2024-02-12 20:40:10,230:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-02-12 20:40:10,231:DEBUG:certbot._internal.main:Arguments: []
2024-02-12 20:40:10,231:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-02-12 20:40:11,037:DEBUG:certbot._internal.log:Root logging level set at 20
2024-02-12 20:40:11,037:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-02-12 20:40:11,074:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x043E4230> and installer <certbot._internal.cli.cli_utils._Default object at 0x043E4230>
2024-02-12 20:40:11,114:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-12 20:40:11,347:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-12 20:40:11,359:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer.
2024-02-12 20:40:11,364:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD
2024-02-12 20:40:11,372:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC.
2024-02-12 20:40:11,372:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-12 20:40:11,372:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-12 20:40:11,377:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03E67350>
Prep: True
2024-02-12 20:40:11,378:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03E67350> and installer None
2024-02-12 20:40:11,378:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-12 20:40:11,384:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-12 20:40:11,385:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-12 20:40:11,387:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-12 20:40:11,953:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-12 20:40:11,954:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:10 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "04no_bcJ738": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-12 20:40:11,955:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-12 20:40:16,631:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7545_key-certbot.pem
2024-02-12 20:40:20,835:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7543_csr-certbot.pem
2024-02-12 20:40:20,836:DEBUG:acme.client:Requesting fresh nonce
2024-02-12 20:40:20,836:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-12 20:40:21,019:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-12 20:40:21,020:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:20 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 63lPIS7zMSfK9DppWkEE6eVUhlRAb4l81gFiVE4XanQfrXnUF_I
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-12 20:40:21,020:DEBUG:acme.client:Storing nonce: 63lPIS7zMSfK9DppWkEE6eVUhlRAb4l81gFiVE4XanQfrXnUF_I
2024-02-12 20:40:21,021:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-12 20:40:21,031:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pNU2ZLOURwcFdrRUU2ZVZVaGxSQWI0bDgxZ0ZpVkU0WGFuUWZyWG5VRl9JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "PTQzZaBxu2YqmLDlyW4ySiETm-t5yiL7T1ek4Hx15Lna0K-nYX2yoM2Oh-btXcU2u0i0X0UDlo-JHA6xEbHyOyew92UbUTEp5JqB6jjjs1cHejfy9grRo6kxng1AZy6qm5aAuQ7hfAMFa1ByqpJ9ifAg4GlYOFh7h9PhlY3jLARWYhyblLhJeZoCpjDEi2hKE_KEzu0eCOKJwRpL-JlWtt2D-LZIF6p5AMn9MhHujqe6U_JBQ9PSLxBSvPG2hIBoioLF2jnWetVfkAh4sSmIkIEdt9q1YWF0xc1Zx4kL3aHbo806NSnVIMmLI5-nFNOOayW7Hmoy9pl2IuNe8GwI6Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-12 20:40:21,225:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-02-12 20:40:21,225:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 12 Feb 2024 19:40:20 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256281307
Replay-Nonce: HpY91-GpVUdYKcXmum3KY5htkeTjyIyRBc9WtaKS0AkLQTUQhmo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-17T02:26:39Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540442217"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256281307"
}
2024-02-12 20:40:21,226:DEBUG:acme.client:Storing nonce: HpY91-GpVUdYKcXmum3KY5htkeTjyIyRBc9WtaKS0AkLQTUQhmo
2024-02-12 20:40:21,226:DEBUG:acme.client:JWS payload:
b''
2024-02-12 20:40:21,232:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540442217:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BWVWRZS2NYbXVtM0tZNWh0a2VUanlJeVJCYzlXdGFLUzBBa0xRVFVRaG1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA0NDIyMTcifQ",
  "signature": "M4TlIePjBdab60iWZpZUq8TTiontoVHlf2AG1KI2bkkD_rxf08Ti6ItxWbfqGMHlEjvUZLxYnypnYrxPcRqxOVq46vnhexZk3NlptGthzu0jMYZ9S-jnAPvHU6x6ncWtVfQHX0s5poJ-TZQfwqU_WoqpXC8v7NBmJClVoA_qdD8rvSPDoYL0c7TPYP0B9fRN0Mtusgnqj_mj1FF2HkSrrJD7Y3YAsAM5SuuhUa7KFTQ3U5qIDKH4_A8afdM88nBk4bMVwPQ-4mMX0SQU71aRmu69ombb2B9OfyPrYHiSWq5CIUwiAYyXA0VCrCr_c7S0IBoElIgnr6gGup6IFI1McQ",
  "payload": ""
}
2024-02-12 20:40:21,430:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540442217 HTTP/1.1" 200 810
2024-02-12 20:40:21,430:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:20 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HpY91-GpfA3C8b0g4RUS9xm6kEwqPtlP4HaDVFM_frKfsrqTMcA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-17T02:26:39Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/D1FeaA",
      "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/-mx8SQ",
      "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/azK9Sg",
      "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs"
    }
  ]
}
2024-02-12 20:40:21,430:DEBUG:acme.client:Storing nonce: HpY91-GpfA3C8b0g4RUS9xm6kEwqPtlP4HaDVFM_frKfsrqTMcA
2024-02-12 20:40:21,431:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-12 20:40:21,431:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-02-12 20:40:21,432:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-12 20:40:21,432:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-12 20:40:21,446:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:40:21,446:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-12 20:40:21,446:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-12 20:40:21,447:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-12 20:40:21,452:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:40:21,492:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-12 20:40:21,735:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-12 20:40:21,738:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-12 20:40:21,740:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-12 20:40:21,749:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC.
