2024-06-29 07:54:15,505:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-06-29 07:54:15,505:DEBUG:certbot._internal.main:Arguments: []
2024-06-29 07:54:15,505:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-06-29 07:54:16,286:DEBUG:certbot._internal.log:Root logging level set at 20
2024-06-29 07:54:16,286:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-06-29 07:54:16,325:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x044F44F0> and installer <certbot._internal.cli.cli_utils._Default object at 0x044F44F0>
2024-06-29 07:54:16,365:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-29 07:54:16,635:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-29 07:54:16,648:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer.
2024-06-29 07:54:16,652:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD
2024-06-29 07:54:16,661:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC.
2024-06-29 07:54:16,661:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-29 07:54:16,661:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-29 07:54:16,666:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03F1E430>
Prep: True
2024-06-29 07:54:16,666:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03F1E430> and installer None
2024-06-29 07:54:16,667:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-29 07:54:16,673:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-29 07:54:16,674:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-29 07:54:16,677:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-29 07:54:17,157:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-29 07:54:17,158:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:54:16 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "wAiGHSLM-cc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-06-29 07:54:17,159:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-29 07:54:22,093:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8027_key-certbot.pem
2024-06-29 07:54:26,688:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8025_csr-certbot.pem
2024-06-29 07:54:26,688:DEBUG:acme.client:Requesting fresh nonce
2024-06-29 07:54:26,688:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-29 07:54:26,844:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-29 07:54:26,844:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:54:25 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jqVAJFJ0ZZHplFuQzvHGfEQq7mPjP-z2btmDVu1p8ziVHLiZrB4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-29 07:54:26,845:DEBUG:acme.client:Storing nonce: jqVAJFJ0ZZHplFuQzvHGfEQq7mPjP-z2btmDVu1p8ziVHLiZrB4
2024-06-29 07:54:26,845:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-29 07:54:26,851:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBaWkhwbEZ1UXp2SEdmRVFxN21QalAtejJidG1EVnUxcDh6aVZITGlackI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "RSYnQX2vzxUkDTxnr8ocMWVMgSIiENShKKpuJBO9tGqiocmt0XrvNsyRA7OX91ada7Pfla2eX2ukW3vFF8qOClKeWAo525ai3PcUG0AzCAmA1UQSQU_A8cbAwHrFMx_WDNuQMNl3xb_5g_y72Man3I9rUAiSZiV0vPmRpKeDujDtax5rFFCACr76cqA8wrDhEAIiGEZ3AjT-cw4_C4vzIL0dCjwKFPrJIHvclq4nwrN91KjSI4ZutZxO1igM0JAm34Dqhd1eYhn1b_c6_gzuy20tgAPGA7iWuUUzSufeh4lzamjUNGYwywa5vEQiGll70a54BDLealKXgsqt2PP47g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-06-29 07:54:27,115:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-06-29 07:54:27,116:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 29 Jun 2024 05:54:26 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824128037
Replay-Nonce: qqMiT6CkVhCmSnKx1aoYGEp2HCLxgNm3lnK7G1IoGE5mJ4BdIaU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:00:50Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824128037"
}
2024-06-29 07:54:27,116:DEBUG:acme.client:Storing nonce: qqMiT6CkVhCmSnKx1aoYGEp2HCLxgNm3lnK7G1IoGE5mJ4BdIaU
2024-06-29 07:54:27,116:DEBUG:acme.client:JWS payload:
b''
2024-06-29 07:54:27,122:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tWaENtU25LeDFhb1lHRXAySENMeGdObTNsbks3RzFJb0dFNW1KNEJkSWFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU0NDY3MzcifQ",
  "signature": "jATxtzN7PKvZFyRelOFx6JfsdVltmRPy-p1vbzPeuKxOgXwBMEGDZux40xhMJocpUTAC-qohh7ey4DwTK-jUwYer7nD9PkO8kZJeSp8_QXgbRsS7oBHum9QJ4rJSmMqSpNVVkzAZi8Q-rczwCA2QQ2S5pjXoMe_Yc5lmUwxMJ-LowVqFFfNVnLeTWxgTY5oGMXwoWqsiqdZt_L2-2Goupat8TFTTsld30oneq-H_OKqctPWd9-dmh8GtEJHRfnQ7ISwtxwXUFafobxz43bzFZUC9_kiAUdFsD72qjZMq3Zb-yYkpKrN137_ZSFolTfYniRs3DesuXcTWEndLFqpYsQ",
  "payload": ""
}
2024-06-29 07:54:27,284:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985446737 HTTP/1.1" 200 810
2024-06-29 07:54:27,284:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:54:26 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jqVAJFJ0ypZKWMEVMIIH4geiapnsXgKPgPkf8vB_sx_QrE5UB6o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:00:50Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/KAQe7Q",
      "status": "pending",
      "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Sd6_7w",
      "status": "pending",
      "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Ra3-nA",
      "status": "pending",
      "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ"
    }
  ]
}
2024-06-29 07:54:27,285:DEBUG:acme.client:Storing nonce: jqVAJFJ0ypZKWMEVMIIH4geiapnsXgKPgPkf8vB_sx_QrE5UB6o
2024-06-29 07:54:27,285:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-29 07:54:27,285:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-06-29 07:54:27,286:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-29 07:54:27,286:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-29 07:54:27,299:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:54:27,299:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-29 07:54:27,300:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-29 07:54:27,300:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-29 07:54:27,305:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:54:27,348:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-29 07:54:27,585:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-29 07:54:27,586:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-06-29 07:54:27,587:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-06-29 07:54:27,592:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC.
2024-06-29 07:54:27,592:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-29 07:54:27,592:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-29 07:54:27,597:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x044D3AF0>
Prep: True
2024-06-29 07:54:27,597:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x044D3AF0> and installer None
2024-06-29 07:54:27,597:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-29 07:54:27,616:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-29 07:54:27,618:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-29 07:54:27,623:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-29 07:54:28,063:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-29 07:54:28,064:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:54:27 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "HfrHO-BHpQI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-29 07:54:28,065:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-29 07:54:32,976:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8028_key-certbot.pem
2024-06-29 07:54:37,184:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8026_csr-certbot.pem
2024-06-29 07:54:37,184:DEBUG:acme.client:Requesting fresh nonce
2024-06-29 07:54:37,184:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-29 07:54:37,332:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-29 07:54:37,333:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:54:36 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9HaFAmoAsfNtFA-TP-OnyculQptwM05I2eGNAdT7_ayU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-29 07:54:37,333:DEBUG:acme.client:Storing nonce: eF-2qMJ9HaFAmoAsfNtFA-TP-OnyculQptwM05I2eGNAdT7_ayU
2024-06-29 07:54:37,333:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-29 07:54:37,339:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlIYUZBbW9Bc2ZOdEZBLVRQLU9ueWN1bFFwdHdNMDVJMmVHTkFkVDdfYXlVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "qA6jU5fFW6yLFE1b99dmcm_a6YJYf-Q4spQqlbzdVfhNmg3-y9lqWR9ZlAhMFOIvDbrrnJFmb4D2mb3AxE2wNVkBgDiR8H8o6IZ-HpfdnOsGhJ33nPHqw8JjR-QcMY93axbaWzMKA0nVeyw4bHjTXKXgAEUVXkkgquilkQPAulQICJHzj_kPP_Ht7-liiYEIGnq1P8GLepcQ-EN6lTNuryrEseRfHJATj-08XjocuocXWKBRAsNxqO2BznEum2dGXgvr0oX_ghSckLD3jrDH_QUoInV1M3-UFPLaqtQlhuTidL2wM_KGZaV22GDO8QPqNn8qrJ8jEkhG5vFxjvv2pw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-06-29 07:54:37,584:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-06-29 07:54:37,585:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 29 Jun 2024 05:54:36 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824165847
Replay-Nonce: B-hK_YLC6dYMIRKRHLBsipdVsRYfS5lnqstYIXRxvuKDselrqGQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824165847"
}
2024-06-29 07:54:37,585:DEBUG:acme.client:Storing nonce: B-hK_YLC6dYMIRKRHLBsipdVsRYfS5lnqstYIXRxvuKDselrqGQ
2024-06-29 07:54:37,585:DEBUG:acme.client:JWS payload:
b''
2024-06-29 07:54:37,591:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEM2ZFlNSVJLUkhMQnNpcGRWc1JZZlM1bG5xc3RZSVhSeHZ1S0RzZWxycUdRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1MDMwODcifQ",
  "signature": "aoTmNE8Laeif49JxhdwnuphMWx3cwYonwjeLjlTMathj1VJrl7mhTQtFuGc2BH5sarhlsdEDYkIe_sCuev8PIl9LhtdAWGMX6SOQrVhckrhdziBaVGufTZnYEnxTn2j66M_bgN2C6BGFchbf37QjQdo42KLinFIXJZxDa2Bq7o2DutEsNCuQGZCD0Het2Gkb2yUmV3rIhDBQ_u86TdeLjw5D9_0A4fHGqLrYlsTtFO8jCFdPiA2cwA_3Gds0OeBxBepGMbGXsOI4SgLV1PHudrb32SrpyilET2cPQ_1OpD3u10jApAaJDR-6_6lNGjr2NaAtG7S24wh_0HpwrpLclQ",
  "payload": ""
}
2024-06-29 07:54:37,742:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985503087 HTTP/1.1" 200 804
2024-06-29 07:54:37,743:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:54:36 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9vTVNj7to-xh4yeE1hMaWieIwrsMHoOgY2xg7_lT0THo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:01Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/6TW65g",
      "status": "pending",
      "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/HbqBvA",
      "status": "pending",
      "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/f36r8w",
      "status": "pending",
      "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ"
    }
  ]
}
2024-06-29 07:54:37,743:DEBUG:acme.client:Storing nonce: eF-2qMJ9vTVNj7to-xh4yeE1hMaWieIwrsMHoOgY2xg7_lT0THo
2024-06-29 07:54:37,744:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-29 07:54:37,744:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-06-29 07:54:37,745:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-29 07:54:37,745:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-29 07:54:37,746:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:54:37,746:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-29 07:54:37,746:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-29 07:54:37,746:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-29 07:54:37,747:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:54:37,796:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-29 07:54:38,058:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-29 07:54:38,059:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-06-29 07:54:38,060:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-06-29 07:54:38,064:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC.
