2024-06-27 06:57:32,715:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-06-27 06:57:32,715:DEBUG:certbot._internal.main:Arguments: []
2024-06-27 06:57:32,716:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-06-27 06:57:33,551:DEBUG:certbot._internal.log:Root logging level set at 20
2024-06-27 06:57:33,551:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-06-27 06:57:33,589:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x051A8DB0> and installer <certbot._internal.cli.cli_utils._Default object at 0x051A8DB0>
2024-06-27 06:57:33,634:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-27 06:57:33,875:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-27 06:57:33,877:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer.
2024-06-27 06:57:33,881:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD
2024-06-27 06:57:33,889:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC.
2024-06-27 06:57:33,889:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-27 06:57:33,890:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-27 06:57:33,895:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x051AD6F0>
Prep: True
2024-06-27 06:57:33,895:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x051AD6F0> and installer None
2024-06-27 06:57:33,895:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-27 06:57:33,900:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-27 06:57:33,901:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-27 06:57:33,903:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-27 06:57:34,368:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-27 06:57:34,369:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:57:34 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "yWCp57Ss_ro": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-06-27 06:57:34,371:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-27 06:57:39,878:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7975_key-certbot.pem
2024-06-27 06:57:44,522:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7973_csr-certbot.pem
2024-06-27 06:57:44,522:DEBUG:acme.client:Requesting fresh nonce
2024-06-27 06:57:44,523:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-27 06:57:44,673:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-27 06:57:44,673:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:57:44 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1VRjeNN9XFM4sthSXwcxaAfGPgK-Tqeq8dFZkVhDpbeeTmc1Stg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-27 06:57:44,674:DEBUG:acme.client:Storing nonce: 1VRjeNN9XFM4sthSXwcxaAfGPgK-Tqeq8dFZkVhDpbeeTmc1Stg
2024-06-27 06:57:44,674:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-27 06:57:44,680:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjlYRk00c3RoU1h3Y3hhQWZHUGdLLVRxZXE4ZEZaa1ZoRHBiZWVUbWMxU3RnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "HZUaBGu7gYSwWDw_gw6gNiiIuf4TYRMdyRg2X__D25RTx1ulJZ80J7hGgpx0j_SSQZdArEac9tufM3kX60FVNBOlf8W-2BHUNLIdvMW1EeK69EYxJBEr54kfsTmy5cmnZ6mMoVizsxaxe4Dm6cd458h4mgr7dsh7xeEBho29XcBG-SPuGxhYGaFUyJ_cyIetenI5l1PXdj4uNmIvFxdCBPzS_ZVZHX8jXfGMT_gGz0h9Qobpq1pHNkfq1viZVg4uEVJYI7-KP6PRlelJTXw0FRudP2aEv7AK4sv9pFtJXG4lKaWSlAgHu3zJcjKGx00nYhsgQ0fKkDPiwvLCltLd_Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-06-27 06:57:44,846:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-06-27 06:57:44,847:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 27 Jun 2024 04:57:44 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824128037
Replay-Nonce: lCR6it1ET8ouPdgi508jyu4iwMrFw7JeJZAKIOk-m_OEwWGQd9I
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:00:50Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824128037"
}
2024-06-27 06:57:44,847:DEBUG:acme.client:Storing nonce: lCR6it1ET8ouPdgi508jyu4iwMrFw7JeJZAKIOk-m_OEwWGQd9I
2024-06-27 06:57:44,847:DEBUG:acme.client:JWS payload:
b''
2024-06-27 06:57:44,854:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibENSNml0MUVUOG91UGRnaTUwOGp5dTRpd01yRnc3SmVKWkFLSU9rLW1fT0V3V0dRZDlJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU0NDY3MzcifQ",
  "signature": "XxkWcDlfwnxPpWI0WB0fyRN8i53DD410Xj0pTs-V6SmI-C76VCsyik3H_S4VN2Hok3qlC4GBsqHe381C1PUWnUX0kuMlv_TPiJEuF3aPhtiP3UbF3_iwqhN1PwVnDbUcuJfgp4Wx5iXQGLbNBWqhvv2gpR1CHcdAyRzNTwsfVpUJneT6BMr4LE17gu32oe8wOef3OTzx6QLrw4MZpDTjd4TwRxNp8zbZBWWQKH-nqLfZiha91RLXYqOK7OFYtzJUCbrccWH1JmueXrt_BFH_GB69jrNGknCxHfjL8ck54uh-JyRdS8iOLo19it2qSz89yPjECsxwzRWykh0jwiYfFA",
  "payload": ""
}
2024-06-27 06:57:45,008:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985446737 HTTP/1.1" 200 810
2024-06-27 06:57:45,010:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:57:44 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1VRjeNN9sUk3Pnn7c2-hjQjbp5CdrhBkNTjl_UUQBTgWa7LXEP0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:00:50Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/KAQe7Q",
      "status": "pending",
      "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Sd6_7w",
      "status": "pending",
      "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Ra3-nA",
      "status": "pending",
      "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ"
    }
  ]
}
2024-06-27 06:57:45,010:DEBUG:acme.client:Storing nonce: 1VRjeNN9sUk3Pnn7c2-hjQjbp5CdrhBkNTjl_UUQBTgWa7LXEP0
2024-06-27 06:57:45,012:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-27 06:57:45,012:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-06-27 06:57:45,013:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-27 06:57:45,014:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-27 06:57:45,029:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:57:45,029:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-27 06:57:45,029:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-27 06:57:45,030:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-27 06:57:45,035:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:57:45,076:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-27 06:57:45,276:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-27 06:57:45,278:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-06-27 06:57:45,279:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-06-27 06:57:45,284:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC.
2024-06-27 06:57:45,284:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-27 06:57:45,284:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-27 06:57:45,289:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0506FF90>
Prep: True
2024-06-27 06:57:45,289:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0506FF90> and installer None
2024-06-27 06:57:45,289:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-27 06:57:45,305:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-27 06:57:45,306:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-27 06:57:45,308:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-27 06:57:45,756:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-27 06:57:45,756:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:57:45 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "BRGxToISFQU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-27 06:57:45,757:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-27 06:57:50,338:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7976_key-certbot.pem
2024-06-27 06:57:54,668:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7974_csr-certbot.pem
2024-06-27 06:57:54,669:DEBUG:acme.client:Requesting fresh nonce
2024-06-27 06:57:54,669:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-27 06:57:54,819:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-27 06:57:54,820:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:57:54 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: lCR6it1Ew8YvuwmeygnEfyIvcC9ff1ZiZFOHelGvftlxhSriYgA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-27 06:57:54,821:DEBUG:acme.client:Storing nonce: lCR6it1Ew8YvuwmeygnEfyIvcC9ff1ZiZFOHelGvftlxhSriYgA
2024-06-27 06:57:54,821:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-27 06:57:54,833:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibENSNml0MUV3OFl2dXdtZXlnbkVmeUl2Y0M5ZmYxWmlaRk9IZWxHdmZ0bHhoU3JpWWdBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "JsSCkIwzbfCDTXt3zBLK_rk4SeoRMwqeQ-jnSw7Lx967OmKwJ2VCku_vEnMG8R_QZZ48axDRiWdAqjIfeKzKtzfjSSlJDGAh6j03dOnvw4JOJCSSAqBiYTmz6sDIE6DGgP-0JMStBjZqWrZdElxUhYsa6KgMc4tNMfjExx0sW2RDui0penq8nCYJIIkFY8qthdKlUb6c40wQHUpnpr8F8cx1hDGppHaltIqKoKqK0sD4N85KGciSzVATjd27pmvHkaCbYhCc4C_f625e6VA6E9qjsohfpJwJMmI7o_AowfFv4erGqaotRaG78HeeuO2XKBdGLDu7NeO_s9cykCDHfg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-06-27 06:57:54,997:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-06-27 06:57:54,998:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 27 Jun 2024 04:57:54 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824165847
Replay-Nonce: lCR6it1E5YKC1soZGhFY9IXlmUl_sByMsAg8VmGqnKlYyVjgRKo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824165847"
}
2024-06-27 06:57:54,998:DEBUG:acme.client:Storing nonce: lCR6it1E5YKC1soZGhFY9IXlmUl_sByMsAg8VmGqnKlYyVjgRKo
2024-06-27 06:57:54,998:DEBUG:acme.client:JWS payload:
b''
2024-06-27 06:57:55,003:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibENSNml0MUU1WUtDMXNvWkdoRlk5SVhsbVVsX3NCeU1zQWc4Vm1HcW5LbFl5VmpnUktvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1MDMwODcifQ",
  "signature": "m22Tk5IAARYJTQSlhU6MrdjvOoPM2OCXrZSNcLg31LmtC5zvVDjDRNSfNwn9PhkrKs4i8sTVY5XCBGrgpvMZpmUjZMucrks92JVCnCuvFQ92GxGJhq2OWNTa2ib18IjLmipGfu3b20ADu458ge37Q9Soj9XuhOCv1Oe-CDiItQaVgTVMBTRSmNdr32Mf07HDS2h37FPknYLqrdsk1tYWyFPnjabUBug4io9VTlKxVAFSMew9KBF1M92PS0iUBh66txeSZBFpJdLFtqqAQXCjw_cw5bbB5CngiEYBeh0qbX-_amfqjNYhkr68KAnBV31NnYrD2LyJnwsuTPSvj3s-UQ",
  "payload": ""
}
2024-06-27 06:57:55,160:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985503087 HTTP/1.1" 200 804
2024-06-27 06:57:55,161:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:57:54 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1VRjeNN9RBMGngTmF_tjHzyL_2PKL8RPYLf8PJc-1BvuSGPdmEA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:01Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/6TW65g",
      "status": "pending",
      "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/HbqBvA",
      "status": "pending",
      "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/f36r8w",
      "status": "pending",
      "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ"
    }
  ]
}
2024-06-27 06:57:55,161:DEBUG:acme.client:Storing nonce: 1VRjeNN9RBMGngTmF_tjHzyL_2PKL8RPYLf8PJc-1BvuSGPdmEA
2024-06-27 06:57:55,162:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-27 06:57:55,162:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-06-27 06:57:55,162:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-27 06:57:55,163:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-27 06:57:55,164:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:57:55,164:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-27 06:57:55,164:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-27 06:57:55,164:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-27 06:57:55,166:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:57:55,207:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-27 06:57:55,453:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-27 06:57:55,454:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-06-27 06:57:55,455:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-06-27 06:57:55,459:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC.
