2024-04-18 05:23:54,099:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-04-18 05:23:54,100:DEBUG:certbot._internal.main:Arguments: []
2024-04-18 05:23:54,100:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-04-18 05:23:55,088:DEBUG:certbot._internal.log:Root logging level set at 20
2024-04-18 05:23:55,089:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-04-18 05:23:55,126:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x05176CF0> and installer <certbot._internal.cli.cli_utils._Default object at 0x05176CF0>
2024-04-18 05:23:55,166:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-18 05:23:55,382:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-18 05:23:55,394:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is signed by the certificate's issuer.
2024-04-18 05:23:55,398:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is: OCSPCertStatus.GOOD
2024-04-18 05:23:55,408:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:24 UTC.
2024-04-18 05:23:55,408:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-18 05:23:55,408:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-18 05:23:55,413:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0515EB90>
Prep: True
2024-04-18 05:23:55,414:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0515EB90> and installer None
2024-04-18 05:23:55,414:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-18 05:23:55,420:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-18 05:23:55,421:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-18 05:23:55,423:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-18 05:23:55,918:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-18 05:23:55,919:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:23:43 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "QEiWg88zIUE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-18 05:23:55,920:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-18 05:24:00,988:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7701_key-certbot.pem
2024-04-18 05:24:05,352:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7699_csr-certbot.pem
2024-04-18 05:24:05,352:DEBUG:acme.client:Requesting fresh nonce
2024-04-18 05:24:05,352:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-18 05:24:05,511:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-18 05:24:05,511:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:23:52 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6qYJqZtwpMpaNRGobp2rZjXNnBGCfIiSl96FESU9MJKlfI7ZVbw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-18 05:24:05,512:DEBUG:acme.client:Storing nonce: 6qYJqZtwpMpaNRGobp2rZjXNnBGCfIiSl96FESU9MJKlfI7ZVbw
2024-04-18 05:24:05,512:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-18 05:24:05,517:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNnFZSnFadHdwTXBhTlJHb2JwMnJaalhObkJHQ2ZJaVNsOTZGRVNVOU1KS2xmSTdaVmJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "etYiqeMs4fT7fUh26PTBSGteCX5kgUIC6CpNfi-IELSC2QjEjGMIYgEEcz5v7jG50RLhEIDqTAI5M5WjCYTUgPsE3ZKH0wSzCiEMEXD7MB57emnh_-E49uu2YPBYgLCLBZnCU9G0nmdM6k0dkohgP_frIzov6CDXppJvBrw2inGyrKojqayJE-ie-p14VzEetBfIuaHQRoxo2oKDs4fcc8oUxVWwYcZHZRsTpwUJgFt_0HcY1gwGzwBjg0pQs3endb3RwQkBKtP1AR-NnmORP3ct8aRWcA7TQaOIp4-i-8o6WD4EnBHiRDCZyyrtfoAo9zt7Pw1x6v89O0khJu4nfA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-18 05:24:05,684:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-04-18 05:24:05,685:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 18 Apr 2024 03:23:52 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602379477
Replay-Nonce: V_63_Dn5yDGEzFFXmLrTphoWaM5dmKBM9wE_ogfpRjN09a1_24A
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:15:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432133867"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602379477"
}
2024-04-18 05:24:05,685:DEBUG:acme.client:Storing nonce: V_63_Dn5yDGEzFFXmLrTphoWaM5dmKBM9wE_ogfpRjN09a1_24A
2024-04-18 05:24:05,686:DEBUG:acme.client:JWS payload:
b''
2024-04-18 05:24:05,691:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432133867:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVl82M19EbjV5REdFekZGWG1MclRwaG9XYU01ZG1LQk05d0Vfb2dmcFJqTjA5YTFfMjRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIxMzM4NjcifQ",
  "signature": "O6CjA53oi-TNyJSbs6KWBWraTTxl8hwnUlBDXXryLV4axKTXpVKApmMWSbM_PI_dR1bA3Q5XXjrOF9kcx9zFCmIWUhFH0_3KlwNkndR_5HO8L_XUDlRRRErR4-BGqJOlc6tTs7ddCm7gw1HVgxHmEuIAa8YrP6PdjPpbZ7jZzcA5J0Z_gzeQlalbG8ndYKJetqquNC0AGNoA6e0idLqQDTKYTsMRXIspYIfkLT26GXus9Bet9vNCBlSeXNFWppoaJiQWs62VloIyHxhMAF1QR02OuKWu0Jg07FFutLU9bZjc7Viq47M8DmueFm8LWptX5D1ABdf3EzYX8QFcpbVDuQ",
  "payload": ""
}
2024-04-18 05:24:05,863:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432133867 HTTP/1.1" 200 810
2024-04-18 05:24:05,864:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:23:53 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: V_63_Dn5thsN1UaFnNQaJQ7SddUBp9CmdkQ--7uc-kEg4sOEcSE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:15:01Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/bALmag",
      "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/gKZ-RA",
      "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/BZrX6Q",
      "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ"
    }
  ]
}
2024-04-18 05:24:05,864:DEBUG:acme.client:Storing nonce: V_63_Dn5thsN1UaFnNQaJQ7SddUBp9CmdkQ--7uc-kEg4sOEcSE
2024-04-18 05:24:05,865:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-18 05:24:05,865:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-04-18 05:24:05,866:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-18 05:24:05,866:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-18 05:24:05,880:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:24:05,880:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-18 05:24:05,880:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-18 05:24:05,881:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-18 05:24:05,886:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:24:05,927:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-18 05:24:06,159:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-18 05:24:06,161:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-18 05:24:06,162:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-18 05:24:06,167:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:42 UTC.
2024-04-18 05:24:06,167:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-18 05:24:06,168:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-18 05:24:06,172:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0515E210>
Prep: True
2024-04-18 05:24:06,173:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0515E210> and installer None
2024-04-18 05:24:06,173:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-18 05:24:06,178:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-18 05:24:06,179:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-18 05:24:06,181:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-18 05:24:06,641:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-18 05:24:06,642:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:23:53 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "jpOUdE3BkSc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-18 05:24:06,642:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-18 05:24:10,557:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7702_key-certbot.pem
2024-04-18 05:24:14,337:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7700_csr-certbot.pem
2024-04-18 05:24:14,338:DEBUG:acme.client:Requesting fresh nonce
2024-04-18 05:24:14,338:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-18 05:24:14,494:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-18 05:24:14,495:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:01 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fYM0lmBiBBX7gO2bbJH8hOnAiP6yRIDfpxpJfFFVX9bzj25ZqJQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-18 05:24:14,495:DEBUG:acme.client:Storing nonce: fYM0lmBiBBX7gO2bbJH8hOnAiP6yRIDfpxpJfFFVX9bzj25ZqJQ
2024-04-18 05:24:14,496:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-18 05:24:14,503:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlCQlg3Z08yYmJKSDhoT25BaVA2eVJJRGZweHBKZkZGVlg5YnpqMjVacUpRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "dpXleWizOzs9-Nyue_P2PHFo2CmhwU94pPpu6QOK2hfUeDLBpGOH8Ks4a5rPKrS6gUn0sPgOIGLDBTqCDJd5_IbfvNLkGNv7cEGJjwgtJBihTVU7iShrt6HELzCsfAEiy6F-64EK3tmCs6fwqEpmDCOg19MWuAjG-LrOgE74QEdjakSQIXUL6recTmj04iwGjbm2_J_rSs8cCzw1m4OCcKV1djpEe14Y6jixyT6ZlzyYdYFKM9JzuCS7GQ_dYOmXlggQvWVZjS7bEpd1FrxqjfHApi4upcp6q-LuFyGvqyz77jNkqNzgMMu18mVbQLG55obXDsNug8f6km8GHXwDqQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-18 05:24:14,672:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-04-18 05:24:14,673:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 18 Apr 2024 03:24:01 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602436727