2024-06-29 07:54:38,065:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-29 07:54:38,065:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-29 07:54:38,070:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x044F0A90>
Prep: True
2024-06-29 07:54:38,070:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x044F0A90> and installer None
2024-06-29 07:54:38,070:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-29 07:54:38,075:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-29 07:54:38,076:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-29 07:54:38,078:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-29 07:54:38,544:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-29 07:54:38,546:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:54:37 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "AjFtcPlK6-M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-29 07:54:38,547:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-29 07:54:43,354:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8029_key-certbot.pem
2024-06-29 07:54:47,570:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8027_csr-certbot.pem
2024-06-29 07:54:47,571:DEBUG:acme.client:Requesting fresh nonce
2024-06-29 07:54:47,571:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-29 07:54:47,727:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-29 07:54:47,728:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:54:46 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qqMiT6Ck1UdX7mhVmZvf14TZf5NdBlKOmT6EydVdtAMHTm0YlnE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-29 07:54:47,728:DEBUG:acme.client:Storing nonce: qqMiT6Ck1UdX7mhVmZvf14TZf5NdBlKOmT6EydVdtAMHTm0YlnE
2024-06-29 07:54:47,728:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-29 07:54:47,736:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2sxVWRYN21oVm1admYxNFRaZjVOZEJsS09tVDZFeWRWZHRBTUhUbTBZbG5FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "kGhemZc6dCxlLI1qxZZ3ZjYYdrgkxu-aTApfdm2WcZXzFVBVee_6npeWYI0woQjJ7KOq5yavqP2rOK2gdXTVrf-SqFsgf_QvM1FbtxCBu8u_SbAWgcM8GuD4cVylpkX99Rrus6AoNFX2XflyuYBSVM4xIxT4Yrr5vnrjOc74kjdqy6LSBcTKlSVpPGb8oOfEtPb-HF_7lpUjesVAsM216G5oUVgfKSgtlAhLC3zjcroOOmXxoDnBaBPkcOfewC1F6SNXiuJoC1OmKEPHRHHAqml6rVFNJsw8glCte2VupjGCOuSlPnKHUuoZmizqzVOGGvFCVC68lbM_X76UeGyTWg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-06-29 07:54:47,904:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-06-29 07:54:47,904:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 29 Jun 2024 05:54:46 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824216467
Replay-Nonce: jqVAJFJ0N1yzE04R5DPaBBznWYQv2qHWJ9CT8v3T2iG-Vtoom1o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:11Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824216467"
}
2024-06-29 07:54:47,905:DEBUG:acme.client:Storing nonce: jqVAJFJ0N1yzE04R5DPaBBznWYQv2qHWJ9CT8v3T2iG-Vtoom1o
2024-06-29 07:54:47,905:DEBUG:acme.client:JWS payload:
b''
2024-06-29 07:54:47,912:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBOMXl6RTA0UjVEUGFCQnpuV1lRdjJxSFdKOUNUOHYzVDJpRy1WdG9vbTFvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1NzQxNzcifQ",
  "signature": "QjTLC9jHNZaYRRXsz4EeWPSGGLcw67OXK8Fcy6a3Z5r3lA3l_ZCjwfXxVPmMHKaJspZtY7b3Ofa-WNz4B4lHBjAXYJowBu1IIKQQ0PJCIL0YDSdCiajZUqqgV-djBgEfrZT5PZq_v1WVrM7r7wKLumpiOxYib0kVFET7oFE-H6ZMPVfdMBztmkljCt80OJ1wzQNXlw4EPGntQ4ynIoMkQxkwSkXftDARTevy88Sjy0a23ljRFKBPovfdsM9i9jpStsg8kOrSMkUmEDtAp8-aibam80RkbiLrbdc0YtEjPcHXvgDN1pdH1y6D04evAl7h8ArpuwHjhhGMecPvXBCcMw",
  "payload": ""
}
2024-06-29 07:54:48,075:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985574177 HTTP/1.1" 200 807
2024-06-29 07:54:48,076:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:54:47 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jqVAJFJ0XugStBveM3bCY3szDgLTmDqKvlbmPqy3E9vhhD2AGlw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:11Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/RO51fg",
      "status": "pending",
      "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/APGIHQ",
      "status": "pending",
      "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/4l4xCQ",
      "status": "pending",
      "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs"
    }
  ]
}
2024-06-29 07:54:48,077:DEBUG:acme.client:Storing nonce: jqVAJFJ0XugStBveM3bCY3szDgLTmDqKvlbmPqy3E9vhhD2AGlw
2024-06-29 07:54:48,078:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-29 07:54:48,078:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-06-29 07:54:48,079:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-29 07:54:48,079:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-29 07:54:48,081:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:54:48,081:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-29 07:54:48,081:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-29 07:54:48,082:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-29 07:54:48,084:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:54:48,124:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-29 07:54:48,304:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-29 07:54:48,306:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-06-29 07:54:48,307:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-06-29 07:54:48,312:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC.
