2024-04-23 12:28:32,172:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-04-23 12:28:32,172:DEBUG:certbot._internal.main:Arguments: []
2024-04-23 12:28:32,173:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-04-23 12:28:33,416:DEBUG:certbot._internal.log:Root logging level set at 20
2024-04-23 12:28:33,417:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-04-23 12:28:33,459:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04445FF0> and installer <certbot._internal.cli.cli_utils._Default object at 0x04445FF0>
2024-04-23 12:28:33,502:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-23 12:28:33,752:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-23 12:28:33,764:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is signed by the certificate's issuer.
2024-04-23 12:28:33,768:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is: OCSPCertStatus.GOOD
2024-04-23 12:28:33,775:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:24 UTC.
2024-04-23 12:28:33,775:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-23 12:28:33,776:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-23 12:28:33,782:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03EA4A90>
Prep: True
2024-04-23 12:28:33,782:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03EA4A90> and installer None
2024-04-23 12:28:33,782:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-23 12:28:33,789:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-23 12:28:33,791:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-23 12:28:33,793:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-23 12:28:34,327:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-23 12:28:34,328:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:29:17 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "noTuvUC8KKM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-23 12:28:34,329:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-23 12:28:39,754:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7844_key-certbot.pem
2024-04-23 12:28:44,875:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7842_csr-certbot.pem
2024-04-23 12:28:44,875:DEBUG:acme.client:Requesting fresh nonce
2024-04-23 12:28:44,876:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-23 12:28:45,030:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-23 12:28:45,030:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:29:28 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sW-8q43N-SZig7UQUPzaEziQfLrSOLgyXBlF-KrlD2PloA37kws
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-23 12:28:45,030:DEBUG:acme.client:Storing nonce: sW-8q43N-SZig7UQUPzaEziQfLrSOLgyXBlF-KrlD2PloA37kws
2024-04-23 12:28:45,031:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-23 12:28:45,037:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M04tU1ppZzdVUVVQemFFemlRZkxyU09MZ3lYQmxGLUtybEQyUGxvQTM3a3dzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "F2HwMnzAguBCqL00yqDR8rPZeIwETw1nkskLorUfRxxxI46hq5EHVQSfHnhpJY_ze-BMsEIP5I7Xxym5863x7hmi7sC_e3ztSy6EVdyXiIzqYJi-fP2O7xySYGY4ljdKSMjT8KrlF5_1UL8n1kROLgiAj9Mt3j_x02wtz7vkX3x5I-g_O7J-aLLCdTAE9flA8zfagIeQrza_sMTlTLrY4dkOukaZYwFzYnHXypeOW8yJ-j5K7_736xhhxwDmnFEeknQuj2_icsUJ_PKgYJOnyUWzaYTEzhng-Cep72ZoO6rCOnp3r7Fdoann1NTWyNgRuR3U8621kbh_ygfXikO4xQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-23 12:28:45,203:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-04-23 12:28:45,204:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 23 Apr 2024 10:29:28 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602379477
Replay-Nonce: sW-8q43Ny9sm1gpqQX-9d4BTO6WyUc3Ay_leca0OlOCYaDQFq_o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:15:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432133867"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602379477"
}
2024-04-23 12:28:45,204:DEBUG:acme.client:Storing nonce: sW-8q43Ny9sm1gpqQX-9d4BTO6WyUc3Ay_leca0OlOCYaDQFq_o
2024-04-23 12:28:45,204:DEBUG:acme.client:JWS payload:
b''
2024-04-23 12:28:45,209:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432133867:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M055OXNtMWdwcVFYLTlkNEJUTzZXeVVjM0F5X2xlY2EwT2xPQ1lhRFFGcV9vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIxMzM4NjcifQ",
  "signature": "j3ACSW1tJGTXUU62nfnsRSx-u76NsofB_1NcyrOjjD6RkRWlAZF0p-vE-s2DBWjBuvWkWARpjM_2Gm9AL1DlM3BoEkWjDDlfWY9LTRDTBR8Y1fCrxnOl-rVhtzycpFXtjmAStbkXjwR-_dmCFSojF6He62fFn7XTkf_cIeHM9sn_q4xp4N4sLubfGoig0t7O1Uix4k3RhpCeExcDEftLQ16kQU_bQ5OqJzLacQ3MBLH2_FssnllVN1qrmumfGn4VxotbDMBWif2KEyQDK585a-NpAwm2XyIyVrih8BIFjv4aCIfJoT1m2uRsFVySYtBnw4emOWb9ZfJcZ68OWu5hnA",
  "payload": ""
}
2024-04-23 12:28:45,378:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432133867 HTTP/1.1" 200 810
2024-04-23 12:28:45,380:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:29:28 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1Th9Qjup_E-w2uwXIxKQ8cUdITtsgXmvdIYA9S4U8HBmKmjcVnM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:15:01Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/bALmag",
      "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/gKZ-RA",
      "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/BZrX6Q",
      "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ"
    }
  ]
}
2024-04-23 12:28:45,380:DEBUG:acme.client:Storing nonce: 1Th9Qjup_E-w2uwXIxKQ8cUdITtsgXmvdIYA9S4U8HBmKmjcVnM
2024-04-23 12:28:45,381:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-23 12:28:45,381:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-04-23 12:28:45,382:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-23 12:28:45,382:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-23 12:28:45,389:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:28:45,390:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-23 12:28:45,390:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-23 12:28:45,390:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-23 12:28:45,396:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:28:45,439:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-23 12:28:45,684:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-23 12:28:45,685:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-23 12:28:45,686:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-23 12:28:45,690:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:42 UTC.
2024-04-23 12:28:45,690:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-23 12:28:45,691:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-23 12:28:45,695:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x043175F0>
Prep: True
2024-04-23 12:28:45,695:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x043175F0> and installer None
2024-04-23 12:28:45,696:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-23 12:28:45,711:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-23 12:28:45,712:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-23 12:28:45,714:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-23 12:28:46,161:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-23 12:28:46,161:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:29:29 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "al5LIF8BX4s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-23 12:28:46,162:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-23 12:28:50,851:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7845_key-certbot.pem
2024-04-23 12:28:55,113:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7843_csr-certbot.pem
2024-04-23 12:28:55,114:DEBUG:acme.client:Requesting fresh nonce
2024-04-23 12:28:55,114:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-23 12:28:55,265:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-23 12:28:55,265:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:29:38 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Y89UXNyazosP3xu-8IbZyZSNNjQT_LlRo1XeSo_tlCs5Mq4MCMA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-23 12:28:55,265:DEBUG:acme.client:Storing nonce: Y89UXNyazosP3xu-8IbZyZSNNjQT_LlRo1XeSo_tlCs5Mq4MCMA
2024-04-23 12:28:55,265:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-23 12:28:55,271:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWF6b3NQM3h1LThJYlp5WlNOTmpRVF9MbFJvMVhlU29fdGxDczVNcTRNQ01BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "L2v7wCmYkjuN-fKrlC7HC2C6M-VXVMVjfzcNuKi1n7bZQbGnpvwAOcAwm4ZETXolTU8hLkKv8mIoCLazJg-NmtU6gI5TrW_X-vwLQ7RL9OJp5VeYYU-mhKrpL64VK-nNUCUL_41OcmhILUyoxAt-Nkh0WVYqVdcAo_cvcjgS3Mni6TX2xVyRoxeeNu8-yAeqk3yZCy94BVr05SY_B3R-94whCUlq3GHOcPrwc8KMVFNHBzd5knDRQ-kfaLqXUeBzq_lI4dND66NaVkgRK5YlsBIAv27YxraOBa_2mS8t5dbuIM2CK1oanajqDZ_Hk0GaUP4TwADe97A6tEvMY364Yg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-23 12:28:55,452:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-04-23 12:28:55,452:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 23 Apr 2024 10:29:38 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602436727