2024-02-12 20:40:21,749:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-12 20:40:21,750:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-12 20:40:21,755:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03D6CFF0>
Prep: True
2024-02-12 20:40:21,755:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03D6CFF0> and installer None
2024-02-12 20:40:21,755:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-12 20:40:21,766:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-12 20:40:21,766:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-12 20:40:21,767:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-12 20:40:22,231:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-12 20:40:22,232:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:21 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "R5fJpjeBV_A": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-12 20:40:22,233:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-12 20:40:26,333:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7546_key-certbot.pem
2024-02-12 20:40:30,311:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7544_csr-certbot.pem
2024-02-12 20:40:30,312:DEBUG:acme.client:Requesting fresh nonce
2024-02-12 20:40:30,312:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-12 20:40:30,476:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-12 20:40:30,477:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:29 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6HUcA-o5H8GJy1r69xv1lfxGYiZCrIM12-Lzs8G5PTEQQ5lBCu0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-12 20:40:30,477:DEBUG:acme.client:Storing nonce: 6HUcA-o5H8GJy1r69xv1lfxGYiZCrIM12-Lzs8G5PTEQQ5lBCu0
2024-02-12 20:40:30,478:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-12 20:40:30,484:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVIOEdKeTFyNjl4djFsZnhHWWlaQ3JJTTEyLUx6czhHNVBURVFRNWxCQ3UwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "LOzdPE-Uza1yWy8v0H8IZYZLAQDMuNmAVO6CvEIT93dpZ3XF9RYvkljn7xD6pCb05HNKUKmis9PUQAzXT-F6pnBbYQBOduBKDKy1poOfGL2aOxthdulF5Fu3BQ2T5ppN9UEIdlZQeAYWNKBKlKIpSRscAqrn1x00WjLvzihydH8EZJzlSDCQHU44StuIPsijYJsNjrzWujqMTnLGdQcWe7R208Xm5Ey7QaaTkkj9lYzLaIUTaBl3V4301C0W8FxnXvnt6qCTgJT3L7JCCz65lOxy-V_pUkWQp7xkv7v70MIYNvXlbVEi4MlkgkgYpLvhYZstUC7jGlvAB0E31ntPgg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-12 20:40:30,729:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-02-12 20:40:30,730:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 12 Feb 2024 19:40:29 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256306347
Replay-Nonce: 6HUcA-o5Zl4rkMwoMrZxgjiVRe310Nq44oWIxKkqdnSC6M3W_XI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-17T02:26:49Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540477517"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256306347"
}
2024-02-12 20:40:30,731:DEBUG:acme.client:Storing nonce: 6HUcA-o5Zl4rkMwoMrZxgjiVRe310Nq44oWIxKkqdnSC6M3W_XI
2024-02-12 20:40:30,731:DEBUG:acme.client:JWS payload:
b''
2024-02-12 20:40:30,739:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540477517:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVabDRya013b01yWnhnamlWUmUzMTBOcTQ0b1dJeEtrcWRuU0M2TTNXX1hJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA0Nzc1MTcifQ",
  "signature": "x-j5ZO4GGLkzSdDXcK09kEMIxZhp6v-XuI861fXNAPh4QSKstwmdd5PNOZR8T9kVWVoeXZVIw1ECsQmB5_bdvc264nBRqgajlkCI-PDuTEp1Ov8Bqzmma3ecMFpRP9UUWJvE9z2QaLyBFvSC5QlFrNTEHTviUhxPPEycmihA7Oa1BURC0Qpu1Zha1tLovb5u6SM88bRFS4N9B0_xWdSrwzEilgoDaHA2rU91luime1GkwuFDYXTzmyW8Zze-KVP4vauT8NXcv_HlvM-BDXfiY7dTNTjGp5RA0Awh_E0FXq981gnPp6JpXPW2R8fWYZHzZI56LB53hxYxsbztjOwd7g",
  "payload": ""
}
2024-02-12 20:40:30,921:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540477517 HTTP/1.1" 200 804
2024-02-12 20:40:30,922:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:29 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6HUcA-o5CRSHuTnH9TQT5eMqxtcDv84Dc9fIX6b3WlatjjmL4go
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-17T02:26:49Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/zBe4Yw",
      "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/jvutYw",
      "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/9Dli9w",
      "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU"
    }
  ]
}
2024-02-12 20:40:30,922:DEBUG:acme.client:Storing nonce: 6HUcA-o5CRSHuTnH9TQT5eMqxtcDv84Dc9fIX6b3WlatjjmL4go
2024-02-12 20:40:30,924:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-12 20:40:30,924:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-02-12 20:40:30,925:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-12 20:40:30,925:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-12 20:40:30,926:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:40:30,926:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-12 20:40:30,927:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-12 20:40:30,927:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-12 20:40:30,930:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:40:30,981:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-12 20:40:31,370:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-12 20:40:31,373:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-12 20:40:31,374:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-12 20:40:31,381:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC.
2024-02-12 20:40:31,381:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-12 20:40:31,381:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-12 20:40:31,386:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03EABA90>
Prep: True
2024-02-12 20:40:31,386:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03EABA90> and installer None
2024-02-12 20:40:31,386:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-12 20:40:31,404:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-12 20:40:31,404:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-12 20:40:31,406:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-12 20:40:31,870:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-12 20:40:31,871:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:30 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "VAWrdm0lP5g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-12 20:40:31,871:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-12 20:40:36,495:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7547_key-certbot.pem
2024-02-12 20:40:40,280:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7545_csr-certbot.pem
2024-02-12 20:40:40,281:DEBUG:acme.client:Requesting fresh nonce
2024-02-12 20:40:40,281:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-12 20:40:40,441:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-12 20:40:40,442:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:39 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6HUcA-o5VeZblyVqWadz2RLC4dkoV80BLQvaMQ9mKCBxtUxzrDg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-12 20:40:40,442:DEBUG:acme.client:Storing nonce: 6HUcA-o5VeZblyVqWadz2RLC4dkoV80BLQvaMQ9mKCBxtUxzrDg
2024-02-12 20:40:40,443:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-12 20:40:40,450:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVWZVpibHlWcVdhZHoyUkxDNGRrb1Y4MEJMUXZhTVE5bUtDQnh0VXh6ckRnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "HXgPE5y_hkVwljQZ6PzPe6w5q7UJTZFexzo90e5zW4XKF0uHXoJSFuMvmnTuqncko8G_ePFG1rwyH6OSx17CQUFmTEvvwJsaZkAC6-P9rWmgPxn-3E3ccKlDKcrZ-htsaA7YpW_xinwUS3rqYY1MJkgbnsrKm4YuuQIch70ezX5gj5yzt3CzxW1CEqR1Qy6XmhZTKN7WsIZ-_l_f-Q_RFzn3TxIvfPOJkksn6sHFVyQWosCLGrmR0pjdv6TtbAtgrED1zpI5nkRfRnpHwN4y-SlKlDI0prCBqoVhCcvk1inKOPnmJ5segwDCeYFowp_Glp3QnTweN6IWr_pNnkJTRA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-12 20:40:40,725:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-02-12 20:40:40,726:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 12 Feb 2024 19:40:39 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256330697
Replay-Nonce: 6HUcA-o5sZUZx18EMGmrbqnuqTvWFaPCxoNE3jtlsbfCIS9irIo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-17T02:26:58Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540514237"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256330697"
}
2024-02-12 20:40:40,727:DEBUG:acme.client:Storing nonce: 6HUcA-o5sZUZx18EMGmrbqnuqTvWFaPCxoNE3jtlsbfCIS9irIo
2024-02-12 20:40:40,728:DEBUG:acme.client:JWS payload:
b''
2024-02-12 20:40:40,741:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540514237:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVzWlVaeDE4RU1HbXJicW51cVR2V0ZhUEN4b05FM2p0bHNiZkNJUzlpcklvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA1MTQyMzcifQ",
  "signature": "YJaLSdUocUKtJGnKAssJGdKrKt7Np-ierjltc9u_q9I7gTWtBAPHYdMnjylusYkkO-rkH64yBBeEp_pzf_d3A_oaJeezQ_JpkbKS1OqLV2ompFRS9NSaRe9mZaz7H-oRV9KxKy7f9W0683jbvqpI_r8uStOpXyugc4loD6WSbFt1tnAzQYhqEWJUV27yyN8OGhChR7AbPSLCxYdgbWNp705ANX1STbzY4NEJU80M1NyUzRQRgo2wZLAC1guFNjUpTKsK4eq-fK-tb1qmR4U45IE8luTbmZOJOcmz8qbQixsTPrvExZW40r092B4gnQu6a5LLx98jGr3P037P_bG4qw",
  "payload": ""
}
2024-02-12 20:40:40,896:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540514237 HTTP/1.1" 200 807
2024-02-12 20:40:40,897:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:39 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6HUcA-o59lOY4Uourjsg6IhRj4nv2LZPM8AwpH-QpVmWInRTln8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-17T02:26:58Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/y7Fh6A",
      "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/tfTCJQ",
      "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/pbKBOA",
      "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE"
    }
  ]
}
2024-02-12 20:40:40,897:DEBUG:acme.client:Storing nonce: 6HUcA-o59lOY4Uourjsg6IhRj4nv2LZPM8AwpH-QpVmWInRTln8
2024-02-12 20:40:40,898:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-12 20:40:40,898:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-02-12 20:40:40,898:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-12 20:40:40,898:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-12 20:40:40,899:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:40:40,899:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-12 20:40:40,899:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-12 20:40:40,900:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-12 20:40:40,901:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:40:40,951:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-12 20:40:41,138:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-12 20:40:41,140:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-12 20:40:41,142:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-12 20:40:41,147:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC.