2024-06-27 06:57:55,459:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-27 06:57:55,460:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-27 06:57:55,465:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x051A8D30>
Prep: True
2024-06-27 06:57:55,465:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x051A8D30> and installer None
2024-06-27 06:57:55,465:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-27 06:57:55,480:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-27 06:57:55,481:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-27 06:57:55,483:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-27 06:57:55,962:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-27 06:57:55,963:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:57:55 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "6KoiHsbyEG8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-27 06:57:55,964:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-27 06:58:00,601:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7977_key-certbot.pem
2024-06-27 06:58:04,936:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7975_csr-certbot.pem
2024-06-27 06:58:04,937:DEBUG:acme.client:Requesting fresh nonce
2024-06-27 06:58:04,937:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-27 06:58:05,098:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-27 06:58:05,100:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:04 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: WDMSYcqSc75L8HUrk9nHZLE4ThKpLIagy43T__8I6hID3j88IHA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-27 06:58:05,100:DEBUG:acme.client:Storing nonce: WDMSYcqSc75L8HUrk9nHZLE4ThKpLIagy43T__8I6hID3j88IHA
2024-06-27 06:58:05,101:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-27 06:58:05,111:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNjNzVMOEhVcms5bkhaTEU0VGhLcExJYWd5NDNUX184STZoSUQzajg4SUhBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Bb0sZIAgXLboV4OYJw5JSmIKEdmH7wj_ePXITOdJeG2t70yMZ1rFFVzG0OJXdsWKEsRFK-wH_qo49YtzmhUlpSnNgF6Uxs-ZKUWnUkri-EKlZ54ygVaWpBUVbchdFUs8dPSecfaaEHyHSqmh7KoOmUq1v9mOZCW6GSLLC3zTN3-AJaC88peLY83S3FvAbuN9eDddsS8_uYwu3XXnel8IxBpS9XlsH46Dvrx30gmONc-g9VfLT-QpDg0t8e-d1BpXd4LNf3qAiu9VqkA0jal2nfIpLIjDHMfk7IcXgMRXzR5HVqkZoV6iQLrdWzAEljlIyGHLQ6y004QKq9ABm-FtnQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-06-27 06:58:05,288:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-06-27 06:58:05,289:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 27 Jun 2024 04:58:05 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824216467
Replay-Nonce: WDMSYcqSEpjGCCQVFI0-HgkPNJnDoJZFYG6zAHvMUK2vMWW25k0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:11Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824216467"
}
2024-06-27 06:58:05,289:DEBUG:acme.client:Storing nonce: WDMSYcqSEpjGCCQVFI0-HgkPNJnDoJZFYG6zAHvMUK2vMWW25k0
2024-06-27 06:58:05,290:DEBUG:acme.client:JWS payload:
b''
2024-06-27 06:58:05,296:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNFcGpHQ0NRVkZJMC1IZ2tQTkpuRG9KWkZZRzZ6QUh2TVVLMnZNV1cyNWswIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1NzQxNzcifQ",
  "signature": "kX4zGu8V2fNOeiPFcDd7fkm_9fSAkuFbN5gUXfD_kDOgHdd3ktNQ4z8eSqmGKZCl_wknj_dNpeMjpVL0LEd46Udk1HCMvUxZ4JiuBA40lXpg9nalhPvEvlgGQSZyXNebpCG1mzXBBRb8KVS9G8z-ZqkIQRTQGe3P8ji4f-yssjsJRttYuv3M_DIodY4jvxl8z9OKP3v0V6C288Yq-aQ3rQgSxim55pXezo7vHKJ9gBziukSySzsvh7yErnbYwWMlCBuFQzKEYK0TouXtCJ_VOllNn05Izec8WUjQP0eMQ9yegPWYDHzeUk-yvBaNIQA5Oe6Nz-XcTJS4MOKJUaP51w",
  "payload": ""
}
2024-06-27 06:58:05,461:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985574177 HTTP/1.1" 200 807
2024-06-27 06:58:05,461:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:05 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: WDMSYcqS5IYtDGg9f9pR9xnJ6d1Fk-f_dIidzkx6NnjsZ8LACko
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:11Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/RO51fg",
      "status": "pending",
      "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/APGIHQ",
      "status": "pending",
      "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/4l4xCQ",
      "status": "pending",
      "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs"
    }
  ]
}
2024-06-27 06:58:05,462:DEBUG:acme.client:Storing nonce: WDMSYcqS5IYtDGg9f9pR9xnJ6d1Fk-f_dIidzkx6NnjsZ8LACko
2024-06-27 06:58:05,462:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-27 06:58:05,462:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-06-27 06:58:05,462:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-27 06:58:05,462:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-27 06:58:05,463:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:58:05,463:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-27 06:58:05,463:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-27 06:58:05,464:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-27 06:58:05,465:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:58:05,505:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-27 06:58:05,733:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-27 06:58:05,735:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-06-27 06:58:05,737:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-06-27 06:58:05,742:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC.
