2024-07-06 14:58:09,641:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-07-06 14:58:09,641:DEBUG:certbot._internal.main:Arguments: []
2024-07-06 14:58:09,641:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-07-06 14:58:10,488:DEBUG:certbot._internal.log:Root logging level set at 20
2024-07-06 14:58:10,489:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-07-06 14:58:10,529:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04863270> and installer <certbot._internal.cli.cli_utils._Default object at 0x04863270>
2024-07-06 14:58:10,572:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-06 14:58:10,920:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-06 14:58:10,921:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer.
2024-07-06 14:58:10,925:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD
2024-07-06 14:58:10,932:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC.
2024-07-06 14:58:10,933:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-06 14:58:10,933:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-06 14:58:10,938:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04240AD0>
Prep: True
2024-07-06 14:58:10,939:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04240AD0> and installer None
2024-07-06 14:58:10,939:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-06 14:58:10,945:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-06 14:58:10,946:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-06 14:58:10,948:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-06 14:58:11,965:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-06 14:58:11,965:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:58:10 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "OgYnXU0xTbA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-06 14:58:11,966:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-06 14:58:17,755:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8222_key-certbot.pem
2024-07-06 14:58:22,988:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8220_csr-certbot.pem
2024-07-06 14:58:22,988:DEBUG:acme.client:Requesting fresh nonce
2024-07-06 14:58:22,988:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-06 14:58:23,154:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-06 14:58:23,155:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:58:22 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zgT1AlV-nI3foW5WjF2B4lBAldSyHAboPenvfWOp3H5WLgGvwDU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-06 14:58:23,155:DEBUG:acme.client:Storing nonce: zgT1AlV-nI3foW5WjF2B4lBAldSyHAboPenvfWOp3H5WLgGvwDU
2024-07-06 14:58:23,155:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-06 14:58:23,160:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1uSTNmb1c1V2pGMkI0bEJBbGRTeUhBYm9QZW52ZldPcDNINVdMZ0d2d0RVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "KpUo6A2nXvgim_NVV0YgWfeKsJ20uRl4T9ZKEiBw31_42DAF6UHyIXLlPTg6KHwCDoUGnYR-eSDNPSY0iFP5twbPZA1WBrGYlq0xwfpMIoxNF4JfKvlBhyOdBElA3AVHGgPT7JLtZ_gS-JmE_4TS_HcQvD9LdieHa8xQj6IV57eMcqrNBIECXZz3Z_qM_TrH2BVnGMrK_hcx6K57aiCNvdmAM_AacvaaS5kTzGmPeDGHh63J_26YtOR1GJY3DrAJQQdRLgwZNig0EJb7opT00Qlz_CE8NmjadxhcJBVyFI2ELrCMAdHBf0RZ_8egTcl_WrBNxkrpxlXU2_UVEUfXzw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-06 14:58:23,349:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-07-06 14:58:23,350:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 06 Jul 2024 12:58:22 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963066047
Replay-Nonce: zgT1AlV-jus3CZoybmkyohEG18RaGGPdXlb700lXVz3mU-VKu5k
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:17:05Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123065917"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963066047"
}
2024-07-06 14:58:23,350:DEBUG:acme.client:Storing nonce: zgT1AlV-jus3CZoybmkyohEG18RaGGPdXlb700lXVz3mU-VKu5k
2024-07-06 14:58:23,351:DEBUG:acme.client:JWS payload:
b''
2024-07-06 14:58:23,357:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123065917:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1qdXMzQ1pveWJta3lvaEVHMThSYUdHUGRYbGI3MDBsWFZ6M21VLVZLdTVrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMwNjU5MTcifQ",
  "signature": "mk4t79_zQdSfL-2HQccSYCyFAcC8CaWqPUF8rRbyX2aQS9huxjhrt8PlIu4q5FWi9J1kKbc1RPsN1GLbAKrUoyyK5r_FKLSXa5ZLxcGWRTmKrAuaFd2J_bgEKkovgkxd-rx02xA8C0xqNICo_btq-CFYAGCLzfsjK7uERiejiGjVIDywEGd_XUNq4kqzmTbR5dD_axB3ZCtk7kAJKRDi1g3tHI_4y8Y5AbxHs7btgz29rF8g5ENZmfT5-VZm027IHl0k-4nAZ2sFw6cUkkt6aQ7XKX2LDzh9g84-9oS6X-niS_psHDCJkT6t081016xN1h7VARGOOFxcoS0xSTOxBg",
  "payload": ""
}
2024-07-06 14:58:23,522:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123065917 HTTP/1.1" 200 810
2024-07-06 14:58:23,523:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:58:22 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eFSVlf8UV_OB8HkEHq6lIKWs9xXnyL0_x5AfGYtQEri7AmQjhg4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:17:05Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/AopFCQ",
      "status": "pending",
      "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/xbrZjg",
      "status": "pending",
      "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/2pJhlw",
      "status": "pending",
      "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4"
    }
  ]
}
2024-07-06 14:58:23,523:DEBUG:acme.client:Storing nonce: eFSVlf8UV_OB8HkEHq6lIKWs9xXnyL0_x5AfGYtQEri7AmQjhg4
2024-07-06 14:58:23,524:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-06 14:58:23,524:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-07-06 14:58:23,525:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-06 14:58:23,525:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-06 14:58:23,539:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:58:23,539:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-06 14:58:23,539:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-06 14:58:23,540:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-06 14:58:23,547:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:58:23,592:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-06 14:58:23,786:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-06 14:58:23,787:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-06 14:58:23,788:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-06 14:58:23,793:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC.
2024-07-06 14:58:23,793:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-06 14:58:23,793:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-06 14:58:23,800:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0472C8F0>
Prep: True
2024-07-06 14:58:23,800:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0472C8F0> and installer None
2024-07-06 14:58:23,800:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-06 14:58:23,805:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-06 14:58:23,806:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-06 14:58:23,807:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-06 14:58:24,294:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-06 14:58:24,295:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:58:23 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "55dNCm_5oD8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-06 14:58:24,296:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-06 14:58:29,364:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8223_key-certbot.pem
2024-07-06 14:58:33,998:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8221_csr-certbot.pem
2024-07-06 14:58:33,999:DEBUG:acme.client:Requesting fresh nonce
2024-07-06 14:58:33,999:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-06 14:58:34,164:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-06 14:58:34,164:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:58:33 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zgT1AlV-uVHtexS3bKGUCmfXNm7mjELW7Qocw0orJKNhyoGjlfg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-06 14:58:34,165:DEBUG:acme.client:Storing nonce: zgT1AlV-uVHtexS3bKGUCmfXNm7mjELW7Qocw0orJKNhyoGjlfg
2024-07-06 14:58:34,165:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-06 14:58:34,171:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi11Vkh0ZXhTM2JLR1VDbWZYTm03bWpFTFc3UW9jdzBvckpLTmh5b0dqbGZnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "W-jtDMz_3HHA3vJQ8NSIeYuTVQm7zeLW70kcvLPswowL4xOUvKnmHWVaLoQvE84PeRAgJPS7trUSCNKBFHkW1SR_DeKIJhty8QyGxdjWI55hsM-7mkGGP9JzQAypxDqX4QsW6Ebm6zmIHPo0BOP49kZrKea1veVjwWpYSUWZvb9X9Kd5ddExd62ixm0GGUlD2_-xozzKmOezr0HL_7BIxLqmIj6YcNBaF3mRQlYXyA0u_i4WKYAAvBn7QybySoYoaUKz1FDvPTp_5Jie9_gIVK_I3tKeG72MgCMffISZpRJwIQoHL9zyXddJ0xtYaEC6PhRxJbMKEJx7zFFyv0iBHw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-06 14:58:34,373:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-07-06 14:58:34,373:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 06 Jul 2024 12:58:33 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963103477
Replay-Nonce: eFSVlf8URvwvP0g88Yy4APej_AFmktJzlaFYbCx1yHrZlHdR5hg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:17:16Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123121967"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963103477"
}
2024-07-06 14:58:34,373:DEBUG:acme.client:Storing nonce: eFSVlf8URvwvP0g88Yy4APej_AFmktJzlaFYbCx1yHrZlHdR5hg
2024-07-06 14:58:34,373:DEBUG:acme.client:JWS payload:
b''
2024-07-06 14:58:34,379:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123121967:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVSdnd2UDBnODhZeTRBUGVqX0FGbWt0SnpsYUZZYkN4MXlIclpsSGRSNWhnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMxMjE5NjcifQ",
  "signature": "S6YDAptxo-NLiiAxMcWh8kmnOemvI_bL3FDRpoI4mjFSUQC6W6PSaQ73R3Rs6lw8lxd3lvRUUSczP3BMzVoE8TerZh_eQmkfFNEDQbQxPhLuRvxoVrUoCtwnQAmv_pP1LJu8Byr3eCsWUhjyMtRatdHgiMJHbTO2NFfYcIv2acIPKirQoobPLxTBBJDxbX-RG8-gdtn5rr-U6x2yS1RR72MqwUe2mdWlXnQozsvP8z_dUaGuhtI_axnQpCwWAFKORmNIEr6TTlmrHW1FcwhLk0GBV6yoX_J9dH9sBlanPOLuINA56mpLiLE_OdCqO6vSpy_ROpbIhZYEEt5NIkz5dA",
  "payload": ""
}
2024-07-06 14:58:34,544:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123121967 HTTP/1.1" 200 804
2024-07-06 14:58:34,544:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:58:33 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eFSVlf8U0vZSv2jkmBamdZQNriiDn95q36Iz0rfTo6lfSmq9Qt0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:17:16Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/Ag883A",
      "status": "pending",
      "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/g4f58w",
      "status": "pending",
      "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/s77iUg",
      "status": "pending",
      "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0"
    }
  ]
}
2024-07-06 14:58:34,544:DEBUG:acme.client:Storing nonce: eFSVlf8U0vZSv2jkmBamdZQNriiDn95q36Iz0rfTo6lfSmq9Qt0
2024-07-06 14:58:34,544:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-06 14:58:34,545:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-07-06 14:58:34,545:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-06 14:58:34,545:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-06 14:58:34,546:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:58:34,546:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-06 14:58:34,546:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-06 14:58:34,547:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-06 14:58:34,548:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:58:34,599:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-06 14:58:34,761:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-06 14:58:34,762:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-07-06 14:58:34,763:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-07-06 14:58:34,768:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC.
