2024-04-25 05:01:06,062:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-04-25 05:01:06,062:DEBUG:certbot._internal.main:Arguments: []
2024-04-25 05:01:06,063:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-04-25 05:01:07,167:DEBUG:certbot._internal.log:Root logging level set at 20
2024-04-25 05:01:07,167:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-04-25 05:01:07,205:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x050A3190> and installer <certbot._internal.cli.cli_utils._Default object at 0x050A3190>
2024-04-25 05:01:07,246:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-25 05:01:07,486:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-25 05:01:07,488:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is signed by the certificate's issuer.
2024-04-25 05:01:07,492:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is: OCSPCertStatus.GOOD
2024-04-25 05:01:07,498:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:24 UTC.
2024-04-25 05:01:07,499:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-25 05:01:07,499:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-25 05:01:07,504:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04AEDE50>
Prep: True
2024-04-25 05:01:07,504:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04AEDE50> and installer None
2024-04-25 05:01:07,504:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-25 05:01:07,511:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-25 05:01:07,512:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-25 05:01:07,514:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-25 05:01:08,219:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-25 05:01:08,220:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:01:49 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "HGwks9wJS_A": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-25 05:01:08,220:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-25 05:01:13,316:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7883_key-certbot.pem
2024-04-25 05:01:17,893:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7881_csr-certbot.pem
2024-04-25 05:01:17,894:DEBUG:acme.client:Requesting fresh nonce
2024-04-25 05:01:17,894:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-25 05:01:18,113:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-25 05:01:18,113:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:01:59 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1Th9QjupSh-4SznDA3HkKexoRCBP6uqlWn6gkTfWZKIcyCnAAS8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-25 05:01:18,113:DEBUG:acme.client:Storing nonce: 1Th9QjupSh-4SznDA3HkKexoRCBP6uqlWn6gkTfWZKIcyCnAAS8
2024-04-25 05:01:18,114:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-25 05:01:18,119:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBTaC00U3puREEzSGtLZXhvUkNCUDZ1cWxXbjZna1RmV1pLSWN5Q25BQVM4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "JcRKN1NpcnZ0rLCJb0AXcC-_D6D5AARUPw3JBgilyQP40B0B-z7-WVmtOt2FrMWR8yobqzj_AeKFFNJMpG4lo_9PqhYwtdZHjIrDcyfWNtGdF2RVAPM8jm0IoJ0i7XwhvUiXjrgLi6k8y60BCi0N5JENLOltE2iMF_NhwHCgjVgNDyMj9bzsBP8E0G64iLXN-seGRpOuiT48pY44uBLqEH3YnNH0WtXaLY88V_D6RFCQRNUL8rSwMoIZKLkg51WDB258XAK0d_wpAFgSTdyVG_Xwjyaz6Z35BW3p7jsvT_h5Pj78iGmUk_GWBp9jjMz0az8hV_TGd9mF9FC5wBI5vg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-25 05:01:18,349:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-04-25 05:01:18,350:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 25 Apr 2024 03:01:59 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785897197
Replay-Nonce: 1Th9QjupqjrQddLOurud50s-T_OVhrQRjYEQP6k_ouJ6AJbC8v4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-05-01T20:39:02Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590903587"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785897197"
}
2024-04-25 05:01:18,350:DEBUG:acme.client:Storing nonce: 1Th9QjupqjrQddLOurud50s-T_OVhrQRjYEQP6k_ouJ6AJbC8v4
2024-04-25 05:01:18,350:DEBUG:acme.client:JWS payload:
b''
2024-04-25 05:01:18,356:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590903587:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBxanJRZGRMT3VydWQ1MHMtVF9PVmhyUVJqWUVRUDZrX291SjZBSmJDOHY0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTA5MDM1ODcifQ",
  "signature": "u7YTeqWurL9BV43mlECg38Y3bKNM0q1I5OQ2uOguZLRzvf1y23y_OkgMMPJrUCMcnfAr_uMJr0cJ-smSuxN3SJgKUfdPeOJ65_U3n5Ei71yDwbJvohyrf-szhfk4BBhcoxguGtz3cxQS-pfJahY3C92qbvsURRxC04hMxPT48q_oGIByhnZb-gAvOXjZSjZ9uEGfqHFZv-iI79sqyfWH3PqOFowxw7bxEvlCXlR3lWAcm_GoUR3G6RnczcAfx48fW2aKhOxeoeBygzAkxgpleTDyShSdtx4jwag-SvAzMdAOFKJmDcAhE5uVbV0UJgBpGYOuE0Wau5fExUUlapy8pA",
  "payload": ""
}
2024-04-25 05:01:18,576:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342590903587 HTTP/1.1" 200 810
2024-04-25 05:01:18,577:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:00 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sW-8q43Nppub7SCKYwwoZARfrX2WHoDhAgluaAae7OzO3g15MvM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-05-01T20:39:02Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/yQQlQg",
      "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/fshO_g",
      "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/Ovx7gQ",
      "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4"
    }
  ]
}
2024-04-25 05:01:18,577:DEBUG:acme.client:Storing nonce: sW-8q43Nppub7SCKYwwoZARfrX2WHoDhAgluaAae7OzO3g15MvM
2024-04-25 05:01:18,578:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-25 05:01:18,578:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-04-25 05:01:18,579:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-25 05:01:18,579:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-25 05:01:18,582:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:01:18,582:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-25 05:01:18,582:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-25 05:01:18,583:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-25 05:01:18,589:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:01:18,630:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-25 05:01:18,847:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-25 05:01:18,848:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-25 05:01:18,849:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-25 05:01:18,854:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:42 UTC.
2024-04-25 05:01:18,854:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-25 05:01:18,854:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-25 05:01:18,859:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04AB81D0>
Prep: True
2024-04-25 05:01:18,859:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04AB81D0> and installer None
2024-04-25 05:01:18,859:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-25 05:01:18,874:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-25 05:01:18,875:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-25 05:01:18,877:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-25 05:01:19,451:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-25 05:01:19,451:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:01 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "IHBoBnTZz9o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-25 05:01:19,452:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-25 05:01:24,009:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7884_key-certbot.pem
2024-04-25 05:01:28,239:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7882_csr-certbot.pem
2024-04-25 05:01:28,240:DEBUG:acme.client:Requesting fresh nonce
2024-04-25 05:01:28,240:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-25 05:01:28,453:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-25 05:01:28,453:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:10 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMppcXsKq6kfjZ-Lmh4csmUEdat0FgnGCfxADux7tC9bDI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-25 05:01:28,454:DEBUG:acme.client:Storing nonce: FUnC6kMppcXsKq6kfjZ-Lmh4csmUEdat0FgnGCfxADux7tC9bDI
2024-04-25 05:01:28,454:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-25 05:01:28,459:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBwY1hzS3E2a2ZqWi1MbWg0Y3NtVUVkYXQwRmduR0NmeEFEdXg3dEM5YkRJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "J5oiluMYZ0koA7j9ne_JjBJcRoYM87y-udm9mcUC5tTd6OZqxPHC_-tDhwR6jl8JOCbpdE39JNmkWlD5PUacNsEytKvfLr-1U677ZlbJG97MB52xOP36Hddb_N_-eqsNXju38R078Wu-SGfSokHd0AudBNrENhr-M2a-l0HLQaSbvQJaacXic58zjBKaQMwd3dn6QUqwVXM21JUnv4i-ib4mqrOaEldywRBj-v9VCC_XTK3mqXrqr_IRXnid0xmw4JAb81AArYlrv3Jp5gzOvkIwDVg74KUKb5nSfahvlosDjkErTPYjWh7nxHFGOtLFqS4hRBHmPJB5mynlmOPWHg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-25 05:01:28,714:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-04-25 05:01:28,715:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 25 Apr 2024 03:02:10 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785936717
Replay-Nonce: Y89UXNya_CboZ2R1AokM3RG1pe4SinseNUpTKmH3AaSwPEfZCsI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-05-01T20:39:12Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590959637"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785936717"
}
2024-04-25 05:01:28,715:DEBUG:acme.client:Storing nonce: Y89UXNya_CboZ2R1AokM3RG1pe4SinseNUpTKmH3AaSwPEfZCsI
2024-04-25 05:01:28,715:DEBUG:acme.client:JWS payload:
b''
2024-04-25 05:01:28,721:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590959637:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFfQ2JvWjJSMUFva00zUkcxcGU0U2luc2VOVXBUS21IM0FhU3dQRWZaQ3NJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTA5NTk2MzcifQ",
  "signature": "e261-K3XQs_OQ2cownDZNV1AP8_c_3ix7JPS-M5sPbSBg24O8lBDm9xUGBJzyp-dytLO5ud3tb8J7Q40VV_-bj8twko7mycQWAHGwoI3EtZOwhn73eB0iEC42IyZPQyg2xMnFESSP2uPeOfpuSEzJepPCj6SZsSxXtXoXECfrC6l-n6RNiSMz-VqwMR3CxxPTMKiOytB3lD1lueR5VFT4HY1kjXv6sXPDUF38MT4kLkcVMYgLw_nOtTxvkmaDcpuVNCVm4SrtQxBsAvtuyPNniu3ze7iAiBMXad-NnnRuIYZS5r81iJlRs6HCD4DNuTxUHf5_5cm_F8RtFXdWx-PZQ",
  "payload": ""
}
2024-04-25 05:01:28,938:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342590959637 HTTP/1.1" 200 804
2024-04-25 05:01:28,939:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:10 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMpDwuTfO6cOxp_aEZwJUPC4pgp2WS7RRXEDmDetLFcPgY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-05-01T20:39:12Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/k2GELA",
      "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/C9NXzA",
      "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/N6vgRQ",
      "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0"
    }
  ]
}
2024-04-25 05:01:28,939:DEBUG:acme.client:Storing nonce: FUnC6kMpDwuTfO6cOxp_aEZwJUPC4pgp2WS7RRXEDmDetLFcPgY
2024-04-25 05:01:28,940:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-25 05:01:28,940:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-04-25 05:01:28,940:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-25 05:01:28,941:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-25 05:01:28,941:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:01:28,941:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-25 05:01:28,942:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-25 05:01:28,942:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-25 05:01:28,943:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:01:28,982:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-25 05:01:29,198:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-25 05:01:29,199:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-04-25 05:01:29,200:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-04-25 05:01:29,204:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:56 UTC.