2024-06-29 07:54:48,312:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-29 07:54:48,313:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-29 07:54:48,318:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x044F0A90>
Prep: True
2024-06-29 07:54:48,318:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x044F0A90> and installer None
2024-06-29 07:54:48,319:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-29 07:54:48,324:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-29 07:54:48,325:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-29 07:54:48,327:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-29 07:54:48,765:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-29 07:54:48,766:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:54:47 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "_FL0kJnjP_0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-29 07:54:48,767:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-29 07:54:53,135:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8030_key-certbot.pem
2024-06-29 07:54:57,388:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8028_csr-certbot.pem
2024-06-29 07:54:57,389:DEBUG:acme.client:Requesting fresh nonce
2024-06-29 07:54:57,389:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-29 07:54:57,535:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-29 07:54:57,537:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:54:56 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: B-hK_YLCVKU19djSo7FqFQ5DM5Kv8q9X-FFo-qyuv5_9NSTL5TE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-29 07:54:57,537:DEBUG:acme.client:Storing nonce: B-hK_YLCVKU19djSo7FqFQ5DM5Kv8q9X-FFo-qyuv5_9NSTL5TE
2024-06-29 07:54:57,537:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-06-29 07:54:57,549:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENWS1UxOWRqU283RnFGUTVETTVLdjhxOVgtRkZvLXF5dXY1XzlOU1RMNVRFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ZuBt0G4paFkMl5Hl9tRnaY5gpd73levA7L58c8d_98oETChvDt5hVSa1dhhmVMTv1u3mZWOsy7nVZnhN-_lt7nuMED8Z-88gyigJCDmZln85yUG3EvvnkBwoDJuHHbYEuzCWnSwx2b93LuC_TRHYj4j3Gk16CpnHJL3LtFSyT_9U_iI8UovDk6Jaz_dUvnt5YFCoTVo29BG8-2ci2VgLjFWhlDqjE6Aqiv_sFDfHp56rx1_TOpaiz-HJpMT5n3zoLsUDVBSeHbAaGfJlE-Em_FU9Xob7GY6sEkV9IQxqWDiK9wr8kvDUCSVrkyduPpdzuNDrc_lL9X4x9cLM-QeL5Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-06-29 07:54:57,772:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-06-29 07:54:57,773:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 29 Jun 2024 05:54:56 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824261497
Replay-Nonce: eF-2qMJ9K5DA8BLkD8ss2qCSYf__FX_MhhvT8AkBjFXFIsnl09A
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:21Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824261497"
}
2024-06-29 07:54:57,773:DEBUG:acme.client:Storing nonce: eF-2qMJ9K5DA8BLkD8ss2qCSYf__FX_MhhvT8AkBjFXFIsnl09A
2024-06-29 07:54:57,774:DEBUG:acme.client:JWS payload:
b''
2024-06-29 07:54:57,787:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlLNURBOEJMa0Q4c3MycUNTWWZfX0ZYX01oaHZUOEFrQmpGWEZJc25sMDlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2NDA4NTcifQ",
  "signature": "dNtkEWej5sOOGMgIeu4580iI9-WRT35BRQlQNDM7KAGQUEkOJ9wzGfMBJmWu9mG109WU6i0bl90ATEOEPmDnTdpatZJWQs7J_qvFMoMD3Rz59sOvYutnlclV9YYy23TS4WEffQGmDZnm77K3d7PppTiMtxFYMMuBGkPyWtmYGUZhd0WJBKgWQFTxO6loqLnGhHxrwKkzfKzVvjoCVxZlfcD2PqmQKq88RTQW5GKWkF7kq4uK-XJJxOKNr9mHS_TYNGJE4kvuzz-C7l0NaEAoTqY5uOqIU9538JC_ZBGr-YvGBK5cXqvAZaZiIFnt9TVzFOLLy2pThLuWZ59ulmi00Q",
  "payload": ""
}
2024-06-29 07:54:57,945:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985640857 HTTP/1.1" 200 801
2024-06-29 07:54:57,945:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:54:56 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: B-hK_YLC4sTLkppwuzshzVPjvQXka96TRZIGDKUs92bW6cBMqXg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:21Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/_W_uNw",
      "status": "pending",
      "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/1XcAQA",
      "status": "pending",
      "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/a1s51Q",
      "status": "pending",
      "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs"
    }
  ]
}
2024-06-29 07:54:57,945:DEBUG:acme.client:Storing nonce: B-hK_YLC4sTLkppwuzshzVPjvQXka96TRZIGDKUs92bW6cBMqXg
2024-06-29 07:54:57,946:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-29 07:54:57,946:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-06-29 07:54:57,946:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-29 07:54:57,946:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-29 07:54:57,947:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:54:57,947:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-29 07:54:57,947:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-29 07:54:57,947:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-29 07:54:57,948:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:54:57,999:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-29 07:54:58,182:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-29 07:54:58,183:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-06-29 07:54:58,184:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-06-29 07:54:58,188:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC.
2024-06-29 07:54:58,188:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-29 07:54:58,189:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-29 07:54:58,194:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x044F0A90>
Prep: True
2024-06-29 07:54:58,194:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x044F0A90> and installer None
2024-06-29 07:54:58,194:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-29 07:54:58,199:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-29 07:54:58,200:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-29 07:54:58,202:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-29 07:54:58,639:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-29 07:54:58,639:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:54:57 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "epp7PecrCy0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-29 07:54:58,640:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-29 07:55:03,644:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8031_key-certbot.pem
2024-06-29 07:55:07,872:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8029_csr-certbot.pem
2024-06-29 07:55:07,872:DEBUG:acme.client:Requesting fresh nonce
2024-06-29 07:55:07,872:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-29 07:55:08,018:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-29 07:55:08,019:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:07 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9gLi3rszeP4QvHz54KsExaHwpbiA9asqupUEnWK5aduM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-29 07:55:08,019:DEBUG:acme.client:Storing nonce: eF-2qMJ9gLi3rszeP4QvHz54KsExaHwpbiA9asqupUEnWK5aduM
2024-06-29 07:55:08,019:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-29 07:55:08,025:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlnTGkzcnN6ZVA0UXZIejU0S3NFeGFId3BiaUE5YXNxdXBVRW5XSzVhZHVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "w7wLY1ytFpaLzUeoyf-vy6mnKzw4bXVjfcC8JGEwiNAz83mhMxVgHDgOUSnUNN6nFJHAqjQlt5Ytgo6lrpRjUAr0fypqBlLK4pw4eETpq1IwX8wjnSAAlQcF7bh_VZefZ3FS9mDvmDGREX3d7YiPtWnNE0PPRaLIbBljZUBGjFTmjFRORlToupNMlLKPvvjHp2mg7vb7pMF-6FVb3mXg2VfoV5gHdZOxrsETKdbgxtkxo8BUgq_D31Gi3vJK_H2W1ZwGlfhEW7N8MHjQHvyzpfX86nnI7jXQnOfmmbN0rPSc1G68gZ0XZ03GZcHWLd20LLC8ss8zieGKLMOFM2G8Mg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-06-29 07:55:08,186:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-06-29 07:55:08,188:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 29 Jun 2024 05:55:07 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824300277
Replay-Nonce: eF-2qMJ9HevjzUpyKGecDSZpnN6mray_85HMYgLoEv9NwfmEu5Q
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:31Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824300277"
}
2024-06-29 07:55:08,188:DEBUG:acme.client:Storing nonce: eF-2qMJ9HevjzUpyKGecDSZpnN6mray_85HMYgLoEv9NwfmEu5Q
2024-06-29 07:55:08,189:DEBUG:acme.client:JWS payload:
b''
2024-06-29 07:55:08,199:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlIZXZqelVweUtHZWNEU1pwbk42bXJheV84NUhNWWdMb0V2OU53Zm1FdTVRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2OTYxMjcifQ",
  "signature": "guFDNAHyw2q4imS8_vQHrk_Ne9nJTECxExnj2rI_zJUpLj3afAdw3Qi1VSiq8W3ESdOubrB7Ck8jcZvPQMuoif_H6c4JqkDSp6VCKl6ui2OWodbxj4bR6N0TsEQeXmxbglN_PwkFmPV8jmet3nRX05qjAspo-bML_Fnzcj6hcVXb3VYPlMBXzeX73tVTZbJ4Xy8s4jNbVMvSIPFyzSL58agByZsaXY7LqrtouiYES3I_vfpj3DRjAzQgh4la8e-cS59jIp7Q67QNFcfGxW32Ic-S2OS-Lg7Sklr9XKKSqprDbsrd-xZk7jYcxDVcdpxL292MdjGSZ6UGIXHjzGa5KA",
  "payload": ""
}
2024-06-29 07:55:08,351:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985696127 HTTP/1.1" 200 805
2024-06-29 07:55:08,353:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:07 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: B-hK_YLCVhjUlxGW_O31EfFN58cK-xf4EEXkKBe0T58Q2Y9ZmrQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:31Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/p3DiTg",
      "status": "pending",
      "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/dn4kZw",
      "status": "pending",
      "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/A2Vu8Q",
      "status": "pending",
      "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU"
    }
  ]
}
2024-06-29 07:55:08,353:DEBUG:acme.client:Storing nonce: B-hK_YLCVhjUlxGW_O31EfFN58cK-xf4EEXkKBe0T58Q2Y9ZmrQ
2024-06-29 07:55:08,355:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-29 07:55:08,355:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-06-29 07:55:08,356:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-29 07:55:08,356:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-29 07:55:08,357:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:55:08,357:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-29 07:55:08,357:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-29 07:55:08,357:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-29 07:55:08,359:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:55:08,398:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-29 07:55:08,594:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-29 07:55:08,595:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-06-29 07:55:08,596:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-06-29 07:55:08,600:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC.