2024-07-06 14:58:34,768:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-06 14:58:34,768:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-06 14:58:34,773:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x042AF3F0>
Prep: True
2024-07-06 14:58:34,774:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x042AF3F0> and installer None
2024-07-06 14:58:34,774:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-06 14:58:34,779:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-06 14:58:34,780:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-06 14:58:34,782:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-06 14:58:35,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-06 14:58:35,227:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:58:34 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "5ygGFQIwDqI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-06 14:58:35,227:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-06 14:58:39,960:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8224_key-certbot.pem
2024-07-06 14:58:44,582:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8222_csr-certbot.pem
2024-07-06 14:58:44,583:DEBUG:acme.client:Requesting fresh nonce
2024-07-06 14:58:44,583:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-06 14:58:44,734:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-06 14:58:44,735:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:58:43 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW6urRFw8asrRzcpUggq8S_cbA_GpCUaIwLz-QGAdPuipM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-06 14:58:44,735:DEBUG:acme.client:Storing nonce: oPjXeLW6urRFw8asrRzcpUggq8S_cbA_GpCUaIwLz-QGAdPuipM
2024-07-06 14:58:44,735:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-06 14:58:44,740:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZ1clJGdzhhc3JSemNwVWdncThTX2NiQV9HcENVYUl3THotUUdBZFB1aXBNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "KkPFDRYhoayITate6quXNVvwt294tJRGiCbOIlhtBPQsJnBU1ZzwAymuiTtwP9-qr5BiEO2UBeWAK4ilG1xaYAitjUitK7T4TJHKf5rN4FXAtWNuR2wcXRAeCVu4BDSazWXHeuPRm9prAY4-9uYWEwSYALyyFpQUGvMyYO0mepF1ROB2_TOUutblEO-kjoUwtrn9EzlM0Sw5H4cLp3DMvnOwP4xtnDpnqah7JMQDFzkKnCJ-vhN6V-IkKGk2iljGcn3-pEKDcCP6dtHO9B8MzIZX-ERAdwLDBDPVIk1XvTbiQQZ9QfGXbm0-hKHIwnDt-iYqg8JwRuEkH8-cEY2qSg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-06 14:58:44,964:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-07-06 14:58:44,965:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 06 Jul 2024 12:58:43 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963135847
Replay-Nonce: EPg6kJgq4qTXHTVPuhO3uGxvOerB08fece78RX7Mf3OftNn9KYA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:17:27Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123171097"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963135847"
}
2024-07-06 14:58:44,965:DEBUG:acme.client:Storing nonce: EPg6kJgq4qTXHTVPuhO3uGxvOerB08fece78RX7Mf3OftNn9KYA
2024-07-06 14:58:44,965:DEBUG:acme.client:JWS payload:
b''
2024-07-06 14:58:44,971:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123171097:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3E0cVRYSFRWUHVoTzN1R3h2T2VyQjA4ZmVjZTc4Ulg3TWYzT2Z0Tm45S1lBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMxNzEwOTcifQ",
  "signature": "SLL19BafqRakO-vvpmtNaghLTtp64J6ey18MoTnVVpPMBhch1_dk5cy2QhhqXDCIlrLok2XuJoy2wx3j5lq9knSXTbuypUARVbYlgEBAWA9xgPjg9eNYzyobLDaVWWe9jZQu8a1T3rXNzlFDTNBo8k9XWGInAMwVEKLJ6bmlccxQdeerLfIutlwapxzTFsWLcAPnK2980O4eUZz4m-2mlhqH4RIg7rnJ34gAljYRTSUcAdEzrJpa7CIhiziUCuKLzmDV2mm7x1Za42UbVKGzjcmMPWEL36O4lXpgMoeCLBdB-jWB6J_PpzWZC-MvvVqkdhaMfMpYYiptLUmrfIpMFQ",
  "payload": ""
}
2024-07-06 14:58:45,124:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123171097 HTTP/1.1" 200 807
2024-07-06 14:58:45,125:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:58:44 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW65ZzT4yaUkP7gK8cJ9rnnG8OyJp38RmYps_cJb6vQjK0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:17:27Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/vQZynA",
      "status": "pending",
      "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/XD91Zg",
      "status": "pending",
      "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/qlRt6w",
      "status": "pending",
      "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo"
    }
  ]
}
2024-07-06 14:58:45,125:DEBUG:acme.client:Storing nonce: oPjXeLW65ZzT4yaUkP7gK8cJ9rnnG8OyJp38RmYps_cJb6vQjK0
2024-07-06 14:58:45,126:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-06 14:58:45,126:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-07-06 14:58:45,126:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-06 14:58:45,127:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-06 14:58:45,128:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:58:45,128:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-06 14:58:45,128:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-06 14:58:45,128:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-06 14:58:45,129:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:58:45,174:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-06 14:58:45,479:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-06 14:58:45,480:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-06 14:58:45,481:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-06 14:58:45,486:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC.