Replay-Nonce: Y89UXNya8Uddz9yORB0wFkcQWAchs4jYGvK1nppziq36YKRQnMk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:15:11Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432206077"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602436727"
}
2024-04-23 12:28:55,453:DEBUG:acme.client:Storing nonce: Y89UXNya8Uddz9yORB0wFkcQWAchs4jYGvK1nppziq36YKRQnMk
2024-04-23 12:28:55,453:DEBUG:acme.client:JWS payload:
b''
2024-04-23 12:28:55,459:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432206077:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWE4VWRkejl5T1JCMHdGa2NRV0FjaHM0allHdksxbnBwemlxMzZZS1JRbk1rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIyMDYwNzcifQ",
  "signature": "U14uyfr9MD_lWuDqtRPO_yKXhZPqdIqruuZNduT-CAIzP3Vksf_GQ_CDKWDzJGdz2Z30NlFUt8JdnoSzvvVOF9_hV-vE-f3yjA3t-uyquEy37GAWSBCpSeQIbEbaONZKIDer5r9nzcOzsuHdWJR7uwknsYLZG5av4Jnev94ZK8MGvJklsOHZobiBG9UIKSOBrVtgxljDAWRfM_hgkvUMGonew08RbHh3_RdxwFd93J0N-gRJT4llsg85XyA52ZUUYsvsZ8FeEGAKiNfZjuvrxR6YIZuPIfqEYxJ5KTGcqx5Rl9IEnWz-b6PzUnlVwVaePX6y_k6w64Z1HbZtsZy7jg",
  "payload": ""
}
2024-04-23 12:28:55,615:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432206077 HTTP/1.1" 200 804
2024-04-23 12:28:55,616:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:29:38 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMpR0ZJPcyA4emJpCj9w6c-HFWL9HyHVo46TNQK5kEUg4c
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:15:11Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/OpeY4Q",
      "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/WcE4Tg",
      "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/Seqm7Q",
      "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo"
    }
  ]
}
2024-04-23 12:28:55,616:DEBUG:acme.client:Storing nonce: FUnC6kMpR0ZJPcyA4emJpCj9w6c-HFWL9HyHVo46TNQK5kEUg4c
2024-04-23 12:28:55,617:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-23 12:28:55,617:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-04-23 12:28:55,618:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-23 12:28:55,618:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-23 12:28:55,619:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:28:55,619:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-23 12:28:55,619:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-23 12:28:55,619:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-23 12:28:55,621:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:28:55,675:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-23 12:28:55,898:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-23 12:28:55,899:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-04-23 12:28:55,900:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-04-23 12:28:55,905:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:56 UTC.
2024-04-23 12:28:55,905:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-23 12:28:55,905:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-23 12:28:55,909:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03EB97F0>
Prep: True
2024-04-23 12:28:55,909:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03EB97F0> and installer None
2024-04-23 12:28:55,909:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-23 12:28:55,920:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-23 12:28:55,921:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-23 12:28:55,923:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-23 12:28:56,397:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-23 12:28:56,398:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:29:39 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "mKwYyzy1LE4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-23 12:28:56,398:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-23 12:29:01,110:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7846_key-certbot.pem
2024-04-23 12:29:05,372:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7844_csr-certbot.pem
2024-04-23 12:29:05,373:DEBUG:acme.client:Requesting fresh nonce
2024-04-23 12:29:05,373:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-23 12:29:05,532:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-23 12:29:05,533:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:29:48 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1Th9QjupxglaJ9_mVk20IuskC532EPaKOTknoqx5LgXk1YWumDE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-23 12:29:05,533:DEBUG:acme.client:Storing nonce: 1Th9QjupxglaJ9_mVk20IuskC532EPaKOTknoqx5LgXk1YWumDE
2024-04-23 12:29:05,533:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-23 12:29:05,539:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXB4Z2xhSjlfbVZrMjBJdXNrQzUzMkVQYUtPVGtub3F4NUxnWGsxWVd1bURFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "OxJMnAuPeJMdg4fSKr7gNOtjvpDMBUxwaNtfYZcVOLolyPkY5sjQj-axWTUt-IcWc1PkdvviHxFIZkZ7jDn7c12kVkup9XW5vt-Ao8gtLMcLgIRuIQtzS8pME3HgdnLNlH53PvyRGM4zFHPAoECFcw4WMAejQ6PRHWONTrdN3tNK5iMMNk5D_n-3hwq8xz8eqGeFvz8GQ9lCZWB2Fx1aRQ-7yavX907hfRqiuJ-Fto982CWi52qsz0ilYrnn8Bw2nYSelkEBr0PxO_B1PhBfndjcuk0FWZWNCElUmxTWLqfbsFoRKVUSA8ljoXZ6BdlzMaZjswkPbPjJPByac7xCcQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-23 12:29:05,711:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-04-23 12:29:05,711:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 23 Apr 2024 10:29:48 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602470407
Replay-Nonce: 1Th9Qjup-eUHpyQIZvDuDpYa_3oUbADT-_QpqXyR_EGjg6AD7rY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:15:20Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432255557"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602470407"
}
2024-04-23 12:29:05,712:DEBUG:acme.client:Storing nonce: 1Th9Qjup-eUHpyQIZvDuDpYa_3oUbADT-_QpqXyR_EGjg6AD7rY
2024-04-23 12:29:05,712:DEBUG:acme.client:JWS payload:
b''
2024-04-23 12:29:05,717:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432255557:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXAtZVVIcHlRSVp2RHVEcFlhXzNvVWJBRFQtX1FwcVh5Ul9FR2pnNkFEN3JZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIyNTU1NTcifQ",
  "signature": "d0IIt3pYwkxVBSKaFWwAFNtl5u37kq-gPXGWdRYw5flHnMUI8_GfdxGaFulPFMsEnVY95ct6ig5nXXXvTOBtZ11MhZzb9CU3h1TphyWSvGQAHh-ndMP6Ni4Z6E_O_KymMNbS6JzK3czNoa4VYiY4Txq9tu6fpm2wLW8-83Qs9Qj42imEim8F5CnARDdDEVwcUM57pG56d9ukCgLqqYUsPbYaDWewdYTYB7v5CvRzJN8n12HlkYAY8aL-I_URIJOgQdipSVJRNMzIozM8hBxUfNEFMrzN33_YAu7ZTAbZqurFP4bbyvCgMKOIA8o0uWfu9yvswdxiBcBVaNf_xCOeoA",
  "payload": ""
}
2024-04-23 12:29:05,879:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432255557 HTTP/1.1" 200 807
2024-04-23 12:29:05,880:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:29:48 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1Th9QjupXRhLzkimPD_C2JG8oyF7xl2OjnoN_-ZmEsy-Gj_f7Fk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:15:20Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/ipHR3w",
      "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/pey6Vw",
      "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/af6Vwg",
      "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg"
    }
  ]
}
2024-04-23 12:29:05,880:DEBUG:acme.client:Storing nonce: 1Th9QjupXRhLzkimPD_C2JG8oyF7xl2OjnoN_-ZmEsy-Gj_f7Fk
2024-04-23 12:29:05,881:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-23 12:29:05,881:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-04-23 12:29:05,882:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-23 12:29:05,882:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-23 12:29:05,883:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:29:05,883:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-23 12:29:05,883:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-23 12:29:05,884:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-23 12:29:05,885:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:29:05,940:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-23 12:29:06,081:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-23 12:29:06,083:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-23 12:29:06,084:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-23 12:29:06,088:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:14 UTC.