2024-06-27 06:58:05,742:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-27 06:58:05,742:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-27 06:58:05,747:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x046A6BF0>
Prep: True
2024-06-27 06:58:05,748:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x046A6BF0> and installer None
2024-06-27 06:58:05,748:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-27 06:58:05,765:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-27 06:58:05,766:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-27 06:58:05,768:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-27 06:58:06,240:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-27 06:58:06,241:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:05 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "WWZCXtF0xGE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-27 06:58:06,242:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-27 06:58:11,029:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7978_key-certbot.pem
2024-06-27 06:58:15,400:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7976_csr-certbot.pem
2024-06-27 06:58:15,400:DEBUG:acme.client:Requesting fresh nonce
2024-06-27 06:58:15,401:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-27 06:58:15,557:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-27 06:58:15,558:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:15 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 8AH9ZZ0o2CrjAyYu6-iG771il4gbrcH6AIQ8FCAcBN509kGH-dM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-27 06:58:15,558:DEBUG:acme.client:Storing nonce: 8AH9ZZ0o2CrjAyYu6-iG771il4gbrcH6AIQ8FCAcBN509kGH-dM
2024-06-27 06:58:15,559:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-06-27 06:58:15,565:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG8yQ3JqQXlZdTYtaUc3NzFpbDRnYnJjSDZBSVE4RkNBY0JONTA5a0dILWRNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "DuV_hLxdFr8Td8l-9onhCtZW27jmkOw7vGYBC5CwQXIqEWjKU2bujy3q9SAfQ310QPyEcBeyF2oqiBPDjMOj8k1frVgDSOYCBHbuLgcSdoaGI3O_rWJAiCzB4dLzxazaF0HblRFqBiTKqtj2h594TPd9kVGFz_EMBzVi2Fy2sXmZbnI6o3XIdbJFNj6eOOaGsTwcd_d36qUSMvUPgRrLUJX8X4C4i9TxhbQD76DnAG8kmnBeGMc9D8Fp55dVC5p8-B6earpGrtXeNfPPEuwq7anpKqirnGMhFcRILJWBgZT3lsIWY2aZokGXQYd7lnFhofXKcnzmF7xM3_ZyZrWitw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-06-27 06:58:15,736:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-06-27 06:58:15,738:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 27 Jun 2024 04:58:15 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824261497
Replay-Nonce: WDMSYcqSA9TCMvrpNuSH29w-G0q0iWJmyJrcEZlsJaLBjfpRQrI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:21Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824261497"
}
2024-06-27 06:58:15,738:DEBUG:acme.client:Storing nonce: WDMSYcqSA9TCMvrpNuSH29w-G0q0iWJmyJrcEZlsJaLBjfpRQrI
2024-06-27 06:58:15,739:DEBUG:acme.client:JWS payload:
b''
2024-06-27 06:58:15,747:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNBOVRDTXZycE51U0gyOXctRzBxMGlXSm15SnJjRVpsc0phTEJqZnBSUXJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2NDA4NTcifQ",
  "signature": "eAoPRSYbueaFfmbtxQS7bdmJL4tTrp1GR1zq1ZH2H__tJzeCsPXxYUheA8x6WdUIghnX3xxCuEqr5xS1T5BJaGkJ-OSu1KVJW02k_TY-gatVXmTpVsVdVGhcVGo89Wgwa6Py83NBlfLvbYp4_gdeTPekfEfHWdLUtL6iLF9QIGJ7PLG91bySM5bHltHVKTvhnKg04nXd72RX2Bt0J_BqhFJLFZRbEe17y0AW_i8A15pCKfqUEwojp8PVgf-mEymlBWgnxGgEuXlC0In672PCCX1yiP7bVuuZPaOqBBqO2q6fm9TYVyTnhciHZKjmhJuGcf3uXWt2rHhfQ68BgMMHTw",
  "payload": ""
}
2024-06-27 06:58:15,910:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985640857 HTTP/1.1" 200 801
2024-06-27 06:58:15,912:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:15 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: WDMSYcqSxfFiQD9l4JfvuzW0uOsOixl-Wh-FkhHo7IEfIgWS56E
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:21Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/_W_uNw",
      "status": "pending",
      "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/1XcAQA",
      "status": "pending",
      "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/a1s51Q",
      "status": "pending",
      "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs"
    }
  ]
}
2024-06-27 06:58:15,912:DEBUG:acme.client:Storing nonce: WDMSYcqSxfFiQD9l4JfvuzW0uOsOixl-Wh-FkhHo7IEfIgWS56E
2024-06-27 06:58:15,914:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-27 06:58:15,914:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-06-27 06:58:15,915:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-27 06:58:15,916:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-27 06:58:15,917:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:58:15,918:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-27 06:58:15,918:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-27 06:58:15,919:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-27 06:58:15,921:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:58:15,973:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-27 06:58:16,160:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-27 06:58:16,163:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-06-27 06:58:16,164:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-06-27 06:58:16,168:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC.
2024-06-27 06:58:16,168:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-27 06:58:16,168:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-27 06:58:16,173:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C17C50>
Prep: True
2024-06-27 06:58:16,173:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C17C50> and installer None
2024-06-27 06:58:16,173:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-27 06:58:16,178:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-27 06:58:16,179:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-27 06:58:16,181:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-27 06:58:16,665:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-27 06:58:16,666:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:16 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "cr4Go-sUQ6Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-27 06:58:16,667:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-27 06:58:21,121:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7979_key-certbot.pem
2024-06-27 06:58:25,525:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7977_csr-certbot.pem
2024-06-27 06:58:25,525:DEBUG:acme.client:Requesting fresh nonce
2024-06-27 06:58:25,525:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-27 06:58:25,686:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-27 06:58:25,687:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:25 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: WDMSYcqSLixrbqLfaciM4OGI8fHDP4ZvIYeYZQan46qowzrjhy0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-27 06:58:25,688:DEBUG:acme.client:Storing nonce: WDMSYcqSLixrbqLfaciM4OGI8fHDP4ZvIYeYZQan46qowzrjhy0
2024-06-27 06:58:25,688:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-27 06:58:25,701:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNMaXhyYnFMZmFjaU00T0dJOGZIRFA0WnZJWWVZWlFhbjQ2cW93enJqaHkwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "UmSXCtHMCEXiGYUcrhyd2PsevbQ8uhaArPz0vtbSRPx3QTrw3M4-k898dhEX8wXvapyl8ow5HTf_tcZUWekDA-j7xhe8f-zQ4noNT3Ry3jT41ZMCTxKqCrjuph7_5xsMfRpMvx8cYshgTDllRHiMyQBEN9dtKXaem_ZOHj-ya-XIlqsroYfIZQXXXL3SLFFNg_kUqKZA_9YBmvm6uhVWAU16Td23f8pGYHul0m14s07xxkbwlSqUxfwI3d6H9kBi9Iajy2utwoUj4pMWWENxsyN2eaR7FEew-L5lSxCWTt6KP45M_a-2HFmZ57jVLlOIqIvWe9MO1SVO8E1hNFRL1A",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-06-27 06:58:25,885:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-06-27 06:58:25,886:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 27 Jun 2024 04:58:25 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824300277
Replay-Nonce: WDMSYcqSSe_cdmGVE1xfYRLUW3ev1xOmymhOKiVtqp9H5DWyKXI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:31Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824300277"
}
2024-06-27 06:58:25,887:DEBUG:acme.client:Storing nonce: WDMSYcqSSe_cdmGVE1xfYRLUW3ev1xOmymhOKiVtqp9H5DWyKXI
2024-06-27 06:58:25,887:DEBUG:acme.client:JWS payload:
b''
2024-06-27 06:58:25,898:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNTZV9jZG1HVkUxeGZZUkxVVzNldjF4T215bWhPS2lWdHFwOUg1RFd5S1hJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2OTYxMjcifQ",
  "signature": "gtIgQSitfrTK66cAyvHUUmq_I8JiZwdsXLs36wDwNiVkKSVQF7TuUMPXdPyiySkqb-TDjo2CdTqw5ZmYIYp2LwQR-8X5mzoXdC0gXB-TCYJdAt4mvsjs_XwPrgjt3WxMWlET60Eq_5tYa-vYe_nyEvqkpdxehzcU7uicJ2C4cGHLgfSjlN_kRzBlTE101dDcR-HZ9n4Bjeof9GJZ13JSo3dOv5TuZYcLdiQz2PQnaolip9IzSzY05-LE7ZG2ok8wlDeE_uj9TO5_wpGBUQDUn9C-wZJNgf60HRXVFBduVoiWnob2qmV6smN8hVduTdtbUxa2GiHoa-WdqbMQAw7D5A",
  "payload": ""
}
2024-06-27 06:58:26,064:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985696127 HTTP/1.1" 200 805
2024-06-27 06:58:26,065:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:25 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 8AH9ZZ0oWlUXIsNMbWxBLLkKgOxfvD2KB-ZAFj7uKyW_vV5qZWU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:31Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/p3DiTg",
      "status": "pending",
      "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/dn4kZw",
      "status": "pending",
      "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/A2Vu8Q",
      "status": "pending",
      "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU"
    }
  ]
}
2024-06-27 06:58:26,065:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oWlUXIsNMbWxBLLkKgOxfvD2KB-ZAFj7uKyW_vV5qZWU
2024-06-27 06:58:26,067:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-27 06:58:26,067:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-06-27 06:58:26,068:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-27 06:58:26,069:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-27 06:58:26,071:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:58:26,071:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-27 06:58:26,071:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-27 06:58:26,072:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-27 06:58:26,075:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:58:26,116:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-27 06:58:26,350:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-27 06:58:26,353:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-06-27 06:58:26,354:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-06-27 06:58:26,364:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC.