2024-07-06 14:58:45,486:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-06 14:58:45,486:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-06 14:58:45,491:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x042D6510>
Prep: True
2024-07-06 14:58:45,491:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x042D6510> and installer None
2024-07-06 14:58:45,492:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-06 14:58:45,496:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-06 14:58:45,497:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-06 14:58:45,499:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-06 14:58:45,951:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-06 14:58:45,952:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:58:44 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "FdVKKscJsvw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-06 14:58:45,952:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-06 14:58:50,778:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8225_key-certbot.pem
2024-07-06 14:58:55,391:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8223_csr-certbot.pem
2024-07-06 14:58:55,392:DEBUG:acme.client:Requesting fresh nonce
2024-07-06 14:58:55,392:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-06 14:58:56,603:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-06 14:58:56,604:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:58:55 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgqKejhBVGVrSEGFp97TgN18nDd6feyqA89aLYsPDiGb6Q
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-06 14:58:56,604:DEBUG:acme.client:Storing nonce: EPg6kJgqKejhBVGVrSEGFp97TgN18nDd6feyqA89aLYsPDiGb6Q
2024-07-06 14:58:56,604:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-07-06 14:58:56,610:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FLZWpoQlZHVnJTRUdGcDk3VGdOMThuRGQ2ZmV5cUE4OWFMWXNQRGlHYjZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Dpc1KVeE15gfE8vMwB6rx_InyqgcBLHIn8ukFZiKDwA9g62u4OWCS1QwWGY0sRPzk6f9gV9ZCFmE6sbiM0F1pRzxrmGpigFutgihdeEo9vw8EUslHVYRwNcPaBSR2HIQIgIU6VaxEsTV82o1iPMfL9xmY_i0-L2ZRkcnntDecCb3dyOKCbZF-TDNtLmFnoLZ5XDpWsRR8Uq9phn6fdjwnP_pbfRU6PFbH_hV0KioSLkPjaOCMZjrl7d29BKtXZchms9AVKgtjYsmaIlChCsWj0EbRaOaWelZqkeqkpzn6cbLqBIjX8ohBhOKvJYPVdBGknGUq56XSGVe-k1DqdpGmQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-06 14:58:56,789:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-07-06 14:58:56,790:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 06 Jul 2024 12:58:55 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963164787
Replay-Nonce: oPjXeLW6P1IosytBS0hfTgTemNyJVNeClhX6K5o_wMDIZ1N7W1Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:17:38Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123214537"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963164787"
}
2024-07-06 14:58:56,790:DEBUG:acme.client:Storing nonce: oPjXeLW6P1IosytBS0hfTgTemNyJVNeClhX6K5o_wMDIZ1N7W1Y
2024-07-06 14:58:56,791:DEBUG:acme.client:JWS payload:
b''
2024-07-06 14:58:56,797:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123214537:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZQMUlvc3l0QlMwaGZUZ1RlbU55SlZOZUNsaFg2SzVvX3dNRElaMU43VzFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMyMTQ1MzcifQ",
  "signature": "M9cBKMkQOO7sS2ppGYoAot9aPu3Fj9Wt8avPwSFDFX2fWP15qu-RBZIe0BesJEZYCW6DDWF9kfD-1JxhRrSIFgZGVTwuUFHEcnXZ_ge1nnVcH6NWp9Bf_2Tdq_gUgRGJVxirABT61HnJleIclNQEH8amQTr-NO8WlwSSC9ve2fxXy-Ru3QagYZUeGIvnLC4poOEuJczHOIWV22ggpX2wwmz7H8rYp-Y-AkHCX2Ynovp2wXWE5qikSixxP3MTwAbwCVTsT7OCa52G40K7duVvBjKunYwyTcMiJ2FTnjDfbci4Ktm_xRqqMINGo0criQ50fS-NU_vIhHxwwyKpIb2f5Q",
  "payload": ""
}
2024-07-06 14:58:56,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123214537 HTTP/1.1" 200 801
2024-07-06 14:58:56,962:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:58:55 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgqiGs9nDTG4-xy92U03CnyI5ufBW3rNpOn5ME34oaXrzg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:17:38Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/FMZRsw",
      "status": "pending",
      "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/6lpfOw",
      "status": "pending",
      "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/gp7pwg",
      "status": "pending",
      "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A"
    }
  ]
}
2024-07-06 14:58:56,962:DEBUG:acme.client:Storing nonce: EPg6kJgqiGs9nDTG4-xy92U03CnyI5ufBW3rNpOn5ME34oaXrzg
2024-07-06 14:58:56,963:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-06 14:58:56,963:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-07-06 14:58:56,964:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-06 14:58:56,964:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-06 14:58:56,965:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:58:56,965:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-06 14:58:56,965:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-06 14:58:56,965:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-06 14:58:56,966:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:58:57,007:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-06 14:58:57,232:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-06 14:58:57,233:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-06 14:58:57,234:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-06 14:58:57,239:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC.
2024-07-06 14:58:57,239:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-06 14:58:57,240:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-06 14:58:57,245:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x041EC6D0>
Prep: True
2024-07-06 14:58:57,245:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x041EC6D0> and installer None
2024-07-06 14:58:57,246:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-06 14:58:57,249:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-06 14:58:57,250:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-06 14:58:57,252:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-06 14:58:59,978:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-06 14:58:59,978:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:58:58 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "RudNiNzqVkk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-06 14:58:59,979:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-06 14:59:04,950:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8226_key-certbot.pem
2024-07-06 14:59:09,630:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8224_csr-certbot.pem
2024-07-06 14:59:09,631:DEBUG:acme.client:Requesting fresh nonce
2024-07-06 14:59:09,631:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-06 14:59:10,065:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-06 14:59:10,065:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:09 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW6Ze4uNwN7ZG9-sOIKZXY9G7UcLztvQhxV5DTvrqQj-vs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-06 14:59:10,065:DEBUG:acme.client:Storing nonce: oPjXeLW6Ze4uNwN7ZG9-sOIKZXY9G7UcLztvQhxV5DTvrqQj-vs
2024-07-06 14:59:10,066:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-06 14:59:10,074:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZaZTR1TndON1pHOS1zT0lLWlhZOUc3VWNMenR2UWh4VjVEVHZycVFqLXZzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "YHAjIIru8kNKOm7yhx3kbshp9_0k3WTkqf4jVsEO4plem_6pEQ1N3NjqWs2kFVoQY3ysN7Z7PbYP1bePCCIksBYz-iEfkxL45HKDlmGpws0zm-zfeHkA77YNvwmMeHErcOdlH38gH0jOidrJOs_miBqdInXwRS-h5EL_rXHyRQ-GH3rQvjzaywFUXjy1K1peKA216Nelj_y9K_NoyxYEB365j-mDVnNgDjkCLhtajv3f9R9Sq8tbWjgEGnSuRfnpk4YnxrDD7xA8HxwTb1JZR3c5raH4easRLYVBM4otCKkDe6Z6DFYK1IYoYGFJxl-nHbg-g7Z4NqpYxXbSPSK9yw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-06 14:59:10,244:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-07-06 14:59:10,245:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 06 Jul 2024 12:59:09 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963193117
Replay-Nonce: oPjXeLW6tSJYD5NYBhfKWP-arFYHq-LdKoYCtxAbllE3TPkGppA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:17:49Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123258277"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963193117"
}
2024-07-06 14:59:10,245:DEBUG:acme.client:Storing nonce: oPjXeLW6tSJYD5NYBhfKWP-arFYHq-LdKoYCtxAbllE3TPkGppA
2024-07-06 14:59:10,245:DEBUG:acme.client:JWS payload:
b''
2024-07-06 14:59:10,254:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123258277:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZ0U0pZRDVOWUJoZktXUC1hckZZSHEtTGRLb1lDdHhBYmxsRTNUUGtHcHBBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMyNTgyNzcifQ",
  "signature": "kZxpT_6diNInm8Yl9s4egIgE8QhDZIX3_wDFkCa2c9o9VZRUour3lV1MAefkRZJ8mNCR1beDauHM6DZP--mxg3myST0qVB_BZuZwz5QgRKbZiGbopAvBzRuyvCs1TMSRjKkW5LvA1tPpKrkCkTpwLR48paK8mnGpxeXQ1JxZ32Ru2H6ShDalEwbb2q-sMr7EaKCrpU9zMxEG_PxLpWQjozND_UARTT9IEqpkiWYrSQx2DoKeA-Hv-Ow1O1MvEEhF46soq4q_gyNeoJd3eRVEVj4nukIVD3bm1R3q1HIUVcyHjUtIq_-Ap2inHAUTMNG6th7Go_wF7UF90NtJHxQm-g",
  "payload": ""
}
2024-07-06 14:59:10,421:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123258277 HTTP/1.1" 200 805
2024-07-06 14:59:10,422:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:09 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgqLJt8AeFU17j4S3eWApEv4fafVORJvcE7-0XjIU20sKI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:17:49Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/7Y8QQA",
      "status": "pending",
      "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/6IRQnQ",
      "status": "pending",
      "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/ZS_Kuw",
      "status": "pending",
      "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400"
    }
  ]
}
2024-07-06 14:59:10,423:DEBUG:acme.client:Storing nonce: EPg6kJgqLJt8AeFU17j4S3eWApEv4fafVORJvcE7-0XjIU20sKI
2024-07-06 14:59:10,424:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-06 14:59:10,424:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-07-06 14:59:10,424:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-06 14:59:10,425:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-06 14:59:10,426:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:59:10,426:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-06 14:59:10,426:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-06 14:59:10,426:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-06 14:59:10,428:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:59:10,482:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-06 14:59:10,678:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-06 14:59:10,679:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-07-06 14:59:10,680:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-07-06 14:59:10,684:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC.
