jp6iPVojjy5aKtjH3osfctcvY9MCDLYUSn0kfowwccCIGm7ZjxmGCD1Y3Cuqt_WdfM-RiCH5Eqg",
  "payload": ""
}
2024-07-10 05:17:57,505:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123407597 HTTP/1.1" 200 811
2024-07-10 05:17:57,506:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:55 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgqc9H7y9suHiGKGloabQ-trq56yljE_-JPftEekwhv25E
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:18:20Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/PlHedw",
      "status": "pending",
      "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/IGmPMQ",
      "status": "pending",
      "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/vPSuUg",
      "status": "pending",
      "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM"
    }
  ]
}
2024-07-10 05:17:57,506:DEBUG:acme.client:Storing nonce: EPg6kJgqc9H7y9suHiGKGloabQ-trq56yljE_-JPftEekwhv25E
2024-07-10 05:17:57,508:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-10 05:17:57,508:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-07-10 05:17:57,509:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-10 05:17:57,510:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-10 05:17:57,511:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:17:57,511:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-10 05:17:57,512:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-10 05:17:57,512:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-10 05:17:57,514:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:17:57,553:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-10 05:17:57,766:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-10 05:17:57,768:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-10 05:17:57,769:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-10 05:17:57,773:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC.
2024-07-10 05:17:57,773:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:17:57,773:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-10 05:17:57,778:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04615D30>
Prep: True
2024-07-10 05:17:57,779:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04615D30> and installer None
2024-07-10 05:17:57,779:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-10 05:17:57,785:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-10 05:17:57,786:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-10 05:17:57,788:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-10 05:17:58,238:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-10 05:17:58,239:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:17:56 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "iabqOKtn5es": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-10 05:17:58,239:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-10 05:18:02,890:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8326_key-certbot.pem
2024-07-10 05:18:07,369:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8324_csr-certbot.pem
2024-07-10 05:18:07,370:DEBUG:acme.client:Requesting fresh nonce
2024-07-10 05:18:07,370:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-10 05:18:07,522:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-10 05:18:07,523:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:18:05 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW6-Zp67O8z7PkZSrEQikHhmvpfpAttJeL18AS3eBd87uw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-10 05:18:07,523:DEBUG:acme.client:Storing nonce: oPjXeLW6-Zp67O8z7PkZSrEQikHhmvpfpAttJeL18AS3eBd87uw
2024-07-10 05:18:07,523:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-10 05:18:07,531:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzYtWnA2N084ejdQa1pTckVRaWtIaG12cGZwQXR0SmVMMThBUzNlQmQ4N3V3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "mNoQyyuOHJ6stosx_HxvJyTlv8U91mB1MvDI1-LccfnWmdXf9oRUPLKcztL70NxioZ5LhjM5bt52ePkWfWDAwtSFFpgPcPyW6PtbEPyk5lQ3fokcPDd4ObQ3N9nwGDIvrgQX_Sp07PmEvbrqx1P5W9a-sN5ejI_p2qmnW7LaZfR_ERn6bcJapnE31NC7b9QRVgdl1sQ4q7859zwwbhW7WVk9UvnyuuHtAQwCeHT0dN3OvYv8n_eLr2EZlMAA4KFoJoYiSFc6dUyXCD_IYpTeGg_n-MBlJCE2IDhVgIRx-B2Ffl4Gzc4psThLqavf_av-2-CnIxzMK4V07HjX--yf9w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-10 05:18:07,707:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-07-10 05:18:07,709:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 10 Jul 2024 03:18:06 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963320687
Replay-Nonce: EPg6kJgqelb1SV_S6MfD93OCBHf8-EobRxpZ2gjw5tfXL78h7Hk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:18:30Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123452997"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963320687"
}