2024-06-27 06:58:26,364:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-27 06:58:26,364:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-27 06:58:26,369:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0506FF10>
Prep: True
2024-06-27 06:58:26,369:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0506FF10> and installer None
2024-06-27 06:58:26,369:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-27 06:58:26,388:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-27 06:58:26,390:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-27 06:58:26,394:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-27 06:58:26,872:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-27 06:58:26,873:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:26 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "cr8ilw0RkPc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-27 06:58:26,874:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-27 06:58:31,857:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7980_key-certbot.pem
2024-06-27 06:58:36,216:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7978_csr-certbot.pem
2024-06-27 06:58:36,216:DEBUG:acme.client:Requesting fresh nonce
2024-06-27 06:58:36,216:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-27 06:58:36,377:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-27 06:58:36,378:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:36 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 8AH9ZZ0o47dlSUGk_k992inn_ndrhzrx6T5zBQI1FGOFjtvk8bQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-27 06:58:36,378:DEBUG:acme.client:Storing nonce: 8AH9ZZ0o47dlSUGk_k992inn_ndrhzrx6T5zBQI1FGOFjtvk8bQ
2024-06-27 06:58:36,379:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-27 06:58:36,387:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG80N2RsU1VHa19rOTkyaW5uX25kcmh6cng2VDV6QlFJMUZHT0ZqdHZrOGJRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "JJ03gpsggHx8l4hHNN5wBzLoggx6fINNUjzF-7Z6GT48njmMeplROsWkqmLcs1OustwaDZ2TstkhJAcM7BNnXApQWmNXfgjw-86qGiFd3brzz7fb-YaqvgRzDuGWpwqbIlYQYXfWUxnRy8zUzk2btq2DKlAf37_an4plJyed3zM_2ml1B4z1SdDQsQ4WKcCYLzGm69V00yoSGxDJIy5mMfCnqYJE3qNvs08Br3mHibDqj9CX-SK3HR39dLic41vG-g1uiiYF1e5xHbskCmzDiU3h74pkrnkE7S3X4XasgbV0N9CFHrBMgKdT6rf_ecVma-faRPFjRQynBv4wOf_SdA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-06-27 06:58:36,560:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-06-27 06:58:36,561:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 27 Jun 2024 04:58:36 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824334367
Replay-Nonce: WDMSYcqSLJeCWXs1OgIWiHaMzQSSVFPW0rU09oFTvMeiK0OIM9o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:41Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824334367"
}
2024-06-27 06:58:36,561:DEBUG:acme.client:Storing nonce: WDMSYcqSLJeCWXs1OgIWiHaMzQSSVFPW0rU09oFTvMeiK0OIM9o
2024-06-27 06:58:36,562:DEBUG:acme.client:JWS payload:
b''
2024-06-27 06:58:36,567:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNMSmVDV1hzMU9nSVdpSGFNelFTU1ZGUFcwclUwOW9GVHZNZWlLME9JTTlvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU3NDcxMTcifQ",
  "signature": "KVCbklpoatOwSBE8LSm5DYB3GERiEtp4c9tdwR8EFdVulmw7YoLIA84aiaFCoqB3sRXjwqmZCmgUCH00dyb5VOFV251xRj8s_w5ggJVNFhhuILZPc03kqhumErrIqKNYekbboxrz6G_TrKpbgfrVg1emrayQ79W3xUw-H3Hp3g_ycOAcp22kpcN38phhDTc7XjpfipChhLD5q1zLQlr9IdNhxj_oCltVydpcBDvEqgxRc8U_n1cJqv0WeWs2WmU2TEFZMHO-nQlGhKpPTyLEfHB4zhL_P_vWBQTmIrgR0JNX8sD0vAluhl4B98D8Sfgfsrjv1rDuTQjI5nc9jQRj0w",
  "payload": ""
}
2024-06-27 06:58:36,731:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985747117 HTTP/1.1" 200 809
2024-06-27 06:58:36,732:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:36 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 8AH9ZZ0oZ07BHhpLZxJu_g9tROzPxbOqiFjLdMlRAIdK_gaDUIs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:41Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/NIFDhg",
      "status": "pending",
      "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/1iYgbg",
      "status": "pending",
      "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/elhV3g",
      "status": "pending",
      "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY"
    }
  ]
}
2024-06-27 06:58:36,732:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oZ07BHhpLZxJu_g9tROzPxbOqiFjLdMlRAIdK_gaDUIs
2024-06-27 06:58:36,733:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-27 06:58:36,733:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-06-27 06:58:36,734:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-27 06:58:36,734:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-27 06:58:36,735:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:58:36,735:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-27 06:58:36,735:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-27 06:58:36,736:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-27 06:58:36,739:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:58:36,791:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-27 06:58:36,982:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-27 06:58:36,983:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer.
2024-06-27 06:58:36,984:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD
2024-06-27 06:58:36,988:INFO:certbot._internal.renewal:Cert not yet due for renewal
2024-06-27 06:58:36,992:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-27 06:58:37,031:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-27 06:58:37,270:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-27 06:58:37,273:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-06-27 06:58:37,275:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-06-27 06:58:37,285:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC.