2024-04-25 05:01:29,205:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-25 05:01:29,205:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-25 05:01:29,211:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03B02270>
Prep: True
2024-04-25 05:01:29,212:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03B02270> and installer None
2024-04-25 05:01:29,212:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-25 05:01:29,227:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-25 05:01:29,227:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-25 05:01:29,229:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-25 05:01:29,860:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-25 05:01:29,861:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:11 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "C8fJXeq9ISQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-25 05:01:29,861:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-25 05:01:34,298:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7885_key-certbot.pem
2024-04-25 05:01:38,431:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7883_csr-certbot.pem
2024-04-25 05:01:38,432:DEBUG:acme.client:Requesting fresh nonce
2024-04-25 05:01:38,432:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-25 05:01:38,639:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-25 05:01:38,640:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:20 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Y89UXNyahBFQzBxVMsMygvlqysQAxkZsU888Z-LeCtCtMFUOhGc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-25 05:01:38,640:DEBUG:acme.client:Storing nonce: Y89UXNyahBFQzBxVMsMygvlqysQAxkZsU888Z-LeCtCtMFUOhGc
2024-04-25 05:01:38,640:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-25 05:01:38,645:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFoQkZRekJ4Vk1zTXlndmxxeXNRQXhrWnNVODg4Wi1MZUN0Q3RNRlVPaEdjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "UeuJ47j1pGzNTNnIFCqe9Khmyb9Na6O9OoXYkSAH6cBHwMPyxajOQb88HpYqM9Vbi4Hk_SHEqfid9pgh6giJI7JBvc1uChcSLR4_3GHIbyBVfOE5NdFmc1B-SFysPlJvzUofo8c_wcdgY1oGy6stDuwNyHwQMPvZysK3chF3dLdkO3rkVcy7IOiYgtseFLDt5WSF2aF3AWYzQBdC1D5PYmhHNLnSqE5zRo8_MVXBnSierpfRxKAGdiU3GHdBG46nqqalh5CcBV4MS-_cENEeRAPhX1syuWNFnQOdo67tX_v7uMRDC7pKcecYMOLkl1HoEsyXWwCR5OgX3iwr3kc_TA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-25 05:01:38,938:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-04-25 05:01:38,938:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 25 Apr 2024 03:02:20 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785966947
Replay-Nonce: Y89UXNyaxPSdjJfhfdtBOuelcmLPIxPlSoldBRVhQmivR_2wXPQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-05-01T20:39:24Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591007887"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785966947"
}
2024-04-25 05:01:38,939:DEBUG:acme.client:Storing nonce: Y89UXNyaxPSdjJfhfdtBOuelcmLPIxPlSoldBRVhQmivR_2wXPQ
2024-04-25 05:01:38,939:DEBUG:acme.client:JWS payload:
b''
2024-04-25 05:01:38,943:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591007887:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWF4UFNkakpmaGZkdEJPdWVsY21MUEl4UGxTb2xkQlJWaFFtaXZSXzJ3WFBRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwMDc4ODcifQ",
  "signature": "ZsSyVurbOL4Me9ELizop_wY-VrzntUoiTopB_cMTTSxDFP8UPVt5t3_nT8WHKgoJIfMDcpwFqtPzvTTIsy28tLklsYxVFY1LX-a6O7GtaietsuK1Vs4w1jcGqGV_UrhSf-xSFLA5_RDhRI6_Hn3A2mWLw--bZ5FutJjmkQ-i8IRfKCTbvk5zfp42pIAfS9__wowF0ChkrrSXx_j12aaamjOh4dJNPnBIHPi1DW1lCmIF3s2zR15WDFuUW8AUXhZBuKdDLKvN80Qo8ZdO-WG54ChsU8SfdIgh3NpyPxcI6gdGTsyDKtx5Jb9MZBQfZjyDe3Ess3Hzz9VvmlhqueeitQ",
  "payload": ""
}
2024-04-25 05:01:39,169:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591007887 HTTP/1.1" 200 807
2024-04-25 05:01:39,170:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:20 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Y89UXNyaOAvJpV8QMkI-A2M--pw68_CkvabHIfBlgfHJaypWaKA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-05-01T20:39:24Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/PHBLZA",
      "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/Lbw9kw",
      "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/PJqcrw",
      "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc"
    }
  ]
}
2024-04-25 05:01:39,170:DEBUG:acme.client:Storing nonce: Y89UXNyaOAvJpV8QMkI-A2M--pw68_CkvabHIfBlgfHJaypWaKA
2024-04-25 05:01:39,171:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-25 05:01:39,171:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-04-25 05:01:39,171:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-25 05:01:39,172:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-25 05:01:39,172:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:01:39,173:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-25 05:01:39,173:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-25 05:01:39,173:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-25 05:01:39,174:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:01:39,228:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-25 05:01:39,422:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-25 05:01:39,423:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-25 05:01:39,423:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-25 05:01:39,428:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:14 UTC.