Replay-Nonce: 41Xn7EjcPgqaOTr0aez9Bsk7-jZsRuZDjK0cClYvTMmmYSsN2Sk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:15:11Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432206077"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602436727"
}
2024-04-18 05:24:14,673:DEBUG:acme.client:Storing nonce: 41Xn7EjcPgqaOTr0aez9Bsk7-jZsRuZDjK0cClYvTMmmYSsN2Sk
2024-04-18 05:24:14,673:DEBUG:acme.client:JWS payload:
b''
2024-04-18 05:24:14,679:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432206077:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamNQZ3FhT1RyMGFlejlCc2s3LWpac1J1WkRqSzBjQ2xZdlRNbW1ZU3NOMlNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIyMDYwNzcifQ",
  "signature": "NrWr8cVea9XWxD785GnnJ_N1-qz1YUuZ4cvoQgha6kWqElI7Oyxp_sFsL-zopjxdDABo9xHyZEY7QkZZL9DsQ91HFo3a8YXI0fiQFnGjUS1MVqJhA8ua1AxOIO0opOVh7vbHCD3WQ7tExZw0jGrLbLdR91MTkCvQ-ZL_uS0VdBl4hu8Mw_VyAJb0WrHnRUl2mSrfAgT_CKBOGb3NxjMS1gHLyXpZJKYGjCX_NNvfS88XH2dLzS5XN3f3DvhZfb1DSzdNlnzC3qeo-WzF7SnPdAnoDCp04sJp7krH9dQk6VU_Filr7_pm_GgRu-Ra-DxoRbfp2KzG7SNujDZesAjT6g",
  "payload": ""
}
2024-04-18 05:24:14,837:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432206077 HTTP/1.1" 200 804
2024-04-18 05:24:14,838:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:02 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 41Xn7Ejcg3T9PQlKNrsj25K28wXCiNySqY8-bzM8P3O3FsfypbE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:15:11Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/OpeY4Q",
      "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/WcE4Tg",
      "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/Seqm7Q",
      "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo"
    }
  ]
}
2024-04-18 05:24:14,838:DEBUG:acme.client:Storing nonce: 41Xn7Ejcg3T9PQlKNrsj25K28wXCiNySqY8-bzM8P3O3FsfypbE
2024-04-18 05:24:14,839:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-18 05:24:14,839:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-04-18 05:24:14,839:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-18 05:24:14,839:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-18 05:24:14,840:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:24:14,840:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-18 05:24:14,840:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-18 05:24:14,841:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-18 05:24:14,842:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:24:14,892:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-18 05:24:15,069:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-18 05:24:15,071:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-04-18 05:24:15,071:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-04-18 05:24:15,075:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:56 UTC.
2024-04-18 05:24:15,076:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-18 05:24:15,076:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-18 05:24:15,080:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04BD0DD0>
Prep: True
2024-04-18 05:24:15,080:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04BD0DD0> and installer None
2024-04-18 05:24:15,081:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-18 05:24:15,084:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-18 05:24:15,085:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-18 05:24:15,087:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-18 05:24:15,519:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-18 05:24:15,520:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:02 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "18Prcd1HZpI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-18 05:24:15,520:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-18 05:24:19,477:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7703_key-certbot.pem
2024-04-18 05:24:23,276:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7701_csr-certbot.pem
2024-04-18 05:24:23,277:DEBUG:acme.client:Requesting fresh nonce
2024-04-18 05:24:23,277:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-18 05:24:23,423:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-18 05:24:23,423:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:10 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6qYJqZtwPReqSKnXkQyVi84IMP6V_IDqPBbf1KsPHbgvkDNyITk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-18 05:24:23,424:DEBUG:acme.client:Storing nonce: 6qYJqZtwPReqSKnXkQyVi84IMP6V_IDqPBbf1KsPHbgvkDNyITk
2024-04-18 05:24:23,424:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-18 05:24:23,430:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNnFZSnFadHdQUmVxU0tuWGtReVZpODRJTVA2Vl9JRHFQQmJmMUtzUEhiZ3ZrRE55SVRrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "RJpyL--ZYJVLiZCBIRQTrZaiDqtHIGHs_urQkTK1HMpZMsGbtHKC6jEF2LWQg51OS9IS8L2oiUsOlnSHgEfTrJVnIm_0fpWQo5_EW7REKKfmoEIZrIsqeMSHd7U0-ANkV3yUzf7WZYWnw8iC1j16n-MXGPj9wOahbBEE1wlMQ7OfZPz3Rx-RqUbZB8fUInLBa6qshMrIEIaX-Po3ohWaYTczTopCgwA8fWHETpPyGimdOk_V-beiZyP3SPWJlfVbPdn08mDc4OzqcniSKJrRKlNMkqusfJJYWpT7ZJVBxnqPR8PNO9GYkh1Cwi6HojRaaqmqB3LSNBIQWGzlz5_Hsg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-18 05:24:23,662:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-04-18 05:24:23,663:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 18 Apr 2024 03:24:10 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602470407
Replay-Nonce: 6qYJqZtwugMJkCJRnRHmnitPkthyG9nqH_YpIfm9co617CCRLFc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:15:20Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432255557"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602470407"
}
2024-04-18 05:24:23,663:DEBUG:acme.client:Storing nonce: 6qYJqZtwugMJkCJRnRHmnitPkthyG9nqH_YpIfm9co617CCRLFc
2024-04-18 05:24:23,663:DEBUG:acme.client:JWS payload:
b''
2024-04-18 05:24:23,669:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432255557:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNnFZSnFadHd1Z01Ka0NKUm5SSG1uaXRQa3RoeUc5bnFIX1lwSWZtOWNvNjE3Q0NSTEZjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIyNTU1NTcifQ",
  "signature": "dwESLsVd4DdZA5iIzhmFrr1AEKgOaYDSQJVLEJBLy7Xopy94tfSWfnKrNiUxuYoAuVQPYEHjFyVbLiizyNmBCVN4Q63TLNKc4Yp2DHZF28Kn3QTx7OCbAhion5iB598k4RS2u6VmIVSqvyN7hM2Hlo11tzRUpdMz2IlyOqUDqbnRL89UaGqh-ZFc8XOsOd0QuyUxTAR9HAyNOeQXsx9iBTxNCDeIoW0sSkw2Y5jpffQ5brWUR8_QAG_Lh9LK5ZJHPtIklYXrZDxySHmguSrtYD1W3sXPNI5aRLPQa_zFxfDspEHS04RL5Jt-P5Wb6IC9t0R9ctfvncQfAWwAGgoLyQ",
  "payload": ""
}
2024-04-18 05:24:23,908:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432255557 HTTP/1.1" 200 807
2024-04-18 05:24:23,909:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:11 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: V_63_Dn5msaeqWzVbAgvlLdvSb222kCNCXvItUvAOeycYotw3Fg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:15:20Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/ipHR3w",
      "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/pey6Vw",
      "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/af6Vwg",
      "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg"
    }
  ]
}
2024-04-18 05:24:23,909:DEBUG:acme.client:Storing nonce: V_63_Dn5msaeqWzVbAgvlLdvSb222kCNCXvItUvAOeycYotw3Fg
2024-04-18 05:24:23,910:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-18 05:24:23,910:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-04-18 05:24:23,910:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-18 05:24:23,910:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-18 05:24:23,911:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:24:23,911:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-18 05:24:23,911:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-18 05:24:23,912:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-18 05:24:23,913:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:24:23,960:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-18 05:24:24,167:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-18 05:24:24,169:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-18 05:24:24,170:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-18 05:24:24,174:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:14 UTC.