2024-06-27 06:58:37,285:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-27 06:58:37,285:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-27 06:58:37,296:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05453E90>
Prep: True
2024-06-27 06:58:37,297:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05453E90> and installer None
2024-06-27 06:58:37,297:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-27 06:58:37,313:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-27 06:58:37,314:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-27 06:58:37,317:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-27 06:58:37,783:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-27 06:58:37,783:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:37 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "UwSzob1IILE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-27 06:58:37,784:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-27 06:58:42,645:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7981_key-certbot.pem
2024-06-27 06:58:46,967:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7979_csr-certbot.pem
2024-06-27 06:58:46,967:DEBUG:acme.client:Requesting fresh nonce
2024-06-27 06:58:46,967:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-27 06:58:47,124:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-27 06:58:47,124:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:46 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: WDMSYcqSC60eAIqN_B5-obQloTrGPtwgSy0_90z9amMgqPtn15E
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-27 06:58:47,125:DEBUG:acme.client:Storing nonce: WDMSYcqSC60eAIqN_B5-obQloTrGPtwgSy0_90z9amMgqPtn15E
2024-06-27 06:58:47,125:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-27 06:58:47,131:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNDNjBlQUlxTl9CNS1vYlFsb1RyR1B0d2dTeTBfOTB6OWFtTWdxUHRuMTVFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "nqhkDcR9JX6OQuchh0YugrdWjodIMRL_QEUX_7RWn4ugFwRiZD_PnRC7g8uJsvBQUWlk24WcRaap5aZGSYrrO_NRWFwsh5e8Av6EYfz0yuly_qd9YunY5bJi7PId8fcBqQb4Qwc5lv1IKU9OGtHf6eAVATzdzI8tHlf6sIqm0fkTG8SyrFCzDw1qyGd8HsC8-1pYlaGhZSlQBVe5bQI1Gwo9J8ulJyRWG-6BYNkONWNbyBmlRSifhhk5IEsn3LKs9ZSk012LXUpaJonyGhnarOhxC4MuTPUmEgcGD7ZahyT_FJyVyGEnJ5KbaTY3YJoncWdkfSRHvsH5eg_l5A2LjQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-06-27 06:58:47,299:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-06-27 06:58:47,300:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 27 Jun 2024 04:58:47 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824371297
Replay-Nonce: 8AH9ZZ0ovyq3-QeJUKvqm7FO89IuB8LIEBi2bha3Qg6Eb8FD-eo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824371297"
}
2024-06-27 06:58:47,300:DEBUG:acme.client:Storing nonce: 8AH9ZZ0ovyq3-QeJUKvqm7FO89IuB8LIEBi2bha3Qg6Eb8FD-eo
2024-06-27 06:58:47,300:DEBUG:acme.client:JWS payload:
b''
2024-06-27 06:58:47,306:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG92eXEzLVFlSlVLdnFtN0ZPODlJdUI4TElFQmkyYmhhM1FnNkViOEZELWVvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4MDM3NjcifQ",
  "signature": "qzY3ZKMEzZTr6OV7dMMGLF_qNQCBkIEKRT_O96E-LtY2-qDZtWAEo877FzKdEJfpSm90aOPKG5kfBXIACCV__ThV7uQ2l3jXqOltqurAMparniQqn3pkjSd7QKmpbxkIS_hfUlL_K6sPHhlnRrS9Gi15vtqPqIZ95blIjgwonDmd60S3tPgJyX7dE1zZGyAYSSYecuQ0qJW8u7EkZln4zUgQBk6aN7wOuIsdSWSPmWOvMG4hr5VprJpNNpp4y4ClVIxfxExgzYWWD_bZFS2HC4gPPemjM2r-nlHIn_qupiK_qIpiOQv2zwAbpRjxI4-lAcPD3p_fbNysre3whJeSeA",
  "payload": ""
}
2024-06-27 06:58:47,465:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985803767 HTTP/1.1" 200 806
2024-06-27 06:58:47,467:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:47 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: WDMSYcqSMtCUmzXxpVC31bzOQSd50W6uawMuFi0HccAbyGI7DDo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:52Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/DP175w",
      "status": "pending",
      "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/kAzjPg",
      "status": "pending",
      "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/-Uec4A",
      "status": "pending",
      "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0"
    }
  ]
}
2024-06-27 06:58:47,467:DEBUG:acme.client:Storing nonce: WDMSYcqSMtCUmzXxpVC31bzOQSd50W6uawMuFi0HccAbyGI7DDo
2024-06-27 06:58:47,469:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-27 06:58:47,469:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-06-27 06:58:47,470:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-27 06:58:47,470:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-27 06:58:47,471:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:58:47,471:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-27 06:58:47,472:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-27 06:58:47,472:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-27 06:58:47,475:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:58:47,519:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-06-27 06:58:47,520:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-27 06:58:47,520:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-06-27 06:58:47,527:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-06-27 06:58:47,529:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-06-27 06:58:47,529:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-06-27 06:58:47,529:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-06-27 06:58:47,529:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-06-27 06:58:47,531:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-06-27 06:58:47,572:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-27 06:58:47,808:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-27 06:58:47,809:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-06-27 06:58:47,810:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-06-27 06:58:47,814:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC.
2024-06-27 06:58:47,814:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-27 06:58:47,814:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-27 06:58:47,819:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x054532F0>
Prep: True
2024-06-27 06:58:47,820:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x054532F0> and installer None
2024-06-27 06:58:47,820:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-27 06:58:47,836:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-27 06:58:47,837:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-27 06:58:47,839:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-27 06:58:48,304:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-27 06:58:48,305:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:48 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "CfrIvqA_k9w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-27 06:58:48,306:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-27 06:58:52,852:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7982_key-certbot.pem
2024-06-27 06:58:57,209:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7980_csr-certbot.pem
2024-06-27 06:58:57,209:DEBUG:acme.client:Requesting fresh nonce
2024-06-27 06:58:57,209:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-27 06:58:57,366:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-27 06:58:57,367:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:57 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 8AH9ZZ0oWDFWr693VX0sdTwWU8HOhu45Wh-O4mEFPASkkgmQfRQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-27 06:58:57,367:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oWDFWr693VX0sdTwWU8HOhu45Wh-O4mEFPASkkgmQfRQ
2024-06-27 06:58:57,368:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-27 06:58:57,374:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG9XREZXcjY5M1ZYMHNkVHdXVThIT2h1NDVXaC1PNG1FRlBBU2trZ21RZlJRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "JxbrhYTIlDuDEqtZpxdHVcSHFwS95zFiSUviduy1WumqvlUSrnA_O5Fzy69qoAifdyELx_-t2N4L1yH3lDNNO5XVXldgjk8O6LFjoc4GkZUNV1rHuZdCL8VesTMqPAHm6MGZVCj2p3iCx-39HOR526Y_VRzPX-r1sNr67KPE2NqLHZkgBkK6pz3T7LwC8ftJWyuw1Z4o60nw452fYBFYcMvNRlo-3UrVyr60ebw9A9dU0RKsocEvRxVeEforCYKmcARmqy9P838XfH3t84n0sngI2p9pdg9duagLxVEjFB8Ukn1IARi_230GatBzfRtBBhXxU65BaukJSUi867LUPQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-06-27 06:58:57,546:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-06-27 06:58:57,547:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 27 Jun 2024 04:58:57 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824405187
Replay-Nonce: 8AH9ZZ0oSh1_v93w8dm0yr_QKIGOP2Lu8aUEgtep-_J2eR7NhfY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824405187"
}
2024-06-27 06:58:57,547:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oSh1_v93w8dm0yr_QKIGOP2Lu8aUEgtep-_J2eR7NhfY
2024-06-27 06:58:57,547:DEBUG:acme.client:JWS payload:
b''
2024-06-27 06:58:57,552:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG9TaDFfdjkzdzhkbTB5cl9RS0lHT1AyTHU4YVVFZ3RlcC1fSjJlUjdOaGZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4NTYwNDcifQ",
  "signature": "WmumXUM0eDvR1Gj7k1Oa7nJYoVqnQ_92GXPccc2T68LU4-Xrgnn_7eGH2av_Dm0Am_dQX2_BsM7rnHhvoKpT0e-3PScRKtjMTNA2ZSithntyw-MxQVR1uPcrQN9zuAK13qfzoqEUUSWRW3wBYNBF-k-WnqCpDsUebHTmgLXTm9k4_zkxredu_pPBYhINEUywgDvQ6ksbCWLnEZWYjWynC2lqmUOBoKqFk508czOM7zpzsbPg7N1ePAq03WXq5MLL_qGvyOXWNdwJYuArRIrZCX4fwVvcTPhPkc-91YQqvQ9h778KA6dzEfmr81O7QHQxW3sIHIUaEvKB-o6M9zZCEw",
  "payload": ""
}
2024-06-27 06:58:57,731:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985856047 HTTP/1.1" 200 811
2024-06-27 06:58:57,731:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:57 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 8AH9ZZ0o0Fjnu6eNXQw0A28kuDLp0pcAC2nnQ5JjX-cWRBjwDzU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:01Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/ZygfgQ",
      "status": "pending",
      "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/f5kJqg",
      "status": "pending",
      "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/OgjqNA",
      "status": "pending",
      "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s"
    }
  ]
}
2024-06-27 06:58:57,732:DEBUG:acme.client:Storing nonce: 8AH9ZZ0o0Fjnu6eNXQw0A28kuDLp0pcAC2nnQ5JjX-cWRBjwDzU
2024-06-27 06:58:57,733:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-27 06:58:57,734:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-06-27 06:58:57,735:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-27 06:58:57,735:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-27 06:58:57,736:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:58:57,736:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-27 06:58:57,736:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-27 06:58:57,737:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-27 06:58:57,738:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:58:57,792:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-27 06:58:58,061:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-27 06:58:58,062:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-06-27 06:58:58,063:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-06-27 06:58:58,066:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC.