2024-04-25 05:01:39,429:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-25 05:01:39,429:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-25 05:01:39,433:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04A2CFB0>
Prep: True
2024-04-25 05:01:39,433:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04A2CFB0> and installer None
2024-04-25 05:01:39,433:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-25 05:01:39,438:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-25 05:01:39,439:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-25 05:01:39,441:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-25 05:01:40,100:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-25 05:01:40,101:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:21 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "UBu35TdERGQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-25 05:01:40,101:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-25 05:01:44,649:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7886_key-certbot.pem
2024-04-25 05:01:48,871:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7884_csr-certbot.pem
2024-04-25 05:01:48,871:DEBUG:acme.client:Requesting fresh nonce
2024-04-25 05:01:48,871:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-25 05:01:49,089:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-25 05:01:49,090:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:30 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sW-8q43N8sUe7FC40CqAtgC5tsEFtAnAZbyOdL00m_89YBbM-HM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-25 05:01:49,090:DEBUG:acme.client:Storing nonce: sW-8q43N8sUe7FC40CqAtgC5tsEFtAnAZbyOdL00m_89YBbM-HM
2024-04-25 05:01:49,090:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-04-25 05:01:49,096:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M044c1VlN0ZDNDBDcUF0Z0M1dHNFRnRBbkFaYnlPZEwwMG1fODlZQmJNLUhNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Ola67AQi-BCM-WyE-qKCevKAg_5suztjrACCVZJJfSPi4ekk8lMA-mC_c56uaJ5Qt53VOqoFGWiYrV_NA5B1Kzrk8v000P88cENBFaiW7HP3QVT4ZQLYmlNm6eZ1dJ6ccIh1IN5XvRRTcokk2GJfYVC8_1gfDopu7RP8IBV-WHZlFFrvw3pxHFo5U-IeHDBooP3CeEkfZbba6oyYMzZIav4TmxQXmuBefay4Wz1wXemCfanAd8YuaTW5DDGPxbecJno0OasBSTXUKPeoSC1yMxM0eu3DCu51O2GgbINYV9EwUcIeQej_IXkxVgR0vNj__EYdr8LZy0ICYiOFBbLD8A",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-25 05:01:49,327:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-04-25 05:01:49,328:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 25 Apr 2024 03:02:30 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785995757
Replay-Nonce: 1Th9QjupMUhxzD_o_ZqCQddnxf5FcVbGbNBr_kPZA3AeI6QMuUM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-05-01T20:39:35Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591052317"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785995757"
}
2024-04-25 05:01:49,328:DEBUG:acme.client:Storing nonce: 1Th9QjupMUhxzD_o_ZqCQddnxf5FcVbGbNBr_kPZA3AeI6QMuUM
2024-04-25 05:01:49,329:DEBUG:acme.client:JWS payload:
b''
2024-04-25 05:01:49,334:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591052317:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBNVWh4ekRfb19acUNRZGRueGY1RmNWYkdiTkJyX2tQWkEzQWVJNlFNdVVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwNTIzMTcifQ",
  "signature": "LXLnkCqPlAF4ISWasw2b-bA-9aAKJs1gvSXWrUnN04qr6dqUC7C-Oeo8gnMjC3uUUGzwh7v6q66TAqkjKJr0U_19_mlZX4DBVYxo50WRt9H-6Vhu0pfjrB7f_XPbMfI4ApGf_lhA9qIpLTHQNGY31Xf9_wyZrCHWhk2gOpSrpRDXsjSJdpgQvI6MGuF3qca_xGPDEcOhC48WKOdWBqOSm3Xnv1ByIZ7n5NTZCivbUcA-EpsoO5W-CWyqqmq36gzz76HSWYuF1GQTckeQq10OwwC1s_h56sMqmw7JCWmpghhPa1RAg3gau5M12gnM3DcrVKP7iR0z0krILcRKr3FkLg",
  "payload": ""
}
2024-04-25 05:01:49,570:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591052317 HTTP/1.1" 200 801
2024-04-25 05:01:49,571:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:31 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1Th9QjupQQjK5fWKgVT--qWZegbQKd0nLOhlkIUPmVBvwlFaj-s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-05-01T20:39:35Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/nXYSvg",
      "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/lcK_gw",
      "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/A5w39g",
      "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ"
    }
  ]
}
2024-04-25 05:01:49,571:DEBUG:acme.client:Storing nonce: 1Th9QjupQQjK5fWKgVT--qWZegbQKd0nLOhlkIUPmVBvwlFaj-s
2024-04-25 05:01:49,572:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-25 05:01:49,572:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-04-25 05:01:49,573:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-25 05:01:49,573:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-25 05:01:49,574:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:01:49,574:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-25 05:01:49,574:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-25 05:01:49,574:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-25 05:01:49,575:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:01:49,626:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-25 05:01:49,885:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-25 05:01:49,886:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-25 05:01:49,887:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-25 05:01:49,892:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:32 UTC.
2024-04-25 05:01:49,892:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-25 05:01:49,893:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-25 05:01:49,898:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03B02230>
Prep: True
2024-04-25 05:01:49,898:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03B02230> and installer None
2024-04-25 05:01:49,898:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-25 05:01:49,913:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-25 05:01:49,914:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-25 05:01:49,916:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-25 05:01:50,535:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-25 05:01:50,536:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:32 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "JssBJurE-5A": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-25 05:01:50,536:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-25 05:01:54,943:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7887_key-certbot.pem
2024-04-25 05:01:58,988:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7885_csr-certbot.pem
2024-04-25 05:01:58,988:DEBUG:acme.client:Requesting fresh nonce
2024-04-25 05:01:58,988:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-25 05:01:59,194:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-25 05:01:59,195:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:40 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMpbmnQK1EBMZ1jyfViocErZQpG3q0cPmT_z66Tzq4H-88
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-25 05:01:59,195:DEBUG:acme.client:Storing nonce: FUnC6kMpbmnQK1EBMZ1jyfViocErZQpG3q0cPmT_z66Tzq4H-88
2024-04-25 05:01:59,195:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-25 05:01:59,201:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBibW5RSzFFQk1aMWp5ZlZpb2NFclpRcEczcTBjUG1UX3o2NlR6cTRILTg4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ICPV9kl_KrwqlO5zf4mcBZLdcYkNH4Xm1WBkAbJ8oqxNqQjglnHXiYXzvioR5GVhKs_jpvaNlpZw5SGEhjaELofg2FBZg85eTSPIiBtOvRi1M1Ffg1xFXoFWyuU3dQx9Zrb4ETjbGYz7OGLkt5Tv5ZhMAjt76xdi9gI_QaTXmes8DDyW1IwP8Yw4N8gzPVBI5Jbb7vuUOzT4MGIzFbHPP_Fp9RYv-6yDrgHmtb-hzAT3smo325H56oeiIjo7b1AjbRs98YA9LsaWkrlFcbd8BZ2Ro97efwRFSodllL6rrpO8gbh3jdKzyWlh7ynKE6USxL18fadY32ROujw1c5GBEA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-25 05:01:59,436:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-04-25 05:01:59,437:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 25 Apr 2024 03:02:41 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786022187
Replay-Nonce: Y89UXNyalP5S4LKFInR6O3cFrbBHO6UZCBh2zZ8sGZ1l8qOKRqc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-05-01T20:39:46Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591093777"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786022187"
}
2024-04-25 05:01:59,437:DEBUG:acme.client:Storing nonce: Y89UXNyalP5S4LKFInR6O3cFrbBHO6UZCBh2zZ8sGZ1l8qOKRqc
2024-04-25 05:01:59,438:DEBUG:acme.client:JWS payload:
b''
2024-04-25 05:01:59,443:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591093777:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFsUDVTNExLRkluUjZPM2NGcmJCSE82VVpDQmgyelo4c0daMWw4cU9LUnFjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwOTM3NzcifQ",
  "signature": "GxTJ31_XZkkZhbZ2R9fJalps2dpzYEyUooO8s1rulECHsmghIozlqbRixI7J8lN6kmnuBOL4SlpWFTXp_7pjjRjU1jSjiDSY4zrUWB2VuMcOGc5Av-SfE2JhIBrVNuYHj1kzSwlTfI_QxnhSCGhiRs_Mhx-zZALetXJKDHLImxrQqZF4vL7IkATqdhkakWWx-ZyjShv02hpmrTOXx1DP0nmNpFj1s4hdcHTZ5IUMSVwAMkfSy6XWeb97NlhOyyQcQCwGV18udOxW-UJBIXYe0uzh-Du-I22U6NJJR-d2dfR147i6FlKb2qt4yaonWN7md4tGAFoRj9dP81aayiZGWQ",
  "payload": ""
}
2024-04-25 05:01:59,645:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591093777 HTTP/1.1" 200 805
2024-04-25 05:01:59,646:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:41 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Y89UXNyam2nlu8wHNIrcA7RmQSJZ4xvSREGR7pkYoABiUnHiR4c
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-05-01T20:39:46Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/5L951w",
      "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/egwr_w",
      "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/HMvVIg",
      "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA"
    }
  ]
}
2024-04-25 05:01:59,646:DEBUG:acme.client:Storing nonce: Y89UXNyam2nlu8wHNIrcA7RmQSJZ4xvSREGR7pkYoABiUnHiR4c
2024-04-25 05:01:59,646:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-25 05:01:59,647:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-04-25 05:01:59,647:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-25 05:01:59,648:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-25 05:01:59,648:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:01:59,648:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-25 05:01:59,649:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-25 05:01:59,649:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-25 05:01:59,650:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:01:59,689:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-25 05:01:59,930:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-25 05:01:59,931:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-04-25 05:01:59,931:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-04-25 05:01:59,936:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:48 UTC.