2024-04-23 12:29:06,088:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-23 12:29:06,089:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-23 12:29:06,094:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0444A150>
Prep: True
2024-04-23 12:29:06,094:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0444A150> and installer None
2024-04-23 12:29:06,094:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-23 12:29:06,099:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-23 12:29:06,100:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-23 12:29:06,102:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-23 12:29:06,576:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-23 12:29:06,576:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:29:49 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "vEhGPvS_UAc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-04-23 12:29:06,577:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-23 12:29:10,945:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7847_key-certbot.pem
2024-04-23 12:29:15,019:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7845_csr-certbot.pem
2024-04-23 12:29:15,020:DEBUG:acme.client:Requesting fresh nonce
2024-04-23 12:29:15,020:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-23 12:29:15,178:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-23 12:29:15,179:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:29:58 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sW-8q43NhVjbPFCUcO7xriUV1zf72O7nOnFQ8AKXlYj_3y-Pe_o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-23 12:29:15,179:DEBUG:acme.client:Storing nonce: sW-8q43NhVjbPFCUcO7xriUV1zf72O7nOnFQ8AKXlYj_3y-Pe_o
2024-04-23 12:29:15,179:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-04-23 12:29:15,185:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05oVmpiUEZDVWNPN3hyaVVWMXpmNzJPN25PbkZROEFLWGxZal8zeS1QZV9vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "oLfnREdTrWsXKnPj5jIjuWIPXOHaFNk8UmhJQpZGTvMHJIXM2rNYsTj764_D8mphSq91w7TSiHdjqAVees2x_XHPzU2LFOMyuUSZ_2iHt9DpBbAggCwjezbeOCMPq1ZmnoZeZ8O8pD8WsGXImMJtu-ZaygPBjmz7y5ffWSH0PISElrybPe3admy4etlGnZP7-Q7oCOap-T7GhqNZdyO2uYGQn10ZUokzfnj7Yea-4yf1kpw2-IrS6Ch4q1xg513QdjrBPUEHu7gq-acPr6hs6PHCmW0HW220e9omVKh3Z0sXrRdv3iTryO4xAQO7gLcA1gBayV8eJII7WqIKHxMSGA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-23 12:29:15,354:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-04-23 12:29:15,355:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 23 Apr 2024 10:29:58 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602501577
Replay-Nonce: 1Th9Qjup_9CR1uC_Y_h-LFu-Yf9L_E5SsAUWIO-skJkgC1MG67E
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:15:29Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432301817"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602501577"
}
2024-04-23 12:29:15,355:DEBUG:acme.client:Storing nonce: 1Th9Qjup_9CR1uC_Y_h-LFu-Yf9L_E5SsAUWIO-skJkgC1MG67E
2024-04-23 12:29:15,355:DEBUG:acme.client:JWS payload:
b''
2024-04-23 12:29:15,361:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432301817:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBfOUNSMXVDX1lfaC1MRnUtWWY5TF9FNVNzQVVXSU8tc2tKa2dDMU1HNjdFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzMDE4MTcifQ",
  "signature": "ss2rx8ZFOUZbDgf82g79vzlr0DgjT5gp9dmiLhY6PrT0E99kqOtIRhU4E2PaRdqokkM2_1kdaXAmjRGnxRTNLW3sNxvWgzm6KXi9LEFLo11GBzKChozR0rYN-7UcUsBr0FrqcBZJH7ayrZoEY3E20vGL3obogdb6TcFg75w7Dd3xZiuE7yeXlJDgInS2FzaVQRGZ_K09C_VQE7VBdyPajF-Zfh9hbZdFpoGFsyoJK_o7SQ8MGgXmwKJnW8iYlY9OGyEJnG-Xt9R0sGkDI2Qh75aVXq3ySYbAUZkW-65za4d4d4eLQByUt9VruP9yryO33QYUi-nA7mSUqPhO4yXs9Q",
  "payload": ""
}
2024-04-23 12:29:15,523:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432301817 HTTP/1.1" 200 801
2024-04-23 12:29:15,524:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:29:58 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1Th9QjupX7OQj25kFcOHmNYEWzqbqZN6_lHoRRH_sQ6TuFfoLwc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:15:29Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/KUsjpA",
      "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/GSkFsw",
      "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/hKNbdQ",
      "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg"
    }
  ]
}
2024-04-23 12:29:15,524:DEBUG:acme.client:Storing nonce: 1Th9QjupX7OQj25kFcOHmNYEWzqbqZN6_lHoRRH_sQ6TuFfoLwc
2024-04-23 12:29:15,525:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-23 12:29:15,525:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-04-23 12:29:15,525:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-23 12:29:15,526:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-23 12:29:15,526:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:29:15,527:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-23 12:29:15,527:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-23 12:29:15,527:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-23 12:29:15,528:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:29:15,570:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-23 12:29:15,841:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-23 12:29:15,842:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-23 12:29:15,843:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-23 12:29:15,847:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:32 UTC.
2024-04-23 12:29:15,847:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-23 12:29:15,848:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-23 12:29:15,853:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04317C10>
Prep: True
2024-04-23 12:29:15,853:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04317C10> and installer None
2024-04-23 12:29:15,853:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-23 12:29:15,858:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-23 12:29:15,858:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-23 12:29:15,860:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-23 12:29:16,306:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-23 12:29:16,307:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:29:59 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "GTMsyn1iX40": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-23 12:29:16,308:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-23 12:29:20,522:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7848_key-certbot.pem
2024-04-23 12:29:24,567:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7846_csr-certbot.pem
2024-04-23 12:29:24,567:DEBUG:acme.client:Requesting fresh nonce
2024-04-23 12:29:24,567:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-23 12:29:24,718:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-23 12:29:24,719:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:07 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMpps6u-OCacwaRTAMAaK1J_1Fj23DgrI9vi1yvB0m10IY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-23 12:29:24,719:DEBUG:acme.client:Storing nonce: FUnC6kMpps6u-OCacwaRTAMAaK1J_1Fj23DgrI9vi1yvB0m10IY
2024-04-23 12:29:24,719:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-23 12:29:24,725:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBwczZ1LU9DYWN3YVJUQU1BYUsxSl8xRmoyM0Rnckk5dmkxeXZCMG0xMElZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ymDieykE3RqCy96-fB-6hyrbDO1TaWLYyHn_OTJiO03Y-tfgd5oVxuLX3VRCrEqe9qkhJZul_Uh1CuQz5R3Aya5uEFrjJtPonUTOCBRGr6bnKxRNTQD7BJazv_xmHGv_wdW1JgTvSf-evG98ac1v3MfkrtNr7NS1TNHBBzA9vYsSy0ogcxzJ0WiTypHZFDGLBdIYMHZvaNqM44WByujca3ohs-VSvFzuzSTnxyDlHZJZzpnYx5lLUiPgk2SbV8rTDEjAo8fXe0tdvdp_aV1fBJFlD-tqphTUcsXZziz02m7wE_OCZZfOfiqKB0SfMx5vq8XIp29piY8lRy6TIE_zpA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-23 12:29:24,897:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-04-23 12:29:24,898:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 23 Apr 2024 10:30:07 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602530997
Replay-Nonce: Y89UXNya95daI6N6s5wNSFnyFd5TLDzLepCD3oCR8wC-hKhnAXc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:15:39Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432345127"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602530997"
}
2024-04-23 12:29:24,898:DEBUG:acme.client:Storing nonce: Y89UXNya95daI6N6s5wNSFnyFd5TLDzLepCD3oCR8wC-hKhnAXc
2024-04-23 12:29:24,898:DEBUG:acme.client:JWS payload:
b''
2024-04-23 12:29:24,904:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432345127:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWE5NWRhSTZONnM1d05TRm55RmQ1VExEekxlcENEM29DUjh3Qy1oS2huQVhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzNDUxMjcifQ",
  "signature": "yp17isJqaeoRX4LAh4xpG4EbZXwblWXaIpX9Oyucen3PgO01vsvn8lRp3ufO4_-L0BiS1dMWVegNlquf2SRy_6a9xfIcvtquAs10yFWG4NfqumU9IW0sp1xrwSc9niePBCCG5pP_Jy37GLqMMg5vWobUppagX4P4z24y2czRX2JEjFdHKjqFr6T42KaOy8zqh8Lt_ViiQb4aP_fGFsSuKpe4ayASLlh97tFpLGJRW_IYklng3Zb0YLC9yhEBXKIGKCD_fddus1-OyaKmAomTdRPkdSGmplKQvpkWBGkvFTtDw1E8bbsyfBw990vIcIWe84ApqTio9Yp7Hb9eJ7lRKQ",
  "payload": ""
}
2024-04-23 12:29:25,078:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432345127 HTTP/1.1" 200 805
2024-04-23 12:29:25,079:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:08 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMpi9KMTpOwm2gjfnpRMKG_gm9jL_y8EMHf8C5BfDM8lgw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:15:39Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/eBWc1Q",
      "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/m8stTw",
      "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/bNUYKA",
      "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs"
    }
  ]
}
2024-04-23 12:29:25,079:DEBUG:acme.client:Storing nonce: FUnC6kMpi9KMTpOwm2gjfnpRMKG_gm9jL_y8EMHf8C5BfDM8lgw
2024-04-23 12:29:25,080:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-23 12:29:25,080:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-04-23 12:29:25,081:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-23 12:29:25,081:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-23 12:29:25,082:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:29:25,082:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-23 12:29:25,082:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-23 12:29:25,083:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-23 12:29:25,084:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:29:25,143:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-23 12:29:25,363:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-23 12:29:25,364:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-04-23 12:29:25,364:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-04-23 12:29:25,368:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:48 UTC.