2024-06-29 07:55:08,600:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-29 07:55:08,600:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-29 07:55:08,605:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x044D8C10>
Prep: True
2024-06-29 07:55:08,606:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x044D8C10> and installer None
2024-06-29 07:55:08,606:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-29 07:55:08,610:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-29 07:55:08,611:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-29 07:55:08,613:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-29 07:55:09,064:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-29 07:55:09,064:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:08 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "S_Ns-6Dtl9s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-29 07:55:09,065:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-29 07:55:13,291:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8032_key-certbot.pem
2024-06-29 07:55:17,396:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8030_csr-certbot.pem
2024-06-29 07:55:17,397:DEBUG:acme.client:Requesting fresh nonce
2024-06-29 07:55:17,397:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-29 07:55:17,547:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-29 07:55:17,547:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:16 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9mVz5kExcTOVhjVLlaVFe05_P1KjSfwIbFlDdV-3p3GY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-29 07:55:17,548:DEBUG:acme.client:Storing nonce: eF-2qMJ9mVz5kExcTOVhjVLlaVFe05_P1KjSfwIbFlDdV-3p3GY
2024-06-29 07:55:17,548:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-29 07:55:17,554:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjltVno1a0V4Y1RPVmhqVkxsYVZGZTA1X1AxS2pTZndJYkZsRGRWLTNwM0dZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "uylsQpn4Qmlz53diSd5UpnWgxvg9X5K04F1vN7qZ1xKdsbUuQOXKyzxeySLlyOHpUVnbyRi2rAK-wAy9kn16kez-_CgxxzkX9jAkWCRdzBxTuj-2e1EZj5duZniMidIJnZWmIi5Kx7tnT1q-AbszHfTia3yCZSO0GkTm8uJOQ8HJrt-FMPMe_cilMUXFb-Cq6obEv7sh8LjJxJ-utjwOCTpunXiWcC13ip04NwKPbdWxE-QLABZ7pdZyS2pxVVbRcB5bpdVvy5TVmDdDoj3C8xUi3H7y1ZshQamgyOr4b1pcN8dy3iNXAh5CWPe-rGUVBA7mnr5Kb3hQN4llGaYhSw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-06-29 07:55:17,722:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-06-29 07:55:17,723:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 29 Jun 2024 05:55:16 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824334367
Replay-Nonce: eF-2qMJ9QcRBnyLvBFEBRTIJxsCYDW2NwUpv26pXOi80zdEeUb0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:41Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824334367"
}
2024-06-29 07:55:17,723:DEBUG:acme.client:Storing nonce: eF-2qMJ9QcRBnyLvBFEBRTIJxsCYDW2NwUpv26pXOi80zdEeUb0
2024-06-29 07:55:17,723:DEBUG:acme.client:JWS payload:
b''
2024-06-29 07:55:17,729:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlRY1JCbnlMdkJGRUJSVElKeHNDWURXMk53VXB2MjZwWE9pODB6ZEVlVWIwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU3NDcxMTcifQ",
  "signature": "d4cYf8fgFCUvggitMWcSK0zZgTDC-f4YwCdW7hjrpPXNXCuAS06floKVJA92-XcPOufichhhXc2L8ZCTa_K1CCBx26Hwfp6ME9o-cnxaf8NvEyAmzodcyRIO0vSZWCEneQ4ujSuR7ce1GlKtzFytobby9YAFEG2bc5Da_FPJBkYpmxAUNtZU4pgJcuZlS0kcDISr-9CJJVQUVNA3XEQE8NqemmzbSKswJoR70FWtaBMbRoTJ7ZjUJKoQuV98FNkwHCgt_Ya2d9-vdALPq-WRvTRzJl-PPVpF68XNlwjzNAnmclS547QBxN2vM3w62EVi5freFNUO_n7rRksNgAul9Q",
  "payload": ""
}
2024-06-29 07:55:17,883:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985747117 HTTP/1.1" 200 809
2024-06-29 07:55:17,884:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:16 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9FLsbH_P3ZReFvOp8-Q32dbsgSGo8HNjBRWQeFZ_H7Wk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:41Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/NIFDhg",
      "status": "pending",
      "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/1iYgbg",
      "status": "pending",
      "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/elhV3g",
      "status": "pending",
      "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY"
    }
  ]
}
2024-06-29 07:55:17,884:DEBUG:acme.client:Storing nonce: eF-2qMJ9FLsbH_P3ZReFvOp8-Q32dbsgSGo8HNjBRWQeFZ_H7Wk
2024-06-29 07:55:17,885:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-29 07:55:17,885:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-06-29 07:55:17,886:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-29 07:55:17,887:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-29 07:55:17,888:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:55:17,888:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-29 07:55:17,888:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-29 07:55:17,889:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-29 07:55:17,892:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:55:17,943:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-29 07:55:18,142:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-29 07:55:18,143:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer.
2024-06-29 07:55:18,144:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD
2024-06-29 07:55:18,149:INFO:certbot._internal.renewal:Cert not yet due for renewal
2024-06-29 07:55:18,153:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-29 07:55:18,192:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-29 07:55:18,393:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-29 07:55:18,395:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-06-29 07:55:18,395:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-06-29 07:55:18,399:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC.