2024-04-25 05:01:59,936:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-25 05:01:59,936:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-25 05:01:59,946:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04AB81D0>
Prep: True
2024-04-25 05:01:59,946:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04AB81D0> and installer None
2024-04-25 05:01:59,946:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-25 05:01:59,951:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-25 05:01:59,952:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-25 05:01:59,954:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-25 05:02:00,627:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-25 05:02:00,628:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:42 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "kjT7C9UwgeY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-25 05:02:00,628:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-25 05:02:04,935:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7888_key-certbot.pem
2024-04-25 05:02:08,970:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7886_csr-certbot.pem
2024-04-25 05:02:08,970:DEBUG:acme.client:Requesting fresh nonce
2024-04-25 05:02:08,970:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-25 05:02:09,193:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-25 05:02:09,193:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:50 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1Th9Qjup93kxT5wlZfekUuSlXY7NYOnPA21h5NEcD7Zg-5OIGc4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-25 05:02:09,193:DEBUG:acme.client:Storing nonce: 1Th9Qjup93kxT5wlZfekUuSlXY7NYOnPA21h5NEcD7Zg-5OIGc4
2024-04-25 05:02:09,194:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-25 05:02:09,199:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXA5M2t4VDV3bFpmZWtVdVNsWFk3TllPblBBMjFoNU5FY0Q3WmctNU9JR2M0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "rUvG-so2JLlZJf3t3qrOJWMmHGwDWOTwC63Gu5dNW8bteKmgUyfNBH97SztSrZXcQsLXtyydbjaFZO8YERW9tEpR6LIoIS2B1fk23aiz24FJxLJkgQ_ijO7fTUPdv-r--s8JRRJqExm9IKGazbIcqiZAcntvLR-5dv1mrn9TK-NB1Ywj3JMwAQ5UNSg4rBGw83W5ynT2Zmu0i9x-THk4CcmyUUsCZpBSbKoLKtJKci1NAGjVRdaQwmnDwXdtI6vE_SlqEVimrRs1RjWyMT53kRc8Je7253dMisalBYUKzP2hWgd1x0Gnex-RiWWfjDG2QnxVmZcBi9lpCgcKXwXbmw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-04-25 05:02:09,438:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-04-25 05:02:09,439:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 25 Apr 2024 03:02:51 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786050437
Replay-Nonce: 1Th9QjupidB7PwfQh1Wy9ffikpb75VD0XqJc_YDJ7Y31s7nipRs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-05-01T20:39:57Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591136247"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786050437"
}
2024-04-25 05:02:09,439:DEBUG:acme.client:Storing nonce: 1Th9QjupidB7PwfQh1Wy9ffikpb75VD0XqJc_YDJ7Y31s7nipRs
2024-04-25 05:02:09,439:DEBUG:acme.client:JWS payload:
b''
2024-04-25 05:02:09,445:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591136247:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBpZEI3UHdmUWgxV3k5ZmZpa3BiNzVWRDBYcUpjX1lESjdZMzFzN25pcFJzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTExMzYyNDcifQ",
  "signature": "LDbaDeGb8TX33TQf-j5aPStzw8DIoArr5dI1tjSeuZezIKH25x7oTcf4Lt_CnbyzC3pD2GXnoooyOX-AZbj52ROWJynUr92C5535xTFhQqCi6tT5Rrdnrk77IeUpLT7oXFpbLFrPJqZwwpFtvPutP782dO5NvOIccNY9eGxrduT-ubb5kV2_hYB6kiav3XrVp5a1XRx4jMy_218V1_Z1FlJ1ML6Uiplm5rSCoWdISN1jIo4lzjxM_DXauAormuA0eGAY0xTFNu4BL_atxF_saEFJDwuGDbUaQlH2d-h4r2mL0DWExWiATT4o7nXqyGv7kqlSVVWV0VESqClf9AvE5A",
  "payload": ""
}
2024-04-25 05:02:09,670:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591136247 HTTP/1.1" 200 809
2024-04-25 05:02:09,670:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:51 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sW-8q43Nreq2gI3hssI2U2NRp78NFrVlipeEbt9qoPuUt5gLqxs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-05-01T20:39:57Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/jmrcew",
      "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/-o7nbg",
      "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/DEae2A",
      "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw"
    }
  ]
}
2024-04-25 05:02:09,671:DEBUG:acme.client:Storing nonce: sW-8q43Nreq2gI3hssI2U2NRp78NFrVlipeEbt9qoPuUt5gLqxs
2024-04-25 05:02:09,671:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-25 05:02:09,671:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-04-25 05:02:09,671:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-25 05:02:09,672:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-25 05:02:09,672:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:02:09,672:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-25 05:02:09,673:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-25 05:02:09,673:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-25 05:02:09,674:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:02:09,713:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-25 05:02:09,917:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-25 05:02:09,918:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-25 05:02:09,919:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-25 05:02:09,923:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:06 UTC.
2024-04-25 05:02:09,924:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-25 05:02:09,924:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-25 05:02:09,928:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05085270>
Prep: True
2024-04-25 05:02:09,929:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05085270> and installer None
2024-04-25 05:02:09,929:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-25 05:02:09,932:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-25 05:02:09,933:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-25 05:02:09,935:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-25 05:02:10,602:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-25 05:02:10,603:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:02:52 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "L3JFuen-bOs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-25 05:02:10,603:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-25 05:02:14,797:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7889_key-certbot.pem
2024-04-25 05:02:18,968:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7887_csr-certbot.pem
2024-04-25 05:02:18,968:DEBUG:acme.client:Requesting fresh nonce
2024-04-25 05:02:18,968:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-25 05:02:19,193:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-25 05:02:19,193:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:00 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sW-8q43N8MvuY1pxjOrCqdwH9Ci03IIEkL1z1mHPqvAuSj-Oqyc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-25 05:02:19,194:DEBUG:acme.client:Storing nonce: sW-8q43N8MvuY1pxjOrCqdwH9Ci03IIEkL1z1mHPqvAuSj-Oqyc
2024-04-25 05:02:19,194:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-25 05:02:19,199:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M044TXZ1WTFweGpPckNxZHdIOUNpMDNJSUVrTDF6MW1IUHF2QXVTai1PcXljIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "WHPIlbcADUg9L69FvC0Z3ChRkdAnghmoawJCg34FD5mhBVXB3irsUCWTyf_xnqEbIV8qmk0SLKMOkaA4MoJxT_Imcelm8f_9ls9tv09YtxdF-tptk_vhdqcDR-c5fJt51_9_ySy8gshLjAPdksx5tlIzOZUo-7qfLdzQ4IpbDBqNIRudGWOYFGooAM7EwfT63Xv1NPBF-OP7zCXU1qS91U90XliwYforJI-noLGwjGGodDsM11o2AgKyLO-cESI8Df6kHf9IhlzH1J-sdeWAmtcTPC2zbE3bkbW1OmzKOfmoPocK74cRSONfTgwGQmLPKK39xpg9YHn0ZphsSmMzOQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-04-25 05:02:19,430:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-04-25 05:02:19,431:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 25 Apr 2024 03:03:01 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786101437
Replay-Nonce: sW-8q43NvZKoRz3RLfp-K2RKMRqZtilhbNecxnPxXWu9jVkyvxE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-05-01T20:40:08Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591202447"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786101437"
}
2024-04-25 05:02:19,431:DEBUG:acme.client:Storing nonce: sW-8q43NvZKoRz3RLfp-K2RKMRqZtilhbNecxnPxXWu9jVkyvxE
2024-04-25 05:02:19,431:DEBUG:acme.client:JWS payload:
b''