2024-04-23 12:29:25,368:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-23 12:29:25,368:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-23 12:29:25,373:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0444A550>
Prep: True
2024-04-23 12:29:25,373:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0444A550> and installer None
2024-04-23 12:29:25,373:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-23 12:29:25,378:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-23 12:29:25,379:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-23 12:29:25,380:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-23 12:29:25,845:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-23 12:29:25,846:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:08 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "ErdM6M2qGlg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-23 12:29:25,847:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-23 12:29:30,086:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7849_key-certbot.pem
2024-04-23 12:29:34,081:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7847_csr-certbot.pem
2024-04-23 12:29:34,082:DEBUG:acme.client:Requesting fresh nonce
2024-04-23 12:29:34,082:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-23 12:29:34,236:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-23 12:29:34,237:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:17 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sW-8q43NY0q4qziYByRDMTkIaXhQOYOtvAeyzNXsb5i7YE-Ks4Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-23 12:29:34,237:DEBUG:acme.client:Storing nonce: sW-8q43NY0q4qziYByRDMTkIaXhQOYOtvAeyzNXsb5i7YE-Ks4Y
2024-04-23 12:29:34,237:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-23 12:29:34,243:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05ZMHE0cXppWUJ5UkRNVGtJYVhoUU9ZT3R2QWV5ek5Yc2I1aTdZRS1LczRZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "S4_IYWvfUZ8PfmI2hcTcyXARMRO-8ms5-58VpC-wap8j4zycI9iEZUHVOLr7a1lQnQavARwAr60mSoolPeZID9pxMM8YDNDZgYaC8DArvzoj9NgRofWB62AyAGC0V9ujzyCY0wPPiRmppNbzIPRYhSILCf7b4Axib5yMnpAfAOA1g7-E7u89b7u2OhIfflzTBRGFokZBaj4vBEPjv4G0aZa2Zi9ikSi1ZzeO7pW6jXyxzkH0KtpuTRza2LySTb_3CIzYQPbY9sEqHwejJtHL-aSWFpcrVuL2nF-6EsChZh9n5iFtVgygO8q74DjTng2TaHN5cwg4OPdPi79lcKI7yQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-04-23 12:29:34,414:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-04-23 12:29:34,414:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 23 Apr 2024 10:30:17 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602558537
Replay-Nonce: sW-8q43N-rn2XGZIa-LC18EG5FxIq6rZQ-tKu_PflG8PYKalYao
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:15:48Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432384097"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602558537"
}
2024-04-23 12:29:34,414:DEBUG:acme.client:Storing nonce: sW-8q43N-rn2XGZIa-LC18EG5FxIq6rZQ-tKu_PflG8PYKalYao
2024-04-23 12:29:34,414:DEBUG:acme.client:JWS payload:
b''
2024-04-23 12:29:34,420:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432384097:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M04tcm4yWEdaSWEtTEMxOEVHNUZ4SXE2clpRLXRLdV9QZmxHOFBZS2FsWWFvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzODQwOTcifQ",
  "signature": "IBecceEePN02IGFKdlIph6AZtycQtbsJ17UBdCAHO1j4sRt_5dbU-ZCY-V7PSzmpne2F7nVUuJJ-DTHfI00QxU1ae5_KKhw1bBGloi_YjxY1djFOc-X9_6zC9EifEuT1QKMwESzsCj1we3jhUy7zvU2jfokts6XAOFiElpCHXS8doLO_NcXvjP5Dhq3WiiGxC1I2XBSM2aBaGjJ8PN9H7WvxEb13BmyhD_MFsXU81F7qRV9230n4px2VnuZEUBpaJiO52DDAlhobyf39q202K1l__dmjASLCrjTeafHKdEIhyX6EARBWztxBgX0eHw5mwcYeXBl-wn1kAIGJM43jXQ",
  "payload": ""
}
2024-04-23 12:29:34,604:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432384097 HTTP/1.1" 200 809
2024-04-23 12:29:34,604:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:17 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1Th9QjupXHxuZoF5NueAxlrrcdmzrIKR9Nn6mblDYrnD-2xTyPg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:15:48Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/oy60bw",
      "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/_4L04g",
      "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/r2alHg",
      "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8"
    }
  ]
}
2024-04-23 12:29:34,604:DEBUG:acme.client:Storing nonce: 1Th9QjupXHxuZoF5NueAxlrrcdmzrIKR9Nn6mblDYrnD-2xTyPg
2024-04-23 12:29:34,605:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-23 12:29:34,605:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-04-23 12:29:34,606:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-23 12:29:34,606:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-23 12:29:34,607:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:29:34,607:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-23 12:29:34,607:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-23 12:29:34,608:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-23 12:29:34,608:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:29:34,650:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-23 12:29:34,894:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-23 12:29:34,895:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-23 12:29:34,896:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-23 12:29:34,901:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:06 UTC.