2024-07-10 05:18:07,709:DEBUG:acme.client:Storing nonce: EPg6kJgqelb1SV_S6MfD93OCBHf8-EobRxpZ2gjw5tfXL78h7Hk
2024-07-10 05:18:07,710:DEBUG:acme.client:JWS payload:
b''
2024-07-10 05:18:07,718:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123452997:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FlbGIxU1ZfUzZNZkQ5M09DQkhmOC1Fb2JSeHBaMmdqdzV0ZlhMNzhoN0hrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0NTI5OTcifQ",
  "signature": "AukzOfdj6dROyy_dnsMY2jD8CZBDuspl_WKCxs-judD7AWVjUUDaJJrz2MHr8kaD9dMp9GhJp6MhLB7YxdY1C8YFTyZi5S7-2FH3C322MsS0j4j_os19sECBtdZh_0qud7a8XRk5oxoRP9j3a89YLFSpuW_yFuRGjvub1cCyVV1EZNoIZd9KwbtDLl9iFyi2Y1rSzSAqjDaVAi35v-I61ICygMK15rPmna9WvrYs-MboZzONY8AZXOF62wVUYuNiFWT1UAEqfldI9M1Exqj8zBj-wnaEAhj-GnamNb3hF9kt28l2p23PwQHSXcSvnLBBXBK-3OfVMb_3MGnxwRJi3w",
  "payload": ""
}
2024-07-10 05:18:07,886:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123452997 HTTP/1.1" 200 810
2024-07-10 05:18:07,888:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:18:06 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgq_IEGSeJ6JdZGnr3DH7d6er2SLJyohfln3qv0KU-FDH0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:18:30Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/jVGASw",
      "status": "pending",
      "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/HCdluw",
      "status": "pending",
      "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/7JAHfA",
      "status": "pending",
      "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A"
    }
  ]
}
2024-07-10 05:18:07,888:DEBUG:acme.client:Storing nonce: EPg6kJgq_IEGSeJ6JdZGnr3DH7d6er2SLJyohfln3qv0KU-FDH0
2024-07-10 05:18:07,889:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-10 05:18:07,890:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-07-10 05:18:07,891:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-10 05:18:07,891:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-10 05:18:07,893:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:18:07,893:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-10 05:18:07,893:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-10 05:18:07,893:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-10 05:18:07,896:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:18:07,949:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-10 05:18:08,112:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-10 05:18:08,114:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-07-10 05:18:08,115:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-07-10 05:18:08,119:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC.
2024-07-10 05:18:08,119:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:18:08,120:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-10 05:18:08,125:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04BBCCD0>
Prep: True
2024-07-10 05:18:08,125:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04BBCCD0> and installer None
2024-07-10 05:18:08,125:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-10 05:18:08,133:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-10 05:18:08,133:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-10 05:18:08,136:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-10 05:18:08,607:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-10 05:18:08,608:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:18:06 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "XAgHakm-TVA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-10 05:18:08,609:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-10 05:18:13,609:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8327_key-certbot.pem
2024-07-10 05:18:18,112:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8325_csr-certbot.pem
2024-07-10 05:18:18,113:DEBUG:acme.client:Requesting fresh nonce
2024-07-10 05:18:18,113:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-10 05:18:18,270:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-10 05:18:18,271:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:18:16 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zgT1AlV-_kiQNhkBVBbV_LmoqOkUm7BFTEyqAozyo9YcVKRVkoQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-10 05:18:18,272:DEBUG:acme.client:Storing nonce: zgT1AlV-_kiQNhkBVBbV_LmoqOkUm7BFTEyqAozyo9YcVKRVkoQ
2024-07-10 05:18:18,272:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-10 05:18:18,278:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1fa2lRTmhrQlZCYlZfTG1vcU9rVW03QkZURXlxQW96eW85WWNWS1JWa29RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "NpglxS-YuklH7HgLR2HB1z2BMcaR5zDuNu8zZRurDzHjk9koN7RW6f2lBkUlyvh0QunwmE13XFF4T_wS4HoqTmkJjUUiQCD9YExgtkZJp5A9sBA8hAOM9uLvh43dFDKjtdrRVXJyyyTPlKB7S1vF7sN6j3ILyUsdHcSfBay0azsDXvaloVqP8TbtxkPP99roECC-bIuQImPpx8BHwTVduXUfWb8TPN0mZgZ4Nk5Mdf9duCKHwTQw8G3dD6YHkrwE4UIjgIHjPg7PSk9NiJLfqT2zTt74joiqg8EURj8wRuFC-LB39xp1tVwMBQO7Q3jTSK2hGC1rUxAYQYpBg9cx_g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-07-10 05:18:18,460:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-07-10 05:18:18,461:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 10 Jul 2024 03:18:16 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963348157