2024-04-25 05:02:19,436:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591202447:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M052WktvUnozUkxmcC1LMlJLTVJxWnRpbGhiTmVjeG5QeFhXdTlqVmt5dnhFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEyMDI0NDcifQ",
  "signature": "wqoT41PrnK9QuUfzS05kPoWdbybwRioJKzlYxp2ihrZVqW8gTRVhn5vB7pwO5OBlwaYjdx-1UMASHjnNTZ0hRRU4w0iWscNGX5M97uW-c8DywTmlADtLdGDrzkyr6g7-86kl5F-9vRdLNXAu2jGICawmjDRP4UdbP2ewj_mm6BFv5F8yqMpa8q9MX7x2UjpP6eaL9RBcpdYOz7dwfdtDcW1YNiSQQWz_OP-pCklVMe9dnVZKg_RotlluY3qP7edgV1f2rvcIdG2_-3PPa4Wifb1xLcgU-HA_twmSOYSDN2S6_eD4Ru__BkYwo4lM4hPyCExjAKwdbKVto7mBfGP0WA",
  "payload": ""
}
2024-04-25 05:02:19,664:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591202447 HTTP/1.1" 200 806
2024-04-25 05:02:19,665:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:01 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1Th9QjupjW0ldhtxJwtL2MoxGXq-anuoMWAgiQUfsvs4iOdd6yU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-05-01T20:40:08Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/8XsmxQ",
      "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/a1GZzw",
      "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/qG0r0A",
      "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc"
    }
  ]
}
2024-04-25 05:02:19,665:DEBUG:acme.client:Storing nonce: 1Th9QjupjW0ldhtxJwtL2MoxGXq-anuoMWAgiQUfsvs4iOdd6yU
2024-04-25 05:02:19,666:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-25 05:02:19,666:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-04-25 05:02:19,667:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-25 05:02:19,667:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-25 05:02:19,668:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:02:19,668:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-25 05:02:19,668:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-25 05:02:19,669:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-25 05:02:19,670:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:02:19,709:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-04-25 05:02:19,709:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-25 05:02:19,710:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-04-25 05:02:19,717:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-04-25 05:02:19,720:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-04-25 05:02:19,720:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-04-25 05:02:19,720:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-04-25 05:02:19,721:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-04-25 05:02:19,723:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-04-25 05:02:19,765:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-25 05:02:19,996:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-25 05:02:19,997:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-25 05:02:19,998:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-25 05:02:20,003:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:23 UTC.
2024-04-25 05:02:20,003:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-25 05:02:20,004:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-25 05:02:20,010:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x050A78B0>
Prep: True
2024-04-25 05:02:20,011:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x050A78B0> and installer None
2024-04-25 05:02:20,011:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-25 05:02:20,016:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-25 05:02:20,017:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-25 05:02:20,019:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-25 05:02:20,695:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-25 05:02:20,695:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:02 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Y-0Vd2hi2yA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-25 05:02:20,696:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-25 05:02:25,212:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7890_key-certbot.pem
2024-04-25 05:02:29,336:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7888_csr-certbot.pem
2024-04-25 05:02:29,337:DEBUG:acme.client:Requesting fresh nonce
2024-04-25 05:02:29,337:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-25 05:02:29,559:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-25 05:02:29,559:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:11 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sW-8q43N46xS3mDqVgUj0Vj5-8JsMbnCJT9Zlys48c6jMayvtkA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-25 05:02:29,559:DEBUG:acme.client:Storing nonce: sW-8q43N46xS3mDqVgUj0Vj5-8JsMbnCJT9Zlys48c6jMayvtkA
2024-04-25 05:02:29,560:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-25 05:02:29,565:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M040NnhTM21EcVZnVWowVmo1LThKc01ibkNKVDlabHlzNDhjNmpNYXl2dGtBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "bWrm6KSECXj7LxSXN9OsH0DcRE6IjZLJHnDHRbsD7PL-QR8NiCn7SMCh53ixAvKNzuFxZod_lTPdATsT0CTz6B6UH_sHSC2Cl2kXJFiMfqPutwprI5ZV-M4YSVKe4W0g3Lp1saMeaNWQXPaeybth-WpukcqqQJyUWosALa9NLbKwcwIF-wGeItyOTI8-DPHEADc8q_FrQjcCkm_8OySYo4DP2F1ZJBXrflg-4Q9RaFApcomg1HlX7sYkZWgnaddHb1oWAlhtuVQA0e1r60ufZDyCUpfPb_d4nEeaGjpRCAwl8uDRh-KzLzpSp4nhjlP_1zXbLDXHjVvgLsLuaodd9Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-25 05:02:29,797:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-04-25 05:02:29,798:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 25 Apr 2024 03:03:11 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786138347
Replay-Nonce: sW-8q43N7d433MzrC8e4bkPbqey6VLKLCGSF6KcelATGeur3M68
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-05-01T20:40:19Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591256287"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786138347"
}
2024-04-25 05:02:29,798:DEBUG:acme.client:Storing nonce: sW-8q43N7d433MzrC8e4bkPbqey6VLKLCGSF6KcelATGeur3M68
2024-04-25 05:02:29,798:DEBUG:acme.client:JWS payload:
b''
2024-04-25 05:02:29,803:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591256287:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M043ZDQzM016ckM4ZTRia1BicWV5NlZMS0xDR1NGNktjZWxBVEdldXIzTTY4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEyNTYyODcifQ",
  "signature": "s63S46Scg0rAM6igNgUFcofM4usi8fd3qUMudfxziM8wUG1ok9J6TxD6sVjqxDD-1h0GQhphrosIcgNNoCW7SRWxZQRtGH4R7TOfydJPsCLJdWNzMqKLiUkgPwnMYd9QFLEM3jAY0aicSkmIk9OHF71_DQGlZhd8hho7LiEzu7PofB9V_sJ77noVOT0-WjWvrascQ1XYDNSbIu5qF4z6tQWzLhAewcPnKgrHQlaFaiLyf9YrDw-J_8Mplxkqla1REh199iqma2ZH7MluJ5LO1e1Anq4XyrZSGN65m_OaXm9A02fRgiHnbUKj_5BvsGRiODSrwrtU7RdcxCqOkXAYPw",
  "payload": ""
}
2024-04-25 05:02:30,029:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591256287 HTTP/1.1" 200 811
2024-04-25 05:02:30,030:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:11 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sW-8q43NrIPb7RyRQ2Ml2MCm1nzEq978Z4Ywjfdtkpw2L8zlgFE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-05-01T20:40:19Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/K-RCZw",
      "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/Qx_SSA",
      "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/92J4RA",
      "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI"
    }
  ]
}
2024-04-25 05:02:30,030:DEBUG:acme.client:Storing nonce: sW-8q43NrIPb7RyRQ2Ml2MCm1nzEq978Z4Ywjfdtkpw2L8zlgFE
2024-04-25 05:02:30,031:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-25 05:02:30,031:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-04-25 05:02:30,032:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-25 05:02:30,032:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-25 05:02:30,033:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:02:30,033:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-25 05:02:30,033:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-25 05:02:30,034:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-25 05:02:30,035:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:02:30,084:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-25 05:02:30,291:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-25 05:02:30,292:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-25 05:02:30,293:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-25 05:02:30,297:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:41 UTC.