2024-04-18 05:24:24,175:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-18 05:24:24,175:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-18 05:24:24,181:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0515EA10>
Prep: True
2024-04-18 05:24:24,181:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0515EA10> and installer None
2024-04-18 05:24:24,181:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-18 05:24:24,186:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-18 05:24:24,186:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-18 05:24:24,188:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-18 05:24:24,652:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-18 05:24:24,652:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:11 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "3c01BZ3aXlA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-18 05:24:24,653:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-18 05:24:28,642:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7704_key-certbot.pem
2024-04-18 05:24:32,589:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7702_csr-certbot.pem
2024-04-18 05:24:32,589:DEBUG:acme.client:Requesting fresh nonce
2024-04-18 05:24:32,589:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-18 05:24:32,744:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-18 05:24:32,745:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:19 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fYM0lmBiqXZKZN7jlmbAkVaxeyx7wzBATzkjRBDgtRWuY15Be4g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-18 05:24:32,745:DEBUG:acme.client:Storing nonce: fYM0lmBiqXZKZN7jlmbAkVaxeyx7wzBATzkjRBDgtRWuY15Be4g
2024-04-18 05:24:32,745:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-04-18 05:24:32,750:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlxWFpLWk43amxtYkFrVmF4ZXl4N3d6QkFUemtqUkJEZ3RSV3VZMTVCZTRnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "SIAoCY2CLGi90AO3OtXX8r0YXOD3iPRBG-OaCTxpy25q7lRlvNBi6uAvoMLXs9wy9SPFZew32fhNH8cbpFtSEj6cKKGoQNHZEM4md4Z0IRJuaxkX-cOyMLavcnOEtbTtPSt5PnM-qOWVdecJQ014upTjL1gchbB0uRhAEXQe1wIU2m18x195CqgTFlCn5ciBClzgopvv7xjZrltyK57MhFu2MUH7YYseR0oz_4HNfARinGUYM4lqsnAH5c4XTtSJ9LweZ-lKzXiqfhYc-TU1O1ZLJkWS0c2Hk_PkHEl-omUnxKP0BkygL2QHkpsQr7sEBDzmDyMfQAW5U3eGsw4T0Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-18 05:24:32,917:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-04-18 05:24:32,918:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 18 Apr 2024 03:24:20 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602501577
Replay-Nonce: fYM0lmBi5izwr5bOLTDicb9IZPbJp0d_Nh8gOkCw6u6M8MLTEP4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:15:29Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432301817"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602501577"
}
2024-04-18 05:24:32,918:DEBUG:acme.client:Storing nonce: fYM0lmBi5izwr5bOLTDicb9IZPbJp0d_Nh8gOkCw6u6M8MLTEP4
2024-04-18 05:24:32,918:DEBUG:acme.client:JWS payload:
b''
2024-04-18 05:24:32,924:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432301817:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmk1aXp3cjViT0xURGljYjlJWlBiSnAwZF9OaDhnT2tDdzZ1Nk04TUxURVA0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzMDE4MTcifQ",
  "signature": "ASecoQME_qwPh6vR7nJlMVNhrpkqSXdFGv7nDnTSIJmiTfsr-AWUV9Vk5DRNANMz41JSANLqoYIZAbu7ZUTsIEHoZ_-FNi6VSqfRzyVK1AnXWQ0Zyu12i6_S9F0kBXOSces_w32a7Yr8AnXHzadVTLtxtOwB7Km9wthrX51bHTctYM0Ro-2SkurbrZSWy68md4xQj8lYBI2fCGkIq6_EpV3fuSlHDfgD8sKDNxv1yYg7opyFSniyr7tF4RPkHgVPDxR77miBpuesDwPugARFaG7YNFJVD98bTNOrAqJG6mtxAyydFJPYihg1w7IRQYLa-U0vAi_GX8Mlcx_9TXhE0A",
  "payload": ""
}
2024-04-18 05:24:33,083:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432301817 HTTP/1.1" 200 801
2024-04-18 05:24:33,084:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:20 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fYM0lmBi6d0MA81H41_nDt2lcnFuJg22VyjS5qZ0BulnpAiuNiQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:15:29Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/KUsjpA",
      "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/GSkFsw",
      "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/hKNbdQ",
      "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg"
    }
  ]
}
2024-04-18 05:24:33,084:DEBUG:acme.client:Storing nonce: fYM0lmBi6d0MA81H41_nDt2lcnFuJg22VyjS5qZ0BulnpAiuNiQ
2024-04-18 05:24:33,085:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-18 05:24:33,085:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-04-18 05:24:33,085:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-18 05:24:33,086:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-18 05:24:33,086:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:24:33,086:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-18 05:24:33,087:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-18 05:24:33,087:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-18 05:24:33,088:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:24:33,127:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-18 05:24:33,389:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-18 05:24:33,390:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-18 05:24:33,391:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-18 05:24:33,395:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:32 UTC.
2024-04-18 05:24:33,396:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-18 05:24:33,396:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-18 05:24:33,400:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04BD0DD0>
Prep: True
2024-04-18 05:24:33,400:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04BD0DD0> and installer None
2024-04-18 05:24:33,400:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-18 05:24:33,417:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-18 05:24:33,418:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-18 05:24:33,418:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-18 05:24:33,932:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-18 05:24:33,933:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:21 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "j9YRdGe_5WE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-18 05:24:33,933:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-18 05:24:37,924:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7705_key-certbot.pem
2024-04-18 05:24:41,830:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7703_csr-certbot.pem
2024-04-18 05:24:41,831:DEBUG:acme.client:Requesting fresh nonce
2024-04-18 05:24:41,831:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-18 05:24:41,989:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-18 05:24:41,990:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:29 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 41Xn7Ejc6OecHOJw14rW-baIlU9QzAA8h1fGkkKGBRRZLaXLPm8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-18 05:24:41,990:DEBUG:acme.client:Storing nonce: 41Xn7Ejc6OecHOJw14rW-baIlU9QzAA8h1fGkkKGBRRZLaXLPm8
2024-04-18 05:24:41,990:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-18 05:24:41,995:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamM2T2VjSE9KdzE0clctYmFJbFU5UXpBQThoMWZHa2tLR0JSUlpMYVhMUG04IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "geydjEmTduIWQjDm0Nh1oNJmh1FMwHCaQAWsMQSi5YT2sPeDtXGOB2yFJEaxNW7veWoe5GScNb4BobAqfu2OJcJ75kRFjgKHIEyzdfhI2WyoP0MdEcA3Fx1tvfQWCE533PKnRYfgvnlbB21vXXARVwjZRUABHlaGpBkQa3pjaJf7qPhk6euXuqD20Xkhieq3zZui6A8Tr5VLHdh8rIG6f7wwUUgHv9dRTshUPE0rH0UGSX9slUoEwAKUmf8EUE7Rho_z_mXdLXfZHTxVHYF643iEQZY4yxTlJawjhjSUxht_LM78k5bDqIRwuXbkDJd5sQ2Cn8g9yNCweuf5Ui-xGA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-18 05:24:42,169:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-04-18 05:24:42,170:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 18 Apr 2024 03:24:29 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602530997
Replay-Nonce: fYM0lmBidhP99ZYxfSkE5_L_fL9Z4GjO5s-Lwvbvgs8UIAdwf6Q
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:15:39Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432345127"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602530997"
}
2024-04-18 05:24:42,170:DEBUG:acme.client:Storing nonce: fYM0lmBidhP99ZYxfSkE5_L_fL9Z4GjO5s-Lwvbvgs8UIAdwf6Q
2024-04-18 05:24:42,171:DEBUG:acme.client:JWS payload:
b''
2024-04-18 05:24:42,176:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432345127:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlkaFA5OVpZeGZTa0U1X0xfZkw5WjRHak81cy1Md3ZidmdzOFVJQWR3ZjZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzNDUxMjcifQ",
  "signature": "vVjuSGytiQDkqLTxdoFkAmIh7jJmp6RIyUSYkdCNklNrWMfMztVg6hlXkjmbPXYfWbw5bxhjTuNQcTzl_rF20_LAh0fEiwhz-ZJJ0JPOSWUtcbIHD98LjuodhUDJIzxvJWW8Z-qZgocfnNbho_qV7LDYVIHXj-05-ep78Rh-M6pFZwZVokColdeYkoiJ7rmFyw-UtTZhlWZMZEmEQ5noZhfz3KYXNnxysBmnQJ_2pY0m1RYOQcT6cNnss9B2Hyhd7n8YnFq1nl-Yxyg7QIk-R5FqDz12XSkaW8ttjeF6qAHfonezfxWEhab9ZeEl7RmaRMzjHa5k8JAttI2_a6UG7g",
  "payload": ""
}
2024-04-18 05:24:42,339:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432345127 HTTP/1.1" 200 805
2024-04-18 05:24:42,339:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:29 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 41Xn7Ejci_gRFScvH6nHWDORCbSYTXRXMQY_PiQQTZWIWbOlgF8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:15:39Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/eBWc1Q",
      "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/m8stTw",
      "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/bNUYKA",
      "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs"
    }
  ]
}
2024-04-18 05:24:42,339:DEBUG:acme.client:Storing nonce: 41Xn7Ejci_gRFScvH6nHWDORCbSYTXRXMQY_PiQQTZWIWbOlgF8
2024-04-18 05:24:42,340:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-18 05:24:42,340:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-04-18 05:24:42,341:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-18 05:24:42,341:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-18 05:24:42,342:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:24:42,342:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-18 05:24:42,342:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-18 05:24:42,342:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-18 05:24:42,343:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:24:42,392:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-18 05:24:42,588:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-18 05:24:42,589:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-04-18 05:24:42,590:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-04-18 05:24:42,594:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:48 UTC.