2024-06-27 06:58:58,066:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-27 06:58:58,067:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-27 06:58:58,072:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x054B6E70>
Prep: True
2024-06-27 06:58:58,072:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x054B6E70> and installer None
2024-06-27 06:58:58,072:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-27 06:58:58,077:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-27 06:58:58,078:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-27 06:58:58,080:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-27 06:58:58,537:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-27 06:58:58,538:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:58:58 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "sw2PZ0I9q_I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-06-27 06:58:58,539:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-27 06:59:03,114:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7983_key-certbot.pem
2024-06-27 06:59:07,549:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7981_csr-certbot.pem
2024-06-27 06:59:07,549:DEBUG:acme.client:Requesting fresh nonce
2024-06-27 06:59:07,549:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-27 06:59:07,701:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-27 06:59:07,702:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:59:07 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1VRjeNN9EVEJLIocIexjFopGIvRvVVv1wontFtL-VURZN0Vnzro
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-27 06:59:07,703:DEBUG:acme.client:Storing nonce: 1VRjeNN9EVEJLIocIexjFopGIvRvVVv1wontFtL-VURZN0Vnzro
2024-06-27 06:59:07,703:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-27 06:59:07,709:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjlFVkVKTElvY0lleGpGb3BHSXZSdlZWdjF3b250RnRMLVZVUlpOMFZuenJvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "isCJoj-zZLmqh39SFih5COifHntseSGj_9sb6OV8hMlxTftlRcNIbzrdEwVQirUIgdv2NqNoaZKD8X5HClW0LmM8XNtxtsgJS_m9_rqW5s0XmfaPbQXY-rM0oUkGuoaEXz-fYlR6NxyTbhbfKohDjLsbAhpeS4WSPK1uN9kA7tZ1vgiJKntAq2Pf5WuskEXoDZA5NlVjmSE3M0oC1c0wpiYD4hm6MOLA5GrvDqepiRuxxH9421UZPaF0Z5J710l-Z9PoAlWnH3voUNL3DtcrZU23MHWxT72cb0EeNNrn5dEQOMypW-aeRIemJNsLtQvEkyrxu6j84euQZrL7yvbpxg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-06-27 06:59:07,932:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-06-27 06:59:07,932:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 27 Jun 2024 04:59:07 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824456717
Replay-Nonce: 1VRjeNN9hfrkbiKe5_BdBXtoh6Rj6Dpu2xczgtjE78pW7aCJv28
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:12Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824456717"
}
2024-06-27 06:59:07,933:DEBUG:acme.client:Storing nonce: 1VRjeNN9hfrkbiKe5_BdBXtoh6Rj6Dpu2xczgtjE78pW7aCJv28
2024-06-27 06:59:07,933:DEBUG:acme.client:JWS payload:
b''
2024-06-27 06:59:07,940:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjloZnJrYmlLZTVfQmRCWHRvaDZSajZEcHUyeGN6Z3RqRTc4cFc3YUNKdjI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5Mjk5MzcifQ",
  "signature": "DXH90O0_Wr5Tfh9akRFJuheETnJuwuJ4PEnr7d7WY-naZbx4H-X2mu-uhK2urPqCSfw8XMP0BGHVecK6ucqilJeXGLSRkbORu4Cy6AK_872Us_X5GU9cr08a1HdaBSIWOo-ZDh-X_PTYS_Bq4I9fkATukZ57fd6LsOgyGEXHjMIm-ndMD26aUXivban5CjDNisRHT-ypKw7HEBSZ0B-XTWxEMwXLR7ur9Vwhp6SgWfEpHqGNj8OdLqB4YeWzIbL8_Dt-SGQtbDywxqW71Ca1twOnbyLEcIPG6yeDDXXL9afa7EAyn6vsdYlCBfD0BC_hJkGwgoHF0oDnyuZGeci8Ww",
  "payload": ""
}
2024-06-27 06:59:08,109:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985929937 HTTP/1.1" 200 810
2024-06-27 06:59:08,109:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:59:07 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1VRjeNN9XStF6aZN4uan6avVD5z0pBQc2fq0d5U9zjMAW5xt5dg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:12Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/gXwyeA",
      "status": "pending",
      "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/K4XtOg",
      "status": "pending",
      "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/NX0yhA",
      "status": "pending",
      "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY"
    }
  ]
}
2024-06-27 06:59:08,109:DEBUG:acme.client:Storing nonce: 1VRjeNN9XStF6aZN4uan6avVD5z0pBQc2fq0d5U9zjMAW5xt5dg
2024-06-27 06:59:08,110:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-27 06:59:08,110:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-06-27 06:59:08,111:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-27 06:59:08,112:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-27 06:59:08,114:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:59:08,114:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-27 06:59:08,115:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-27 06:59:08,115:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-27 06:59:08,118:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:59:08,158:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-27 06:59:08,348:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-27 06:59:08,349:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-06-27 06:59:08,350:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-06-27 06:59:08,355:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC.
2024-06-27 06:59:08,355:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-27 06:59:08,355:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-27 06:59:08,360:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05453050>
Prep: True
2024-06-27 06:59:08,361:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05453050> and installer None
2024-06-27 06:59:08,361:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-27 06:59:08,366:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-27 06:59:08,367:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-27 06:59:08,369:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-27 06:59:08,862:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-27 06:59:08,863:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:59:08 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "JnlUMbKJrGU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-27 06:59:08,863:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-27 06:59:13,857:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7984_key-certbot.pem
2024-06-27 06:59:18,322:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7982_csr-certbot.pem
2024-06-27 06:59:18,323:DEBUG:acme.client:Requesting fresh nonce
2024-06-27 06:59:18,323:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-27 06:59:18,486:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-27 06:59:18,486:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:59:18 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 8AH9ZZ0o_8sch8nSo5nTk00YntqC-Z02U35m20y7tSWC9zzQMb8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-27 06:59:18,486:DEBUG:acme.client:Storing nonce: 8AH9ZZ0o_8sch8nSo5nTk00YntqC-Z02U35m20y7tSWC9zzQMb8
2024-06-27 06:59:18,486:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-27 06:59:18,492:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG9fOHNjaDhuU281blRrMDBZbnRxQy1aMDJVMzVtMjB5N3RTV0M5enpRTWI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "HU7xC3tANb6sd4s4Ut9nOCWeH3nC1AucwLF0ISaFHthSI_zRrcysQ6Iz1z1mQ2dGABslW5na06slHIuFGWv9rNkcbvhXBhHpEYpUhkWygCrDZGD6HHqMg9-jqbt2ltHpYVC2azevqH54GAJ1XyMIA1RiXmT5vdt6dk23fl0faz5XTTfYwZ0EW302a9LXjrldwaxW1F0lbh2FewCMzOcCfL8XXYL_BS50HD2UXCNoITomwF_G20n6uIm7O7AzYHioeou0sTG4s18hEUwz7v52SB1UXDRI98eHgZmk8czXBJ7qTmZBTRWOn6bbNkod2EDtiNKKiseBpmSjz4h_FNERgw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-06-27 06:59:18,666:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-06-27 06:59:18,666:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 27 Jun 2024 04:59:18 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824496987
Replay-Nonce: WDMSYcqSZWpU_IXdRWp2uD8qx6Hee4x8RnMIwQd-IHMOUxbUR_s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:22Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824496987"
}
2024-06-27 06:59:18,666:DEBUG:acme.client:Storing nonce: WDMSYcqSZWpU_IXdRWp2uD8qx6Hee4x8RnMIwQd-IHMOUxbUR_s
2024-06-27 06:59:18,666:DEBUG:acme.client:JWS payload:
b''
2024-06-27 06:59:18,672:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNaV3BVX0lYZFJXcDJ1RDhxeDZIZWU0eDhSbk1Jd1FkLUlITU9VeGJVUl9zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5ODk1MTcifQ",
  "signature": "HtrJoNr52CN9Z2qV7KIwzHVqxPdLRRVWOHoeLn9QRRuVgww5CjBRyKiD_yGZk4Xbt4Sq1qSc-HSxwgN22GcrK5NVYuCnDjmkw0wQ7irRkQMGjXMatga7QugfcICBNdQZCovl01WZQPcOo_EYA4C2wUPzloS3dXPfV20osDcjbXPTaVM8hiz4iSv-_lfuaK4wMLT6sTAgZGrYV6BCWC3mGn5wo5GZT9RAN_hZ7gjmdz3rnPLCycmom32fA2Qqg8TiwvjuEIc0pemToPA645W2pEcO2z9ZEu-OWOlzCQrJuXrT808aWMNchZsT74nMJTO87B3ak-m4m0DlZT1bptZh9Q",
  "payload": ""
}
2024-06-27 06:59:18,848:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985989517 HTTP/1.1" 200 809
2024-06-27 06:59:18,849:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:59:18 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 8AH9ZZ0oPnyBqEiILijjAS_oP4JkvBu78YH5TqgPRJYzDhXUzS0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:22Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/ebl14A",
      "status": "pending",
      "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/-PFYBw",
      "status": "pending",
      "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/LKEO7w",
      "status": "pending",
      "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0"
    }
  ]
}
2024-06-27 06:59:18,849:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oPnyBqEiILijjAS_oP4JkvBu78YH5TqgPRJYzDhXUzS0
2024-06-27 06:59:18,850:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-27 06:59:18,850:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-06-27 06:59:18,851:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-27 06:59:18,851:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-27 06:59:18,852:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:59:18,852:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-27 06:59:18,852:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-27 06:59:18,853:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-27 06:59:18,854:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:59:18,909:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-27 06:59:19,098:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-27 06:59:19,099:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2024-06-27 06:59:19,099:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2024-06-27 06:59:19,104:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC.