2024-04-25 05:02:30,297:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-25 05:02:30,298:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-25 05:02:30,302:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x053A5A90>
Prep: True
2024-04-25 05:02:30,303:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x053A5A90> and installer None
2024-04-25 05:02:30,303:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-25 05:02:30,308:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-25 05:02:30,309:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-25 05:02:30,311:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-25 05:02:30,970:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-25 05:02:30,971:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:12 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "3qHqzgKZXPY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-25 05:02:30,971:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-25 05:02:35,237:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7891_key-certbot.pem
2024-04-25 05:02:39,269:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7889_csr-certbot.pem
2024-04-25 05:02:39,270:DEBUG:acme.client:Requesting fresh nonce
2024-04-25 05:02:39,270:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-25 05:02:39,490:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-25 05:02:39,490:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:21 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sW-8q43NUah1NWYTK0B3ykkdu_ZWI0V2S511c5HPN0Ik7qd_Mu8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-25 05:02:39,490:DEBUG:acme.client:Storing nonce: sW-8q43NUah1NWYTK0B3ykkdu_ZWI0V2S511c5HPN0Ik7qd_Mu8
2024-04-25 05:02:39,491:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-25 05:02:39,496:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05VYWgxTldZVEswQjN5a2tkdV9aV0kwVjJTNTExYzVIUE4wSWs3cWRfTXU4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "btPPHnNb0JDj2pdc528Rg6pb54LVHWngzhDmWDElpdX9UJrFWmmaH3viqY0jRV6DIEWZknVD8tvuEmzVP-zjXfrrTZe1e3DdHTzUTqWRExvEnrYveWtY5RQyTLMKpORen-RENked_harSi8xx_e2-N0ItaQ3fCrmjGxMr0mh4jGEdmFf9NG9IsVIaUhlhuxR7L3lSRTPLQPE2INR29Xjrt_EDHj7MUeFrku0mv9E9OrafxWDOIUhs94YFyx9iU0D4CFj4MUkD8jZgjszhD2wfW16_MJKoT6hZmEUmWymx-ijKE5K8t-db3YVTGZ556arLP7Yj2s5VRRloAPlgkNqcg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-04-25 05:02:39,737:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-04-25 05:02:39,738:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 25 Apr 2024 03:03:21 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786169497
Replay-Nonce: sW-8q43NylhJvqTDKS-jc_rIsSlZHtYg83ENWH1k6d13ceJ3raY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-05-01T20:40:30Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591303867"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786169497"
}
2024-04-25 05:02:39,738:DEBUG:acme.client:Storing nonce: sW-8q43NylhJvqTDKS-jc_rIsSlZHtYg83ENWH1k6d13ceJ3raY
2024-04-25 05:02:39,738:DEBUG:acme.client:JWS payload:
b''
2024-04-25 05:02:39,744:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591303867:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M055bGhKdnFUREtTLWpjX3JJc1NsWkh0WWc4M0VOV0gxazZkMTNjZUozcmFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzMDM4NjcifQ",
  "signature": "cAAF_2Ss9gWZhtIg0HUeMbiuYQvOpFovyr-kVWdY5exDo07N4wu-BSI1JvjTCxm1qc3g5GFloTEgWI14XG_FC46j6GUi0I_tjp2T_LOi39FuFzs3CrWqr0g4l7TqDyyLKqegPltZP2-3CzQyi9IALW0Q-3pASb6IU5QMVQpZR0C_iEVtyiHnT4tqR3fq6Lc7B4y60ITWBci_SXVjElqpYNnsnbsEWuCdDMIEIUF-cM8ELxdv_-pfODCBYuBI9ao_rJmjn2v3O5xoLESBs7C04JJ9YTPvk--KaxP97vljscFCY7TBw6_wPi5TXV4DBNXE6GNi5AyjE9Wq9otZgmtu4A",
  "payload": ""
}
2024-04-25 05:02:39,967:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591303867 HTTP/1.1" 200 810
2024-04-25 05:02:39,968:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:21 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1Th9QjupgO3KPyo6bYdhHamP4QSTOWTcUBMFxz_zXGW_5T33LqI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-05-01T20:40:30Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/fVMRLg",
      "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/q_0-Ew",
      "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/G3BN_A",
      "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0"
    }
  ]
}
2024-04-25 05:02:39,968:DEBUG:acme.client:Storing nonce: 1Th9QjupgO3KPyo6bYdhHamP4QSTOWTcUBMFxz_zXGW_5T33LqI
2024-04-25 05:02:39,969:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-25 05:02:39,969:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-04-25 05:02:39,969:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-25 05:02:39,970:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-25 05:02:39,970:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:02:39,970:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-25 05:02:39,971:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-25 05:02:39,971:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-25 05:02:39,972:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:02:40,014:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-25 05:02:40,216:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-25 05:02:40,218:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-04-25 05:02:40,219:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-04-25 05:02:40,223:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:58 UTC.
2024-04-25 05:02:40,223:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-25 05:02:40,224:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-25 05:02:40,228:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x050A75D0>
Prep: True
2024-04-25 05:02:40,229:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x050A75D0> and installer None
2024-04-25 05:02:40,229:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-25 05:02:40,233:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-25 05:02:40,233:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-25 05:02:40,235:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-25 05:02:40,820:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-25 05:02:40,821:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:22 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "D7ojY9j-AH4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-25 05:02:40,821:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-25 05:02:45,147:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7892_key-certbot.pem
2024-04-25 05:02:49,148:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7890_csr-certbot.pem
2024-04-25 05:02:49,149:DEBUG:acme.client:Requesting fresh nonce
2024-04-25 05:02:49,149:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-25 05:02:49,354:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-25 05:02:49,355:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:30 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMpuHX1BsATdPSjCxlrT5tCzbVtWwufyvgtAKkEwbZhKPE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-25 05:02:49,355:DEBUG:acme.client:Storing nonce: FUnC6kMpuHX1BsATdPSjCxlrT5tCzbVtWwufyvgtAKkEwbZhKPE
2024-04-25 05:02:49,355:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-25 05:02:49,361:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXB1SFgxQnNBVGRQU2pDeGxyVDV0Q3piVnRXd3VmeXZndEFLa0V3YlpoS1BFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ZXEjnKwhur3zWAaVoXzy-ASuIYBQ7c2bTgV61CJs2pjhArzgb6LYHJ_zyP54b6Q-tQBLEli_fGp6a5GRkpzLK2JUFOgKVzPjjZy4fNk_SZRhnu-Y067hLEs35L0OgdAbpJZoZEmFjTyMcLHCYB6qNoozKmccJLekek-vD1GXhJnZ6Aq4HT1Y8-6pH3uX1hu3FYIg69z0IAmDa5yZqT2I5NWpaXP8eNzNLA_3pjJQ81prBQCBi4AN9iVQwwfDjBjPLdabsENQMvSgbaroSmnDEPDNetwEIqdoa4bmv_3O1IwB4R1GxGWUeRjZXlGfTsHER7py6pzTj6OyngIkt-7OSw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-04-25 05:02:49,659:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-04-25 05:02:49,660:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 25 Apr 2024 03:03:31 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786200537
Replay-Nonce: Y89UXNyaF6PumXqZQWullKeIn9IN15Xs6wBg82XtlUhZgK0i9RY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-05-01T20:40:41Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591349607"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786200537"
}
2024-04-25 05:02:49,660:DEBUG:acme.client:Storing nonce: Y89UXNyaF6PumXqZQWullKeIn9IN15Xs6wBg82XtlUhZgK0i9RY
2024-04-25 05:02:49,661:DEBUG:acme.client:JWS payload:
b''
2024-04-25 05:02:49,666:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591349607:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFGNlB1bVhxWlFXdWxsS2VJbjlJTjE1WHM2d0JnODJYdGxVaFpnSzBpOVJZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzNDk2MDcifQ",
  "signature": "X3HbBBtAcp2aTNr8-39enLM3IFeE3ANBfM01xLvJzD5461DEvM5YEVAu1U8fCHVcaPt93ZkhWpkOikqY7QadIrVblHl6mywyThn2iS63fLKuPYgy9IjKzcZak9zNkoa4NmL1VILtXfkRGR-M50T1m4Snnd_i2B16h2Pmka-C2r941LhG3rClDTH-14pV72phupVRo09FtS6CkOu4NvuIvrppWgiapzGnwp5ygZxWcSQxO35mBKSRDY6itaBt2KKgxExvVCa1K1ebgFDHqkxGVZVWsvtOpJgMbbI5zGYwIlGxxW3I9q5qhGsmDudFCCfKwR91KGmzk8lzfckhX1XoOw",
  "payload": ""
}
2024-04-25 05:02:49,930:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591349607 HTTP/1.1" 200 809
2024-04-25 05:02:49,930:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:31 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMpZqJX6agdVp13Z7zj9_SLNN1PwxdUP4Zaj0H-VxB0xd4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-05-01T20:40:41Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/oncY-g",
      "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/YKDY0A",
      "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/Xd0Giw",
      "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY"
    }
  ]
}
2024-04-25 05:02:49,930:DEBUG:acme.client:Storing nonce: FUnC6kMpZqJX6agdVp13Z7zj9_SLNN1PwxdUP4Zaj0H-VxB0xd4
2024-04-25 05:02:49,930:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-25 05:02:49,931:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-04-25 05:02:49,931:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-25 05:02:49,931:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-25 05:02:49,932:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:02:49,932:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-25 05:02:49,932:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-25 05:02:49,933:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-25 05:02:49,934:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:02:49,985:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-25 05:02:50,199:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-25 05:02:50,200:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is signed by the certificate's issuer.