2024-07-06 14:59:10,685:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-06 14:59:10,685:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-06 14:59:10,690:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04868E90>
Prep: True
2024-07-06 14:59:10,691:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04868E90> and installer None
2024-07-06 14:59:10,691:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-06 14:59:10,696:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-06 14:59:10,697:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-06 14:59:10,699:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-06 14:59:11,176:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-06 14:59:11,177:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:10 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "1V2ZydeRb38": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-06 14:59:11,178:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-06 14:59:16,036:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8227_key-certbot.pem
2024-07-06 14:59:20,669:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8225_csr-certbot.pem
2024-07-06 14:59:20,670:DEBUG:acme.client:Requesting fresh nonce
2024-07-06 14:59:20,670:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-06 14:59:20,824:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-06 14:59:20,825:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:19 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW61FDyoKjXTWgtua9lmkJ23IilQo0KNcbukWmw4Kvr0aM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-06 14:59:20,825:DEBUG:acme.client:Storing nonce: oPjXeLW61FDyoKjXTWgtua9lmkJ23IilQo0KNcbukWmw4Kvr0aM
2024-07-06 14:59:20,826:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-06 14:59:20,832:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzYxRkR5b0tqWFRXZ3R1YTlsbWtKMjNJaWxRbzBLTmNidWtXbXc0S3ZyMGFNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "sf3ekjVNHmIWcEZnshtzeOYBuOQVfn_bpOo5P_kFKulL5pq1ip4bHt-9lJa3TezITYGie8Is1ytRr_rlFfWJLjdlqAUEpoAf1rE-umewoInMDKWz8yzJWqjIhN3NOcy3fOIg1yVEQd0tgIgkTuJb7zB4QtfwtO1DflUI1FAENM6uaWE4VCflwII7t5wsREVBoIQ6e8YtFnXfJERIDqr4QmVaUQnalpEGe5Ms63YS5AQCIL2ypk1J4K60pOqk0_Y_f82VOFTVlzqcUZZ38iblr3rYersObYsnfNtlWj-PRkXlgYyj9BtORTWeYKPQoikBem7gYwHpCDzI5MnhKCvnnA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-07-06 14:59:21,009:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-07-06 14:59:21,010:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 06 Jul 2024 12:59:19 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963222697
Replay-Nonce: EPg6kJgqf_oVSNbURQI31FNHtJiAqY_ICCr1Luu2JYGEMkY0_3w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:17:59Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123301867"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963222697"
}
2024-07-06 14:59:21,010:DEBUG:acme.client:Storing nonce: EPg6kJgqf_oVSNbURQI31FNHtJiAqY_ICCr1Luu2JYGEMkY0_3w
2024-07-06 14:59:21,010:DEBUG:acme.client:JWS payload:
b''
2024-07-06 14:59:21,016:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123301867:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FmX29WU05iVVJRSTMxRk5IdEppQXFZX0lDQ3IxTHV1MkpZR0VNa1kwXzN3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMzMDE4NjcifQ",
  "signature": "KldLElWz1hiV5YBKIrdXzTxtkj1KSEtol199oiyh7PAccmkfAPzW6GOByNKjplN4XLpXaNLj3kw7ubHDxV1JGwKur4xxlBhjLCmnSuF8xbMAw19BgupP1cpIv3BjFc63YCXgR2dUURhrfXjlBYw13zBC0Qm45URN5euE97g3zpDGd377pV-1hc_IG-RdSFWv4NzhUVRsnH7WaF36cgU2PC3fS509EfU-Brv27DrjfxJTGwQu5sOkDwikqoc0R7SrhcbnYXVNFlyTNcAW_2r33Q8_i3bDaqHJZdK2mZ0vp1PMYBcgUQC3YXyE4ULMef864kGpQX3bTbj8mFKyusi8iQ",
  "payload": ""
}
2024-07-06 14:59:21,170:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123301867 HTTP/1.1" 200 809
2024-07-06 14:59:21,170:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:20 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW6FJOOzvngiytKgRpguGk--9mLKN6LVc0sTRo99IDrDYo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:17:59Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/VjMp2w",
      "status": "pending",
      "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/GGZVqQ",
      "status": "pending",
      "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/GI9X-A",
      "status": "pending",
      "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94"
    }
  ]
}
2024-07-06 14:59:21,171:DEBUG:acme.client:Storing nonce: oPjXeLW6FJOOzvngiytKgRpguGk--9mLKN6LVc0sTRo99IDrDYo
2024-07-06 14:59:21,171:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-06 14:59:21,171:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-07-06 14:59:21,172:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-06 14:59:21,172:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-06 14:59:21,173:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:59:21,173:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-06 14:59:21,173:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-06 14:59:21,174:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-06 14:59:21,175:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:59:21,222:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-06 14:59:21,430:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-06 14:59:21,432:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer.
2024-07-06 14:59:21,432:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD
2024-07-06 14:59:21,437:INFO:certbot._internal.renewal:Cert not yet due for renewal
2024-07-06 14:59:21,441:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-06 14:59:21,488:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-06 14:59:21,674:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-06 14:59:21,676:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-06 14:59:21,676:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-06 14:59:21,681:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC.