2024-02-12 20:40:41,148:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-12 20:40:41,148:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-12 20:40:41,153:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03E479B0>
Prep: True
2024-02-12 20:40:41,153:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03E479B0> and installer None
2024-02-12 20:40:41,153:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-12 20:40:41,157:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-12 20:40:41,158:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-12 20:40:41,159:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-12 20:40:41,691:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-12 20:40:41,692:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:40 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "o_3aBzGnl_4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-12 20:40:41,693:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-12 20:40:45,527:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7548_key-certbot.pem
2024-02-12 20:40:49,481:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7546_csr-certbot.pem
2024-02-12 20:40:49,482:DEBUG:acme.client:Requesting fresh nonce
2024-02-12 20:40:49,482:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-12 20:40:49,661:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-12 20:40:49,662:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:48 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 63lPIS7zozuJ7QereImMERGHBDnfRudi2pX1P6L9BdaKoUEWn4w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-12 20:40:49,663:DEBUG:acme.client:Storing nonce: 63lPIS7zozuJ7QereImMERGHBDnfRudi2pX1P6L9BdaKoUEWn4w
2024-02-12 20:40:49,664:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-02-12 20:40:49,669:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pvenVKN1FlcmVJbU1FUkdIQkRuZlJ1ZGkycFgxUDZMOUJkYUtvVUVXbjR3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "uJjmbS08Bv_Rj9W7Cr17ojPCZGigHRzQw2ZMDWOMtcsR1JMfyHk9Ps0m31LnKl3TJksmU4_wbDYQZk2UBqZdkpc3tu8IOwK-4p2b0cTPvGCE1rCN-TuA7zNR6wVWjyYXX8ARCVC6QUOaCxIliMYt7aUlBZnfok2c1zPH9AQmZJnncXY-BEZ0r32tmamN9B-wEY_E9OwTXQ8SnxyxTJNiWCNH0nzIlk38pn3cMn80mnP3EyTj8RMzJ4A1ywq12rsxCWcicwnKb6PnPwg6LAvwvg55aZAilrfvTpGMYKBudzJd1WTbmEjMjd0hQMGCxWZTbo5cC1JoE6Ohj3F-E2dyuA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-12 20:40:49,857:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-02-12 20:40:49,858:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 12 Feb 2024 19:40:48 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256364097
Replay-Nonce: 63lPIS7zqsWzFwP7iLbMdYF16ynyc_jybTzNPFCIwMMCT8a51Gw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-17T02:27:07Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540559067"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256364097"
}
2024-02-12 20:40:49,858:DEBUG:acme.client:Storing nonce: 63lPIS7zqsWzFwP7iLbMdYF16ynyc_jybTzNPFCIwMMCT8a51Gw
2024-02-12 20:40:49,859:DEBUG:acme.client:JWS payload:
b''
2024-02-12 20:40:49,864:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540559067:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pxc1d6RndQN2lMYk1kWUYxNnlueWNfanliVHpOUEZDSXdNTUNUOGE1MUd3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA1NTkwNjcifQ",
  "signature": "VwsthjAzBAv2-ItOacPuDZ7CxOOyknVkg3YSmjR6ZpL4f4pWBWk8vNr0oq7bpgOHqLucLwi-ATB-Gxu7FLE_WVE1laHyf3qICt57GA4qqyJy3SYk32XkyZXgd789fAt-byik0W9K4HodARxZZ2R87pQgaQ7Vn5AiLauHc9M7Q_3bl2ZSVeJetZuVr2IsfYO8jPAzaKQqDTaQRwISbBFTE2uTkS1gU6EbWl47-zbl2YcoNS2V5Eul9YBFDLyW-4Ds-697sVv94b8OPZrh71ofq3FghKJijtdGP0rPtLfPBSOeUuNB6V5sYrgkPnH7uFnAg-WcxWyiQyPDbHkztQ1D5A",
  "payload": ""
}
2024-02-12 20:40:50,048:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540559067 HTTP/1.1" 200 801
2024-02-12 20:40:50,049:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:49 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HpY91-GpV4BvcNihAKgsbVbDp4u8aQXh0qcj2pG3--_95a_JCXY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-17T02:27:07Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/MBQGZA",
      "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/Aot2bg",
      "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/YelLvw",
      "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw"
    }
  ]
}
2024-02-12 20:40:50,050:DEBUG:acme.client:Storing nonce: HpY91-GpV4BvcNihAKgsbVbDp4u8aQXh0qcj2pG3--_95a_JCXY
2024-02-12 20:40:50,051:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-12 20:40:50,052:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-02-12 20:40:50,052:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-12 20:40:50,052:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-12 20:40:50,053:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:40:50,054:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-12 20:40:50,054:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-12 20:40:50,054:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-12 20:40:50,055:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:40:50,102:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-12 20:40:50,312:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-12 20:40:50,313:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-12 20:40:50,314:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-12 20:40:50,318:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC.