2024-04-25 05:02:50,201:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD
2024-04-25 05:02:50,206:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:17 UTC.
2024-04-25 05:02:50,206:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-25 05:02:50,207:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-25 05:02:50,213:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04AD7D50>
Prep: True
2024-04-25 05:02:50,213:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04AD7D50> and installer None
2024-04-25 05:02:50,213:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-25 05:02:50,218:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-25 05:02:50,218:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-25 05:02:50,220:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-25 05:02:50,792:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-25 05:02:50,793:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:32 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "9roQavzn7nk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-25 05:02:50,794:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-25 05:02:54,897:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7893_key-certbot.pem
2024-04-25 05:02:58,927:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7891_csr-certbot.pem
2024-04-25 05:02:58,927:DEBUG:acme.client:Requesting fresh nonce
2024-04-25 05:02:58,927:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-25 05:02:59,125:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-25 05:02:59,126:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:40 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Y89UXNyaXRJ7EXdx6dGlJR0uDHVvIBkSkvx7kDdMXybYK4cgmHw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-25 05:02:59,126:DEBUG:acme.client:Storing nonce: Y89UXNyaXRJ7EXdx6dGlJR0uDHVvIBkSkvx7kDdMXybYK4cgmHw
2024-04-25 05:02:59,126:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-25 05:02:59,132:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFYUko3RVhkeDZkR2xKUjB1REhWdklCa1Nrdng3a0RkTVh5YllLNGNnbUh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "XBC-x-BIncSeaLil96_l2VAOjrWaEspBVeZ-_KZn9zZrxSPjdw7-z8-jvsciFCWGCczuIuTyW4D_iyZwMHroBxP3BWqlKRNVROaE4yc-8s1oxVRQ1jlzYtxkj2Spk7HlGSdhw91q9ttIWTU9EqV2jUYu7CAlszHAYAXUYo6ygxHpQCMaIMa5ULE0Q-36afMoa-T8o6wPYhAqedRVAWEV5IyTA6kCmpIJV8WbFC_9lNYqdOKcG0BimqOn8a53kqIOUnwNMdRq9GWw9RMumXLLStZ2O-f1NgL6xCa-Lclrqpxya92qcPICpBK-bxiEiS_BmUAg8S02wIstfgVPMjTISQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-25 05:02:59,348:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-04-25 05:02:59,349:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 25 Apr 2024 03:03:40 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786231497
Replay-Nonce: Y89UXNyap_wdjf3CXS4XS8_AB2Y2CW5IdpFmpp25X7qhwPwCvdw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-05-01T20:40:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591394247"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786231497"
}
2024-04-25 05:02:59,349:DEBUG:acme.client:Storing nonce: Y89UXNyap_wdjf3CXS4XS8_AB2Y2CW5IdpFmpp25X7qhwPwCvdw
2024-04-25 05:02:59,349:DEBUG:acme.client:JWS payload:
b''
2024-04-25 05:02:59,355:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591394247:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFwX3dkamYzQ1hTNFhTOF9BQjJZMkNXNUlkcEZtcHAyNVg3cWh3UHdDdmR3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzOTQyNDcifQ",
  "signature": "WbyDoQtIno6SukzcGDOUwiyu9rrHtH4-jXH6BCsQDfiMTvYgm_e4Oa8og4CAYp2Y1pFzDUE5vd9-EDJv3eB_Mdsv4Cd5NXnoGLZcFKAyOYWvv3n1DUTBitkNzxZqBU4d2XNSSKlGz-hCL5fuYZ7ealac21s7jnFYZdwk7WuH77dEwvAZniAc29uFJMG2jhqKZLhSULJ9hxPYpZiYxksvllCGUwU_BIXIUuwBQx0vTz1RsX7FA73aBrbzLsTP1bYJ0QAju6oaM6GS8gw3O6wK0W1P4MABkbDw1T24U6cVIEGT5ysGRCIhjvfXdt49lMIzg-jxHs85vLDNsBIjntYtWg",
  "payload": ""
}
2024-04-25 05:02:59,563:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591394247 HTTP/1.1" 200 805
2024-04-25 05:02:59,564:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:41 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMpHOTYbVL-sihJfVL2nQVqmXwitn_5qF8PvmsoIy6fFus
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-05-01T20:40:52Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/ePyIlw",
      "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/TCtJEA",
      "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/RorkVg",
      "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY"
    }
  ]
}
2024-04-25 05:02:59,564:DEBUG:acme.client:Storing nonce: FUnC6kMpHOTYbVL-sihJfVL2nQVqmXwitn_5qF8PvmsoIy6fFus
2024-04-25 05:02:59,564:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-25 05:02:59,565:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-04-25 05:02:59,565:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-25 05:02:59,566:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-25 05:02:59,566:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:02:59,566:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-25 05:02:59,567:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-25 05:02:59,567:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-25 05:02:59,568:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:02:59,609:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-25 05:02:59,864:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-25 05:02:59,866:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is signed by the certificate's issuer.
2024-04-25 05:02:59,867:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD
2024-04-25 05:02:59,871:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:34 UTC.