Replay-Nonce: zgT1AlV-gotj7ygoCEBAlnPBbf2bne8o4FW0ZMSyT9dygQCimt0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:18:40Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123495577"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963348157"
}
2024-07-10 05:18:18,461:DEBUG:acme.client:Storing nonce: zgT1AlV-gotj7ygoCEBAlnPBbf2bne8o4FW0ZMSyT9dygQCimt0
2024-07-10 05:18:18,461:DEBUG:acme.client:JWS payload:
b''
2024-07-10 05:18:18,467:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123495577:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1nb3RqN3lnb0NFQkFsblBCYmYyYm5lOG80RlcwWk1TeVQ5ZHlnUUNpbXQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0OTU1NzcifQ",
  "signature": "q6CCqwavgvhhwE6kbZ0Xdqvqq-wf-LqJDNy2eKP6xlGtWccOsw31M5tdOXC3T8s9pP0HbN4mU5teOSsnBu6ZYzYFGkRgfxdsU8s0dynK_K2w1dKSqS0kzB1hEjvb0Db1ER1P0NX3ViSeLfQbahwYCjCLC2S3cjykHSeOspDjbl67HAskRGAQYwBfsmaRiuoK4ThEe0MRXjX7UT1dZMD8qI1UWRBU796HgCU6hoLxjIJAzDLP12lgtCASFgqWjFomZoVzXkMEHGAu-OWzh4IHAHC8WFT4o_-yga-Ux_a5ARND1gEDcxQwyqKrvJW_ol4-R78vbk6S5Wmt9EH6QZg-DA",
  "payload": ""
}
2024-07-10 05:18:18,645:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123495577 HTTP/1.1" 200 809
2024-07-10 05:18:18,646:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:18:16 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eFSVlf8UhM3LP3DLzguV15GnxuPy0tzfwTNBVKDh7SAFeapD6F8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:18:40Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/CYYT4Q",
      "status": "pending",
      "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/HlKjqg",
      "status": "pending",
      "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/iwR44A",
      "status": "pending",
      "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA"
    }
  ]
}
2024-07-10 05:18:18,646:DEBUG:acme.client:Storing nonce: eFSVlf8UhM3LP3DLzguV15GnxuPy0tzfwTNBVKDh7SAFeapD6F8
2024-07-10 05:18:18,646:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-10 05:18:18,647:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-07-10 05:18:18,648:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-10 05:18:18,648:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-10 05:18:18,649:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:18:18,649:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-10 05:18:18,649:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-10 05:18:18,650:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-10 05:18:18,651:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:18:18,711:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-10 05:18:18,923:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-10 05:18:18,924:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2024-07-10 05:18:18,925:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2024-07-10 05:18:18,929:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC.
2024-07-10 05:18:18,929:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:18:18,930:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-10 05:18:18,935:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x009959F0>
Prep: True
2024-07-10 05:18:18,935:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x009959F0> and installer None
2024-07-10 05:18:18,935:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-10 05:18:18,940:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-10 05:18:18,940:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-10 05:18:18,942:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-10 05:18:19,415:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-10 05:18:19,417:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:18:17 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "ycSP2Ziogdw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-07-10 05:18:19,418:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-10 05:18:24,091:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8328_key-certbot.pem
2024-07-10 05:18:28,635:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8326_csr-certbot.pem
2024-07-10 05:18:28,637:DEBUG:acme.client:Requesting fresh nonce
2024-07-10 05:18:28,637:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-10 05:18:28,793:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-10 05:18:28,794:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:18:27 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zgT1AlV-H8D2lEzqJWTdUeG5POniItxBtNK3PjCo6nWOLmDPF8Q