2024-07-06 14:59:21,682:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-06 14:59:21,682:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-06 14:59:21,687:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04860930>
Prep: True
2024-07-06 14:59:21,688:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04860930> and installer None
2024-07-06 14:59:21,688:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-06 14:59:21,693:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-06 14:59:21,694:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-06 14:59:21,697:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-06 14:59:22,150:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-06 14:59:22,151:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:21 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "7H16RFLxC8I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-06 14:59:22,151:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-06 14:59:26,807:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8228_key-certbot.pem
2024-07-06 14:59:31,530:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8226_csr-certbot.pem
2024-07-06 14:59:31,530:DEBUG:acme.client:Requesting fresh nonce
2024-07-06 14:59:31,530:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-06 14:59:31,681:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-06 14:59:31,682:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:30 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW6U1YEfJYC3b0Hh8ng6ztp3z_rSmZ7_vtgV9eUHs2QKNQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-06 14:59:31,682:DEBUG:acme.client:Storing nonce: oPjXeLW6U1YEfJYC3b0Hh8ng6ztp3z_rSmZ7_vtgV9eUHs2QKNQ
2024-07-06 14:59:31,682:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-06 14:59:31,689:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZVMVlFZkpZQzNiMEhoOG5nNnp0cDN6X3JTbVo3X3Z0Z1Y5ZVVIczJRS05RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "mWqCmgLsAsi_i10IiW7mxvkZTiDlJN7CQjR1D24bGtttyOfSMNKC5IdNhDPHjxXAM54aBRMT5L-WPF3QODsUji7Piu97a7BrZAND020ZS_nk3Kd0zFpr2CpNAI-ZPyy1Xji96o9_d6npc69EqrB6uR8uiJp6vS9Qw47WnU5-r8SueJekAsi2AzHMh98XyO79NG5T74dTCjqwo6as7FQ0Ll6JamhaBCCmdDTRidHlKT-dclMA0uOLZbCak_KpSRfFKwDCX1vAf4kEcPKhS6yXTl3pXn5GTacn2OO6Fmon69JvdLNKFL5JmUzzvzQ0Be37n2aQQh5MnkfY4AhYE02oMw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-07-06 14:59:31,862:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-07-06 14:59:31,862:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 06 Jul 2024 12:59:30 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963261767
Replay-Nonce: EPg6kJgqSOaLMb7HfaO0NnPQ6na2IIJD0iRuTYDwclW-7KJ9wf0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:18:10Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123357867"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963261767"
}
2024-07-06 14:59:31,863:DEBUG:acme.client:Storing nonce: EPg6kJgqSOaLMb7HfaO0NnPQ6na2IIJD0iRuTYDwclW-7KJ9wf0
2024-07-06 14:59:31,863:DEBUG:acme.client:JWS payload:
b''
2024-07-06 14:59:31,869:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123357867:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FTT2FMTWI3SGZhTzBOblBRNm5hMklJSkQwaVJ1VFlEd2NsVy03S0o5d2YwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMzNTc4NjcifQ",
  "signature": "fdg5Ezn98h-281SlbNg7B3s9PVCvHRtTeP0cZ25aRR_bGC9fjzld-8sPE67_cnZ1P57Y340S3KAb-Wg5Nvd6qZn0GlLXYxU6iuug4WAxg7zbhmKhA0RBcIx71CZ3-7RKaS1TPWfJj-0Kl_7hRD6yd0zT5amt2ysbeP8rR7PcYyohenc4ZSYOgDsFhJy0FzW2YaYQ6uIZQipyD9R6of6KuOpA7kiehUK_kPo3Q5-e-au1fvY0II2MrodJWd2bUohsppmZ8sRYDBkdeBMdmhEpCRL7kl19XmmGDC6t_X2obzupxIizXaU7X4qtmfEiC8tThCGVVI20utX6rljEOuhgGg",
  "payload": ""
}
2024-07-06 14:59:32,024:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123357867 HTTP/1.1" 200 806
2024-07-06 14:59:32,025:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:31 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgq-99kHHPLLdHBY_v0ErQLc9YIcUoLnBHi-N6cuMOiWzo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:18:10Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/mRUn6w",
      "status": "pending",
      "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/Flovww",
      "status": "pending",
      "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/ejtuAg",
      "status": "pending",
      "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU"
    }
  ]
}
2024-07-06 14:59:32,025:DEBUG:acme.client:Storing nonce: EPg6kJgq-99kHHPLLdHBY_v0ErQLc9YIcUoLnBHi-N6cuMOiWzo
2024-07-06 14:59:32,025:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-06 14:59:32,026:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-07-06 14:59:32,027:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-06 14:59:32,027:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-06 14:59:32,028:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:59:32,028:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-06 14:59:32,028:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-06 14:59:32,029:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-06 14:59:32,030:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:59:32,085:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-07-06 14:59:32,085:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-06 14:59:32,085:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-07-06 14:59:32,092:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-07-06 14:59:32,095:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-07-06 14:59:32,095:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-07-06 14:59:32,095:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-07-06 14:59:32,095:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-07-06 14:59:32,097:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-07-06 14:59:32,141:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-06 14:59:32,341:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-06 14:59:32,343:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-06 14:59:32,344:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-06 14:59:32,350:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC.
2024-07-06 14:59:32,350:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-06 14:59:32,350:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-06 14:59:32,354:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04B51D90>
Prep: True
2024-07-06 14:59:32,355:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04B51D90> and installer None
2024-07-06 14:59:32,355:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-06 14:59:32,371:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-06 14:59:32,372:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-06 14:59:32,374:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-06 14:59:32,874:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-06 14:59:32,874:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:31 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "whibbK8Dn6w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-07-06 14:59:32,875:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-06 14:59:37,812:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8229_key-certbot.pem
2024-07-06 14:59:42,421:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8227_csr-certbot.pem
2024-07-06 14:59:42,422:DEBUG:acme.client:Requesting fresh nonce
2024-07-06 14:59:42,422:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-06 14:59:42,583:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-06 14:59:42,583:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:41 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eFSVlf8UQLsimVoPCO2ePtSijhmkaGY-_s9C2v54yHEQjul3lY4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-06 14:59:42,583:DEBUG:acme.client:Storing nonce: eFSVlf8UQLsimVoPCO2ePtSijhmkaGY-_s9C2v54yHEQjul3lY4
2024-07-06 14:59:42,584:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-06 14:59:42,590:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVRTHNpbVZvUENPMmVQdFNpamhta2FHWS1fczlDMnY1NHlIRVFqdWwzbFk0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "y4LyFV2nJrgcSE942rRbaAkvt2gUY6IziXN5aLNt-RLJr61i9Vn4UIYvqxx3zzRPJWWrzrPZU7ezp-6hZJMPDaTnpilsj3EkUB2khei-r4tmd4pUtovtvfWaBX6GqW-Vpav9KQQrOiP3sCqVmeG6kZSgExgbu-xkqPri7RDIBryWoNsJI8WQl3p9sp2663_5K0pim281SF9qYcjpgdg_aMcB54G4LP_MRgIq5n6tjbApiRsIfCqQR5qHRGHUNmyfaR1zoUGi5HjFBH36Y05tRrqCKOHFNejbchhQffYhzZn-RNkWsbmww9DAnli3FJNNaBsBG5sOzAmoWpCSqkAO5w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-06 14:59:42,846:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-07-06 14:59:42,846:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 06 Jul 2024 12:59:41 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963292297
Replay-Nonce: zgT1AlV-aj9wQFq6yhshhk1wadastlUWMKlIS5K0UAsodEhvJ24
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:18:20Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123407597"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963292297"
}
2024-07-06 14:59:42,846:DEBUG:acme.client:Storing nonce: zgT1AlV-aj9wQFq6yhshhk1wadastlUWMKlIS5K0UAsodEhvJ24
2024-07-06 14:59:42,847:DEBUG:acme.client:JWS payload:
b''
2024-07-06 14:59:42,853:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123407597:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1hajl3UUZxNnloc2hoazF3YWRhc3RsVVdNS2xJUzVLMFVBc29kRWh2SjI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0MDc1OTcifQ",
  "signature": "A63aTpOfbLWDwy3q-djbPmkGKzadkERwLyzPU6PPQfLsptiH--frq4Zd3bbTmKIK7DDP3p21LxSr4dG0PURfSAO5RGyI7N5GSMxLh27qHplFcuV_Pxguj_F91I6t0fcSlEUNQJoUNFJgTBUmivGsIhgEXVfrRkkFIqRKEeFelvgFaSCEGE-9iZtS7bNkCyeuI_pSQ6bwgb3l878julSE7yUYwCDG9cBPxcnqfTWsK8VQJz1P0Fps8Qpro3VJ-Y_APKGgE1rSptvg8I43iUM_Sa10ioAdLGOtNwGbPRBUs3haqqIEBmCHebmo2VrBz89vp7Oji9n6nbOazRJ_CRrQIw",
  "payload": ""
}
2024-07-06 14:59:43,020:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123407597 HTTP/1.1" 200 811
2024-07-06 14:59:43,021:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:41 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zgT1AlV-eo0qS88Y5PnT9cIReWjXoJ9NRBB0Bp6XX4w9pCcSZPU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:18:20Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/PlHedw",
      "status": "pending",
      "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/IGmPMQ",
      "status": "pending",
      "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/vPSuUg",
      "status": "pending",
      "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM"
    }
  ]
}
2024-07-06 14:59:43,021:DEBUG:acme.client:Storing nonce: zgT1AlV-eo0qS88Y5PnT9cIReWjXoJ9NRBB0Bp6XX4w9pCcSZPU
2024-07-06 14:59:43,022:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-06 14:59:43,022:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-07-06 14:59:43,023:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-06 14:59:43,023:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-06 14:59:43,024:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:59:43,024:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-06 14:59:43,024:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-06 14:59:43,024:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-06 14:59:43,025:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:59:43,078:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-06 14:59:43,288:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-06 14:59:43,289:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-06 14:59:43,290:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-06 14:59:43,295:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC.