2024-02-12 20:40:50,319:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-12 20:40:50,319:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-12 20:40:50,324:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x038D4C10>
Prep: True
2024-02-12 20:40:50,324:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x038D4C10> and installer None
2024-02-12 20:40:50,324:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-12 20:40:50,340:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-12 20:40:50,341:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-12 20:40:50,343:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-12 20:40:50,893:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-12 20:40:50,894:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:49 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "1Tx2gymknTg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-12 20:40:50,895:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-12 20:40:55,016:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7549_key-certbot.pem
2024-02-12 20:40:58,804:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7547_csr-certbot.pem
2024-02-12 20:40:58,804:DEBUG:acme.client:Requesting fresh nonce
2024-02-12 20:40:58,805:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-12 20:40:58,987:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-12 20:40:58,988:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:58 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 63lPIS7z-UrUsVKpO7DCXJn1XnPNskOsNUrtAc-0Q1K2jn33e_E
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-12 20:40:58,988:DEBUG:acme.client:Storing nonce: 63lPIS7z-UrUsVKpO7DCXJn1XnPNskOsNUrtAc-0Q1K2jn33e_E
2024-02-12 20:40:58,989:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-12 20:40:58,998:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3otVXJVc1ZLcE83RENYSm4xWG5QTnNrT3NOVXJ0QWMtMFExSzJqbjMzZV9FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "yBrkvZrm3P_hdZ7TDu-4jqV1k3ssCdGRZmC_SReHp4Sfe09_GbIbPKnz2SGboLzkUBBBEXIAHEZqW7pu-DQSbXA2Qwi0ZvWz7Hba1AxJSdKo9i22xW8u_cFXjktf6q-YhjThNWa4eS3WVyVbwq-_H9LEcnlgsB2H8BbSnJHawWACm3QZx7iTwXlUhSjaWdEoqU4JcqN2AOumoyNl1WtBVEmWkTcjHwmAPNmielS2y84vgpsNMT9NAcExFjt6snIkDWXPX-qT_rfnUaOPSWpFHhfX6FImgds--xWC-35s4LpwX68JWBILGPJ-XLdJ7g2-lhjTQ2Uu_ngwz5KyoZReqw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-12 20:40:59,191:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-12 20:40:59,192:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 12 Feb 2024 19:40:58 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256394317
Replay-Nonce: 63lPIS7zWhpz-YpeHEboebGa_1xu3rM0mvHGcIuMkJTij5HxABk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-17T02:27:17Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540602497"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256394317"
}
2024-02-12 20:40:59,193:DEBUG:acme.client:Storing nonce: 63lPIS7zWhpz-YpeHEboebGa_1xu3rM0mvHGcIuMkJTij5HxABk
2024-02-12 20:40:59,193:DEBUG:acme.client:JWS payload:
b''
2024-02-12 20:40:59,206:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540602497:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pXaHB6LVlwZUhFYm9lYkdhXzF4dTNyTTBtdkhHY0l1TWtKVGlqNUh4QUJrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2MDI0OTcifQ",
  "signature": "N3NGnf8_6iM1nKtdDmhUQaNmWIR55Pw4MABPHP5bf9gB7Hg5aeO6Dzg89xyvuQeLbjxMMAmswGFhjq5ZlKn5_JZqZOyy8DL_n16emmLgpK7JBSGr-pD089a7xbB7v2AO4oV6qu6rUzonGb809G1jzA0Cpg1j9_BFfkqcmvVNrxlypZTvrV-pI2tcJaaeFxEStkRC-Xk33TP519mkBqp5wonME4UFzQh-56-G5ky1z3pRGGKwOdrFwB8OZwXKBYe0nkrnpeO5LtT8NCu8aZxiG9zdzO5BaT9vDennYb03GliaR_TxddFTt4I5R0rLcS-dL4Py-VFk1GHokrIbo_ef5Q",
  "payload": ""
}
2024-02-12 20:40:59,396:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540602497 HTTP/1.1" 200 805
2024-02-12 20:40:59,397:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:58 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 63lPIS7zA-C6mJZ6Si988Mc483SZ1Ou1OLmUyxjUn6UZNTOZiDU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-17T02:27:17Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/miLWNg",
      "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/oFvs1Q",
      "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/iyA7eA",
      "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg"
    }
  ]
}
2024-02-12 20:40:59,397:DEBUG:acme.client:Storing nonce: 63lPIS7zA-C6mJZ6Si988Mc483SZ1Ou1OLmUyxjUn6UZNTOZiDU
2024-02-12 20:40:59,398:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-12 20:40:59,398:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-02-12 20:40:59,399:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-12 20:40:59,399:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-12 20:40:59,400:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:40:59,400:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-12 20:40:59,400:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-12 20:40:59,400:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-12 20:40:59,402:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:40:59,449:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-12 20:40:59,646:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-12 20:40:59,648:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-12 20:40:59,649:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-12 20:40:59,656:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC.
2024-02-12 20:40:59,656:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-12 20:40:59,656:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-12 20:40:59,661:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03E67350>
Prep: True
2024-02-12 20:40:59,661:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03E67350> and installer None
2024-02-12 20:40:59,661:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-12 20:40:59,666:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-12 20:40:59,666:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-12 20:40:59,668:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-12 20:41:00,135:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-12 20:41:00,136:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:40:59 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "KWz-vpeCDDE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-12 20:41:00,137:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-12 20:41:04,000:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7550_key-certbot.pem
2024-02-12 20:41:07,837:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7548_csr-certbot.pem
2024-02-12 20:41:07,838:DEBUG:acme.client:Requesting fresh nonce
2024-02-12 20:41:07,838:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-12 20:41:07,992:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-12 20:41:07,992:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:07 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6HUcA-o51g5JLHOyc6y3icSgvKlsMfkVrNddSR5ZXrdkdO4EGEg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-12 20:41:07,993:DEBUG:acme.client:Storing nonce: 6HUcA-o51g5JLHOyc6y3icSgvKlsMfkVrNddSR5ZXrdkdO4EGEg
2024-02-12 20:41:07,993:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-12 20:41:07,998:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzUxZzVKTEhPeWM2eTNpY1Nndktsc01ma1ZyTmRkU1I1WlhyZGtkTzRFR0VnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "dznblc1Yjr7XkvVqXgPLqCD76cJvdbeIPNMsGB23X1TiUH6IpMXozKEskeRXyu_IJxGu4Em23z5U8zaygsvfJUvdcIvdFjaPmeXs1MrdwleiXbZXqvoeoQK8vdzarShqjHRkPTqqqy77cuOCc38tfrcWmF8Do2EQcCz42UWCP4Zo0teR77TYujy7PLvUw_wD0bB5K8Vjc3q2EBgGbcsf2iojnJ-Ljw0PjmFVb9TXAelGPGR3Bp6YPs4MBRY7ehNpbMfMP2laJ85RcGwwUxfGoRAggDPKKwL7ySA3wBdWKhzMBYarTA_Iyk9gG_Oed7UKP1j9XZaTxzgsUQM8i1a1og",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-12 20:41:08,167:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-02-12 20:41:08,168:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 12 Feb 2024 19:41:07 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256417567
Replay-Nonce: 6HUcA-o5uQnYSTguI5ta_UlzniHwsdoV__yK9AGJctrJ5-X0MGI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-17T02:27:26Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540637387"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256417567"
}
2024-02-12 20:41:08,168:DEBUG:acme.client:Storing nonce: 6HUcA-o5uQnYSTguI5ta_UlzniHwsdoV__yK9AGJctrJ5-X0MGI
2024-02-12 20:41:08,168:DEBUG:acme.client:JWS payload:
b''
2024-02-12 20:41:08,174:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540637387:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzV1UW5ZU1RndUk1dGFfVWx6bmlId3Nkb1ZfX3lLOUFHSmN0cko1LVgwTUdJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2MzczODcifQ",
  "signature": "U6iLkXg-XdJPSyFZLx9SvzNza05vcuaUn1r44vdmQSk8JitRfQw5ZnESguwGzEUrlAyv8b89dyT90-xmOlH-4fQuXcG2fXaRfCf_YLsQuuE2EsizRs4w-HaIrl5e0x-5mf1hQCUqVVARCkBjcLPV-8xbrG6KRWyBZ3znXBVSYSL-anwmnjUUDyZsCdBgwsjB-AscHcuNt0oXXa8ErBPKeSN-vIO9pF7xPlgtfoxG490p7TMpp6-KAqdO__I4ZgSaDxS4TUaX9fS-BPcYknndK-Zs2oQDBjuTDxKFHl2modNx4B2_syq1T-K0tW_v-eGHWd83daZN1YP1dmB2Wbh0uQ",
  "payload": ""
}
2024-02-12 20:41:08,354:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540637387 HTTP/1.1" 200 809
2024-02-12 20:41:08,355:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:07 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HWHXB1ulYu1Y5T4IKVhupx31As6M6SPLRtdX-LlnEA4lNEsHaJk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-17T02:27:26Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/K5ceNg",
      "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/h5pTLw",
      "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/S75ZSA",
      "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0"
    }
  ]
}
2024-02-12 20:41:08,355:DEBUG:acme.client:Storing nonce: HWHXB1ulYu1Y5T4IKVhupx31As6M6SPLRtdX-LlnEA4lNEsHaJk
2024-02-12 20:41:08,356:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-12 20:41:08,356:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-02-12 20:41:08,357:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-12 20:41:08,357:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-12 20:41:08,357:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:41:08,357:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-12 20:41:08,357:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-12 20:41:08,357:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-12 20:41:08,359:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:41:08,400:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-12 20:41:08,567:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-12 20:41:08,568:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-12 20:41:08,569:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-12 20:41:08,572:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC.