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-10 05:18:28,794:DEBUG:acme.client:Storing nonce: zgT1AlV-H8D2lEzqJWTdUeG5POniItxBtNK3PjCo6nWOLmDPF8Q
2024-07-10 05:18:28,794:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-10 05:18:28,802:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1IOEQybEV6cUpXVGRVZUc1UE9uaUl0eEJ0TkszUGpDbzZuV09MbURQRjhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "jaFTRV-zaenWCogFy3NjKbGX4BnCiqU5P8YXlvZsBtYfgidYOTysZsyuGCPv4rs3pdTX-aa__TgwTIWzhtex6K_X95P6xGMMym14Cseeml0IuD-sRv75sEr3add_KdKx1HSQKfQMMZjqzYCUNo2C_-Z5T_wpPlKrwdFEi0VDKov5ev37ArWaJcyFkBXfZfmCLXfuCpnYcnw26XQaZQ08u2CkS8JuFKB5HP41S_CuVpazCJ_XUePWUocmZaZ7kQr09VR74jSVIH2QcUf-CDAm71ZiF3PYBxh8ioFGLmeNsEUAnHgEnhypB1rLu0T2XF2zDDA9cQ-Zouang1zEnQtlsw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-10 05:18:28,980:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-07-10 05:18:28,981:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 10 Jul 2024 03:18:27 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963374667
Replay-Nonce: eFSVlf8Uj6YRtJNFJsg1gyAiMWV-4C5e6dVtuFowYIhXTerMGFk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:18:51Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123535867"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963374667"
}
2024-07-10 05:18:28,982:DEBUG:acme.client:Storing nonce: eFSVlf8Uj6YRtJNFJsg1gyAiMWV-4C5e6dVtuFowYIhXTerMGFk
2024-07-10 05:18:28,982:DEBUG:acme.client:JWS payload:
b''
2024-07-10 05:18:28,988:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123535867:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVqNllSdEpORkpzZzFneUFpTVdWLTRDNWU2ZFZ0dUZvd1lJaFhUZXJNR0ZrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM1MzU4NjcifQ",
  "signature": "qmZ2DHsFEBok22G2XoGvqiV4QGbrI4q7eQqeqroU_lccGMLDNJm7Way_eK10FXtjD-LaRG8WaBayIJZfHMNA9HXArT-ux7Ug4t-OUdHbciLtoYr-gf7F58bsQBgmvwPoNcigkRITdNrMf_nVG4E4xkNVtMIWbi1FhY17389EsNStDOWNwWbtqJOJhLeemxH5m3sBvaDkLbeD93gff_CJBNlq14MQFpXP6YfA08OblE0HUpYaKOUX-MgIhHQ44C9zGGGHwlOgkN2AuJ5GTJxXIyuP9Z5EKWX8y28JNszQMTipToWHo03n1EQQS1G47qmcL-JKcO0aOXUoKLkIjxpEWw",
  "payload": ""
}
2024-07-10 05:18:29,147:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123535867 HTTP/1.1" 200 805
2024-07-10 05:18:29,148:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:18:27 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eFSVlf8UhjJ_z6GFLlFDRwxCMFoRvqG2WhYpRzHIJy4AiUm-_hk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:18:51Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/7949-Q",
      "status": "pending",
      "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/1xlmxg",
      "status": "pending",
      "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/Gfn7VQ",
      "status": "pending",
      "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8"
    }
  ]
}
2024-07-10 05:18:29,148:DEBUG:acme.client:Storing nonce: eFSVlf8UhjJ_z6GFLlFDRwxCMFoRvqG2WhYpRzHIJy4AiUm-_hk
2024-07-10 05:18:29,149:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-10 05:18:29,149:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-07-10 05:18:29,150:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-10 05:18:29,151:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-10 05:18:29,153:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:18:29,153:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-10 05:18:29,154:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-10 05:18:29,154:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-10 05:18:29,156:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:18:29,197:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-10 05:18:29,454:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-10 05:18:29,455:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-10 05:18:29,456:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-10 05:18:29,460:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC.
2024-07-10 05:18:29,461:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:18:29,461:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-10 05:18:29,469:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x009AB350>
Prep: True
2024-07-10 05:18:29,470:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x009AB350> and installer None
2024-07-10 05:18:29,470:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-10 05:18:29,475:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-10 05:18:29,476:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-10 05:18:29,478:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-10 05:18:29,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-10 05:18:29,961:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:18:28 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "FO3sDXGcXj0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-10 05:18:29,962:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-10 05:18:34,855:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8329_key-certbot.pem