2024-06-29 07:55:18,399:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-29 07:55:18,400:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-29 07:55:18,405:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03F25850>
Prep: True
2024-06-29 07:55:18,406:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03F25850> and installer None
2024-06-29 07:55:18,406:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-29 07:55:18,410:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-29 07:55:18,411:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-29 07:55:18,413:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-29 07:55:18,895:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-29 07:55:18,896:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:17 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Q5nquj-d-TE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-29 07:55:18,896:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-29 07:55:23,309:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8033_key-certbot.pem
2024-06-29 07:55:27,450:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8031_csr-certbot.pem
2024-06-29 07:55:27,450:DEBUG:acme.client:Requesting fresh nonce
2024-06-29 07:55:27,450:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-29 07:55:27,610:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-29 07:55:27,611:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:26 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jqVAJFJ0ok1obrcgTIxFUV8RqStqDmrD2r0ZufDWs_wxqu2itkg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-29 07:55:27,611:DEBUG:acme.client:Storing nonce: jqVAJFJ0ok1obrcgTIxFUV8RqStqDmrD2r0ZufDWs_wxqu2itkg
2024-06-29 07:55:27,611:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-29 07:55:27,618:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBvazFvYnJjZ1RJeEZVVjhScVN0cURtckQycjBadWZEV3Nfd3hxdTJpdGtnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "XY5WdMyWaAyCN_6EVhHu32mn0LguTfj7wRyiT4FxqyAy569QTs8LavFny5Q8JCn4shH4E62r8dgg8Y4HAR63cTIJxQc5I1qP7BevTA9pswoh1QVSqWfJVmJR4dCDndX3CvK8nH_VzUGnRAfuJjQZIiWFhAadcXf3xmB1U4fzjNY61KWSMo4bmCFhgQl4RIQ8l6jfiWsc_FqLVGoe__vIOLSmtPVC19CxXJagBMU2HPthY6PIu8Q4pvWmlSQkidudPF1iObpdzatsTs7ZUvGJ6ncJ_wg-2gMob-UHjoYIurnI3vqPs3NxlyUyyuAH66s5l41Lyrn-kdZqUNzNmcT-VQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-06-29 07:55:27,792:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-06-29 07:55:27,793:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 29 Jun 2024 05:55:26 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824371297
Replay-Nonce: jqVAJFJ0-7aRk-3XjuBBq5o8GDJ-Fgc3DkDfubBxBsPAJqGuT0w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824371297"
}
2024-06-29 07:55:27,793:DEBUG:acme.client:Storing nonce: jqVAJFJ0-7aRk-3XjuBBq5o8GDJ-Fgc3DkDfubBxBsPAJqGuT0w
2024-06-29 07:55:27,793:DEBUG:acme.client:JWS payload:
b''
2024-06-29 07:55:27,799:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjAtN2FSay0zWGp1QkJxNW84R0RKLUZnYzNEa0RmdWJCeEJzUEFKcUd1VDB3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4MDM3NjcifQ",
  "signature": "WPdRZYDx_TkJIXtXkqYBTKpYjh1XESoVGk3hIwhZSRGiDPsQtrjqB7OJLOP4zZL32onZdUNSZ_P0R6nYRCVVxTGL2Z2cNV430NUOKy9rlQbqGX-una3Mpgtnq5-bMXiqlZ6XGmB9YyKG7Kfu-SPBAn40KQsaSzeklTf3aWZ-VJFHXx6oxezlqPGpZPvvjqsKYgGyKZPVtbPJIea_b4mBnzBqaqRiFNN7UFN2Xd_yd-aCPzjJgIAVaUXs5NwvmItYDf04gthlc9v6s3J_SuliKJo6h9630gUIlg7srin1Vvh_6otakywrbquycLnrDKMmg5ly4Qgcl0-zFCFQyaToGA",
  "payload": ""
}
2024-06-29 07:55:27,965:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985803767 HTTP/1.1" 200 806
2024-06-29 07:55:27,965:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:27 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jqVAJFJ0NvONs7q-uo3cFeTW4BtnmD0XcpfRgaYjOo6kaK0F6U0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:52Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/DP175w",
      "status": "pending",
      "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/kAzjPg",
      "status": "pending",
      "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/-Uec4A",
      "status": "pending",
      "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0"
    }
  ]
}
2024-06-29 07:55:27,966:DEBUG:acme.client:Storing nonce: jqVAJFJ0NvONs7q-uo3cFeTW4BtnmD0XcpfRgaYjOo6kaK0F6U0
2024-06-29 07:55:27,966:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-29 07:55:27,967:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-06-29 07:55:27,967:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-29 07:55:27,968:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-29 07:55:27,968:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:55:27,969:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-29 07:55:27,969:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-29 07:55:27,969:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-29 07:55:27,971:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:55:28,010:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-06-29 07:55:28,011:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-29 07:55:28,011:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-06-29 07:55:28,017:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-06-29 07:55:28,019:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-06-29 07:55:28,019:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-06-29 07:55:28,020:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-06-29 07:55:28,020:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-06-29 07:55:28,022:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-06-29 07:55:28,060:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-29 07:55:28,289:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-29 07:55:28,290:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-06-29 07:55:28,291:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-06-29 07:55:28,295:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC.
2024-06-29 07:55:28,296:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-29 07:55:28,296:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-29 07:55:28,301:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x047FF910>
Prep: True
2024-06-29 07:55:28,301:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x047FF910> and installer None
2024-06-29 07:55:28,301:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-29 07:55:28,305:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-29 07:55:28,306:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-29 07:55:28,307:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-29 07:55:28,756:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-29 07:55:28,757:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:27 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "r32B8wrrOu0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-29 07:55:28,757:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-29 07:55:33,002:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8034_key-certbot.pem
2024-06-29 07:55:37,131:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8032_csr-certbot.pem
2024-06-29 07:55:37,132:DEBUG:acme.client:Requesting fresh nonce
2024-06-29 07:55:37,132:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-29 07:55:37,282:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-29 07:55:37,283:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:36 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9-6m5b98SosHU0yz_vBcBvlAWHZDkjvaEjye2mUcZ9ZQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-29 07:55:37,283:DEBUG:acme.client:Storing nonce: eF-2qMJ9-6m5b98SosHU0yz_vBcBvlAWHZDkjvaEjye2mUcZ9ZQ
2024-06-29 07:55:37,284:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-29 07:55:37,290:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjktNm01Yjk4U29zSFUweXpfdkJjQnZsQVdIWkRranZhRWp5ZTJtVWNaOVpRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "sKT2s7stn13TjziLe_xdOK7fJ2mfy9T1F0SfBw4BOo2GlLBoSR-aSjP1stNBdLpDNlnGQsytiCzNZDVDLZE_2gbmj4YjXvPrzFFyV-8DsDFUd9K9lIl8NuTBefjSOBSIWEM6-lQqpCeZYU0UrL-oh_ucOAgX3k56XffOIrJYsziRCZKfS3djoyirWMgfz4qHWsUttkGyXufFOvi6DhxJk-YdHGCpHQnSrKBGhWDwN0lY6qO0LWLNyr4YCRqRwM3R8n4UzZ3a07c9K7KKpPbDjoibHFIB1P1PYK-X_hDeDQAVbuuT9oOKqShtpnZLcxadqhJTpskAKBYRu0EijtV0mA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-06-29 07:55:37,460:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-06-29 07:55:37,462:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 29 Jun 2024 05:55:36 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824405187
Replay-Nonce: eF-2qMJ9Xix7Qm4qho-egNWSR7XWGZqXKLqyjIVlhCDncV2Eur4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824405187"
}
2024-06-29 07:55:37,462:DEBUG:acme.client:Storing nonce: eF-2qMJ9Xix7Qm4qho-egNWSR7XWGZqXKLqyjIVlhCDncV2Eur4
2024-06-29 07:55:37,463:DEBUG:acme.client:JWS payload:
b''
2024-06-29 07:55:37,469:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlYaXg3UW00cWhvLWVnTldTUjdYV0dacVhLTHF5aklWbGhDRG5jVjJFdXI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4NTYwNDcifQ",
  "signature": "p8-fy3PojnLZmzSN-2vX3qGaFMTWp7_pDjlvlbgFTvNO6OVu44vj5qW5tC39nt9_U--ZH8pqqh6JAG6XVrQPoqNfwo0fKwJy1gPtwcKJdm4Q1xAsDph6uzYU0U0M6EaMIS-hGcmadEJYD19TyC-fmOUZWWhnopxZfu7wt4lrhI4aJ9lce7gogoRppZUecooEfWkHq9bZvrOzwOMiUGgVhh92F5g6rWDINh76VhQZLRUY-ZV7E9XoixJJh10TTEGGCWCB3biz6m1p93jPeIsZDFcB139G-seZoyvYkQThvReeJhl9_uTCgA7sThjdrllE3iVwWl5Blc2V2qwaw2b7VA",
  "payload": ""
}
2024-06-29 07:55:37,636:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985856047 HTTP/1.1" 200 811
2024-06-29 07:55:37,638:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:36 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: B-hK_YLCQPOSlFmRzfaxi9PMoFmCbxMqGQtNuqiBDZ28XKWaHYA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:01Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/ZygfgQ",
      "status": "pending",
      "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/f5kJqg",
      "status": "pending",
      "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/OgjqNA",
      "status": "pending",
      "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s"
    }
  ]
}
2024-06-29 07:55:37,638:DEBUG:acme.client:Storing nonce: B-hK_YLCQPOSlFmRzfaxi9PMoFmCbxMqGQtNuqiBDZ28XKWaHYA
2024-06-29 07:55:37,639:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-29 07:55:37,640:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-06-29 07:55:37,641:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-29 07:55:37,641:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-29 07:55:37,643:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:55:37,643:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-29 07:55:37,644:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-29 07:55:37,644:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-29 07:55:37,647:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:55:37,688:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-29 07:55:37,879:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-29 07:55:37,881:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-06-29 07:55:37,882:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-06-29 07:55:37,887:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC.