2024-04-18 05:24:42,595:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-18 05:24:42,595:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-18 05:24:42,599:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0546FDD0>
Prep: True
2024-04-18 05:24:42,600:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0546FDD0> and installer None
2024-04-18 05:24:42,600:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-18 05:24:42,604:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-18 05:24:42,605:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-18 05:24:42,607:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-18 05:24:43,036:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-18 05:24:43,036:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:30 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "5MH7L2snoCk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-18 05:24:43,037:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-18 05:24:47,492:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7706_key-certbot.pem
2024-04-18 05:24:51,380:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7704_csr-certbot.pem
2024-04-18 05:24:51,381:DEBUG:acme.client:Requesting fresh nonce
2024-04-18 05:24:51,381:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-18 05:24:51,526:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-18 05:24:51,526:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:38 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6qYJqZtwzVNKqKY4Sz5abG27NzneOl_24UkGLfzIpFBTUGcc9aU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-18 05:24:51,527:DEBUG:acme.client:Storing nonce: 6qYJqZtwzVNKqKY4Sz5abG27NzneOl_24UkGLfzIpFBTUGcc9aU
2024-04-18 05:24:51,527:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-18 05:24:51,531:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNnFZSnFadHd6Vk5LcUtZNFN6NWFiRzI3TnpuZU9sXzI0VWtHTGZ6SXBGQlRVR2NjOWFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "EzpHhKI0yDE39tqlnYEj2cnpIiL8eZwk7EbvCGSAZ_xInQlwzL4RZ5fmhcr5vDrvp5XTJtH5sLMq0AljJgyLPAXbk5SiAJ3YTbSocrQSu5vRbc5FJUfgftDBPWbETohMy8AjTuOw-4RmyGzTvsw9hcTR21srRO4UIaJRu0UJVPMwcTU4yCWEmhawIVeoiHweXSQlOe3yDFWboDpwZlbiFOR34ZU1hDGvih0mZj9743yqUqIrbDGTNK5RFvOYoNJIBNjj3Um8vFnVxAlU6lakFJDFVTZ2ycLcdI-RU7ums1w4nup7YjvdvUZ08aAIEIvpm6Q_ge9EyYtcnNAQ-HIOvQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-04-18 05:24:51,696:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-04-18 05:24:51,697:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 18 Apr 2024 03:24:38 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602558537
Replay-Nonce: 6qYJqZtwp1B6Apc5o0fVZWCEbpYe-VyK5LqzVDPraphSZZPx7U4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:15:48Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432384097"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602558537"
}
2024-04-18 05:24:51,697:DEBUG:acme.client:Storing nonce: 6qYJqZtwp1B6Apc5o0fVZWCEbpYe-VyK5LqzVDPraphSZZPx7U4
2024-04-18 05:24:51,697:DEBUG:acme.client:JWS payload:
b''
2024-04-18 05:24:51,703:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432384097:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNnFZSnFadHdwMUI2QXBjNW8wZlZaV0NFYnBZZS1WeUs1THF6VkRQcmFwaFNaWlB4N1U0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzODQwOTcifQ",
  "signature": "SSQJfeS0Oa262c8WgAspB7DVHs9x5AANKsGU-HLVDZ01TexHhjTkdfwWRsF__uqxsMv0PPvaaaK0p8ZQwhfgsK6KIujq7Bv63p-Tsy0GQxSxeQxXJXOqW8mCeXMFyaOnlvTdxahXwugu3Nsx8gBppInT4l40fQUvMVohu1SxuzPuCGwIxP-5An852CCp9C8iFNIjJhUP69MsJzfqnoqRjINaFtybcEqyVj4k3geJxJSPM2woutU-0NeYldRoIul81lbEOsWZEGATNWwDKp77e5agEBJqcrwZlZsJBbfgatYl4wNcaJH48g57mcLvXG5S9VWP1CJ3baj3GtdVupHo7Q",
  "payload": ""
}
2024-04-18 05:24:51,882:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432384097 HTTP/1.1" 200 809
2024-04-18 05:24:51,882:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:39 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: V_63_Dn5_048qIRBRfyPBFCh2hfmpM2mR0XfPeSWZYgBaPyA74A
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:15:48Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/oy60bw",
      "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/_4L04g",
      "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/r2alHg",
      "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8"
    }
  ]
}
2024-04-18 05:24:51,883:DEBUG:acme.client:Storing nonce: V_63_Dn5_048qIRBRfyPBFCh2hfmpM2mR0XfPeSWZYgBaPyA74A
2024-04-18 05:24:51,883:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-18 05:24:51,883:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-04-18 05:24:51,884:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-18 05:24:51,884:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-18 05:24:51,885:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:24:51,885:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-18 05:24:51,885:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-18 05:24:51,885:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-18 05:24:51,886:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:24:51,931:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-18 05:24:52,176:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-18 05:24:52,177:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-18 05:24:52,178:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-18 05:24:52,182:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:06 UTC.