2024-02-12 20:41:08,572:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-12 20:41:08,572:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-12 20:41:08,577:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x043C5D70>
Prep: True
2024-02-12 20:41:08,577:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x043C5D70> and installer None
2024-02-12 20:41:08,578:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-12 20:41:08,582:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-12 20:41:08,583:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-12 20:41:08,585:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-12 20:41:09,043:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-12 20:41:09,044:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:08 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "hg_zEQgo6Pg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-12 20:41:09,044:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-12 20:41:13,113:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7551_key-certbot.pem
2024-02-12 20:41:17,029:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7549_csr-certbot.pem
2024-02-12 20:41:17,029:DEBUG:acme.client:Requesting fresh nonce
2024-02-12 20:41:17,030:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-12 20:41:17,182:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-12 20:41:17,183:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:16 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HWHXB1ul-8I1zw58P0t7ZPXl2mb27lcOzXLUo2F52d0bfTJt8GY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-12 20:41:17,183:DEBUG:acme.client:Storing nonce: HWHXB1ul-8I1zw58P0t7ZPXl2mb27lcOzXLUo2F52d0bfTJt8GY
2024-02-12 20:41:17,183:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-12 20:41:17,189:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWwtOEkxenc1OFAwdDdaUFhsMm1iMjdsY096WExVbzJGNTJkMGJmVEp0OEdZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Mo6Arbxej0AM5hbK2XwvYOWWZXFvIRIAHAzROAUdBpPH5wdg80Vbp28oJ78k52xoroLxirfKKGnE-wZheYSdsuoZzZGyvJpDanbjE5sfi3yoxxes-Yj9_jMQk8MgisRPzgTT_e9WAV_-otKO183PpaQD9c7F4WkUHoE8IAEdhy6VlqoPK5W3D8L1jTMQh91jN7-3of1DvajPDTt1_wnttCmQaSpRGOB0vEkaDkIFFzwmUBYHSP59FTO79rcJO0B1nUlCIyAdWNijiyK52cjNquh-zLPNuVO8TxrAjXpVKD1ulnyE4EeQFt9GH8XlG1GXKvolSC1QyLYeH0O3uVOulg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-12 20:41:17,360:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-02-12 20:41:17,361:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 12 Feb 2024 19:41:16 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256441417
Replay-Nonce: HWHXB1ulDE0Sqity36rKKSclsBd-ke5WoRy096D-GK9fejBc6ho
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-17T02:27:36Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540672207"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256441417"
}
2024-02-12 20:41:17,361:DEBUG:acme.client:Storing nonce: HWHXB1ulDE0Sqity36rKKSclsBd-ke5WoRy096D-GK9fejBc6ho
2024-02-12 20:41:17,362:DEBUG:acme.client:JWS payload:
b''
2024-02-12 20:41:17,371:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540672207:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxERTBTcWl0eTM2cktLU2Nsc0JkLWtlNVdvUnkwOTZELUdLOWZlakJjNmhvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2NzIyMDcifQ",
  "signature": "H6f23tHBTrPllg3KpVE-yDUFWZ767dhU53rWUr_RYTYohvmqmP6pzU1KambfOuys2pgw7LM1eFKbtUzU1Zl1U7abgKY0HDP-UvSwdGCckr3GgX-VVy4eF-hsxqy49egic7jq95v0r77z9AF-IHHD2m1FN6dH9uus8hVOH8QVqG0bqNGnc58ojDk_jILln6b1_JUkvPCk_ZLYxFe1vdMr70TrJpYw6ck1rGeRRgRBlPwl7cDlBDjMPLuIx1VijPB0CGeJ4uItVFu4c2_IpcvNQdaqWeFc2xwmYRUqgAtgTqX_T5yvMCPEIJkXlgQC6ZenIZNXYnv5mAb55rkgh9qrdw",
  "payload": ""
}
2024-02-12 20:41:17,541:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540672207 HTTP/1.1" 200 806
2024-02-12 20:41:17,542:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:16 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6HUcA-o5QUU-bDYq7jZjfdaQliYjCcrs68YxpC1p4TPCjRkEew4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-17T02:27:36Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/cHbPmQ",
      "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/w9R_yw",
      "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/Hm4ubg",
      "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo"
    }
  ]
}
2024-02-12 20:41:17,543:DEBUG:acme.client:Storing nonce: 6HUcA-o5QUU-bDYq7jZjfdaQliYjCcrs68YxpC1p4TPCjRkEew4
2024-02-12 20:41:17,544:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-12 20:41:17,545:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-02-12 20:41:17,545:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-12 20:41:17,546:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-12 20:41:17,547:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:41:17,548:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-12 20:41:17,548:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-12 20:41:17,549:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-12 20:41:17,550:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:41:17,595:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-02-12 20:41:17,595:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-12 20:41:17,595:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-02-12 20:41:17,602:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-02-12 20:41:17,604:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-02-12 20:41:17,604:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-02-12 20:41:17,604:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-02-12 20:41:17,605:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-02-12 20:41:17,607:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-02-12 20:41:17,645:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-12 20:41:17,844:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-12 20:41:17,845:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-12 20:41:17,846:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-12 20:41:17,851:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC.