2024-06-29 07:55:37,887:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-29 07:55:37,887:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-29 07:55:37,893:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C67AB0>
Prep: True
2024-06-29 07:55:37,893:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C67AB0> and installer None
2024-06-29 07:55:37,894:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-29 07:55:37,898:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-29 07:55:37,899:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-29 07:55:37,900:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-29 07:55:38,347:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-29 07:55:38,348:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:37 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "v9Z4HKxdlYY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-06-29 07:55:38,349:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-29 07:55:42,590:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8035_key-certbot.pem
2024-06-29 07:55:46,727:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8033_csr-certbot.pem
2024-06-29 07:55:46,728:DEBUG:acme.client:Requesting fresh nonce
2024-06-29 07:55:46,728:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-29 07:55:46,878:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-29 07:55:46,879:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:45 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: B-hK_YLCbn1BqVS3IqHtg1RVQDlBS1f61c7LxmXNtB22OehShj4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-29 07:55:46,879:DEBUG:acme.client:Storing nonce: B-hK_YLCbn1BqVS3IqHtg1RVQDlBS1f61c7LxmXNtB22OehShj4
2024-06-29 07:55:46,879:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-29 07:55:46,886:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENibjFCcVZTM0lxSHRnMVJWUURsQlMxZjYxYzdMeG1YTnRCMjJPZWhTaGo0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "a9hs5Ya8PthOFC6rHR-JE6y-Ql--X_oPMSpOcrEGs2rzehBkJMXpQlHX6qgDTCSetBex8D38jrTZVWYk7QlKLS7mD6bkJ9kVc2_iCAq81gks84bVKttPvMxGg2Hh9ixIkpIMgl2mInJC5zQERfvNSt8Ois50Hcb1pZx8cmwKtpRH_lfVsP7SwvlKYtCk4tZ-X_HL-JYN-4XFNzinIKcXUYi78_1PYUf7kI4SbytBGJEKdtWWl83Zi0KUIeyIcvLzo-udSsga2a7Tqt2CIUSkfwbjEHh3WgXuvtDuIhZJCDA7DioPx-55gOxpBmu2G5oT3UrBDZNAM-Pn7gpDezJgYA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-06-29 07:55:47,061:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-06-29 07:55:47,062:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 29 Jun 2024 05:55:46 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824456717
Replay-Nonce: B-hK_YLCYl35Mb0uoEIwsiPl4IJ1iuzkb4-P6TjFt9AHz40IgSM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:12Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824456717"
}
2024-06-29 07:55:47,062:DEBUG:acme.client:Storing nonce: B-hK_YLCYl35Mb0uoEIwsiPl4IJ1iuzkb4-P6TjFt9AHz40IgSM
2024-06-29 07:55:47,062:DEBUG:acme.client:JWS payload:
b''
2024-06-29 07:55:47,068:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENZbDM1TWIwdW9FSXdzaVBsNElKMWl1emtiNC1QNlRqRnQ5QUh6NDBJZ1NNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5Mjk5MzcifQ",
  "signature": "BHkXGFg1nXI7uVIy_4AHWqF9fVyhNw1l71up81QD117NcZ19gLZFydayB7pE1tb095MARKR5esG08tMi6pr53g4NmlSwnWfzRbnNovx_e3ZBLl7YpxvIiTWPay1pyyPMmCGvpz2mWMiEG-u9wnS4rK40SsSRWziPc3Y0b663I_jA3WCwMFNywojjqUSZJUsCOetoirUDjcrQF7ouQg-8jzyLbKFNVZGjhhxzFLMQFghCwHsUk5lXeL-6CdcCgKf4vc2cLGy4C_LfL6s3x2bJ4gl-4nXXBFxZkSyp5x_cwuRdtlsfKnU6-nrW-MBzFsaN5iePJboyM1M3BsYLI4p_PA",
  "payload": ""
}
2024-06-29 07:55:47,221:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985929937 HTTP/1.1" 200 810
2024-06-29 07:55:47,221:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:46 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9Lob7vyCS6cCfeyIhx-RnG3fk5w-HhIakA7EDJd0Af58
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:12Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/gXwyeA",
      "status": "pending",
      "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/K4XtOg",
      "status": "pending",
      "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/NX0yhA",
      "status": "pending",
      "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY"
    }
  ]
}
2024-06-29 07:55:47,222:DEBUG:acme.client:Storing nonce: eF-2qMJ9Lob7vyCS6cCfeyIhx-RnG3fk5w-HhIakA7EDJd0Af58
2024-06-29 07:55:47,222:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-29 07:55:47,223:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-06-29 07:55:47,223:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-29 07:55:47,223:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-29 07:55:47,224:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:55:47,224:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-29 07:55:47,225:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-29 07:55:47,225:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-29 07:55:47,226:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:55:47,271:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-29 07:55:47,453:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-29 07:55:47,454:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-06-29 07:55:47,455:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-06-29 07:55:47,459:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC.
2024-06-29 07:55:47,459:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-29 07:55:47,460:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-29 07:55:47,466:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x047E8890>
Prep: True
2024-06-29 07:55:47,466:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x047E8890> and installer None
2024-06-29 07:55:47,466:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-29 07:55:47,471:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-29 07:55:47,472:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-29 07:55:47,474:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-29 07:55:47,906:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-29 07:55:47,906:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:46 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "ojjC7x0Jeaw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-29 07:55:47,907:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-29 07:55:52,143:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8036_key-certbot.pem
2024-06-29 07:55:56,270:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8034_csr-certbot.pem
2024-06-29 07:55:56,271:DEBUG:acme.client:Requesting fresh nonce
2024-06-29 07:55:56,271:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-29 07:55:56,414:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-29 07:55:56,415:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:55 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9nU9GGFFmt3xvczUicwHPHhscdEtrAKuPnCuRyceqgoA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-29 07:55:56,416:DEBUG:acme.client:Storing nonce: eF-2qMJ9nU9GGFFmt3xvczUicwHPHhscdEtrAKuPnCuRyceqgoA
2024-06-29 07:55:56,416:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-29 07:55:56,423:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjluVTlHR0ZGbXQzeHZjelVpY3dIUEhoc2NkRXRyQUt1UG5DdVJ5Y2VxZ29BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "BcfGWCwnbTVdVASD1u-Xk3-H_7GrA1Y9FdSCqMGXBhZv7THT5vG1y_QcxJL_nZmawbQgIqI0PU4JFY80e7dgGbgnDxgRTyR7u-rljOplG7egv2snYC4JESzNJR-nYNXGLpGgTPuOIQmIxAsni4dH58q6tlyZFVaMCK95TdWmDVSGEkXG8UpJ9mF2xgWkF1RjhEUankBAFqNtLxMMpGoiRxokNniWTrPQf3HE4bvJuL4FmZzphfDqxHHP6ZgkxlFKWy4XgK4z5LKc2Ce_mmqvXTeZyQRHxQ5wAjdQU9fCqdPiJa_3DpSCJ1h7k4iw46t9DdaPs7bOI9cYocCLSh9iPA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-06-29 07:55:56,580:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-06-29 07:55:56,581:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 29 Jun 2024 05:55:55 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824496987
Replay-Nonce: B-hK_YLCp_RdDK7Gxb11m8l2RoKs3CDLyTx24Y8uN4sVlpcy624
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:22Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824496987"
}
2024-06-29 07:55:56,581:DEBUG:acme.client:Storing nonce: B-hK_YLCp_RdDK7Gxb11m8l2RoKs3CDLyTx24Y8uN4sVlpcy624
2024-06-29 07:55:56,581:DEBUG:acme.client:JWS payload:
b''
2024-06-29 07:55:56,587:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENwX1JkREs3R3hiMTFtOGwyUm9LczNDREx5VHgyNFk4dU40c1ZscGN5NjI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5ODk1MTcifQ",
  "signature": "hrsYxacSoZ7pPNIIP9yGFyzRv4ELjUWklTrpIX7Fdz_W4lTA4uSeZAUNuYrRcOyj1v7ewHny8Vy6lSC60tyifv9FFXfetGY4NARJ4KhH0f7eZclC8-gBH9Rj93oUv-mbPhmLKvaiu-HbuVPkl75a7u7RuvFZMxw4eXiSWFKWtwLAND16QuwyLoNy3zMhwxQ7MUh7IDlDyC4SKnjX63vpev25s-nE8zzT5-E-I4GaEVJRoWYfs2z9vlPrm9XCgEr92LQW_ll-D430lyYtoCCD_3xaR4eRtSyIwblmneIypALiz-j-_02sb60HVCD20g_qVdI1vhbuWmQ129ASx79CpA",
  "payload": ""
}
2024-06-29 07:55:56,740:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985989517 HTTP/1.1" 200 809
2024-06-29 07:55:56,741:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:55 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9k1usfTeTHcWpVIzx4loFTvPOvu8aIviqBtTxO0-uNBs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:22Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/ebl14A",
      "status": "pending",
      "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/-PFYBw",
      "status": "pending",
      "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/LKEO7w",
      "status": "pending",
      "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0"
    }
  ]
}
2024-06-29 07:55:56,741:DEBUG:acme.client:Storing nonce: eF-2qMJ9k1usfTeTHcWpVIzx4loFTvPOvu8aIviqBtTxO0-uNBs
2024-06-29 07:55:56,742:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-29 07:55:56,742:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-06-29 07:55:56,743:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-29 07:55:56,743:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-29 07:55:56,744:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:55:56,744:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-29 07:55:56,744:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-29 07:55:56,744:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-29 07:55:56,746:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:55:56,786:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-29 07:55:57,034:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-29 07:55:57,035:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2024-06-29 07:55:57,036:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2024-06-29 07:55:57,041:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC.