2024-07-10 05:18:39,309:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8327_csr-certbot.pem
2024-07-10 05:18:39,310:DEBUG:acme.client:Requesting fresh nonce
2024-07-10 05:18:39,310:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-10 05:18:39,470:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-10 05:18:39,471:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:18:37 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zgT1AlV-tWhzOAr9mCQ5azwKVnNvqn300ppd7d7g9hMwd8QlYlk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-10 05:18:39,471:DEBUG:acme.client:Storing nonce: zgT1AlV-tWhzOAr9mCQ5azwKVnNvqn300ppd7d7g9hMwd8QlYlk
2024-07-10 05:18:39,471:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-10 05:18:39,478:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi10V2h6T0FyOW1DUTVhendLVm5OdnFuMzAwcHBkN2Q3ZzloTXdkOFFsWWxrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "GmAKcxP2rhAF6SxJsvnSxigBHlkKSyR6MxKn9ru-q7tb_xIUyIiJdtGjeYPrDw4guqxK8SR3XIW6_zkCVv1IGM-McT2bu382nJMDR55lQa1xQ4hyxpZz2S9la6yMDQK6XRQyBIONodz5cn2wrhQ81N6wwUREaAc6CRbrm6JO1TLndKIMfuQS-SlypWgQTBJdoxl7-CvvVqlOGn1FipGt_wm_DiXQ8Kw_yf8Bv1lXoVXlIgdTEFxM0OemdhwMi9Bgm51QxAkwRts_uWR-NBwy-VgSO_kMimLs--feFqeih4dL-xR0a2o4Kg0p6lRAE4nKnETKBgPORpWYazD6HBtdzg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-10 05:18:39,666:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-07-10 05:18:39,667:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 10 Jul 2024 03:18:38 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963400877
Replay-Nonce: zgT1AlV-pwDuQ5leRLi4fZe8AiFZOhFeteWH0Kk5YUVO_Xhlels
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:19:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123574347"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963400877"
}
2024-07-10 05:18:39,667:DEBUG:acme.client:Storing nonce: zgT1AlV-pwDuQ5leRLi4fZe8AiFZOhFeteWH0Kk5YUVO_Xhlels
2024-07-10 05:18:39,667:DEBUG:acme.client:JWS payload:
b''
2024-07-10 05:18:39,673:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123574347:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1wd0R1UTVsZVJMaTRmWmU4QWlGWk9oRmV0ZVdIMEtrNVlVVk9fWGhsZWxzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM1NzQzNDcifQ",
  "signature": "CSmWNxmM8VnVHRal6CjNxUnbWlhSrlEwQuLi6W7cAMc6FIaY2SsDya9IGht3Ijj3VhI679bs9zWl8r4GQckpFoY76CmtSeiTXPvUShsrKeW88Msff4gnzLhR-Z6tnBLlI7NCszl1Y3Wq7oyP-GoDKGrRG3KjuTsmKAXupZEuxSjJpU_Aj5W6WcLUi0bJHwB95BqK0lQtlo3M_qmjvsPLH69Ox2jIdJk7kYbhvcvVA1ieG04GezuNRg8wuCCBJ22f-YDMqOqtMoHfC-F6AzFHugKXSg2fSz6wZnPgX4Y1xRfGih1LpZOhZ99gkmtXWb4gcRKKQSeuWB9OzQIvuc8Euw",
  "payload": ""
}
2024-07-10 05:18:39,836:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123574347 HTTP/1.1" 200 805
2024-07-10 05:18:39,837:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:18:38 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eFSVlf8UUiblzbYUoPAQ-m8hcWv2-tHiOom2SJ31VSfPgGRBpMc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:19:01Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/NeAJIw",
      "status": "pending",
      "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/4slvLA",
      "status": "pending",
      "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/_5WNoA",
      "status": "pending",
      "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU"
    }
  ]
}
2024-07-10 05:18:39,837:DEBUG:acme.client:Storing nonce: eFSVlf8UUiblzbYUoPAQ-m8hcWv2-tHiOom2SJ31VSfPgGRBpMc
2024-07-10 05:18:39,838:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-10 05:18:39,838:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-07-10 05:18:39,839:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-10 05:18:39,839:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-10 05:18:39,840:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:18:39,840:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-10 05:18:39,840:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-10 05:18:39,840:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-10 05:18:39,841:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:18:39,892:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-10 05:18:40,114:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-10 05:18:40,116:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-07-10 05:18:40,116:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-07-10 05:18:40,121:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC.