2024-07-06 14:59:43,295:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-06 14:59:43,295:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-06 14:59:43,302:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x00B421F0>
Prep: True
2024-07-06 14:59:43,302:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x00B421F0> and installer None
2024-07-06 14:59:43,302:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-06 14:59:43,308:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-06 14:59:43,309:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-06 14:59:43,312:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-06 14:59:43,781:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-06 14:59:43,782:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:42 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "2ldFk_Jc8fU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-06 14:59:43,783:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-06 14:59:48,535:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8230_key-certbot.pem
2024-07-06 14:59:53,499:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8228_csr-certbot.pem
2024-07-06 14:59:53,500:DEBUG:acme.client:Requesting fresh nonce
2024-07-06 14:59:53,500:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-06 14:59:53,657:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-06 14:59:53,658:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:52 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eFSVlf8U3s-tk1YmkAr6wU40Q5aAdhBjokfy_SapnzsX7px2Qy0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-06 14:59:53,658:DEBUG:acme.client:Storing nonce: eFSVlf8U3s-tk1YmkAr6wU40Q5aAdhBjokfy_SapnzsX7px2Qy0
2024-07-06 14:59:53,658:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-06 14:59:53,665:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFUzcy10azFZbWtBcjZ3VTQwUTVhQWRoQmpva2Z5X1NhcG56c1g3cHgyUXkwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "y2qGqK8mU6y_0iL1U0x3jVPtt0CxLriR4FAXGBuzsxgFhv8JloKrKMOX5YyIBdFi-p5XXthX17YHtspoJaZ_tBmbNgh5gx_ajkk0lR9lBvF4W4ILc31KrpdGK8UgyrQu64N357YXMWeoiwmjBUGn-OE_YtEVWNM40t4ZDf9M8S3872o9vSMR3BgCVqYh-hkjyUz2NybxPdmXNo9ULuv8xBD0xrfLBnykXWfD93Rv_Vo1RhTIIrVNr6aDV_UBXyeNow5snFmVWdZhms0WXk9GXEcPLLRYpBcKWZtV0sBSUPZXQ4Y3XZFvI-zjXko0NVF1jNu1P9tRCFPmIdC8CnWnLw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-06 14:59:53,847:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-07-06 14:59:53,848:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 06 Jul 2024 12:59:52 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963320687
Replay-Nonce: zgT1AlV-SQI1fWqn7PZn190C6kDcGo27nQvADlc4Ss_oy2vOQS4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:18:30Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123452997"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963320687"
}
2024-07-06 14:59:53,848:DEBUG:acme.client:Storing nonce: zgT1AlV-SQI1fWqn7PZn190C6kDcGo27nQvADlc4Ss_oy2vOQS4
2024-07-06 14:59:53,849:DEBUG:acme.client:JWS payload:
b''
2024-07-06 14:59:53,857:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123452997:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1TUUkxZldxbjdQWm4xOTBDNmtEY0dvMjduUXZBRGxjNFNzX295MnZPUVM0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0NTI5OTcifQ",
  "signature": "F0WKjuBh2jkHbfqkCYecl60e_Uh_Xste6VbfrKtNKhiRp6sRtWX7G6SZDBAWoW05t6AMW2ADsb6PJfIbOYehKAbJFgbjTkEVj-tsqJRwKjdSq6gnow8kKEBeYulfiymX6EPRUESHQ-k-gpm1NfuE7Mkuu9-9NC8G_fclOyQvV656S-IG9EdAskHkYncSVhyxWl0Fnr9sS5SHO5tLJTGT8Rub1ykKW7DyviD7b_aTd419y_qoGXSS-lWoupwXvxdbyRu21wEwAxIQfcSAz45J3IUQpti3tDVrUpKEAmtZ9CNx1gasURHxQ6CMxjruAJi2UxdJaSu0PV64lPN2ZguPmA",
  "payload": ""
}
2024-07-06 14:59:54,030:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123452997 HTTP/1.1" 200 810
2024-07-06 14:59:54,031:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:53 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zgT1AlV-NH12c81tpB8ilAOZ8EQYpqIvEKAbsB6F4uWkrAHWxe0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:18:30Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/jVGASw",
      "status": "pending",
      "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/HCdluw",
      "status": "pending",
      "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/7JAHfA",
      "status": "pending",
      "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A"
    }
  ]
}
2024-07-06 14:59:54,031:DEBUG:acme.client:Storing nonce: zgT1AlV-NH12c81tpB8ilAOZ8EQYpqIvEKAbsB6F4uWkrAHWxe0
2024-07-06 14:59:54,032:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-06 14:59:54,032:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-07-06 14:59:54,032:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-06 14:59:54,033:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-06 14:59:54,033:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:59:54,033:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-06 14:59:54,033:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-06 14:59:54,033:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-06 14:59:54,035:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 14:59:54,086:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-06 14:59:54,278:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-06 14:59:54,279:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-07-06 14:59:54,280:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-07-06 14:59:54,284:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC.
2024-07-06 14:59:54,284:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-06 14:59:54,285:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-06 14:59:54,289:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04B51BF0>
Prep: True
2024-07-06 14:59:54,289:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04B51BF0> and installer None
2024-07-06 14:59:54,289:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-06 14:59:54,295:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-06 14:59:54,296:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-06 14:59:54,298:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-06 14:59:54,777:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-06 14:59:54,778:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 12:59:53 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "RlBxx0jC8zE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-06 14:59:54,779:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-06 14:59:59,590:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8231_key-certbot.pem
2024-07-06 15:00:04,133:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8229_csr-certbot.pem
2024-07-06 15:00:04,134:DEBUG:acme.client:Requesting fresh nonce
2024-07-06 15:00:04,134:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-06 15:00:04,294:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-06 15:00:04,295:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 13:00:03 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zgT1AlV-MO4J_OlfvVIoo0ADzIw5qpCeXsJFKEAYqKawkpkuEok
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-06 15:00:04,295:DEBUG:acme.client:Storing nonce: zgT1AlV-MO4J_OlfvVIoo0ADzIw5qpCeXsJFKEAYqKawkpkuEok
2024-07-06 15:00:04,295:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-06 15:00:04,302:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1NTzRKX09sZnZWSW9vMEFEekl3NXFwQ2VYc0pGS0VBWXFLYXdrcGt1RW9rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ILcDVxzfSlaZ7vcc_do8jeDzETEsEj94lzf5Hz0oCxmKBiN50IQLUPJghtf7qtKzEVcETArN3GmBggGKSx4C-bkf0kMFzuHVI6gZLc6RacXnF4I_13lLRBGmFBRsK-6wmf0QyzM6oorFMuKJBZpgwchQDU4uZNAV11zPogGIfsiHa3eU13DVEfnUvsxbNbf40jDG_Wc_5u7jYJpwYYEu32nl6vJhY9rKT16xxYOmxt--932_Z4MHg6Wo-iu2CheHOxZPQt080wN89dPNEnq3AbYhsLlVmgosbjb5mXG84lmyLF6cHjJeSIGqO0iokv_6nXSVq7RubQa24eG36FVfcw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-07-06 15:00:04,502:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-07-06 15:00:04,503:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 06 Jul 2024 13:00:03 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963348157
Replay-Nonce: zgT1AlV-DetKHJanpdR2mUL0F3Y3AkSQ1Eqp7OGttMeQbECid4Q
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:18:40Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123495577"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963348157"
}
2024-07-06 15:00:04,503:DEBUG:acme.client:Storing nonce: zgT1AlV-DetKHJanpdR2mUL0F3Y3AkSQ1Eqp7OGttMeQbECid4Q
2024-07-06 15:00:04,503:DEBUG:acme.client:JWS payload:
b''
2024-07-06 15:00:04,509:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123495577:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1EZXRLSEphbnBkUjJtVUwwRjNZM0FrU1ExRXFwN09HdHRNZVFiRUNpZDRRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0OTU1NzcifQ",
  "signature": "f5tPaeJ5OaaFDdTa7xoBBLCnVynK8QxbLzIXC3-CnRDauiKWLeTI9KkmXtRvUcmYR0IVV2gW068rb9j9Av0PLwbTSYNYA1u8jeYsTsAPTbbxaxs27q02dwo0-pUA6pO5HrOXj9z9zjpF2uxbTVQmFOvtUN3pDS3GIcPIP1rFNWQ7AIu67UjuzuDca0YjnYLcOzULBzNL14PB4r5TN_W7XkuCnAsicVzvjshjLfawuDQTbK8etRaffDNJNq9a9ZKBsJX7ZsF2VUkOUF-8R6GHGI-QEoqkrgQcDxy6MBDt_3ViAMn_yiQsoqQ5tzxgFt2VcB5Apn36CFW6_lXKKmz1dg",
  "payload": ""
}
2024-07-06 15:00:04,676:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123495577 HTTP/1.1" 200 809
2024-07-06 15:00:04,677:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 13:00:03 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: zgT1AlV-qdSCwOfCbIITwwrmeCp6JcKW0CLzdmWlQV3k1vmQRX4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:18:40Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/CYYT4Q",
      "status": "pending",
      "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/HlKjqg",
      "status": "pending",
      "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/iwR44A",
      "status": "pending",
      "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA"
    }
  ]
}
2024-07-06 15:00:04,678:DEBUG:acme.client:Storing nonce: zgT1AlV-qdSCwOfCbIITwwrmeCp6JcKW0CLzdmWlQV3k1vmQRX4
2024-07-06 15:00:04,678:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-06 15:00:04,679:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-07-06 15:00:04,679:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-06 15:00:04,680:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-06 15:00:04,680:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 15:00:04,681:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-06 15:00:04,681:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-06 15:00:04,681:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-06 15:00:04,682:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 15:00:04,734:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-06 15:00:04,966:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-06 15:00:04,967:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2024-07-06 15:00:04,968:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2024-07-06 15:00:04,972:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC.