2024-06-29 07:55:57,041:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-29 07:55:57,041:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-29 07:55:57,046:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x044D3C70>
Prep: True
2024-06-29 07:55:57,047:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x044D3C70> and installer None
2024-06-29 07:55:57,047:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-29 07:55:57,051:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-29 07:55:57,052:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-29 07:55:57,053:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-29 07:55:57,534:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-29 07:55:57,535:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:55:56 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "KexyQA19A9o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-29 07:55:57,535:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-29 07:56:02,042:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8037_key-certbot.pem
2024-06-29 07:56:06,233:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8035_csr-certbot.pem
2024-06-29 07:56:06,233:DEBUG:acme.client:Requesting fresh nonce
2024-06-29 07:56:06,234:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-29 07:56:06,394:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-29 07:56:06,395:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:56:05 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qqMiT6Ck6IyHzlpu0yctgHuUjMzugpWhJShPV-M3MABOG_1RotQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-29 07:56:06,395:DEBUG:acme.client:Storing nonce: qqMiT6Ck6IyHzlpu0yctgHuUjMzugpWhJShPV-M3MABOG_1RotQ
2024-06-29 07:56:06,395:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-29 07:56:06,400:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2s2SXlIemxwdTB5Y3RnSHVVak16dWdwV2hKU2hQVi1NM01BQk9HXzFSb3RRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "a5pYZhxf5Lk8KDwwZgin3VDhpiem79PO2h0WJcWCB_McuthxBsIc6pJRn-mybHobB7tQrO5tdSUcrohj_RYeK1SvSjXspcXHVt_srG4-EMkfhmqkvIx5Z4wzU9rr5FXvrSyCi8po2ORRXRx36da7gzURYgljW90wnjSDWtZRBwCiLw6Plp7M3ancKIskN_z56Sf6klt1xcAEGR58XNPu7v8Fh_JzP3SmRpYHZih357CC2kz9UgDisfmLua0-EDqmZ2G0AHnLhv79njKeD6MTFT10ECO9G4CnJo6fp03s32zA05USM8hDvzSiNLiPT5uQM7pyqEmzkBKpht2TNqxQtw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-06-29 07:56:06,571:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-06-29 07:56:06,572:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 29 Jun 2024 05:56:05 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824533727
Replay-Nonce: qqMiT6CkJFI6K96F6YYC88p3MWKPsvY6vNHLPTv6uv7chQ-eDdA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:32Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824533727"
}
2024-06-29 07:56:06,572:DEBUG:acme.client:Storing nonce: qqMiT6CkJFI6K96F6YYC88p3MWKPsvY6vNHLPTv6uv7chQ-eDdA
2024-06-29 07:56:06,573:DEBUG:acme.client:JWS payload:
b''
2024-06-29 07:56:06,579:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tKRkk2Szk2RjZZWUM4OHAzTVdLUHN2WTZ2TkhMUFR2NnV2N2NoUS1lRGRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYwNDc5MjcifQ",
  "signature": "oBOaaD3DLFvS4MG_VxpOk2vjhwdKWXthN5-JXV3_8k4S1BnUtiLU3dvsfpikBt_N6-tBSiP8G4Gwufj4J8VXEYDkTEpKpwBx7AEH1znVY_tAy5ZgtDVQbGlY-4kMkhoXwWFOwLnv0sQC4F1C5CkbIEZoj8apugXpd8bek7K5BcT3bCt1-1pa4dySf8m3XpeXn2KJzPrfo0-YSeCevW5COGUHdFLzg_AI--5iBYUcoZHTASu6yhw-gpgRl2j-DhkkbZgdxV7xQG95b_3V4-Hpl8A8RCkQ5PzaXSPU7suzQ2f8pH9UJMTVOz3CNuUSqvbu849arCBa_UVfvrMzyoijpQ",
  "payload": ""
}
2024-06-29 07:56:06,744:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986047927 HTTP/1.1" 200 805
2024-06-29 07:56:06,745:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:56:05 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jqVAJFJ0lEVkmAaSSdCtiEmNFUxghU1cYt3gyOACaDQULA0btC0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:32Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/a7aI1Q",
      "status": "pending",
      "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/Rqj-2Q",
      "status": "pending",
      "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/4mVq6w",
      "status": "pending",
      "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0"
    }
  ]
}
2024-06-29 07:56:06,745:DEBUG:acme.client:Storing nonce: jqVAJFJ0lEVkmAaSSdCtiEmNFUxghU1cYt3gyOACaDQULA0btC0
2024-06-29 07:56:06,746:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-29 07:56:06,747:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-06-29 07:56:06,749:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-29 07:56:06,749:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-29 07:56:06,750:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:56:06,750:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-29 07:56:06,750:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-29 07:56:06,750:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-29 07:56:06,752:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:56:06,801:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-29 07:56:06,989:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-29 07:56:06,991:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-06-29 07:56:06,993:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-06-29 07:56:07,000:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC.