2024-07-10 05:18:40,122:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-10 05:18:40,122:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-10 05:18:40,128:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04EC7B90>
Prep: True
2024-07-10 05:18:40,128:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04EC7B90> and installer None
2024-07-10 05:18:40,128:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-10 05:18:40,133:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-10 05:18:40,134:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-10 05:18:40,136:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-10 05:18:40,584:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-10 05:18:40,585:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:18:38 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "ZPAEtjFqCvw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-10 05:18:40,585:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-10 05:18:45,227:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8330_key-certbot.pem
2024-07-10 05:18:49,686:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8328_csr-certbot.pem
2024-07-10 05:18:49,687:DEBUG:acme.client:Requesting fresh nonce
2024-07-10 05:18:49,687:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-10 05:18:49,835:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-10 05:18:49,836:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:18:48 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW6p37tCL5I4gOx8xcPwUSNENNSmyuVqwo6OVOsEqpQdQQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-10 05:18:49,836:DEBUG:acme.client:Storing nonce: oPjXeLW6p37tCL5I4gOx8xcPwUSNENNSmyuVqwo6OVOsEqpQdQQ
2024-07-10 05:18:49,836:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-10 05:18:49,848:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZwMzd0Q0w1STRnT3g4eGNQd1VTTkVOTlNteXVWcXdvNk9WT3NFcXBRZFFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "vx1bfzSWaGatc1tMtXuITGGWkMlHhqXkIUttbSVU8lFlulFZaXZkLgCtGBweoGLXwM5AnrmiV_cPDd0pd73GEl7vJOTfDdmPZ3YUJnbnjSeueZdwXDQZghvPJRQx2w3NdG4a-EmqPXSHeNV4FnJ65l5Ido70_0OHkKO8ylm3wsn2O0fQ-gW46HUD-FxdCvgvvlWO1rWmssmKBlW3RNccW7dI5IZbyJ8e9rF26VkmLtUQByptjTOdQx1GPzwON39mSxQZUcuSpgbQa1ClZAZbznwXiY8aUDZXE2wvlURK245UCYdNlmJ9n9mr3VWaQlUupFUzBzBe5TP3mYwetL8dFQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-10 05:18:50,010:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-07-10 05:18:50,011:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 10 Jul 2024 03:18:48 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963440917
Replay-Nonce: EPg6kJgqCWDo7IlVFk5HHX2M-u-WW_NbZzKmNn97HT9B2zkOUWE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:19:11Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123633137"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963440917"
}
2024-07-10 05:18:50,011:DEBUG:acme.client:Storing nonce: EPg6kJgqCWDo7IlVFk5HHX2M-u-WW_NbZzKmNn97HT9B2zkOUWE
2024-07-10 05:18:50,011:DEBUG:acme.client:JWS payload:
b''
2024-07-10 05:18:50,017:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123633137:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FDV0RvN0lsVkZrNUhIWDJNLXUtV1dfTmJaekttTm45N0hUOUIyemtPVVdFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM2MzMxMzcifQ",
  "signature": "YI2rMIHlgUqUslZGeKaO_6xfoBgZ_jgg0jbzgoofZYn1hrC7rvBD0AZlNPLcYCH8UBz-KTKXDPnTeb4I9Ct0sL1sEk-SdR29Qmg8MdK-JayXRl1e8vNAY6A9bG2fM8Hshqwi0rYp2Lea2eMvVSo8hHVLAR-GKoLz-r9z-3EQdhXAFm-Cf49XqKCha2Rd6nE2VTlLrL8Ruq9IOy7digKDPR96Ve-P3tBKc74JCrZKBPLhn_C5CUJjwyAd0jO8QlNtmHdXKAXPyQkHLSq-EkUJWdfOVf0tX8dH68YTpaDc_yTmxHevrWcsiAC4ULR2gws0pjugZJjG6rmNArh2w38ePw",
  "payload": ""
}
2024-07-10 05:18:50,171:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123633137 HTTP/1.1" 200 805
2024-07-10 05:18:50,173:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 10 Jul 2024 03:18:48 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW6P1vU85BsC8xQjZlkQhJBFTqmPk00B1bv8EPxJ7grV80
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:19:11Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/cKgBUw",
      "status": "pending",
      "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/fI1u_A",
      "status": "pending",
      "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/N6igCw",
      "status": "pending",
      "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A"
    }
  ]
}
2024-07-10 05:18:50,173:DEBUG:acme.client:Storing nonce: oPjXeLW6P1vU85BsC8xQjZlkQhJBFTqmPk00B1bv8EPxJ7grV80
2024-07-10 05:18:50,174:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-10 05:18:50,175:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-07-10 05:18:50,176:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-10 05:18:50,176:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-10 05:18:50,177:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:18:50,178:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-10 05:18:50,178:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-10 05:18:50,178:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-10 05:18:50,179:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-10 05:18:50,179:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-07-10 05:18:50,180:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-07-10 05:18:50,193:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 15 renew failure(s), 0 parse failure(s)
2024-07-10 05:18:50,194:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)