2024-07-06 15:00:04,972:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-06 15:00:04,973:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-06 15:00:04,978:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04847FD0>
Prep: True
2024-07-06 15:00:04,979:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04847FD0> and installer None
2024-07-06 15:00:04,979:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-06 15:00:04,984:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-06 15:00:04,985:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-06 15:00:04,987:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-06 15:00:05,425:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-06 15:00:05,425:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 13:00:04 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "yn4zYGDh11U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-07-06 15:00:05,426:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-06 15:00:10,299:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8232_key-certbot.pem
2024-07-06 15:00:15,042:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8230_csr-certbot.pem
2024-07-06 15:00:15,043:DEBUG:acme.client:Requesting fresh nonce
2024-07-06 15:00:15,043:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-06 15:00:15,189:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-06 15:00:15,189:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 13:00:14 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgqz6oUh1WL2pJP4sWeh_iijqCEI1tNnZ8fbUBYqEpl5k0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-06 15:00:15,189:DEBUG:acme.client:Storing nonce: EPg6kJgqz6oUh1WL2pJP4sWeh_iijqCEI1tNnZ8fbUBYqEpl5k0
2024-07-06 15:00:15,190:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-06 15:00:15,196:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3F6Nm9VaDFXTDJwSlA0c1dlaF9paWpxQ0VJMXROblo4ZmJVQllxRXBsNWswIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "jDkfOeL3LIZZJ3UsZ2PcgGLUBnNsZAT7xILnDTM23-ppBG60G0Bg2kt2Y4H70K1rcE-qg3gFWkyqk-dxYHLbfnWwCpmyR1m2SS3Dmj73CVV7ziwnGGv2_YU4q_9eheZv9iDl4TKeZjOIGFy5mfYTWh5I_MSZ4tE10BTnsfd-hgIKG52H0-lGl066XA8W2YGfobHz5xnHSwj4oLeQqDI40QWbppEeQs7nZ7rrfWFAmdwlQK2XNkO1soS4RhWV0B0YIl5GvUeNfqFmxAMx9B77YqGi9q3quozxa1A0bsx-6a6l5JsXM8GLmlq9MZ0rkKndgqfVQbqpwAx6mq09jJWUnA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-06 15:00:15,363:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-07-06 15:00:15,364:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 06 Jul 2024 13:00:14 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963374667
Replay-Nonce: oPjXeLW66e_-L0OHEK_APaWIqWEv0QUYojuJv89v3LfbolEjsNo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:18:51Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123535867"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963374667"
}
2024-07-06 15:00:15,364:DEBUG:acme.client:Storing nonce: oPjXeLW66e_-L0OHEK_APaWIqWEv0QUYojuJv89v3LfbolEjsNo
2024-07-06 15:00:15,365:DEBUG:acme.client:JWS payload:
b''
2024-07-06 15:00:15,371:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123535867:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzY2ZV8tTDBPSEVLX0FQYVdJcVdFdjBRVVlvanVKdjg5djNMZmJvbEVqc05vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM1MzU4NjcifQ",
  "signature": "sezsLEc2dZpMejglhbviB9nwafKATggZq1_H_KhJP05xjx2ghEyRMKCPvkbrvhvaC8edEdeB9UzJU9taiSMBN3NtTsbpbKSBTMD3m3uD21088zksA7UGmcexw7vrBXGC5HddejyNpGxPwtrl8qNhDK7yqr3OvtzP0iA2DeXQBpHE4YZS51Vq27hiKq4TxThjxu-Y-yhsqZRV92kBYLykMFmPl8Qqi_JBulod8_ZOhjG4u2_Q6fxe7OXDcVKXF-bihLN1JvMyN3H0PajfyLkDE7N_IJ-q2R5NcRUv-tOjmN5dqTTGylZTY0MrB_QlCcBUSVxEg96vWnov3xonP-adZg",
  "payload": ""
}
2024-07-06 15:00:15,520:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123535867 HTTP/1.1" 200 805
2024-07-06 15:00:15,520:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 13:00:14 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgqV6rrFrjRVcus7z6Hvcw6tWkGrpyC8grJHtwQtYIz59c
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:18:51Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/7949-Q",
      "status": "pending",
      "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/1xlmxg",
      "status": "pending",
      "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/Gfn7VQ",
      "status": "pending",
      "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8"
    }
  ]
}
2024-07-06 15:00:15,520:DEBUG:acme.client:Storing nonce: EPg6kJgqV6rrFrjRVcus7z6Hvcw6tWkGrpyC8grJHtwQtYIz59c
2024-07-06 15:00:15,521:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-06 15:00:15,521:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-07-06 15:00:15,522:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-06 15:00:15,522:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-06 15:00:15,524:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 15:00:15,524:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-06 15:00:15,524:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-06 15:00:15,525:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-06 15:00:15,527:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 15:00:15,586:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-06 15:00:15,788:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-06 15:00:15,790:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-06 15:00:15,790:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-06 15:00:15,796:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC.