2024-02-12 20:41:17,851:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-12 20:41:17,852:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-12 20:41:17,857:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x046DA590>
Prep: True
2024-02-12 20:41:17,857:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x046DA590> and installer None
2024-02-12 20:41:17,857:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-12 20:41:17,862:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-12 20:41:17,863:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-12 20:41:17,865:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-12 20:41:18,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-12 20:41:18,415:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:17 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "K8aZwfRUipg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-12 20:41:18,416:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-12 20:41:22,708:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7552_key-certbot.pem
2024-02-12 20:41:26,779:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7550_csr-certbot.pem
2024-02-12 20:41:26,780:DEBUG:acme.client:Requesting fresh nonce
2024-02-12 20:41:26,780:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-12 20:41:26,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-12 20:41:26,963:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:26 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HpY91-GpTZ-QOr51FlmslSlVjf7pkwgfAwYX_91jeeaepZLimfA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-12 20:41:26,963:DEBUG:acme.client:Storing nonce: HpY91-GpTZ-QOr51FlmslSlVjf7pkwgfAwYX_91jeeaepZLimfA
2024-02-12 20:41:26,963:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-12 20:41:26,972:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BUWi1RT3I1MUZsbXNsU2xWamY3cGt3Z2ZBd1lYXzkxamVlYWVwWkxpbWZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "XqmlKEGyv8CnmEXfwhkNb5f_SRkMQelnGirlEtea6lkfiCFvmr8L5xgopDSbFqKR2y0oOcsCRyr1OVwXS9ZDBFwPBDU8HO5f88V5SGuHjxiveRfhYsxcCHfK_GWo5XQBKmY-OU5ZV44ZZnhTDw4870sXRQxGFH4mV6-0A7syN5vsqaYmoE6khdhh33r1DOQX76ODDjaDKlOeL6giU9ge4hjSHyOOngHh2zPYDLdWOw6ojcxZ6yGw2OAsGGCcVMnTY3nRllGQRcOMhp0TdMZeZWoHsu82rxSrYpxnt6FMOOUtJZ0boG4fGcY0hjHhCxIEJltdkErgs87AuCePm6F1UQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-12 20:41:27,165:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-02-12 20:41:27,165:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 12 Feb 2024 19:41:26 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256462697
Replay-Nonce: HpY91-GpC3tCdZwJNiM-124-G1ut-_S_CyNHTz7AVOjmNJbQn-M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-17T02:27:45Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540704157"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256462697"
}
2024-02-12 20:41:27,166:DEBUG:acme.client:Storing nonce: HpY91-GpC3tCdZwJNiM-124-G1ut-_S_CyNHTz7AVOjmNJbQn-M
2024-02-12 20:41:27,166:DEBUG:acme.client:JWS payload:
b''
2024-02-12 20:41:27,171:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540704157:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BDM3RDZFp3Sk5pTS0xMjQtRzF1dC1fU19DeU5IVHo3QVZPam1OSmJRbi1NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3MDQxNTcifQ",
  "signature": "m_0IVVjhCNwmaDrkQmnbFgL-pXuz5gFyDKhHG2VM6N6G6-daO-zg_iZphH7kD1hK6OJlZk4udWY744AzUt3vV8GXFlK87Rk0hFCzwnENSMbDduzKimBqGt1PZ4_21vMNGEQVk_cFjItzuP8DQ7L1wvDNDeAhFUfa2d8nl2YmhYDmr_rHThEhpefW_p8TInwflGyU7E4IM_peR9THIHPeTSrPmwv0bDuE-eZZ6z3_HgKfDz04aBWp6arwhd4iIw3VpDjaaw6ZInQo7Q-yZnV45Nkot0jUA00S1k2kmwZa3WQscmV5lSTtfDRvDNyExTdzdVjsKeh3vsWu17TOePVIeA",
  "payload": ""
}
2024-02-12 20:41:27,356:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540704157 HTTP/1.1" 200 811
2024-02-12 20:41:27,357:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:26 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 63lPIS7zL_xtOwGPHvUakj5Ehh1rD4YLaBqy1r4BZRZ7X6Un74s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-17T02:27:45Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/62ck5w",
      "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/BJFdnw",
      "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/eTpKlQ",
      "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo"
    }
  ]
}
2024-02-12 20:41:27,357:DEBUG:acme.client:Storing nonce: 63lPIS7zL_xtOwGPHvUakj5Ehh1rD4YLaBqy1r4BZRZ7X6Un74s
2024-02-12 20:41:27,358:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-12 20:41:27,358:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-02-12 20:41:27,359:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-12 20:41:27,359:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-12 20:41:27,360:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:41:27,360:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-12 20:41:27,360:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-12 20:41:27,360:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-12 20:41:27,361:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:41:27,398:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-12 20:41:27,583:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-12 20:41:27,585:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-12 20:41:27,587:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-12 20:41:27,597:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC.
2024-02-12 20:41:27,597:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-12 20:41:27,598:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-12 20:41:27,602:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x046E7B70>
Prep: True
2024-02-12 20:41:27,602:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x046E7B70> and installer None
2024-02-12 20:41:27,602:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-12 20:41:27,615:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-12 20:41:27,615:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-12 20:41:27,617:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-12 20:41:28,208:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-12 20:41:28,209:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:27 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Y79ubb0rHs4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-12 20:41:28,210:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-12 20:41:32,430:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7553_key-certbot.pem
2024-02-12 20:41:36,431:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7551_csr-certbot.pem
2024-02-12 20:41:36,431:DEBUG:acme.client:Requesting fresh nonce
2024-02-12 20:41:36,431:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-12 20:41:36,610:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-12 20:41:36,611:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:35 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HpY91-GpRv8Eo8ndoyyYPFYzagg8KKpy_yYJIed1Bnrs2MBQfBo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-12 20:41:36,611:DEBUG:acme.client:Storing nonce: HpY91-GpRv8Eo8ndoyyYPFYzagg8KKpy_yYJIed1Bnrs2MBQfBo
2024-02-12 20:41:36,612:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-12 20:41:36,619:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BSdjhFbzhuZG95eVlQRll6YWdnOEtLcHlfeVlKSWVkMUJucnMyTUJRZkJvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "RbPhwriBwtfHtt8HVuKywQ6GVpkY01Wu7wBVYHCHVFUMfHqKXCMKLHihl4yT9AeE1J3NPorPfcndHu1wxeOHjmo_2CcT00N_KfzEm8cOTUUVukzFwDb2erMS8twdY7jsfoinQbPXswHynAj1PCoptCTmh3_L6tlRr6vNIp9162mD6t6o1XejGm2EXvLWhAtsZlFZF9A3wrfQK_a8_Gyq3CnThu6WaSF7ck6om0q5zRa3IhblqEAOior8OcHLRMpzKrClprfe-udTeS5vssQhtI3jXYrDzOLhM1qXo_5X4bdAfvBpghVTuOBhbf0YwAU6EIcU5XJYBJok5N969h_vOw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-12 20:41:36,807:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-02-12 20:41:36,808:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 12 Feb 2024 19:41:35 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256484587
Replay-Nonce: 63lPIS7zFw-5Rmf5KrKzQh-j5DKuVw59aSKiDcjFNGaMkN0rHOQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-17T02:27:54Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540734247"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256484587"
}
2024-02-12 20:41:36,808:DEBUG:acme.client:Storing nonce: 63lPIS7zFw-5Rmf5KrKzQh-j5DKuVw59aSKiDcjFNGaMkN0rHOQ
2024-02-12 20:41:36,808:DEBUG:acme.client:JWS payload:
b''
2024-02-12 20:41:36,816:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540734247:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pGdy01Um1mNUtyS3pRaC1qNURLdVZ3NTlhU0tpRGNqRk5HYU1rTjBySE9RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3MzQyNDcifQ",
  "signature": "ylbVtDVuxPqbqdXPQmicUxUv4XlGodOD1SIjZkFezmY3V5AiLmlZWlD0F4Mh0odfrm843YU0Ct_kNFiVYYIbb48j0qGgncA6bQC3M0Z6rqh07olBTw384CK7ElpwDIsP22b2kL4kcccWz1BBFI8UEzM0VdwipHv7lqR-saLZoXipNTXzBQ_V6dxzjGnzhpEkTTWk0wYKhA50jl6JqGZ4bPD5JNjLHsbWiJZVzQw9OrW3XttvclIH0zQ0xDFJgonwdWh7biwd-vhmpk4LjZNBOdFm8wrHtMWPxXfnlH35JqQPz_7pqXUPRxYRbLoqKRfFy8zHYSdOuLXDF6NxKneaNQ",
  "payload": ""
}
2024-02-12 20:41:37,001:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540734247 HTTP/1.1" 200 810
2024-02-12 20:41:37,002:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:36 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HpY91-GpbAr8TO1ogLKQ-_ZobJTagpCZWrILDwVbnYX0ZI8RCqo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-17T02:27:54Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/QhhIwA",
      "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/zrc52g",
      "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/3Cf07Q",
      "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg"
    }
  ]
}
2024-02-12 20:41:37,002:DEBUG:acme.client:Storing nonce: HpY91-GpbAr8TO1ogLKQ-_ZobJTagpCZWrILDwVbnYX0ZI8RCqo
2024-02-12 20:41:37,002:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-12 20:41:37,002:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-02-12 20:41:37,003:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-12 20:41:37,003:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-12 20:41:37,004:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:41:37,004:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-12 20:41:37,004:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-12 20:41:37,005:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-12 20:41:37,006:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:41:37,044:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-12 20:41:37,285:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-12 20:41:37,288:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2024-02-12 20:41:37,289:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2024-02-12 20:41:37,294:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC.