2024-04-18 05:24:52,182:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-18 05:24:52,183:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-18 05:24:52,186:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05419670>
Prep: True
2024-04-18 05:24:52,187:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05419670> and installer None
2024-04-18 05:24:52,187:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-18 05:24:52,202:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-18 05:24:52,203:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-18 05:24:52,205:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-18 05:24:52,669:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-18 05:24:52,669:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:39 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "N76evUapCQg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-18 05:24:52,670:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-18 05:24:57,090:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7707_key-certbot.pem
2024-04-18 05:25:01,041:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7705_csr-certbot.pem
2024-04-18 05:25:01,042:DEBUG:acme.client:Requesting fresh nonce
2024-04-18 05:25:01,042:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-18 05:25:01,197:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-18 05:25:01,198:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:48 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 41Xn7EjcgtQOT8HnJWHxuROBTrOIE0dOxWINMLGwkh8D4qmFIxc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-18 05:25:01,198:DEBUG:acme.client:Storing nonce: 41Xn7EjcgtQOT8HnJWHxuROBTrOIE0dOxWINMLGwkh8D4qmFIxc
2024-04-18 05:25:01,198:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-18 05:25:01,204:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamNndFFPVDhIbkpXSHh1Uk9CVHJPSUUwZE94V0lOTUxHd2toOEQ0cW1GSXhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Db3ZBWuuN8XgncuAiT5mp53frv1g_gFdf1VEq_0pohytMNO_DWlHnofXZdRrOMpDb425XWhP-XTz9uZoIDeDQG_EZkQdeIIDx-Fyb0-kIhFh87Dd7rMxblWdLG8Rp05jDG9cc_I_S29NyOJBysnEMDAw3ueCP8QnzvZ2g3lZgE1sKVL1cL8GDQcv-wJ4J5dTOJ5rhawA9SDOyNaB0IzuU86tC5hHTtJNlfI-GRrbWmNa_Wf878_V0mYEit9qmWbhgR6J3iocuenVqftEbwCvaX_1N63vUowqkWXYodhcqaA1dULL2ofVCJTiubClg8UTkZLvv_TOjKkUBHexOTKcLg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-04-18 05:25:01,370:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-04-18 05:25:01,370:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 18 Apr 2024 03:24:48 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602586927
Replay-Nonce: fYM0lmBiLds8FNZNtMbzE9nQXaAQYqMLhbNH2sM-A_-TGaesCJw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:15:58Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432423627"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602586927"
}
2024-04-18 05:25:01,370:DEBUG:acme.client:Storing nonce: fYM0lmBiLds8FNZNtMbzE9nQXaAQYqMLhbNH2sM-A_-TGaesCJw
2024-04-18 05:25:01,371:DEBUG:acme.client:JWS payload:
b''
2024-04-18 05:25:01,376:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432423627:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlMZHM4Rk5aTnRNYnpFOW5RWGFBUVlxTUxoYk5IMnNNLUFfLVRHYWVzQ0p3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI0MjM2MjcifQ",
  "signature": "VcyeExp-WS-G6o5KsiOsjNcqulqnlqcSV1O_HC5QqJf_f9ww66Di0h3dY16HMr00H04wdp6reTCPvTKBc_v_w6bWbB4MeM1i6C4iq57s68CvH2cURc1k94n3qW9TFfuxpNBQWELVGAtLHScIlrr8RBpZ6VH5-XTuLtznmawScqR9_qb0mQxGzls0tig4fI10GsoSqImTvnmJoywSD1Kpy7iZUTsihIAgiXWFThDXR_ag0xXPncGgDcfDyC5qVyWUr_QFEvs_XIASAUon30Zxl4vA4JD-gsJPULaNOPDrcf73Iz3iyzrlpnExf_HZbGNiJcS07e3xdQfsN7PriiKOXw",
  "payload": ""
}
2024-04-18 05:25:01,559:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432423627 HTTP/1.1" 200 806
2024-04-18 05:25:01,560:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:48 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fYM0lmBirPJbef7pHWn5XxnX86nComeXEqTC3ho_pLQmFaU-Dsk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:15:58Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/-JWQ0A",
      "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/YJ2jiA",
      "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/r6TG8Q",
      "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA"
    }
  ]
}
2024-04-18 05:25:01,560:DEBUG:acme.client:Storing nonce: fYM0lmBirPJbef7pHWn5XxnX86nComeXEqTC3ho_pLQmFaU-Dsk
2024-04-18 05:25:01,561:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-18 05:25:01,561:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-04-18 05:25:01,562:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-18 05:25:01,562:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-18 05:25:01,563:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:25:01,563:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-18 05:25:01,563:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-18 05:25:01,563:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-18 05:25:01,565:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:25:01,610:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-04-18 05:25:01,611:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-18 05:25:01,611:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-04-18 05:25:01,617:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-04-18 05:25:01,620:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-04-18 05:25:01,620:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-04-18 05:25:01,620:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-04-18 05:25:01,621:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-04-18 05:25:01,623:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-04-18 05:25:01,661:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-18 05:25:01,845:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-18 05:25:01,846:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-18 05:25:01,847:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-18 05:25:01,851:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:23 UTC.
2024-04-18 05:25:01,851:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-18 05:25:01,852:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-18 05:25:01,856:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05475270>
Prep: True
2024-04-18 05:25:01,856:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05475270> and installer None
2024-04-18 05:25:01,856:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-18 05:25:01,862:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-18 05:25:01,863:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-18 05:25:01,865:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-18 05:25:02,331:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-18 05:25:02,332:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:49 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "6BZzKCM7cTQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-18 05:25:02,332:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-18 05:25:06,568:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7708_key-certbot.pem
2024-04-18 05:25:10,431:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7706_csr-certbot.pem
2024-04-18 05:25:10,432:DEBUG:acme.client:Requesting fresh nonce
2024-04-18 05:25:10,432:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-18 05:25:10,588:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-18 05:25:10,589:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:57 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 41Xn7Ejcodz1GBS8oQuJHPWTQV4bxGf0DRZd1J4he7UrCj3-o8A
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-18 05:25:10,590:DEBUG:acme.client:Storing nonce: 41Xn7Ejcodz1GBS8oQuJHPWTQV4bxGf0DRZd1J4he7UrCj3-o8A
2024-04-18 05:25:10,590:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-18 05:25:10,594:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamNvZHoxR0JTOG9RdUpIUFdUUVY0YnhHZjBEUlpkMUo0aGU3VXJDajMtbzhBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "lkUUXsum-0B6RsikBTsxLDnHnPuzvW9YLRYHv9XHLj_qsnlmUxfXgMAz9RCMgcwsdsAX0ONhwuCIlws1ZojylwnB2FYmJURQBnmUJAAcar4RvBCvIeUi-xPEFn4kKbwMf9bJ_FamhMPoU5C6a7C87lkoMrSDR41GtzM3vfViRi3b4FAPbM1lbOUlaMhjr4cl853zHmcKq4COZ7X4bO6lg3TxqOx2eAm0B2vZCZDGwxpDjRoj_C-7pecEnQbti1CIA06yqc7G-hP1Wa8d3YCqe-ZWG1cAt7LEU_hjqxgPYJLvJSpMRHWSpnKAlytlzx9U4-rRJU8Xl1ZcV88eJSOcYA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-18 05:25:10,764:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-04-18 05:25:10,764:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 18 Apr 2024 03:24:57 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602629937
Replay-Nonce: fYM0lmBiUd4-bq3Gbe-GUh5uA0BBHJi8zudIWaPvjJCcWMatblY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:16:07Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432480227"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602629937"
}
2024-04-18 05:25:10,765:DEBUG:acme.client:Storing nonce: fYM0lmBiUd4-bq3Gbe-GUh5uA0BBHJi8zudIWaPvjJCcWMatblY
2024-04-18 05:25:10,765:DEBUG:acme.client:JWS payload:
b''
2024-04-18 05:25:10,769:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432480227:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlVZDQtYnEzR2JlLUdVaDV1QTBCQkhKaTh6dWRJV2FQdmpKQ2NXTWF0YmxZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI0ODAyMjcifQ",
  "signature": "iRVr4Gs_ZkaJqad3hwAw9byJtiigmol81ue_AruPmv7Arunm8Yb5wXQEAZbXbxlNcx5OdZTaOqQHwHIW68aGPAu20Q-a7oU7xz_Af2gKG03KrJR4e3oE2elda4vHNaR50UvLNJGEDv0QLWu2mVbbqKR5_1DVIc6lwZpzx6rBMidXnyJ4VRI4X_KLXndIy3ntsS9wm32NQg4vs-Wty_n0l0UVegnuL4Z3YToxg4RNQEhjcZGzgy4s5ATSkMCaBGo8yyjke-SGrgQUwa4L1KG0OWqpV7xL9rOZW4JG6QseC03kpKgNuM25ZH3RUFriOVuEC045OXieRe63oHMHZXrnnw",
  "payload": ""
}
2024-04-18 05:25:10,928:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432480227 HTTP/1.1" 200 811
2024-04-18 05:25:10,929:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:58 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 41Xn7EjcEPdeJjHGF4axuYxG79XPxQaykkF7wF7AE0P7r3FFhfI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:16:07Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/1ONL0g",
      "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/E9W28w",
      "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/K6R9wQ",
      "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto"
    }
  ]
}
2024-04-18 05:25:10,929:DEBUG:acme.client:Storing nonce: 41Xn7EjcEPdeJjHGF4axuYxG79XPxQaykkF7wF7AE0P7r3FFhfI
2024-04-18 05:25:10,930:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-18 05:25:10,930:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-04-18 05:25:10,931:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-18 05:25:10,931:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-18 05:25:10,932:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:25:10,932:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-18 05:25:10,932:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-18 05:25:10,932:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-18 05:25:10,933:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:25:10,972:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-18 05:25:11,147:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-18 05:25:11,148:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-18 05:25:11,149:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-18 05:25:11,154:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:41 UTC.