2024-04-23 12:29:34,901:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-23 12:29:34,901:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-23 12:29:34,906:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0444A030>
Prep: True
2024-04-23 12:29:34,906:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0444A030> and installer None
2024-04-23 12:29:34,907:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-23 12:29:34,911:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-23 12:29:34,912:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-23 12:29:34,914:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-23 12:29:35,349:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-23 12:29:35,349:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:18 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "yJpzvXBvKe4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-04-23 12:29:35,350:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-23 12:29:39,720:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7850_key-certbot.pem
2024-04-23 12:29:43,759:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7848_csr-certbot.pem
2024-04-23 12:29:43,759:DEBUG:acme.client:Requesting fresh nonce
2024-04-23 12:29:43,759:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-23 12:29:43,906:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-23 12:29:43,907:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:26 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMpvshvjdFRr-Hj6FARMhocGJoKMxIE7xc5PltMZX-VxZ0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-23 12:29:43,907:DEBUG:acme.client:Storing nonce: FUnC6kMpvshvjdFRr-Hj6FARMhocGJoKMxIE7xc5PltMZX-VxZ0
2024-04-23 12:29:43,907:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-23 12:29:43,913:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXB2c2h2amRGUnItSGo2RkFSTWhvY0dKb0tNeElFN3hjNVBsdE1aWC1WeFowIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ktTomg8WV14CkomuUFLFuF2KZ7I1akcn8QiSMfaMZh-21Z84C5wUTa4XCJbkKkZ2Kttv7eq4iIppjEa6wMOhtELdSrd2peAupIA02EDVMv6GSE0KzhW_PasiEGuvfmVDDNmLfA3q0ys8HeIM_v-a_WpyMEHN9ZXr-MeJLC6HGzPHGJyl0LP8AH9OvXhumSsSjAJD5sTdnfGsH3XxVEH21VpKZBGc60FyPlzCzNC_drkwwb3AGsLC7uvGvvBwLXLEDEIPWIFEQhr6hjGcEGljLtt_nBXb2MuwDyKvXFaMRNdLGOXejNW6Zh9FZ_89Brm6T74dy0gXImW1QoVY2WRGIg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-04-23 12:29:44,069:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-04-23 12:29:44,069:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 23 Apr 2024 10:30:27 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602586927
Replay-Nonce: FUnC6kMpUNZLkejVul629hEvg01pF9F1yOMvP9uDhdLn_m8Uggc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:15:58Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432423627"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602586927"
}
2024-04-23 12:29:44,070:DEBUG:acme.client:Storing nonce: FUnC6kMpUNZLkejVul629hEvg01pF9F1yOMvP9uDhdLn_m8Uggc
2024-04-23 12:29:44,070:DEBUG:acme.client:JWS payload:
b''
2024-04-23 12:29:44,075:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432423627:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBVTlpMa2VqVnVsNjI5aEV2ZzAxcEY5RjF5T012UDl1RGhkTG5fbThVZ2djIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI0MjM2MjcifQ",
  "signature": "WwY72H9gn8DBg-aGe5-7g6CAxZCSft10YaLW22D57QG_2yZWFNkb0IHFcucy7ii4SPTt3ccNfqqEQVBDsFPT6k9192wvA-9R2-WDGA8Gff48QTMUc8H5RtUGIN06Swav70XT_U-LIIXL3kZfE0C3RQVIKZUcbiCj950PCo309sGRbjr2kxcYU06qT8f2fsjSnhX9uSpWFd7m5HAdnH9hcECik8N3i6LU6CxMNy_AYc7A5AsRaF7li3vAIe5kYxMdW1Cb5Zv786CF53ZdxLiJ_1ut1bHqDrYBFqdiVOLg7tfjbS_Je-hz50D-J95mDkLk3n8McyRIzRSjP-U7dXvNPA",
  "payload": ""
}
2024-04-23 12:29:44,264:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432423627 HTTP/1.1" 200 806
2024-04-23 12:29:44,265:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:27 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMplhN1IfD6k46NhiWiL32PrNDt-XT7md59CPCr9bLEulI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:15:58Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/-JWQ0A",
      "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/YJ2jiA",
      "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/r6TG8Q",
      "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA"
    }
  ]
}
2024-04-23 12:29:44,265:DEBUG:acme.client:Storing nonce: FUnC6kMplhN1IfD6k46NhiWiL32PrNDt-XT7md59CPCr9bLEulI
2024-04-23 12:29:44,265:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-23 12:29:44,266:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-04-23 12:29:44,266:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-23 12:29:44,267:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-23 12:29:44,267:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:29:44,267:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-23 12:29:44,268:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-23 12:29:44,268:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-23 12:29:44,269:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:29:44,318:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-04-23 12:29:44,318:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-23 12:29:44,318:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-04-23 12:29:44,327:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-04-23 12:29:44,329:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-04-23 12:29:44,329:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-04-23 12:29:44,329:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-04-23 12:29:44,330:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-04-23 12:29:44,332:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-04-23 12:29:44,373:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-23 12:29:44,619:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-23 12:29:44,620:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-23 12:29:44,621:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-23 12:29:44,626:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:23 UTC.
2024-04-23 12:29:44,627:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-23 12:29:44,627:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-23 12:29:44,632:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0444A150>
Prep: True
2024-04-23 12:29:44,632:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0444A150> and installer None
2024-04-23 12:29:44,632:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-23 12:29:44,637:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-23 12:29:44,638:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-23 12:29:44,640:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-23 12:29:45,114:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-23 12:29:45,115:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:28 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "I83hKSYKtks": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-23 12:29:45,115:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-23 12:29:49,396:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7851_key-certbot.pem
2024-04-23 12:29:53,557:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7849_csr-certbot.pem
2024-04-23 12:29:53,557:DEBUG:acme.client:Requesting fresh nonce
2024-04-23 12:29:53,558:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-23 12:29:53,716:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-23 12:29:53,717:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:36 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1Th9QjupPWDAhj9ZPQXXkSgFcFv3heeKI1zmJSAJhvB3LDJG3kA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-23 12:29:53,717:DEBUG:acme.client:Storing nonce: 1Th9QjupPWDAhj9ZPQXXkSgFcFv3heeKI1zmJSAJhvB3LDJG3kA
2024-04-23 12:29:53,717:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-23 12:29:53,723:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBQV0RBaGo5WlBRWFhrU2dGY0Z2M2hlZUtJMXptSlNBSmh2QjNMREpHM2tBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "yBII3h2aqH56VNo7QfluiquDb-HNDT013DlnyosRi4X89jqZK6bufWS7FtjM9NJvXfP74tX_cZQFnAuHPZVL_lyI8mK2D_B3RCw4oPYXnWdQDkWMZ1IWnomv_eNzwVo3jpiI1P13qXglRt08josqlu642yWgXsduF3tOqg8YRLogzlr1pkBcDmkMyzCxthiF0lhGcvP2kInVeDYhd4fUwv-8u0PPiUecwYT0ysfALzGXm_-JVsvBwePW4oFlJzWIfyLDqiGlfwLrAMoiDGT7Ho1mPCMAAhtex9a2Fc3lKk-Orw5lLHVEaxnDz14Mgay9-4NXb1mggwCfWDsK1UEkng",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-23 12:29:53,891:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-04-23 12:29:53,892:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 23 Apr 2024 10:30:36 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602629937
Replay-Nonce: 1Th9QjupphNM0Hj2OSk_BtbYAZkXTx7Nr4C4yug-0zQb8Wp_bZo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:16:07Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432480227"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602629937"
}
2024-04-23 12:29:53,892:DEBUG:acme.client:Storing nonce: 1Th9QjupphNM0Hj2OSk_BtbYAZkXTx7Nr4C4yug-0zQb8Wp_bZo
2024-04-23 12:29:53,892:DEBUG:acme.client:JWS payload:
b''
2024-04-23 12:29:53,898:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432480227:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBwaE5NMEhqMk9Ta19CdGJZQVprWFR4N05yNEM0eXVnLTB6UWI4V3BfYlpvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI0ODAyMjcifQ",
  "signature": "vXO8FxnKM78lpFEu05JGoEVEh1_PrIcPntvZxq03-WQLeZd8tswTUYYIOBqXE8DvcyJGcs3A9Ji-PUuKrBhrxWmbe8zDnHYfXpcDWcn-uCnre9I0OeYRuhMP5ths7CR5GiPDD67qGuraLizsCPi2wsJ1i1ogyzQek6t4sXagIG-cf0diFJDV3Oho9JVkQ8LKzwSv57DE6B4d-CfjhRsoq4a0PTx3Q6Fx1OmcKmf7OhMCV7YbuBe9iL83XyIdBP4LMdh5g6sltGFRxvxpGbXJwx3xilCZoxkmZPGSf9ymbGJADRl9FTrxQa4uq6a6spb4HJ8LTB5RHG0YiUvnb5r-Qw",
  "payload": ""
}
2024-04-23 12:29:54,058:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432480227 HTTP/1.1" 200 811
2024-04-23 12:29:54,059:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:37 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sW-8q43NwcZyAZmCn7XeaMVUV06NMBjnTWB8zYkHjD_WGSyrN8E
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:16:07Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/1ONL0g",
      "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/E9W28w",
      "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/K6R9wQ",
      "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto"
    }
  ]
}
2024-04-23 12:29:54,059:DEBUG:acme.client:Storing nonce: sW-8q43NwcZyAZmCn7XeaMVUV06NMBjnTWB8zYkHjD_WGSyrN8E
2024-04-23 12:29:54,060:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-23 12:29:54,060:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-04-23 12:29:54,061:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-23 12:29:54,061:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-23 12:29:54,062:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:29:54,062:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-23 12:29:54,062:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-23 12:29:54,062:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-23 12:29:54,063:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:29:54,117:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-23 12:29:54,295:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-23 12:29:54,296:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-23 12:29:54,297:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-23 12:29:54,301:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:41 UTC.