2024-02-12 20:41:37,294:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-12 20:41:37,294:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-12 20:41:37,299:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x046DAB10>
Prep: True
2024-02-12 20:41:37,300:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x046DAB10> and installer None
2024-02-12 20:41:37,300:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-12 20:41:37,316:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-12 20:41:37,317:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-12 20:41:37,319:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-12 20:41:37,784:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-12 20:41:37,785:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:36 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "FGkYGQLE6gQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-12 20:41:37,787:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-12 20:41:41,887:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7554_key-certbot.pem
2024-02-12 20:41:45,833:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7552_csr-certbot.pem
2024-02-12 20:41:45,833:DEBUG:acme.client:Requesting fresh nonce
2024-02-12 20:41:45,834:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-12 20:41:45,991:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-12 20:41:45,992:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:45 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6HUcA-o5MPe9trDRPHchQPXstZ7pCjqU_rfwgOScmABO-k40WkQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-12 20:41:45,993:DEBUG:acme.client:Storing nonce: 6HUcA-o5MPe9trDRPHchQPXstZ7pCjqU_rfwgOScmABO-k40WkQ
2024-02-12 20:41:45,993:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-12 20:41:46,006:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVNUGU5dHJEUlBIY2hRUFhzdFo3cENqcVVfcmZ3Z09TY21BQk8tazQwV2tRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "J9oWHNFyVQAbV0oAnawkJ75HYyNSJlOdwGwX_XqudxS5BwSeRlH9ikrZBMJSu0F4ARqy0Lh40PVMZP6xClB_6roJD1o0ke8uoSQ_pUGF3UNjlOTnx2L3ZH-0CCVRhxvfFia_I5MTBA_TQ39X3ZFqdKyKWmXvFjfPQOoMKb4WO5LfYdYAuskoni3V3fDc9LXFJPf44K0l2ywMWRImVT9__wwZ0ZtaUm5y0GIHaMyOeZhYacID_WOMXqT4cRa9Mw4FralnqkyfmleF1eJx0rVhsQVGM-XB5Z25aSefaU1RN3KPd5V5RIf27qJcMcFtKuGn7mmLvDe1DmC1kfHNVhp4Sg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-12 20:41:46,180:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-02-12 20:41:46,182:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 12 Feb 2024 19:41:45 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256513597
Replay-Nonce: 6HUcA-o5mPZUzeLQgioIzOm93xlyWFPVkAfnMnHD8AziLzHK0X4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-17T02:28:03Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540772027"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256513597"
}
2024-02-12 20:41:46,182:DEBUG:acme.client:Storing nonce: 6HUcA-o5mPZUzeLQgioIzOm93xlyWFPVkAfnMnHD8AziLzHK0X4
2024-02-12 20:41:46,183:DEBUG:acme.client:JWS payload:
b''
2024-02-12 20:41:46,188:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540772027:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVtUFpVemVMUWdpb0l6T205M3hseVdGUFZrQWZuTW5IRDhBemlMekhLMFg0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3NzIwMjcifQ",
  "signature": "HYOmz4VTyE2n7YHdl1Dr7nP0ZHPh26aMLFfqdl1S9cd3lj6ElvIEF-u-u0m0w4HOOkGgjuH_1-OjoNmNPZhm-fdgGKpId9kbW1K6ZkPX0ayXRnm6TR7iwLAyIi1bbRZ4yBQHYAniH9iZI9cgCzaYj7K7zVN5Lh9tBT7eX2NGecclIj-GDDdO_-nQ5Kbo11lCbzn47IBVBjw0nPVemCoNpoMQs3w0s5IfNhjn4lAa18JV88UW-JKSDW-_7ZNiM8uDL7kjwalzs8cfLNk2nNb4uohN18x216TemIiaYLylI5UQlfWG1fJDoAsHwMqujPG_f7Ws06hSAqdCy_ZK4y4uaw",
  "payload": ""
}
2024-02-12 20:41:46,350:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540772027 HTTP/1.1" 200 809
2024-02-12 20:41:46,351:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:45 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HWHXB1ul6lC_9dPKdT2_1DhNlnd63bOaSqrP1dhKhSMImjcB4k4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-17T02:28:03Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/6vejxw",
      "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/m1WT-w",
      "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/53Jzvw",
      "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw"
    }
  ]
}
2024-02-12 20:41:46,351:DEBUG:acme.client:Storing nonce: HWHXB1ul6lC_9dPKdT2_1DhNlnd63bOaSqrP1dhKhSMImjcB4k4
2024-02-12 20:41:46,352:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-12 20:41:46,352:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-02-12 20:41:46,353:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-12 20:41:46,353:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-12 20:41:46,354:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:41:46,354:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-12 20:41:46,354:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-12 20:41:46,355:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-12 20:41:46,356:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:41:46,410:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-12 20:41:46,576:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-12 20:41:46,579:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer.
2024-02-12 20:41:46,581:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD
2024-02-12 20:41:46,589:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC.