2024-06-29 07:56:07,000:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-29 07:56:07,001:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-29 07:56:07,005:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C7FF10>
Prep: True
2024-06-29 07:56:07,005:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C7FF10> and installer None
2024-06-29 07:56:07,005:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-29 07:56:07,010:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-29 07:56:07,010:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-29 07:56:07,013:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-29 07:56:07,493:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-29 07:56:07,493:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:56:06 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "_DHdrr8GG78": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-29 07:56:07,494:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-29 07:56:11,924:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8038_key-certbot.pem
2024-06-29 07:56:16,099:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8036_csr-certbot.pem
2024-06-29 07:56:16,100:DEBUG:acme.client:Requesting fresh nonce
2024-06-29 07:56:16,100:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-29 07:56:16,260:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-29 07:56:16,262:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:56:15 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qqMiT6Ck7HRXFFxFUCBaN8ePJSGhlhrpjO41pvhxWSjEVWsLOlE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-29 07:56:16,262:DEBUG:acme.client:Storing nonce: qqMiT6Ck7HRXFFxFUCBaN8ePJSGhlhrpjO41pvhxWSjEVWsLOlE
2024-06-29 07:56:16,263:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-29 07:56:16,272:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2s3SFJYRkZ4RlVDQmFOOGVQSlNHaGxocnBqTzQxcHZoeFdTakVWV3NMT2xFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ngo0k7T_4QhX0Oac586SSpe_O8LfuMYJm_PPcQQHAeOtMX2ZZmDYAIshRRm3FYUI4o31MC4OZPN8Gk2mtpjGlw9xoUSaD6ag_fF6xVJUSAhwELaO2Chb_zmjfiCmmZm8qm7JFFwUUxFm5MvKcy9j62TUCMijJS4DDTIJDmxZMJiSAiXFDCRFeCP8166sNG2PK3g9pFj6wx47iQlwZrNMqvnz5yNKniWq3KxLsrHHtpDStpK-oL0WSm13f1S9vHTZmIrnXSGtJdLQ_kt0KflC1AEvwen-HMcDBHjkm5qI8GQwPOmmH6f7wcSmIpb9XLhMuM6Kp89P2G8LfarwWTGpkw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-06-29 07:56:16,445:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-06-29 07:56:16,446:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 29 Jun 2024 05:56:15 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824568847
Replay-Nonce: qqMiT6CkBrL5CU7aehtxzs362RahtaTzgnv2mT5cf1fYItkq6h4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:42Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824568847"
}
2024-06-29 07:56:16,446:DEBUG:acme.client:Storing nonce: qqMiT6CkBrL5CU7aehtxzs362RahtaTzgnv2mT5cf1fYItkq6h4
2024-06-29 07:56:16,446:DEBUG:acme.client:JWS payload:
b''
2024-06-29 07:56:16,452:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tCckw1Q1U3YWVodHh6czM2MlJhaHRhVHpnbnYybVQ1Y2YxZllJdGtxNmg0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxMDExNjcifQ",
  "signature": "fiC3L7WXQqUiCdUq1lNYomBXrGmsynneKY-EAI4tX9-IZl2wBnJV7Tj05r09wc_luq2BR4gK0P41emo024GfrXQu255Jerli5kXbVkm2NbforsZ7YTn5LD2OD7lRC8EAjL0VxLFcLYGC3fP-6gXA7GTgbWlVGcRB7jLaaioeGE5_ewKB61ZEBI5tDogpqBKVXTBoMw63TYaAqueAhfvQCs-xgHuSzaHpza0Rej2H2ynLLUJlKpvKG9VRSgBDvo1QoCmFcfh4OPPSEgDwmFC4NJ4k32SU_kRsE5WpKIt_eQKEx1in9rpeTrvlMSR2T4YF5utY_fOgVCxQOrtT5CEnzg",
  "payload": ""
}
2024-06-29 07:56:16,618:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986101167 HTTP/1.1" 200 805
2024-06-29 07:56:16,618:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:56:15 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jqVAJFJ0obUnVNxkvab9Yzj0oxzSkmYKO2zuAxfhxTLfoik8WHU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:42Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/nlLFxg",
      "status": "pending",
      "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/mOuqMg",
      "status": "pending",
      "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/b0ZrJg",
      "status": "pending",
      "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q"
    }
  ]
}
2024-06-29 07:56:16,618:DEBUG:acme.client:Storing nonce: jqVAJFJ0obUnVNxkvab9Yzj0oxzSkmYKO2zuAxfhxTLfoik8WHU
2024-06-29 07:56:16,619:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-29 07:56:16,619:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-06-29 07:56:16,621:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-29 07:56:16,621:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-29 07:56:16,623:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:56:16,623:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-29 07:56:16,624:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-29 07:56:16,624:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-29 07:56:16,626:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:56:16,675:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-29 07:56:16,907:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-29 07:56:16,908:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-06-29 07:56:16,909:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-06-29 07:56:16,914:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC.
2024-06-29 07:56:16,914:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-29 07:56:16,915:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-29 07:56:16,919:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x044F0A90>
Prep: True
2024-06-29 07:56:16,919:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x044F0A90> and installer None
2024-06-29 07:56:16,919:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-29 07:56:16,924:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-29 07:56:16,924:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-29 07:56:16,927:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-29 07:56:17,407:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-29 07:56:17,408:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:56:16 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "boKNLNQnTNw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-29 07:56:17,408:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-29 07:56:21,573:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8039_key-certbot.pem
2024-06-29 07:56:25,705:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8037_csr-certbot.pem
2024-06-29 07:56:25,705:DEBUG:acme.client:Requesting fresh nonce
2024-06-29 07:56:25,705:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-29 07:56:25,867:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-29 07:56:25,869:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:56:24 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qqMiT6CkHNKcLUeftE8y7xdT2a8cGs2j98wvOFyQ56gK0YsTmnc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-29 07:56:25,869:DEBUG:acme.client:Storing nonce: qqMiT6CkHNKcLUeftE8y7xdT2a8cGs2j98wvOFyQ56gK0YsTmnc
2024-06-29 07:56:25,869:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-29 07:56:25,882:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tITktjTFVlZnRFOHk3eGRUMmE4Y0dzMmo5OHd2T0Z5UTU2Z0swWXNUbW5jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "DCeFYjL0hp20wJ5PcLOm_C4nGNT5YH37VubQY4JFXRj4usW0fxVz9ud-ezG_lSYHe9S6u6V4A77Z2fNdftFYNdFvK1JzyadC7Qlb7lHgO1d8SKm4J4C8B8Q5Ijo8GEKPP_b6ftd2Cuhi-QXkrjHVhKykQBJUvyoGnBM-eMI-jRFCE0ySVRanesn7BgqDzaRyITGb4KucIaold28M9eqImRJlFRcVXpQCbxxzqNEbrBPPpQmO2x1qsgJkLpQI0uwxpFf_K5yVoljQegDbEa3rySuCdDIgHMR1MTRjop5N8E4XcSByfhCWg-d0bq3sBVtbm1-ZMootmzV3bMNRUBj4SQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-06-29 07:56:26,058:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-06-29 07:56:26,059:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 29 Jun 2024 05:56:25 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824603047
Replay-Nonce: qqMiT6CkPRtilAoa6iba0KDS_tmzKgon-U6V8bxPivWQRfjVk1s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:53Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824603047"
}
2024-06-29 07:56:26,060:DEBUG:acme.client:Storing nonce: qqMiT6CkPRtilAoa6iba0KDS_tmzKgon-U6V8bxPivWQRfjVk1s
2024-06-29 07:56:26,060:DEBUG:acme.client:JWS payload:
b''
2024-06-29 07:56:26,067:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tQUnRpbEFvYTZpYmEwS0RTX3Rtektnb24tVTZWOGJ4UGl2V1FSZmpWazFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxNTY2NDcifQ",
  "signature": "XySPklyPMKbrnYNjRl7Kt5yU1YLYVryiMY-WIAInG7QWBH4Ud4SDWEyA2Gj5ABFwb_D2kDJ-1GHIg6Jq8Cq0TE7XcSR0Gwx9N2zGARQqzLpzR0sBWlYO2F9JNoHJmdeaaOdlboAamuHx46G7xiPFc1MKVF75ByWMZOkAiGLjMqCkI6pAie1bZ1VTl9aRgYu5S_k8Jx7jQYVFq6Yeks7SmT04MS430lLQYEX4pOFT5qaIp44bk8L-Q2QlzdbK0INMUh-lFAEN2fo-Ah1ClZntMLvzfzFguLs392iD2RPWmM5gex57W2TN3HTL8iM2RtnQA2JHaPaPhEsr3rDZhYNBxQ",
  "payload": ""
}
2024-06-29 07:56:26,232:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986156647 HTTP/1.1" 200 805
2024-06-29 07:56:26,233:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 29 Jun 2024 05:56:25 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jqVAJFJ0gYJEiNPQ2J5eK9FVULrL30g7PBzerzISsA_1vBc55lE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:53Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/B3rfNg",
      "status": "pending",
      "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/ZEHm3Q",
      "status": "pending",
      "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/xivawQ",
      "status": "pending",
      "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk"
    }
  ]
}
2024-06-29 07:56:26,233:DEBUG:acme.client:Storing nonce: jqVAJFJ0gYJEiNPQ2J5eK9FVULrL30g7PBzerzISsA_1vBc55lE
2024-06-29 07:56:26,234:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-29 07:56:26,234:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-06-29 07:56:26,235:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-29 07:56:26,236:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-29 07:56:26,238:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:56:26,238:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-29 07:56:26,238:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-29 07:56:26,239:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-29 07:56:26,241:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-29 07:56:26,242:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-06-29 07:56:26,242:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-06-29 07:56:26,254:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-06-29 07:56:26,256:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)