2024-04-18 05:25:11,154:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-18 05:25:11,154:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-18 05:25:11,158:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05486C90>
Prep: True
2024-04-18 05:25:11,158:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05486C90> and installer None
2024-04-18 05:25:11,158:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-18 05:25:11,164:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-18 05:25:11,165:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-18 05:25:11,168:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-18 05:25:11,633:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-18 05:25:11,633:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:24:58 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "_g5wenbBUj0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-18 05:25:11,634:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-18 05:25:15,600:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7709_key-certbot.pem
2024-04-18 05:25:19,375:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7707_csr-certbot.pem
2024-04-18 05:25:19,376:DEBUG:acme.client:Requesting fresh nonce
2024-04-18 05:25:19,376:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-18 05:25:19,530:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-18 05:25:19,530:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:25:06 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 41Xn7EjcDA8oRxlQx0zI9G90hs38sfXLK3YupmiYzgIqzLm07H4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-18 05:25:19,531:DEBUG:acme.client:Storing nonce: 41Xn7EjcDA8oRxlQx0zI9G90hs38sfXLK3YupmiYzgIqzLm07H4
2024-04-18 05:25:19,531:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-18 05:25:19,538:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamNEQThvUnhsUXgwekk5RzkwaHMzOHNmWExLM1l1cG1pWXpnSXF6TG0wN0g0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "QSSxih9h778AQIZyjHy77deQO9NjMkA9MRXea1A3blRdzMpV0mQ0aUvGmiVnnxdsnP232OqMCN0lZNVOKjaFLZ3oyS0XAMSYYzIEKOEwIdlSco51WsjiwqdQ2pGM6gtCdkR8_NaUURUyjGHoVphE1Ux30jbVno3h88ESX7NpijjznIM8bC5tZccR3SGIVRnQ7-JpEJVsMmB0lzz0y6evn9wzEZwPVjvvpoQSPNzakNGv09euCdb17d0ZdMfQ9b7T0LIxGUHF8MnrtkM2TaNA7oz2iS44fXETA8S371vSLjGpfipknoitsQlHhP4Wm6OYt1DrSBC6PsOxEyNjmHiaBg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-18 05:25:19,707:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-04-18 05:25:19,707:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 18 Apr 2024 03:25:06 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602663067
Replay-Nonce: 41Xn7EjcAPi7QemxsZrV_47NGLCO86H1b2m7WxIwQJG2tJ8y98o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:16:16Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432528027"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602663067"
}
2024-04-18 05:25:19,707:DEBUG:acme.client:Storing nonce: 41Xn7EjcAPi7QemxsZrV_47NGLCO86H1b2m7WxIwQJG2tJ8y98o
2024-04-18 05:25:19,708:DEBUG:acme.client:JWS payload:
b''
2024-04-18 05:25:19,713:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432528027:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamNBUGk3UWVteHNaclZfNDdOR0xDTzg2SDFiMm03V3hJd1FKRzJ0Sjh5OThvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI1MjgwMjcifQ",
  "signature": "HYN54Ml1QyuNP8CsUQWNrxovIpiLTq6-RZS_u2lXpLB_mfKbh87d8g2C3YnEIQSHYURcEfF3hhs_1eNMWRA32FBFDm5uSJJKhSvGT3RrQwuqfW3Wjfz4D6RNCafaF5QSZ8fHpBzV-A7nZzD8UR-6SpOQ8yTizMFNzq1WhGFvhs0HqSo9WUyfZ04BqZhS66D3wXq6LB8Ruc5kfSXKRnyuAnbIe9XZ0VpP9SO_QfsPwT8E3P8blWoCzxwDjAouVc21cMsRB086axZMttrnpH8GS1_DXleiKSM1KpmRT6xWF2CuHjBIFsScH3jMfgkfSdPxnL4J1Ygj9XjprPjOHLl0Gg",
  "payload": ""
}
2024-04-18 05:25:19,871:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432528027 HTTP/1.1" 200 810
2024-04-18 05:25:19,872:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:25:07 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 41Xn7EjcEXU11gYvuQUL7rWMyCT3TYDd_jMZKSkh5JYbyXK3nxc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:16:16Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/fZogaQ",
      "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/ApLG9Q",
      "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/eOLRKQ",
      "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA"
    }
  ]
}
2024-04-18 05:25:19,872:DEBUG:acme.client:Storing nonce: 41Xn7EjcEXU11gYvuQUL7rWMyCT3TYDd_jMZKSkh5JYbyXK3nxc
2024-04-18 05:25:19,873:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-18 05:25:19,873:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-04-18 05:25:19,874:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-18 05:25:19,874:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-18 05:25:19,874:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:25:19,875:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-18 05:25:19,875:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-18 05:25:19,875:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-18 05:25:19,876:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:25:19,922:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-18 05:25:20,157:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-18 05:25:20,158:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-04-18 05:25:20,158:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-04-18 05:25:20,163:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:58 UTC.
2024-04-18 05:25:20,163:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-18 05:25:20,163:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-18 05:25:20,168:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05486B30>
Prep: True
2024-04-18 05:25:20,168:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05486B30> and installer None
2024-04-18 05:25:20,168:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-18 05:25:20,173:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-18 05:25:20,174:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-18 05:25:20,176:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-18 05:25:20,651:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-18 05:25:20,652:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:25:07 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "tVs_mf6U8zk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-04-18 05:25:20,652:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-18 05:25:25,106:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7710_key-certbot.pem
2024-04-18 05:25:29,009:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7708_csr-certbot.pem
2024-04-18 05:25:29,010:DEBUG:acme.client:Requesting fresh nonce
2024-04-18 05:25:29,010:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-18 05:25:29,170:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-18 05:25:29,170:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:25:16 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 41Xn7Ejc_isMzcvJItX0xOjfuIxN63xOsSwSUNcnuUBD6_qPKcQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-18 05:25:29,171:DEBUG:acme.client:Storing nonce: 41Xn7Ejc_isMzcvJItX0xOjfuIxN63xOsSwSUNcnuUBD6_qPKcQ
2024-04-18 05:25:29,171:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-18 05:25:29,176:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamNfaXNNemN2Skl0WDB4T2pmdUl4TjYzeE9zU3dTVU5jbnVVQkQ2X3FQS2NRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "RV_HQoC4VwpFdFFJU6XcGL4bdlLSkG0oIBxQEyfze-gdEbhftKW-iuEJl95LRgrNYQuT5ted6DYhk0qcivMK6a4ef3_IK3EQGlMoVAhfrVPgFI-dVZDL3eZ1YoyzOSI6xo88JipkGFlzTHWU4FOeLIB3BUIffDrWZ0THmFqBQEj4lGa7AGaG7u8vY2QgyTlzHyzCplUSfIw7hd1qHFtGAblZEjNkxnbdmlgejZipm3Kal118CgZ8fhD9O48GX7nejlKn3wlkcrovyjlJjNf0_g1cneW6EqqbUb_HfwpINeJrPmYqfdel12xXTB9udly4yTQ9QILkr_KKXZG4Gtdu8w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-04-18 05:25:29,419:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-04-18 05:25:29,420:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 18 Apr 2024 03:25:16 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602692837
Replay-Nonce: 41Xn7EjcuLNKVnjVfuz2Mbr_GHsk9c4oikk9Fwjte5386uxeTOE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:16:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432570877"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602692837"
}
2024-04-18 05:25:29,420:DEBUG:acme.client:Storing nonce: 41Xn7EjcuLNKVnjVfuz2Mbr_GHsk9c4oikk9Fwjte5386uxeTOE
2024-04-18 05:25:29,420:DEBUG:acme.client:JWS payload:
b''
2024-04-18 05:25:29,426:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432570877:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamN1TE5LVm5qVmZ1ejJNYnJfR0hzazljNG9pa2s5RndqdGU1Mzg2dXhlVE9FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI1NzA4NzcifQ",
  "signature": "klw-aC_ctcj2hXclPY9U6eakMNW5BF3mHgCV--5YiYwoaRYVZ4IIp-aAO-xihWj2yLpcI9m1Q2zALwmRehVK_n-RKBMTzsHwVZ3bRTYtMcD5yQTjpMV3_LcoQcNeoE944eO8LzT5nrmn2dx3msQanuvB3XRRUNl3b3C2qJoajR4J5DupyKDWRA2htw5YILKGU0RWJiakXALad9SFDI6aI3n040tlJb2YwtXO987lpBTfunMqPaeuOj2aQoit8RLoRUpouiCmWmHEINDT43ZapwsOXFzN2cjtbo4O0q2Vhy_LsXXy1Wtrmpb28zAXmrdKNVWdxpXGbJ8TAmU9sDuMVg",
  "payload": ""
}
2024-04-18 05:25:29,590:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432570877 HTTP/1.1" 200 809
2024-04-18 05:25:29,590:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:25:16 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 41Xn7EjcbPNnrDRmmMhb-Ee5umDuiAwCKlixGdJNI5fVRBtYFQ0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:16:25Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/IP7Jnw",
      "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/jfJGPg",
      "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/AYFk4w",
      "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190"
    }
  ]
}
2024-04-18 05:25:29,591:DEBUG:acme.client:Storing nonce: 41Xn7EjcbPNnrDRmmMhb-Ee5umDuiAwCKlixGdJNI5fVRBtYFQ0
2024-04-18 05:25:29,591:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-18 05:25:29,592:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-04-18 05:25:29,593:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-18 05:25:29,593:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-18 05:25:29,595:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:25:29,595:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-18 05:25:29,595:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-18 05:25:29,596:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-18 05:25:29,598:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:25:29,646:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-18 05:25:29,896:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-18 05:25:29,897:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is signed by the certificate's issuer.