2024-04-25 05:02:59,872:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-25 05:02:59,872:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-25 05:02:59,883:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04AB81D0>
Prep: True
2024-04-25 05:02:59,884:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04AB81D0> and installer None
2024-04-25 05:02:59,884:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-25 05:02:59,901:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-25 05:02:59,902:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-25 05:02:59,904:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-25 05:03:00,490:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-25 05:03:00,490:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:42 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Ommrjgn86qQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-25 05:03:00,491:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-25 05:03:04,582:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7894_key-certbot.pem
2024-04-25 05:03:08,527:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7892_csr-certbot.pem
2024-04-25 05:03:08,528:DEBUG:acme.client:Requesting fresh nonce
2024-04-25 05:03:08,528:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-25 05:03:08,734:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-25 05:03:08,734:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:50 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMp0GrmO3TdpNAShgCAAY4dPfNrq2Sy4ZwD4uPL1IVFrM8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-25 05:03:08,734:DEBUG:acme.client:Storing nonce: FUnC6kMp0GrmO3TdpNAShgCAAY4dPfNrq2Sy4ZwD4uPL1IVFrM8
2024-04-25 05:03:08,735:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-25 05:03:08,744:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXAwR3JtTzNUZHBOQVNoZ0NBQVk0ZFBmTnJxMlN5NFp3RDR1UEwxSVZGck04IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "wdflmcL6cQpiwMFW7Ec_3MPCKz2uh0bIki4Jf9YRlFJlrjr5HYJ1dNAwleGGbAc5YLw6iV272ybSvBd1TRt5SaH2DxPDK-4zB_ALQigeMbuHB-XDZCnPr6Q0_g2aDH63VlNuTxH1IJIhRWcOItxOYdb3d-w0Tdre49Xhl6j6apAEgYOzYiETmcLWcdJBsjjIRBRRKRsQ8CXjf5Cl2UwQTu1xL1sCoSoBGgHaTlpVy64kIySNNTJXwN04DyOktoXb8U3po3CUcR68o_dGF10EE5zhSuBEv9iLy3Dx1l4QkxPWU-DcLocvHuICPekP7VBLn1ldoMYGXqbNV7EzgPhYLA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-25 05:03:08,960:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-04-25 05:03:08,961:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 25 Apr 2024 03:03:50 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786267447
Replay-Nonce: Y89UXNya9wHVkN9HvDpvZuVEA3gWPmIOjM6TmLECAYotbaNDJJU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-05-01T20:41:03Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591444387"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786267447"
}
2024-04-25 05:03:08,961:DEBUG:acme.client:Storing nonce: Y89UXNya9wHVkN9HvDpvZuVEA3gWPmIOjM6TmLECAYotbaNDJJU
2024-04-25 05:03:08,961:DEBUG:acme.client:JWS payload:
b''
2024-04-25 05:03:08,966:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591444387:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWE5d0hWa045SHZEcHZadVZFQTNnV1BtSU9qTTZUbUxFQ0FZb3RiYU5ESkpVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTE0NDQzODcifQ",
  "signature": "FGyNt2yxDtbCCUt8p26vueXWZRTuBonaV4tS7z5d4Utx6YGM_2YjWCgUkk3nyWqZegnSKR0khuep2lWQWi73TqIXQM7jQj7iO_J1Tmx2dTd0rCNcekPSxHRIx5-SpiowNJZMIaXblpoyeMjTH4Cix_sOH1qY9ZFxBA2428AVU1xnRLOO9xd8Pw_SAyOKuqJMq_Em-d3efuUW0PX76R-q-yvMIRyPE6dgBLN0_fQUsbfGc_W-VtyxyDacH86japxclLXej-38oNd1AeJErJ2GLvvg2AFsaZLks4lYhMrRg_czuXqJTah2MsIWT8f2VSZBZv3eeMOYghKQSVp1hIT3ZA",
  "payload": ""
}
2024-04-25 05:03:09,169:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591444387 HTTP/1.1" 200 805
2024-04-25 05:03:09,170:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:50 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Y89UXNyaiKOHzrkjkLbiCWuA9Qw3pkpgD9f7Mk_FKjkY5tI6l-s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-05-01T20:41:03Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/VwZ0tQ",
      "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/OQQw2Q",
      "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/x6ddUg",
      "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg"
    }
  ]
}
2024-04-25 05:03:09,170:DEBUG:acme.client:Storing nonce: Y89UXNyaiKOHzrkjkLbiCWuA9Qw3pkpgD9f7Mk_FKjkY5tI6l-s
2024-04-25 05:03:09,170:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-25 05:03:09,171:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-04-25 05:03:09,171:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-25 05:03:09,171:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-25 05:03:09,172:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:03:09,172:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-25 05:03:09,172:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-25 05:03:09,173:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-25 05:03:09,174:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:03:09,213:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-04-25 05:03:09,428:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-04-25 05:03:09,429:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-04-25 05:03:09,430:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-04-25 05:03:09,434:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:48 UTC.
2024-04-25 05:03:09,434:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-04-25 05:03:09,435:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-04-25 05:03:09,439:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0507F2D0>
Prep: True
2024-04-25 05:03:09,439:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0507F2D0> and installer None
2024-04-25 05:03:09,440:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-04-25 05:03:09,444:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-04-25 05:03:09,445:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-04-25 05:03:09,447:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-04-25 05:03:10,029:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747
2024-04-25 05:03:10,030:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:03:51 GMT
Content-Type: application/json
Content-Length: 747
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "qYJMNNqgTFE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-04-25 05:03:10,030:INFO:certbot._internal.main:Renewing an existing certificate
2024-04-25 05:03:14,322:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7895_key-certbot.pem
2024-04-25 05:03:18,319:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7893_csr-certbot.pem
2024-04-25 05:03:18,320:DEBUG:acme.client:Requesting fresh nonce
2024-04-25 05:03:18,320:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-04-25 05:03:18,516:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-04-25 05:03:18,516:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:04:00 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: FUnC6kMpbowUC9gOEYuKP1KgZCDhWOTOyiiWYmpd4-2x-4BtvyA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-04-25 05:03:18,517:DEBUG:acme.client:Storing nonce: FUnC6kMpbowUC9gOEYuKP1KgZCDhWOTOyiiWYmpd4-2x-4BtvyA
2024-04-25 05:03:18,517:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-04-25 05:03:18,522:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBib3dVQzlnT0VZdUtQMUtnWkNEaFdPVE95aWlXWW1wZDQtMngtNEJ0dnlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "bTzT-4YnegCaWhlzMXPHcDs7jqrzCwoFjEqX08sG6fBz3-GLgPnm1jOkk2vKkM2QUDc3YRf9txZqBcPPFemIJwAPajeiAKtyZmI0nGepj5U1VZbgbTa_u3-q4RjMwj6yx66azd-1JD1GMmafqFrY05ugjYqzglNPFP0ZMotgxe7y6eX85A55t9BF47_t3kd5kt0p4VFQIfnHLLujnoY7U39PSozfqiAOlo6jcS98hUlEhcoKLjUvNP4E0hzEpTyGJu0poMUq8KSqW5iWbMn7HPrMW9CCRjcHS0tlqfh-X0Eu1i3GBMgCH3m9e9T6UJ0WTAb1hlfR8OGvKIEELVNd5w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-04-25 05:03:18,733:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-04-25 05:03:18,734:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 25 Apr 2024 03:04:00 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786306657
Replay-Nonce: FUnC6kMpSrbw8UwM6vuYJMgoXe0-2h2LZwUgRfJRtpo4rBKRfv0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-05-01T20:41:14Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591499197"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786306657"
}
2024-04-25 05:03:18,734:DEBUG:acme.client:Storing nonce: FUnC6kMpSrbw8UwM6vuYJMgoXe0-2h2LZwUgRfJRtpo4rBKRfv0
2024-04-25 05:03:18,734:DEBUG:acme.client:JWS payload:
b''
2024-04-25 05:03:18,743:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591499197:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBTcmJ3OFV3TTZ2dVlKTWdvWGUwLTJoMkxad1VnUmZKUnRwbzRyQktSZnYwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTE0OTkxOTcifQ",
  "signature": "Fzy-z0SoeZEMb_xy2TtQQrMhrwqbD-srfHpvQ0FwsWCtrL0Ca35I2u4MOlzaflxp5UDsM2yyMhaR14Zs6aS-pluzGRMrMKj-LeHJzOMD1S6fU6sb9D1iAYe08UbC3w9sR14gekOaS5qLivxOjP-B9N29mL7MvoKc9VJ70Eim2HxewChAXcp8ayhIm4h_K8xn0pXpEMLmiTwFI0s93_oy4PSZs0rhxbxL61uC2LwFZWW2nxrg7a1wtLUCqRsPPcqi36dOSUvwHHHBhbWSTEhcukkZEYf2gj7IYejRRsHZbzTXwBUMT6mBlOuaalVlbI3Iw45Fn1aweR9F9hp3d7YLBQ",
  "payload": ""
}
2024-04-25 05:03:18,943:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591499197 HTTP/1.1" 200 805
2024-04-25 05:03:18,944:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 25 Apr 2024 03:04:00 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Y89UXNya0xRIvSD1Gm_BTpnt6Fd8QrGp5gE2SMkmsBHO7dZyvHQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-05-01T20:41:14Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/wllBug",
      "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/l8TEMw",
      "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/3h01xg",
      "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo"
    }
  ]
}
2024-04-25 05:03:18,944:DEBUG:acme.client:Storing nonce: Y89UXNya0xRIvSD1Gm_BTpnt6Fd8QrGp5gE2SMkmsBHO7dZyvHQ
2024-04-25 05:03:18,944:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-04-25 05:03:18,944:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-04-25 05:03:18,944:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-04-25 05:03:18,944:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-04-25 05:03:18,945:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:03:18,945:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-04-25 05:03:18,945:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-04-25 05:03:18,946:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-04-25 05:03:18,947:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-04-25 05:03:18,947:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-04-25 05:03:18,947:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-04-25 05:03:18,959:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-04-25 05:03:18,961:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)