2024-04-23 12:29:54,301:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-23 12:29:54,301:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-23 12:29:54,306:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x005FD090>
Prep: True
2024-04-23 12:29:54,306:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x005FD090> and installer None
2024-04-23 12:29:54,306:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-23 12:29:54,311:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-23 12:29:54,312:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-23 12:29:54,314:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-23 12:29:54,789:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-23 12:29:54,790:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:37 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "vSaIz-srRfM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-04-23 12:29:54,790:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-23 12:29:59,126:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7852_key-certbot.pem
2024-04-23 12:30:03,446:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7850_csr-certbot.pem
2024-04-23 12:30:03,446:DEBUG:acme.client:Requesting fresh nonce
2024-04-23 12:30:03,446:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-23 12:30:03,604:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-23 12:30:03,605:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:46 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1Th9QjupuhH9LY9cmbZ04ttHuN8uRtUBI3QB4BlURFK1rvbYgMg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-23 12:30:03,605:DEBUG:acme.client:Storing nonce: 1Th9QjupuhH9LY9cmbZ04ttHuN8uRtUBI3QB4BlURFK1rvbYgMg
2024-04-23 12:30:03,609:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-23 12:30:03,616:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXB1aEg5TFk5Y21iWjA0dHRIdU44dVJ0VUJJM1FCNEJsVVJGSzFydmJZZ01nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "YW0JbxtpiZw2zcDJmAM6k-ajWMeqboSIFiBNU1NYTwhsSa89wM0HGfcLTwEdCg8cMarwSz4yoICz8ndUtz3V05KYnI5XW4X_V6kMJPLHjkabYYWY2Dj8uDGXOmod06-3ZqmbaG9Zx4q-i_4eWcjfKgjC_oVZwDLTiiod6Vs6LdLcYscAIN4vAsG9HB5YR-qZmEbvZ4bfpHvWiDd4bGjDTZNOZgDmoJ24G8ThWF5R5Q6wzArKI3oYnK4Gq2dk2uwUM6NlzhlaQ7sa6jNi3GwE13vtP7tnuxyA40i8euMz4dKqCZJTVN_tNwpXU1UzJ8snfFmDh2ERWxKzMmnuTn8oCQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-23 12:30:03,785:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-04-23 12:30:03,786:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 23 Apr 2024 10:30:46 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602663067
Replay-Nonce: 1Th9QjupjWs8dR9EOlCde3gzLRgYlJkddsM9fNu-HD4J0JijwPo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:16:16Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432528027"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602663067"
}
2024-04-23 12:30:03,786:DEBUG:acme.client:Storing nonce: 1Th9QjupjWs8dR9EOlCde3gzLRgYlJkddsM9fNu-HD4J0JijwPo
2024-04-23 12:30:03,787:DEBUG:acme.client:JWS payload:
b''
2024-04-23 12:30:03,792:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432528027:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBqV3M4ZFI5RU9sQ2RlM2d6TFJnWWxKa2Rkc005Zk51LUhENEowSmlqd1BvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI1MjgwMjcifQ",
  "signature": "aglWSbUKiy0UNzxp1J4-T-sOP_lCLTuKAFA5XUZA4sNyMLSjbY3h9BqszGz_IVdMFYuJCzHbwKrXnFlVEuytDBtP2cdj_xA1xKExZwTBhorCf6f4Rynk-m0stPOaVFjPxs58Y86Nw6sfFoaYxHxWHcedAkOQS3Pf6ZehmxBuJdGhG1v2ehLsoX8MX6lOsmEPwnLOhHWURyJc_KidCj7hMS1zmH8lm05G7XD8_dBsHxsCq7GHgLlWb2UahZhCgeWcDYU8OIGDoT8B0KmcLQJsYyG2IWtWp6J1QKDMSMp5uOB3nt3GO91v7W-6bQ3qhXuZqe4oGLFB5uvQdfpKowYWsQ",
  "payload": ""
}
2024-04-23 12:30:03,956:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432528027 HTTP/1.1" 200 810
2024-04-23 12:30:03,957:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:46 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1Th9QjupBTwCiepoDaO3utpjblNpifXJ-plL_voATVwGBd3zkE0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:16:16Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/fZogaQ",
      "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/ApLG9Q",
      "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/eOLRKQ",
      "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA"
    }
  ]
}
2024-04-23 12:30:03,957:DEBUG:acme.client:Storing nonce: 1Th9QjupBTwCiepoDaO3utpjblNpifXJ-plL_voATVwGBd3zkE0
2024-04-23 12:30:03,958:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-23 12:30:03,958:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-04-23 12:30:03,959:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-23 12:30:03,959:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-23 12:30:03,960:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:30:03,960:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-23 12:30:03,960:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-23 12:30:03,960:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-23 12:30:03,962:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:30:04,011:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-23 12:30:04,256:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-23 12:30:04,257:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-04-23 12:30:04,258:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-04-23 12:30:04,263:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:58 UTC.
2024-04-23 12:30:04,263:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-23 12:30:04,263:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-23 12:30:04,269:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0473B8F0>
Prep: True
2024-04-23 12:30:04,269:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0473B8F0> and installer None
2024-04-23 12:30:04,270:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-23 12:30:04,280:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-23 12:30:04,281:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-23 12:30:04,283:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-23 12:30:04,719:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-23 12:30:04,720:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:47 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "tjewCx45hFI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-04-23 12:30:04,720:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-23 12:30:09,066:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7853_key-certbot.pem
2024-04-23 12:30:13,090:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7851_csr-certbot.pem
2024-04-23 12:30:13,090:DEBUG:acme.client:Requesting fresh nonce
2024-04-23 12:30:13,091:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-23 12:30:13,244:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-23 12:30:13,245:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:56 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMphTFFgOeLveCYFjBwIsWQKaxrzGfPMgkJBoXvYacyiFs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-23 12:30:13,246:DEBUG:acme.client:Storing nonce: FUnC6kMphTFFgOeLveCYFjBwIsWQKaxrzGfPMgkJBoXvYacyiFs
2024-04-23 12:30:13,246:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-23 12:30:13,252:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBoVEZGZ09lTHZlQ1lGakJ3SXNXUUtheHJ6R2ZQTWdrSkJvWHZZYWN5aUZzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "L7R3EBbGQ4KB3t80200jg6q_gIjXxWXT8pUZV1TvR9UDnJipk9tYHB2b5YbrnU7YPBAi4M3bY8t6yZH4fcJCfyQ3K-aiTJTHIV8AoHlGC6-gmNXHvS90TInJDN6bGJrXHFp69kOfGESmk619kQhqsSDyV_JPkKgwxfvrX_ql1rVitCTyMDKuOC1nwvoyk-MlW476p5F5gLsOsJNKXbxFKAvFKyvnA4H-QBPvSycUSPAPYVO5z_Me0vYiat3w9xRUEzdmBVN8YYr7awoOu546nXN98VK8Jo901iscN9SyJHLaHTrX568vqtswdErWcdO5Q-zGmlEfPKqsdhSog9D67g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-04-23 12:30:13,417:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-04-23 12:30:13,418:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 23 Apr 2024 10:30:56 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602692837
Replay-Nonce: Y89UXNya9Vux6-IZ_IhSrXdZA_-FLCKUtYr9DkakvW__BmaeGrE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:16:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432570877"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602692837"
}
2024-04-23 12:30:13,418:DEBUG:acme.client:Storing nonce: Y89UXNya9Vux6-IZ_IhSrXdZA_-FLCKUtYr9DkakvW__BmaeGrE
2024-04-23 12:30:13,419:DEBUG:acme.client:JWS payload:
b''
2024-04-23 12:30:13,424:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432570877:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWE5VnV4Ni1JWl9JaFNyWGRaQV8tRkxDS1V0WXI5RGtha3ZXX19CbWFlR3JFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI1NzA4NzcifQ",
  "signature": "a1w7gMwChu2VR4qcbVvEag8bLfYTIB11oUOniQ247UgRjRiVKKHWfnXEop2iBDqabJLoRioqFYbHDykzFguNRB3IbrEtKlwn1bs-zJY3S1JmIjYcLKwktWVnu0t4UIlYrC7aeLlErF25obH3DUlvs16UBbBMfCqhyOJqY6gfWO0ioM94moralAD59lU1MsWxVUO1CdRif441dElaLKEzs_HF-HJAWYv4pPh1PS1EEQfk5f3tY71rukEeBxOnK0ODGHLnJPngmPNC4qQyoHguGNYlU4u_dOyPdg3702FRuonNkUoLXlehaJRhkVrLlcelJ2wPJS74-h89X7Kp_9aBOA",
  "payload": ""
}
2024-04-23 12:30:13,592:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432570877 HTTP/1.1" 200 809
2024-04-23 12:30:13,593:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:56 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Y89UXNya_vZpSMB2q5R7wxYv7wZiH9xnkreiInkI64b7MQye-Lc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:16:25Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/IP7Jnw",
      "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/jfJGPg",
      "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/AYFk4w",
      "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190"
    }
  ]
}
2024-04-23 12:30:13,593:DEBUG:acme.client:Storing nonce: Y89UXNya_vZpSMB2q5R7wxYv7wZiH9xnkreiInkI64b7MQye-Lc
2024-04-23 12:30:13,593:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-23 12:30:13,594:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-04-23 12:30:13,594:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-23 12:30:13,594:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-23 12:30:13,595:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:30:13,595:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-23 12:30:13,595:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-23 12:30:13,596:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-23 12:30:13,597:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:30:13,649:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-23 12:30:13,849:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-23 12:30:13,851:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is signed by the certificate's issuer.