2024-04-18 05:25:29,898:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD
2024-04-18 05:25:29,902:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:17 UTC.
2024-04-18 05:25:29,902:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-18 05:25:29,903:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-18 05:25:29,908:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05475490>
Prep: True
2024-04-18 05:25:29,908:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05475490> and installer None
2024-04-18 05:25:29,908:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-18 05:25:29,912:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-18 05:25:29,913:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-18 05:25:29,915:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-18 05:25:30,390:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-18 05:25:30,391:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:25:17 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "HcVcl5EWBlk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-18 05:25:30,391:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-18 05:25:34,381:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7711_key-certbot.pem
2024-04-18 05:25:38,183:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7709_csr-certbot.pem
2024-04-18 05:25:38,184:DEBUG:acme.client:Requesting fresh nonce
2024-04-18 05:25:38,184:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-18 05:25:38,342:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-18 05:25:38,342:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:25:25 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fYM0lmBijSM6-3jAlxYp9_9PwriKFQHHsBzT7gqY8gnmCmJoRzQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-18 05:25:38,343:DEBUG:acme.client:Storing nonce: fYM0lmBijSM6-3jAlxYp9_9PwriKFQHHsBzT7gqY8gnmCmJoRzQ
2024-04-18 05:25:38,343:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-18 05:25:38,348:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlqU002LTNqQWx4WXA5XzlQd3JpS0ZRSEhzQnpUN2dxWThnbm1DbUpvUnpRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ivaHS9eFHjfrThh97QSsCzA0NmSrkIsTEY2bm77fgJZrpDZ0yI5h7bL0r-utQc4eaHVPLjoZ6vd3rRuxttPYNpa3wtzB6VNUocOwnT-BqO9asIh7U_9zgoG87UsPqL4MsfAd2neSIgVWm021dp2Qe8L9VoI-5SMDJ-qVqxqHW0aW6Sva72WhWUSNd0mwyeAb3Kq8ary8yCu_ZE46Av-r3ZfmD6qcT54D4KJdXLO7J9Lur63opWeR30B_wfp7c9m-zZAYCResv48xMzq08Mjo2XMKSvyvKDFpbjvB80q9NHYt2r-hOr6wbiQfhHq4AUwvxC0FRSCd87oVXsLo4Yofuw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-18 05:25:38,520:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-04-18 05:25:38,520:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 18 Apr 2024 03:25:25 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602722417
Replay-Nonce: fYM0lmBiFUpm5TZCHrBd2DC3SRE0Fcxz3nwoT7TZnaQZfsEoAc4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:16:35Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432614317"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602722417"
}
2024-04-18 05:25:38,520:DEBUG:acme.client:Storing nonce: fYM0lmBiFUpm5TZCHrBd2DC3SRE0Fcxz3nwoT7TZnaQZfsEoAc4
2024-04-18 05:25:38,521:DEBUG:acme.client:JWS payload:
b''
2024-04-18 05:25:38,526:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432614317:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlGVXBtNVRaQ0hyQmQyREMzU1JFMEZjeHozbndvVDdUWm5hUVpmc0VvQWM0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2MTQzMTcifQ",
  "signature": "FSUPix2vS6GPfaahLmbOy2FcCsMVQmKHoBytBRpNJnkVITpnJz6g85Ytt8OaKe6gMTQUlK-Btb3SWcFUNTkRQy5FK_bBoxSA05c6tBEYEhdoRWd3gxb0t8ZKODfpKlhGvSrd23Tmu5c9n56lXpw5JUwQ3ozBfgfs41DAqfelYpHCWd0p6q2kZ3YfyHQiLIwDHzsa2UKQdcAGJQ-5wvC91wCsYqbBtPKl0Wh6o6h9DooDgi5kmOkIp0DW5G1mS-NU3K1m9oT3lxtKHyPhJ5CoqBXHn2fKlzO1EkjxyHOBDRQijrmiqOUG09ygO4El8dkHIeMZn7B6XyyFwNsxTdWcCw",
  "payload": ""
}
2024-04-18 05:25:38,688:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432614317 HTTP/1.1" 200 805
2024-04-18 05:25:38,689:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:25:25 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fYM0lmBiP4dY3zhqjeFhPUWrPQ8-MJtP0dR-iaL8hX89Py43Rf8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:16:35Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/xAjnBA",
      "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/eaCuPQ",
      "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/2jUEjw",
      "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U"
    }
  ]
}
2024-04-18 05:25:38,690:DEBUG:acme.client:Storing nonce: fYM0lmBiP4dY3zhqjeFhPUWrPQ8-MJtP0dR-iaL8hX89Py43Rf8
2024-04-18 05:25:38,690:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-18 05:25:38,690:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-04-18 05:25:38,691:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-18 05:25:38,691:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-18 05:25:38,692:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:25:38,693:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-18 05:25:38,693:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-18 05:25:38,693:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-18 05:25:38,695:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:25:38,744:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-18 05:25:38,933:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-18 05:25:38,934:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-18 05:25:38,935:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-18 05:25:38,939:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:34 UTC.