2024-06-27 06:59:19,104:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-27 06:59:19,105:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-27 06:59:19,109:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04B6B3F0>
Prep: True
2024-06-27 06:59:19,110:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04B6B3F0> and installer None
2024-06-27 06:59:19,110:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-27 06:59:19,115:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-27 06:59:19,116:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-27 06:59:19,118:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-27 06:59:19,571:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-27 06:59:19,572:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:59:19 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "fxUIGNimaEA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-27 06:59:19,572:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-27 06:59:24,463:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7985_key-certbot.pem
2024-06-27 06:59:28,959:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7983_csr-certbot.pem
2024-06-27 06:59:28,960:DEBUG:acme.client:Requesting fresh nonce
2024-06-27 06:59:28,960:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-27 06:59:29,112:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-27 06:59:29,113:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:59:28 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1VRjeNN9-EXBy_VwwCfo_HgjznBlwQ5CN-_IqFc8ijKoV59BWxU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-27 06:59:29,113:DEBUG:acme.client:Storing nonce: 1VRjeNN9-EXBy_VwwCfo_HgjznBlwQ5CN-_IqFc8ijKoV59BWxU
2024-06-27 06:59:29,114:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-27 06:59:29,124:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjktRVhCeV9Wd3dDZm9fSGdqem5CbHdRNUNOLV9JcUZjOGlqS29WNTlCV3hVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "lQuXGAwLp4sXguJGFcM6NI_th5saiYHhb0789pUMToDaySrput0HeWHBDJ5n16FrKF8c7J9WsNHFIHupQBaNrct-K-a44EQwj4_uj6C3wrH7jDYdth0hcWbQRJpLTm7e9PD7zmekZWMy8C-cNfas8qVOMYFAtmMyqpUPu3UEQFEU50kPl2uZTSoTXPZ6j7XuyqJ__TA7XHBx_535vMq6ueyrgY3t63xcA-isAYrqQbUAzSQXAYXsvQZHXMGFs4tj8hwcpQuUuDuiW53QHDcHJt9bvjdT9hF64pLPVToYmFJdwqHeft-GEDV_-JRBSC-Sf9zfSpchg72LfLrOltXN4g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-06-27 06:59:29,289:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-06-27 06:59:29,290:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 27 Jun 2024 04:59:29 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824533727
Replay-Nonce: 1VRjeNN9aoLByJT3E26Hj8NOgbgEcNckd1AsmIg-4R_Xt9bVwX0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:32Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824533727"
}
2024-06-27 06:59:29,290:DEBUG:acme.client:Storing nonce: 1VRjeNN9aoLByJT3E26Hj8NOgbgEcNckd1AsmIg-4R_Xt9bVwX0
2024-06-27 06:59:29,291:DEBUG:acme.client:JWS payload:
b''
2024-06-27 06:59:29,297:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjlhb0xCeUpUM0UyNkhqOE5PZ2JnRWNOY2tkMUFzbUlnLTRSX1h0OWJWd1gwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYwNDc5MjcifQ",
  "signature": "f_q7kso8KiI8oBBQfSWJ5ffgdkLvrpyhSb-usZSXiNUHStTr8nWPayJAGTIktlIf69QT3HqNzxD4AvmAExU3-sh04u8YBrIHy0kLCFrluz-UojqsuSjE7m_GM_YGajKm0tKfaCkZtAqBu41j7OBWzLGsXxYIRMDht2HWQMvQlFRgpun2Yy4wLDDNL9YovrG3SIpseowK5Bmt-vb4LmaU1Xo6AOR70In8Upk21pdKwBEgM_TKqt7F0yMJoXQ9m666k9h6zYYQfTZDDYr0Xx8rs_8kPBitF6IlB2iFZjJ8UZiBK6nby0_jmuKDGSSstDqd1GwuVPJFv0YrN01nAz0myQ",
  "payload": ""
}
2024-06-27 06:59:29,453:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986047927 HTTP/1.1" 200 805
2024-06-27 06:59:29,454:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:59:29 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: lCR6it1EZtCnxCzwESZzvAnAC-pfDTz7CaomhdScTbC9MU_aTVg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:32Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/a7aI1Q",
      "status": "pending",
      "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/Rqj-2Q",
      "status": "pending",
      "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/4mVq6w",
      "status": "pending",
      "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0"
    }
  ]
}
2024-06-27 06:59:29,454:DEBUG:acme.client:Storing nonce: lCR6it1EZtCnxCzwESZzvAnAC-pfDTz7CaomhdScTbC9MU_aTVg
2024-06-27 06:59:29,454:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-27 06:59:29,455:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-06-27 06:59:29,455:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-27 06:59:29,456:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-27 06:59:29,456:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:59:29,457:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-27 06:59:29,457:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-27 06:59:29,457:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-27 06:59:29,458:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:59:29,508:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-27 06:59:29,738:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-27 06:59:29,740:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-06-27 06:59:29,741:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-06-27 06:59:29,744:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC.