2024-07-06 15:00:15,796:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-06 15:00:15,797:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-06 15:00:15,802:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04B637B0>
Prep: True
2024-07-06 15:00:15,803:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04B637B0> and installer None
2024-07-06 15:00:15,803:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-06 15:00:15,808:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-06 15:00:15,809:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-06 15:00:15,812:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-06 15:00:16,244:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-06 15:00:16,245:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 13:00:15 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "X7qdK390c-g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-06 15:00:16,245:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-06 15:00:21,060:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8233_key-certbot.pem
2024-07-06 15:00:25,495:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8231_csr-certbot.pem
2024-07-06 15:00:25,496:DEBUG:acme.client:Requesting fresh nonce
2024-07-06 15:00:25,496:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-06 15:00:25,641:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-06 15:00:25,641:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 13:00:24 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW6pgSBrnvVt9Jb_MfE_mskrULl7ouPoAtD-g5NHeTFVPw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-06 15:00:25,642:DEBUG:acme.client:Storing nonce: oPjXeLW6pgSBrnvVt9Jb_MfE_mskrULl7ouPoAtD-g5NHeTFVPw
2024-07-06 15:00:25,642:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-06 15:00:25,649:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZwZ1NCcm52VnQ5SmJfTWZFX21za3JVTGw3b3VQb0F0RC1nNU5IZVRGVlB3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "xhQpKPTxQQCtXpD0JsBi1rCM8eQ89KHwHQOPBAWHXomC4T3W-LQWNHFcB2tjYQhJu6aVJgCexloW5_1k0SM-y2_Gw2Vwe32vqh0WcKHPBHJUh0qN3oM9UYkX4eK2mCVAWLfdPRUQECWqhQA1fgvONmRDpEElcmTlZb9eKIgKoseuh0YdwgzfzPsZeYmyuK5iN078anIvS_hmSz5MwjY_ytusa51nSLo7B0_z7mUT9kPxVr0JaxJCRDn6_0f_gXL2AhkwLigNUDkw9-26-MxpkkkKkyCEhEd3ekNPW1gS3cbUtyqF8OTI6cLIKcKtUDhabSX2IHpKEcqG8jzDxiefRA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-06 15:00:25,829:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-07-06 15:00:25,830:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 06 Jul 2024 13:00:24 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963400877
Replay-Nonce: oPjXeLW65kJJIJ7_g7pOSYmY9Sld1F0sXCe0w45lqyoOd4WKyjM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:19:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123574347"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963400877"
}
2024-07-06 15:00:25,830:DEBUG:acme.client:Storing nonce: oPjXeLW65kJJIJ7_g7pOSYmY9Sld1F0sXCe0w45lqyoOd4WKyjM
2024-07-06 15:00:25,830:DEBUG:acme.client:JWS payload:
b''
2024-07-06 15:00:25,836:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123574347:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzY1a0pKSUo3X2c3cE9TWW1ZOVNsZDFGMHNYQ2UwdzQ1bHF5b09kNFdLeWpNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM1NzQzNDcifQ",
  "signature": "DwVW3LHr9DKATLZw8wtzKrl_cTLiShL54GpWkq4L9NT9p77mhV3vs-hdpunacWTSr7UIyyddOyCwEJRonLLqNI-zS1fNAYQBlFvNLQYBgXJRFX2J-3yTnX4Qi00GxVEW-BO_o0Vyj1ytpA4UsgciIpN1uf7OIV994iijAsKXn1xJfpt48En7uulArHyt0gue2f5nuBUbY1cp4TApc_BLJM0Y_4V3-gA1IF-gC5anwsDgPURYDkMMqCVbfuQTtDCySdZT6OvbaB6x1xV-_D0nZrbfEWzTCu_UNoQnQqovqQsyZGCNE0YmhFulnJuQcRWCXlWWpewUm5Mf7TiMU8fJVA",
  "payload": ""
}
2024-07-06 15:00:25,985:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123574347 HTTP/1.1" 200 805
2024-07-06 15:00:25,986:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 13:00:24 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgqLtkaY4iSj7H2ehk77U5HPiMwegTLJUgZaxTgQolllmw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:19:01Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/NeAJIw",
      "status": "pending",
      "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/4slvLA",
      "status": "pending",
      "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/_5WNoA",
      "status": "pending",
      "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU"
    }
  ]
}
2024-07-06 15:00:25,986:DEBUG:acme.client:Storing nonce: EPg6kJgqLtkaY4iSj7H2ehk77U5HPiMwegTLJUgZaxTgQolllmw
2024-07-06 15:00:25,987:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-06 15:00:25,987:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-07-06 15:00:25,988:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-06 15:00:25,988:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-06 15:00:25,989:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 15:00:25,989:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-06 15:00:25,989:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-06 15:00:25,990:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-06 15:00:25,991:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 15:00:26,043:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-06 15:00:26,300:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-06 15:00:26,302:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-07-06 15:00:26,303:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-07-06 15:00:26,308:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC.
2024-07-06 15:00:26,308:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-06 15:00:26,309:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-06 15:00:26,314:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04B52730>
Prep: True
2024-07-06 15:00:26,314:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04B52730> and installer None
2024-07-06 15:00:26,314:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-06 15:00:26,319:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-06 15:00:26,320:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-06 15:00:26,322:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-06 15:00:26,770:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-06 15:00:26,771:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 13:00:25 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "g8exg5oJ_VA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-06 15:00:26,771:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-06 15:00:31,664:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8234_key-certbot.pem
2024-07-06 15:00:36,267:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8232_csr-certbot.pem
2024-07-06 15:00:36,268:DEBUG:acme.client:Requesting fresh nonce
2024-07-06 15:00:36,268:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-06 15:00:36,417:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-06 15:00:36,418:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 13:00:35 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: oPjXeLW6oIHHTd6bQoPK-cqxkT5xjox48PlkVBxKkRyxAGK9u1o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-06 15:00:36,418:DEBUG:acme.client:Storing nonce: oPjXeLW6oIHHTd6bQoPK-cqxkT5xjox48PlkVBxKkRyxAGK9u1o
2024-07-06 15:00:36,419:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-06 15:00:36,425:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZvSUhIVGQ2YlFvUEstY3F4a1Q1eGpveDQ4UGxrVkJ4S2tSeXhBR0s5dTFvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Zh7qJGUHww0ku_VoeWhi1NwR1ASsURT0gkPkgK4CiG9wqDDGaCUwITqWxsbfSwbX6ctTRGEC-gtkQwc2QtQohwwIWJ8JF5CX65K2wRBDo-5ftqJWPGfGxldvjDiorKodwc1JTxXh0DIb_b3icJECaXAeGSmltSdmtfhOHI5QtbT9QFpNpwxyKTnDL1cSIKmI4KqmAZgQ4mSrT_uafKrB3uPJmsxhnks7MNc-DZCOc5AN1rL6l3v-zLAvryE4lNkhZVWi8ckCTJWUJP-0Nuw1VNijKiMPwFVhiFUzeU7JP_Kvm76GmgwBbATwSgiBxrj_rKVgDY51h6z18mJPyP0Rdw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-06 15:00:36,589:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-07-06 15:00:36,590:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 06 Jul 2024 13:00:35 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963440917
Replay-Nonce: EPg6kJgq26X0c0K3bKI34f8nGOgqJgLZZQV-gEfqURlC2kkeeIA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-10T11:19:11Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123633137"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963440917"
}
2024-07-06 15:00:36,590:DEBUG:acme.client:Storing nonce: EPg6kJgq26X0c0K3bKI34f8nGOgqJgLZZQV-gEfqURlC2kkeeIA
2024-07-06 15:00:36,590:DEBUG:acme.client:JWS payload:
b''
2024-07-06 15:00:36,597:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123633137:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3EyNlgwYzBLM2JLSTM0ZjhuR09ncUpnTFpaUVYtZ0VmcVVSbEMya2tlZUlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM2MzMxMzcifQ",
  "signature": "utpiW8t2bf96yGw4Laoq3DpcXQKepiPmFtWpl5I6M8uVOFgp1I1nbo2ren6BgA3dPjuFNcXjVyMBs2QYUMDhsdD-dO8xrR0soOlJmHAJhdt3MxyjIO48c8f5cDSM-AE4ySdnDisScLGMby1J7r0CtcJIsqquGMGdSPEGmWUl6zlwbjd-Y0IcvlDZP0cKHRh_uIECsssNQGnIPGA4BygzNvXY4J3e4UxrIB73jVbMD_AR6sF1GnLLr8LQeTWVNHuFfikCqQ7nN66LKybY0Lijas-qN7_DuccdtOopQD3tnBUF-OnjY-4XJGu3Epm6VICgRyp9Z9ZPdxVS0z5vtNV_gA",
  "payload": ""
}
2024-07-06 15:00:36,751:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123633137 HTTP/1.1" 200 805
2024-07-06 15:00:36,752:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 06 Jul 2024 13:00:35 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: EPg6kJgqs_GAr1ZQIVVCog_SwQIDmN0hcaK8KfWWpykv5sgL8T8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-10T11:19:11Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/cKgBUw",
      "status": "pending",
      "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/fI1u_A",
      "status": "pending",
      "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/N6igCw",
      "status": "pending",
      "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A"
    }
  ]
}
2024-07-06 15:00:36,752:DEBUG:acme.client:Storing nonce: EPg6kJgqs_GAr1ZQIVVCog_SwQIDmN0hcaK8KfWWpykv5sgL8T8
2024-07-06 15:00:36,752:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-06 15:00:36,753:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-07-06 15:00:36,753:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-06 15:00:36,753:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-06 15:00:36,754:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 15:00:36,754:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-06 15:00:36,755:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-06 15:00:36,755:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-06 15:00:36,756:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-06 15:00:36,757:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-07-06 15:00:36,757:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-07-06 15:00:36,759:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-07-06 15:00:36,760:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)