2024-04-23 12:30:13,851:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD
2024-04-23 12:30:13,856:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:17 UTC.
2024-04-23 12:30:13,856:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-23 12:30:13,856:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-23 12:30:13,860:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04425F90>
Prep: True
2024-04-23 12:30:13,860:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04425F90> and installer None
2024-04-23 12:30:13,860:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-23 12:30:13,876:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-23 12:30:13,877:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-23 12:30:13,879:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-23 12:30:14,355:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-23 12:30:14,356:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:30:57 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "gTEs8P3TdaQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-23 12:30:14,356:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-23 12:30:19,076:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7854_key-certbot.pem
2024-04-23 12:30:23,409:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7852_csr-certbot.pem
2024-04-23 12:30:23,410:DEBUG:acme.client:Requesting fresh nonce
2024-04-23 12:30:23,410:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-23 12:30:23,569:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-23 12:30:23,569:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:31:06 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1Th9QjuptpGyktF3_2aHVYC7Om0myIgzj85FsNGlHuihMVMNOV8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-23 12:30:23,569:DEBUG:acme.client:Storing nonce: 1Th9QjuptpGyktF3_2aHVYC7Om0myIgzj85FsNGlHuihMVMNOV8
2024-04-23 12:30:23,570:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-23 12:30:23,575:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXB0cEd5a3RGM18yYUhWWUM3T20wbXlJZ3pqODVGc05HbEh1aWhNVk1OT1Y4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "jhUXrz8g9m7I_7AwfxfISKbY3ANDZKdvdwILSkYMzadkFM2hY10TM84i0l0PTkzrPinesB78kOSKuVWxaEAk8NC7OL8dVENHPUhR5wM9nz5fODc8bf19pRPq6vPhtqHzQ5A_Vu44mFlx5i6EmXxLGop-m2QXov8XliRnRHp883avu3vCb1szddkYQgVwje0nzhJMGMuSfvz9H4Gjh9EuestegnFxhLOWE7gSx_qcNhSF62rdmC6urBBvLpTmiLDyFa7cNRjaWNrO5ilVnTnt1aD1UbQNlCzqveKIl_tTQcNzQZrLhgMbJwy_vzfP9UclgBPFetJK7xCupZ5VG4x_Zg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-23 12:30:23,745:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-04-23 12:30:23,746:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 23 Apr 2024 10:31:06 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602722417
Replay-Nonce: sW-8q43NNLUP5R2YzVPqwyi76N-GW-wT4WhGXhPJVPOesTdD4qY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:16:35Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432614317"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602722417"
}
2024-04-23 12:30:23,746:DEBUG:acme.client:Storing nonce: sW-8q43NNLUP5R2YzVPqwyi76N-GW-wT4WhGXhPJVPOesTdD4qY
2024-04-23 12:30:23,746:DEBUG:acme.client:JWS payload:
b''
2024-04-23 12:30:23,752:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432614317:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05OTFVQNVIyWXpWUHF3eWk3Nk4tR1ctd1Q0V2hHWGhQSlZQT2VzVGRENHFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2MTQzMTcifQ",
  "signature": "ax7JYMKqlR_6a9DIg_fo2N1EE5IyrXFcnF5aLnaMWZNg1CQTd_EDmJTc0b7vqhFKEhoAPE2PM1od6rZgmRkVh43rhBm66aR0y0oCs_FEJBc8mU19Df1QFEtKEainAcpCeRePYn2nUqHKoRyWcTMHIK7cFRufKW8y5PyFIg7gSqG1cOSr6KtomCJujpjl6fCsgvNKPbQegDgf4nYGvFgZ7iOg2sRb4WdVnNnUg-yBRr_H_1uZUhqhwireerJMESXfJK47pThiC3tTBqtNnL-f0NwjeYbYWSa9lZfvS2i-9EHs8FKcNjfFxAuLvB3GmE_waXOSzg0Ekw6kqS7qhlX0rg",
  "payload": ""
}
2024-04-23 12:30:23,927:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432614317 HTTP/1.1" 200 805
2024-04-23 12:30:23,928:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:31:06 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sW-8q43NlaPHwWFE1VNiO7hw5YoVdA1FELxkr0EpoPZkyx83Wh0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:16:35Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/xAjnBA",
      "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/eaCuPQ",
      "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/2jUEjw",
      "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U"
    }
  ]
}
2024-04-23 12:30:23,928:DEBUG:acme.client:Storing nonce: sW-8q43NlaPHwWFE1VNiO7hw5YoVdA1FELxkr0EpoPZkyx83Wh0
2024-04-23 12:30:23,929:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-23 12:30:23,929:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-04-23 12:30:23,930:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-23 12:30:23,930:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-23 12:30:23,931:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:30:23,931:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-23 12:30:23,931:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-23 12:30:23,931:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-23 12:30:23,931:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:30:23,984:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-23 12:30:24,228:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-23 12:30:24,229:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-23 12:30:24,229:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-23 12:30:24,234:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:34 UTC.