2024-06-27 06:59:29,744:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-27 06:59:29,745:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-27 06:59:29,750:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x054B6D30>
Prep: True
2024-06-27 06:59:29,750:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x054B6D30> and installer None
2024-06-27 06:59:29,750:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-27 06:59:29,768:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-27 06:59:29,769:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-27 06:59:29,771:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-27 06:59:30,203:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-27 06:59:30,205:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:59:29 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "rys3SHt7avw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-06-27 06:59:30,206:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-27 06:59:34,950:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7986_key-certbot.pem
2024-06-27 06:59:39,382:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7984_csr-certbot.pem
2024-06-27 06:59:39,382:DEBUG:acme.client:Requesting fresh nonce
2024-06-27 06:59:39,382:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-27 06:59:39,537:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-27 06:59:39,539:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:59:39 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1VRjeNN9MCBQnaLWJuG_mIdLmYPzOQkT41l-UDMivp2hafHpBvs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-27 06:59:39,539:DEBUG:acme.client:Storing nonce: 1VRjeNN9MCBQnaLWJuG_mIdLmYPzOQkT41l-UDMivp2hafHpBvs
2024-06-27 06:59:39,540:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-27 06:59:39,551:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjlNQ0JRbmFMV0p1R19tSWRMbVlQek9Ra1Q0MWwtVURNaXZwMmhhZkhwQnZzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "xItoWHPQYCLYwiAekmXO86IL_uL_41wGBEsqYS_p3Ap-98oD9e8ttq1oGQnc1OI3XSXI_M2KJtInw-iFV675ee98doZrpgWAEHnDycBcnQ_4FnCEG4Aypf-1GxhMEHeUpNDJotQTuDRW-oGFz5-VQ7tiYojd0Mr3Hiodtta75NyYIm09vxCfH4R79vmpQdnRjTFKUgRXiQ4TiEv7XLh4Q1xvOwLm1S6zzb5X_KxCOxhHGcUeak9KOc4yI58otK8Yrin9F0Xew54k8mJ9r4ET5owpRA_XNdQQFGTVuaZW6DlqOSwh5Iy1DLcHV_cKHr6mS6qe0vLqsW89VOl9vGfDbg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-06-27 06:59:39,719:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-06-27 06:59:39,719:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 27 Jun 2024 04:59:39 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824568847
Replay-Nonce: 1VRjeNN9d0sySEJ3lYMn0ocf57UE7LdOcTwXVdqUigahUyG9E_c
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:42Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824568847"
}
2024-06-27 06:59:39,720:DEBUG:acme.client:Storing nonce: 1VRjeNN9d0sySEJ3lYMn0ocf57UE7LdOcTwXVdqUigahUyG9E_c
2024-06-27 06:59:39,720:DEBUG:acme.client:JWS payload:
b''
2024-06-27 06:59:39,727:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjlkMHN5U0VKM2xZTW4wb2NmNTdVRTdMZE9jVHdYVmRxVWlnYWhVeUc5RV9jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxMDExNjcifQ",
  "signature": "Qdswnk_1c_xvJXl275iOY-QXTeOFNRy4G7x1Pyb-fENdctL-bjbqpq22KjumyBSjDmDJ2SagnVgSIlNaccQdoaZZ-IJk2yPB8L07mYIlYl52khqVrhjfk0AH2ZmnOPU4fdgJN3rmAG2h9Wdt-v1ob00WRxDrVP_bz4I6Oo-XS_OKtY5L9mMlcuPh7_gqF3i18uMYAX3O7H0-SKh_diML_MAwC-wHeTdTv0sjFHEmp6pV1_AftXimWiJNWYmARr4m71J9O7RTQwHTWkcfvktTQ1jFLRXEt-Tgw7_DGKGdQGBSwKNPMIplElGUo2xXB0lpUc0g0LG0Zj4xJ09r4_7bsA",
  "payload": ""
}
2024-06-27 06:59:39,891:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986101167 HTTP/1.1" 200 805
2024-06-27 06:59:39,892:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:59:39 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1VRjeNN9pOCL8H9dWwCpjeVpPWg-wnyTvR_jJsxPeRfufzfQMFI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:42Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/nlLFxg",
      "status": "pending",
      "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/mOuqMg",
      "status": "pending",
      "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/b0ZrJg",
      "status": "pending",
      "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q"
    }
  ]
}
2024-06-27 06:59:39,892:DEBUG:acme.client:Storing nonce: 1VRjeNN9pOCL8H9dWwCpjeVpPWg-wnyTvR_jJsxPeRfufzfQMFI
2024-06-27 06:59:39,893:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-27 06:59:39,894:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-06-27 06:59:39,895:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-27 06:59:39,895:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-27 06:59:39,897:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:59:39,897:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-27 06:59:39,898:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-27 06:59:39,898:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-27 06:59:39,900:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:59:39,951:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-06-27 06:59:40,167:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-06-27 06:59:40,169:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-06-27 06:59:40,170:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-06-27 06:59:40,175:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC.
2024-06-27 06:59:40,175:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-06-27 06:59:40,175:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-06-27 06:59:40,181:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x054A0E70>
Prep: True
2024-06-27 06:59:40,181:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x054A0E70> and installer None
2024-06-27 06:59:40,181:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-06-27 06:59:40,185:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-06-27 06:59:40,186:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-27 06:59:40,188:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-27 06:59:40,632:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-27 06:59:40,633:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:59:40 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "LSUt4CfweYU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-27 06:59:40,634:INFO:certbot._internal.main:Renewing an existing certificate
2024-06-27 06:59:45,189:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7987_key-certbot.pem
2024-06-27 06:59:49,628:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7985_csr-certbot.pem
2024-06-27 06:59:49,628:DEBUG:acme.client:Requesting fresh nonce
2024-06-27 06:59:49,629:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-27 06:59:49,778:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-27 06:59:49,780:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:59:49 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1VRjeNN9c8fyVBWZZrJHJlSYEw2ZYtUKN-dPUCXrtGmFpYG7rvI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-06-27 06:59:49,780:DEBUG:acme.client:Storing nonce: 1VRjeNN9c8fyVBWZZrJHJlSYEw2ZYtUKN-dPUCXrtGmFpYG7rvI
2024-06-27 06:59:49,781:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-06-27 06:59:49,794:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjljOGZ5VkJXWlpySkhKbFNZRXcyWll0VUtOLWRQVUNYcnRHbUZwWUc3cnZJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "YbYoHuS6_N31iPS5YePTHV3ahd-9s1lXjqT4fZxvRWbmtbj0ITby6T6C0yoLT6M2fwDhPgW-jGAfwg-1a0wxT0JQdER-IARr0o6_4QskKxAvJVo7G1aLENFPSKKj0VHl3WAWke7Hhganx8MfoUOpnmosVep7p1rs4yLwjH2xtYZx9hOxitplcIjZcbn5XgAw4_VAQov8YiRncAZdn4V2hopVZ-yBlFRPIG5Y7imaetrK_hp79TQA9gLdn35tj-rvnICR1UOTr3IxfXjxuJ9wxiHQoZZBloZSBDGliOoLVgw-WCiUZ-vVmxnWnDsrHS_XtLgk3jPfeHhY4jI6uKC7aA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-06-27 06:59:49,962:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-06-27 06:59:49,963:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 27 Jun 2024 04:59:49 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824603047
Replay-Nonce: lCR6it1ECaByTBNmaKjXz1uXM0QgQBWI6LzzjADOoVqkKaV14t8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:53Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824603047"
}
2024-06-27 06:59:49,963:DEBUG:acme.client:Storing nonce: lCR6it1ECaByTBNmaKjXz1uXM0QgQBWI6LzzjADOoVqkKaV14t8
2024-06-27 06:59:49,963:DEBUG:acme.client:JWS payload:
b''
2024-06-27 06:59:49,969:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibENSNml0MUVDYUJ5VEJObWFLalh6MXVYTTBRZ1FCV0k2THp6akFET29WcWtLYVYxNHQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxNTY2NDcifQ",
  "signature": "NHcU877olutEZq9aununPkxVY-kzPe96FDPJ7mNx_6JSSKVYOIxTF-ZjZ_ut3coc2GYlmHb4kelCgrKkn3f5WgBK_l7SdCJ1Ifc9iaqQC0VE0Y2RxO7spTs1b_XolsQIOWzg7vA4zEgBq0u-90MoBHDz_gV_kPIj0_7E8z0ibH9vk_A2Z3UTfLlcp0JDBqysLeVYO-hFmELnBhBvlvhFvw-l_SBy-5SJIjQ6J1woP5zCMsLTFmpEFjF2XnSaV1iElZw43zh308cftWoqlFy5AiNM2WKTa13VP9Nf1_4SCeQYXFX5Sn1OtZMg2FO0xeT4eahsUqvA3a2NwIC1t2sq9w",
  "payload": ""
}
2024-06-27 06:59:50,128:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986156647 HTTP/1.1" 200 805
2024-06-27 06:59:50,129:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 27 Jun 2024 04:59:49 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1VRjeNN98LzGJMsBRcJLk6Neb0sMW2URYt_vwRZt9KpK54Qah1I
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:53Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/B3rfNg",
      "status": "pending",
      "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/ZEHm3Q",
      "status": "pending",
      "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/xivawQ",
      "status": "pending",
      "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk"
    }
  ]
}
2024-06-27 06:59:50,130:DEBUG:acme.client:Storing nonce: 1VRjeNN98LzGJMsBRcJLk6Neb0sMW2URYt_vwRZt9KpK54Qah1I
2024-06-27 06:59:50,131:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-27 06:59:50,132:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-06-27 06:59:50,133:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-06-27 06:59:50,133:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-06-27 06:59:50,135:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:59:50,136:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-27 06:59:50,136:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-27 06:59:50,137:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-06-27 06:59:50,139:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-06-27 06:59:50,139:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-06-27 06:59:50,139:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-06-27 06:59:50,150:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-06-27 06:59:50,153:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)