2024-04-18 05:25:38,939:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-18 05:25:38,939:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-18 05:25:38,944:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05486310>
Prep: True
2024-04-18 05:25:38,944:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05486310> and installer None
2024-04-18 05:25:38,944:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-18 05:25:38,948:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-18 05:25:38,949:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-18 05:25:38,951:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-18 05:25:39,394:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-18 05:25:39,394:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:25:26 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "2sNsx7S4ulE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-18 05:25:39,395:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-18 05:25:43,850:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7712_key-certbot.pem
2024-04-18 05:25:47,660:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7710_csr-certbot.pem
2024-04-18 05:25:47,660:DEBUG:acme.client:Requesting fresh nonce
2024-04-18 05:25:47,660:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-18 05:25:47,809:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-18 05:25:47,810:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:25:35 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6qYJqZtwfQLLAAtZPcwN585N9o-OdQ438lKNVvbYGG33oezcEn0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-18 05:25:47,810:DEBUG:acme.client:Storing nonce: 6qYJqZtwfQLLAAtZPcwN585N9o-OdQ438lKNVvbYGG33oezcEn0
2024-04-18 05:25:47,810:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-18 05:25:47,816:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNnFZSnFadHdmUUxMQUF0WlBjd041ODVOOW8tT2RRNDM4bEtOVnZiWUdHMzNvZXpjRW4wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "uYh0vcXK94wmFkFggtsEuzIvPpemVRGXpv7KI8lfq7uU05QC3jKzE1K2cRcnABTOtvMgzGPUAcLCXfk9f8W2oWGoh-MfJ8hvKz7qkdyLarU5n16PkoE6b3T3x4PXlo182zPFrM0nlImN8tIEWMI3_2W3aKD_EdBdZneiKhPYVYKv8FFXiku1Ib78Gur8joeo7kpDjYthBGNJdi9w2iG_BKfIR8Epg4te32p6bk4TfCP1J7biTa3m4IZaFehQ53-FF8kZq_tEOTIawwLOmmWbw87pEP86FGvqWWtNEHuehJ7xKG9lfPZjawRxHpFEvHpmuOx2JZQqIkDHwmtytuJ6IA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-18 05:25:47,978:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-04-18 05:25:47,979:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 18 Apr 2024 03:25:35 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602748407
Replay-Nonce: 6qYJqZtwXdJeqWV9IAoN2va5J5RdRl1dZOdx89li00CmCKAbhu0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:16:44Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432651637"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602748407"
}
2024-04-18 05:25:47,979:DEBUG:acme.client:Storing nonce: 6qYJqZtwXdJeqWV9IAoN2va5J5RdRl1dZOdx89li00CmCKAbhu0
2024-04-18 05:25:47,979:DEBUG:acme.client:JWS payload:
b''
2024-04-18 05:25:47,984:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432651637:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNnFZSnFadHdYZEplcVdWOUlBb04ydmE1SjVSZFJsMWRaT2R4ODlsaTAwQ21DS0FiaHUwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2NTE2MzcifQ",
  "signature": "AAKkIXOSc6FH3dQOAVABkXdcXoU5K6sDRbqz8yUOuDbqau2W5orPsNpkbF-EYfYJaraBy5dSOAWaCpZsQIDtfj-68em8BrLR-90whoBjnwY3mZ7fnm_ywh56HmEC3M3v8uVUNHbTmZ_fruSA9iBSaJCFdMn43L7cT7Qq0CFqXRZ56Dp5pqObSY9qiwcUXTgzPE-ZkPnYA4cBJ8q72U2KlW7ljEZf7781QsI80Ydw1Fg9BVFvUUGhbZbLs5ZLFSJsqFaEINjEcIifQkZd1djOY25fhTik6RWSQcZS4LgSfq36Lq1jL_AaexB6AC4Vk1vHVYe0CfemfGSXg95w_0vMzA",
  "payload": ""
}
2024-04-18 05:25:48,144:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432651637 HTTP/1.1" 200 805
2024-04-18 05:25:48,145:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:25:35 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: V_63_Dn5wenz1TA5DGgEmCxkLto2LssAWSN_d3bTguz3EhB6njk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:16:44Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/MmDBAg",
      "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/zq-rkw",
      "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/n89D0Q",
      "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA"
    }
  ]
}
2024-04-18 05:25:48,145:DEBUG:acme.client:Storing nonce: V_63_Dn5wenz1TA5DGgEmCxkLto2LssAWSN_d3bTguz3EhB6njk
2024-04-18 05:25:48,145:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-18 05:25:48,146:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-04-18 05:25:48,146:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-18 05:25:48,146:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-18 05:25:48,147:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:25:48,147:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-18 05:25:48,147:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-18 05:25:48,148:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-18 05:25:48,149:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:25:48,187:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-18 05:25:48,417:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-18 05:25:48,418:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-04-18 05:25:48,419:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-04-18 05:25:48,423:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:48 UTC.
2024-04-18 05:25:48,423:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-18 05:25:48,424:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-18 05:25:48,428:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05486F30>
Prep: True
2024-04-18 05:25:48,428:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05486F30> and installer None
2024-04-18 05:25:48,428:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-18 05:25:48,433:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-18 05:25:48,433:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-18 05:25:48,434:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-18 05:25:48,864:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-18 05:25:48,864:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:25:36 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "-1FWIbz-J3k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-18 05:25:48,865:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-18 05:25:52,738:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7713_key-certbot.pem
2024-04-18 05:25:56,506:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7711_csr-certbot.pem
2024-04-18 05:25:56,507:DEBUG:acme.client:Requesting fresh nonce
2024-04-18 05:25:56,507:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-18 05:25:56,649:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-18 05:25:56,650:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:25:43 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6qYJqZtwuwT7EM2YMi7Ol-egnizCWSao7cVQ0vOk8bT7gEir29M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-18 05:25:56,650:DEBUG:acme.client:Storing nonce: 6qYJqZtwuwT7EM2YMi7Ol-egnizCWSao7cVQ0vOk8bT7gEir29M
2024-04-18 05:25:56,650:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-18 05:25:56,656:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNnFZSnFadHd1d1Q3RU0yWU1pN09sLWVnbml6Q1dTYW83Y1ZRMHZPazhiVDdnRWlyMjlNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "u_I7urbPro--7koeNF6VuDTDaDnINbVWZD3JGMwKWSQ-Cx38fiB9vxgAGPPYemyl2Je_KbppZ6kLiLPCu4WJFXLW8OCK7-XQD-kPunx_ZOyOVp82wQi-7f7B7a9XoxbCY8GzONvTOBifBmRadB5cXqce4MLc2NV-NfCMSpgpQYqn4RPTgN6rQlXiXE3hF9g1XTf7m0HdIlYoM9x4cxR_4O3KGz-d7DlIONcmlOZdsBIQw1fdVzMtSw0wDYQoYRi4Ut7TCns7zjA0u3KixNAc9ac86V9dNb-Dev7dGP5s3EutZspEHLyRdbm1aKWE6ZY8lLXu6ZlMAas8Q8I0mHSX1Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-18 05:25:56,811:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-04-18 05:25:56,812:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 18 Apr 2024 03:25:44 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602776607
Replay-Nonce: V_63_Dn57rzzvQ8w2Du1u7aS2GvvYFuafuKn_agXVizrIIyCh5g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:16:53Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432691097"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602776607"
}
2024-04-18 05:25:56,812:DEBUG:acme.client:Storing nonce: V_63_Dn57rzzvQ8w2Du1u7aS2GvvYFuafuKn_agXVizrIIyCh5g
2024-04-18 05:25:56,812:DEBUG:acme.client:JWS payload:
b''
2024-04-18 05:25:56,818:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432691097:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVl82M19EbjU3cnp6dlE4dzJEdTF1N2FTMkd2dllGdWFmdUtuX2FnWFZpenJJSXlDaDVnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2OTEwOTcifQ",
  "signature": "LnHAjVSrcHUt4YrlnulDi1DAqB7O0dCjcU6Vs1cTocw74f2YB3_1pZ-6EA1w7DeB5Z38Y0JbbWD8_B3Z0AcvJqCiJVQlECRUlhIIpy4XSMF7kVE90Alpqe-v97_QTdwoEpDgsr3x4LUzXg98ZvjrApLcvdCkh1eAl5xQA1IVJdeLiN38TfpkJFb6p38LyN6S1pli8D7ZF1WB4DGn4Ix9akSKHnxG2cZiuyLkgBS-R_jWyviDzk5xz145fGshqdKIINgepdETM709vQiSIZI3HADT819lt58D9KtSDgGjqv1wpOkdnulTB4wQTDxtcqTjJzhTP0-ic1A-mEpkrfXwlw",
  "payload": ""
}
2024-04-18 05:25:56,995:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432691097 HTTP/1.1" 200 805
2024-04-18 05:25:56,996:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 18 Apr 2024 03:25:44 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6qYJqZtwXg7hpSRfnHuE96H3hKeDJy_KQgGgHIkvuEL1_xHrmPg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:16:53Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/PSRvrQ",
      "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/SZF9hg",
      "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/9pqO_A",
      "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU"
    }
  ]
}
2024-04-18 05:25:56,996:DEBUG:acme.client:Storing nonce: 6qYJqZtwXg7hpSRfnHuE96H3hKeDJy_KQgGgHIkvuEL1_xHrmPg
2024-04-18 05:25:56,997:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-18 05:25:56,997:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-04-18 05:25:56,997:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-18 05:25:56,998:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-18 05:25:56,998:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:25:56,998:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-18 05:25:56,999:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-18 05:25:56,999:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-18 05:25:57,001:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-18 05:25:57,002:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-04-18 05:25:57,002:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-04-18 05:25:57,014:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-04-18 05:25:57,016:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)