2024-04-23 12:30:24,235:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-23 12:30:24,235:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-23 12:30:24,240:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0473BB70>
Prep: True
2024-04-23 12:30:24,240:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0473BB70> and installer None
2024-04-23 12:30:24,240:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-23 12:30:24,255:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-23 12:30:24,256:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-23 12:30:24,258:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-23 12:30:24,723:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-23 12:30:24,723:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:31:07 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "mMwIi3WCzFU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-23 12:30:24,724:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-23 12:30:29,105:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7855_key-certbot.pem
2024-04-23 12:30:33,408:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7853_csr-certbot.pem
2024-04-23 12:30:33,409:DEBUG:acme.client:Requesting fresh nonce
2024-04-23 12:30:33,409:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-23 12:30:33,564:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-23 12:30:33,564:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:31:16 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sW-8q43NZMpDSLTQ0OncCDFeaobJpwtJ3ptRcNwqrHaqiReeVak
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-23 12:30:33,565:DEBUG:acme.client:Storing nonce: sW-8q43NZMpDSLTQ0OncCDFeaobJpwtJ3ptRcNwqrHaqiReeVak
2024-04-23 12:30:33,565:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-23 12:30:33,572:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05aTXBEU0xUUTBPbmNDREZlYW9iSnB3dEozcHRSY053cXJIYXFpUmVlVmFrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "sCie42vhoNjU0CVXwkH3ljh2o22yIlTjhPm2l-kHqeDxLTBefolHxPu5wj_bSDaZoL39118Tj822-IDCmsEMkJ0ie06EcDdwnWR0Xlb3Sg6UmzgR4KG-C6YXls-sctJvj7Csi6MVJg2YIg4pCm-HxswsYWpByYzWLuQ3dW3lSjvW-AysdaleDe9iPSPCI2WXEh1RPP-rhZT5xCIcAM1JgTGfTyv5e-o1awVS6gCqhrSu0hdu7v5VRlknEiYbzAgztM3gsJLKaQcN9OSwAcIAc1e1nu69QZNaWVQ6j2Ux6I21eq8tOftt6dU5Q5JBvg7Dn_IIzNdx3bvw6u8t_UWupA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-23 12:30:33,738:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-04-23 12:30:33,739:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 23 Apr 2024 10:31:16 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602748407
Replay-Nonce: 1Th9Qjupz2Q-HxuSyChTHxX53eNg0Kl2-qiqV2CwoqRAU2eGZCI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:16:44Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432651637"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602748407"
}
2024-04-23 12:30:33,739:DEBUG:acme.client:Storing nonce: 1Th9Qjupz2Q-HxuSyChTHxX53eNg0Kl2-qiqV2CwoqRAU2eGZCI
2024-04-23 12:30:33,740:DEBUG:acme.client:JWS payload:
b''
2024-04-23 12:30:33,745:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432651637:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXB6MlEtSHh1U3lDaFRIeFg1M2VOZzBLbDItcWlxVjJDd29xUkFVMmVHWkNJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2NTE2MzcifQ",
  "signature": "vA2h6Cl0QcootQeq-VHpzpAupBcW0nyIn0D2S7KeFre26n7fs6jajYGYl7fw7Kj2AFNPc0Od04oQoBw2oyMzBCZGJLshAC3ocpFkosF7bpPAccLTBcjbZim2vsQOATyW4ME_tVOGpv3gKDq9JMZJf-ubKwHZQ4BGdS8Wvs806VsSysyBM0gJCv6bqHCJQKm7h5jsZoZReYPZ-M7weqsGxSykfijGRKsMUOKcPxrZq_74y3aeIie02AB65ja1j8JJ5aeT7tyIFXAhgsPdZJEQnAycyYqdwTluOKamj4K62zita2VZPyUcC8ruK23iJEAkGQ9gJCldWXi1bwq5EW5Tvw",
  "payload": ""
}
2024-04-23 12:30:33,904:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432651637 HTTP/1.1" 200 805
2024-04-23 12:30:33,904:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:31:16 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sW-8q43NE3QuzL6qK7epSLg8gy87CPpNNGFqg0hA4x7NE0kkNQo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:16:44Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/MmDBAg",
      "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/zq-rkw",
      "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/n89D0Q",
      "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA"
    }
  ]
}
2024-04-23 12:30:33,905:DEBUG:acme.client:Storing nonce: sW-8q43NE3QuzL6qK7epSLg8gy87CPpNNGFqg0hA4x7NE0kkNQo
2024-04-23 12:30:33,905:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-23 12:30:33,905:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-04-23 12:30:33,906:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-23 12:30:33,906:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-23 12:30:33,907:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:30:33,907:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-23 12:30:33,907:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-23 12:30:33,908:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-23 12:30:33,909:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:30:33,965:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-23 12:30:34,167:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-23 12:30:34,168:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-04-23 12:30:34,169:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-04-23 12:30:34,174:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:48 UTC.
2024-04-23 12:30:34,174:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-23 12:30:34,174:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-23 12:30:34,179:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x044452F0>
Prep: True
2024-04-23 12:30:34,179:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x044452F0> and installer None
2024-04-23 12:30:34,179:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-23 12:30:34,195:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-23 12:30:34,196:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-23 12:30:34,198:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-23 12:30:34,665:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-23 12:30:34,666:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:31:17 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "zKvsa5Q0gaQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-04-23 12:30:34,666:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-23 12:30:39,155:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7856_key-certbot.pem
2024-04-23 12:30:43,449:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7854_csr-certbot.pem
2024-04-23 12:30:43,450:DEBUG:acme.client:Requesting fresh nonce
2024-04-23 12:30:43,450:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-23 12:30:43,601:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-23 12:30:43,601:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:31:26 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Y89UXNya-N5Jn1Bj9_UntdA2UG_2e5Xvb4MZlTxfklzszKfhkxU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-23 12:30:43,602:DEBUG:acme.client:Storing nonce: Y89UXNya-N5Jn1Bj9_UntdA2UG_2e5Xvb4MZlTxfklzszKfhkxU
2024-04-23 12:30:43,602:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-23 12:30:43,606:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWEtTjVKbjFCajlfVW50ZEEyVUdfMmU1WHZiNE1abFR4ZmtsenN6S2Zoa3hVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "FQsuw0P4iTucidWOW7BBeHZ8aFeB6Sws0E-yIQUXW1pn3qiQ2XtprhUNVUUc0dllCwZc-PHTzU-5w7IXHMbSDF6y4hL1f_Slk6UbILtg0gyoBK0jP3IROCudKSEKQStZ0Z_A8__Pgf8KD1lq5UtgZEzkUpAlgjbx8WHkCJQCQ2LhL_lOCjZ-WGC-bz1l2-NOlOAhNd8Hoec95_gmvmrL2FeOebCmBm0r_GoEY55VqzNo07FQEVynucntkT83hnjj593uIe6Q_YHUbhl5gKLVChRE0CASAY3ctW61zy_1RhzAeu6cXuajcg2xEH-lqFL4oQsq3rpg5A_oz_eRVu529w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-23 12:30:43,848:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-04-23 12:30:43,848:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 23 Apr 2024 10:31:26 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602776607
Replay-Nonce: FUnC6kMpeQ-px_8behmMwvqY_JQ55toPN3kzjWoMHJxmqQ00H6w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-04-24T03:16:53Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432691097"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602776607"
}
2024-04-23 12:30:43,849:DEBUG:acme.client:Storing nonce: FUnC6kMpeQ-px_8behmMwvqY_JQ55toPN3kzjWoMHJxmqQ00H6w
2024-04-23 12:30:43,849:DEBUG:acme.client:JWS payload:
b''
2024-04-23 12:30:43,855:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432691097:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBlUS1weF84YmVobU13dnFZX0pRNTV0b1BOM2t6aldvTUhKeG1xUTAwSDZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2OTEwOTcifQ",
  "signature": "trUw6g94fiksbbjxPzNiwlzukvidQ0BfXH3bJ4V2yCBu-wh-kuC1W76N4GhmarlboCEbJ-0LZMi5D3dzs_bOUyf5Slga1Fbl2Se4jM07k7RRyxNZEIGKJtZ89_6gVzjbFbYCzjE_AK38fiEXgWfHsHrNFG_brCq-6S2s8zsedckrwXNTV3EIV134CGjeg1WDzwMCHUyZsDAqxN1enlvamAiexWE9DzWSkklOmw8nDhIcF4-WcNA_DsdBHmIykc4kISB7UI0dvVn58bcfArmT3DZVZxns0XqPxqQX-WlxkPFU1twGFg13nTRYypUy-lPgm0_alOrcdpnYpBE1TBqCmQ",
  "payload": ""
}
2024-04-23 12:30:44,010:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432691097 HTTP/1.1" 200 805
2024-04-23 12:30:44,011:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 23 Apr 2024 10:31:27 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMpQx_RVC_rJr6aZAgATlIRLHBAcA-bCHhOaRC9j0Y1x5g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-04-24T03:16:53Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/PSRvrQ",
      "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/SZF9hg",
      "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/9pqO_A",
      "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU"
    }
  ]
}
2024-04-23 12:30:44,011:DEBUG:acme.client:Storing nonce: FUnC6kMpQx_RVC_rJr6aZAgATlIRLHBAcA-bCHhOaRC9j0Y1x5g
2024-04-23 12:30:44,012:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-23 12:30:44,012:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-04-23 12:30:44,013:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-23 12:30:44,013:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-23 12:30:44,014:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:30:44,014:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-23 12:30:44,014:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-23 12:30:44,015:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-23 12:30:44,016:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-23 12:30:44,016:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-04-23 12:30:44,017:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-04-23 12:30:44,022:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-04-23 12:30:44,024:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)