2024-02-12 20:41:46,589:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-12 20:41:46,589:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-12 20:41:46,594:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x043E15B0>
Prep: True
2024-02-12 20:41:46,595:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x043E15B0> and installer None
2024-02-12 20:41:46,595:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-12 20:41:46,601:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-12 20:41:46,602:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-12 20:41:46,604:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-12 20:41:47,058:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-12 20:41:47,059:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:46 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "SB06fpthd9k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-12 20:41:47,059:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-12 20:41:51,326:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7555_key-certbot.pem
2024-02-12 20:41:55,272:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7553_csr-certbot.pem
2024-02-12 20:41:55,273:DEBUG:acme.client:Requesting fresh nonce
2024-02-12 20:41:55,273:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-12 20:41:55,424:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-12 20:41:55,425:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:54 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HWHXB1ulluJyvjJeQLyIPe8ez3ftKlZJFqrStOcL1P-k2agfEf8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-12 20:41:55,425:DEBUG:acme.client:Storing nonce: HWHXB1ulluJyvjJeQLyIPe8ez3ftKlZJFqrStOcL1P-k2agfEf8
2024-02-12 20:41:55,426:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-12 20:41:55,439:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxsdUp5dmpKZVFMeUlQZThlejNmdEtsWkpGcXJTdE9jTDFQLWsyYWdmRWY4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "u9E58XB0t6b24u8Q3iFobVeI1bsUWSaa7V47Nawwb_DCEhLoGc9mjUzdg7ctbK18078Vb6QmWbQ3twLpCEOA4VDFDx2ofPdXeTuDeBBaGPwfD698dkVzJyRACAwAlq3deG_betUTco42_Qxt7PcgkoCYLgHZv_cE1atxpE3FRCsOSdY3cyEjDO5fXTDPln0dM-P8niQDCMim-Wht-D0GNKst3FQmFkY-EyxTdOj9n-OSpCE980o7BzOxm8fbmLHX-P5ttbVAajlQCnQ-wWZklrGEaWL0Lu_3_5obVr4YiuohTpEaPuP2w_sh9DXpYmm6T494PxIJvGq6tFv3umqTBg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-12 20:41:55,650:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-12 20:41:55,651:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 12 Feb 2024 19:41:54 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256544587
Replay-Nonce: HWHXB1ulQ3Xr_t-2Q8_ZUsxa9CBQkrSqt8lYXC09p0BJ2Ey0wGw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-17T02:28:13Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540813967"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256544587"
}
2024-02-12 20:41:55,651:DEBUG:acme.client:Storing nonce: HWHXB1ulQ3Xr_t-2Q8_ZUsxa9CBQkrSqt8lYXC09p0BJ2Ey0wGw
2024-02-12 20:41:55,651:DEBUG:acme.client:JWS payload:
b''
2024-02-12 20:41:55,657:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540813967:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxRM1hyX3QtMlE4X1pVc3hhOUNCUWtyU3F0OGxZWEMwOXAwQkoyRXkwd0d3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4MTM5NjcifQ",
  "signature": "X9UpvuS4ELn0nxx7VlTBEQR5qmsnYvp4RYXTEwQ4BSZv8EMdMxlcOocNMgf5ssdByhvsuCCoiiT5V5zCchAtUFyL7_LuqWATiARG5RssaZirkBhEHRzRYb2-wmGdWl-sbIbsoJXgugKVV8an0rCQgDavE_bj3aAoz3kvXaWyJzVoVKAIGsBP6JQotUO8QMmLE4WgdTy8YzL2a9npnYumgLeefi0RNWpZ1Sp-C4IBxj62go1rh4gRuxqdy2kbBXfPiOLCf8NJYeo7a_KNCzMZQWu6XmNa9Js6Ponl0gZ2qT3NdWJuJmNFx0LH9wfLnaHtn57a9N7AptbUj9DL-sP6lg",
  "payload": ""
}
2024-02-12 20:41:55,819:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540813967 HTTP/1.1" 200 805
2024-02-12 20:41:55,820:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:54 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HWHXB1ulqP98cXEIMvHmjQt5OU-kzcyuhZv77vykP5MF097swCU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-17T02:28:13Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/QS3xjQ",
      "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/GcxOwg",
      "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/pdWHtQ",
      "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM"
    }
  ]
}
2024-02-12 20:41:55,820:DEBUG:acme.client:Storing nonce: HWHXB1ulqP98cXEIMvHmjQt5OU-kzcyuhZv77vykP5MF097swCU
2024-02-12 20:41:55,821:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-12 20:41:55,821:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-02-12 20:41:55,822:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-12 20:41:55,822:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-12 20:41:55,823:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:41:55,823:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-12 20:41:55,823:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-12 20:41:55,823:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-12 20:41:55,824:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:41:55,873:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-12 20:41:56,037:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-12 20:41:56,040:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-12 20:41:56,041:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-12 20:41:56,051:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC.
2024-02-12 20:41:56,051:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-12 20:41:56,052:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-12 20:41:56,057:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x001A0B90>
Prep: True
2024-02-12 20:41:56,058:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x001A0B90> and installer None
2024-02-12 20:41:56,058:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-12 20:41:56,073:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-12 20:41:56,074:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-12 20:41:56,076:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-12 20:41:56,550:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-12 20:41:56,551:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:41:55 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "EmPnGTQ_Wec": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-12 20:41:56,553:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-12 20:42:00,633:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7556_key-certbot.pem
2024-02-12 20:42:04,538:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7554_csr-certbot.pem
2024-02-12 20:42:04,539:DEBUG:acme.client:Requesting fresh nonce
2024-02-12 20:42:04,539:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-12 20:42:04,692:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-12 20:42:04,693:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:42:03 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HWHXB1ulvAVKnaNJPStKuoFZEpHFu7PDsEUjpIYwKQtGZnZidxc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-12 20:42:04,693:DEBUG:acme.client:Storing nonce: HWHXB1ulvAVKnaNJPStKuoFZEpHFu7PDsEUjpIYwKQtGZnZidxc
2024-02-12 20:42:04,694:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-12 20:42:04,700:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWx2QVZLbmFOSlBTdEt1b0ZaRXBIRnU3UERzRVVqcElZd0tRdEdablppZHhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Z9HkcIOyKzqssCGLpbIybDgztMGJIxvr6cperIKIQszAiY6ZuLNkTDsgXynexYCs6ETHMijcHF-cgLu76luvrsJ21m3sE0JrkS8RrnDLBlSy28KUmSR8U97QBK0CwLyA27g_jOuqpoVVzO08MuHxCBYZwc_JTGsNxksYJmXmDhGo9hMujlqJh_ksbqgPIKRB65jP1BlUTtw6YJx165VmC7tdZNnFv3e18-mnzJ4g_1Ri3qKKt_r1lDPp5FxgmMLXjGJZ1QGopVsOoHnF_YT4DI10ogyl3leSATqTXp2xl9mw3uzRzc55_exAh7n7vks2Kcy_W1mbxiANksFM8fYV-A",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-12 20:42:04,950:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-12 20:42:04,951:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 12 Feb 2024 19:42:04 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256570667
Replay-Nonce: HWHXB1ullndqhu7vPNYF9IMg5qn4dtMsUa3CvwBPA3lKVzm7eyo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-17T02:28:22Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540850567"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256570667"
}
2024-02-12 20:42:04,952:DEBUG:acme.client:Storing nonce: HWHXB1ullndqhu7vPNYF9IMg5qn4dtMsUa3CvwBPA3lKVzm7eyo
2024-02-12 20:42:04,953:DEBUG:acme.client:JWS payload:
b''
2024-02-12 20:42:04,965:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540850567:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxsbmRxaHU3dlBOWUY5SU1nNXFuNGR0TXNVYTNDdndCUEEzbEtWem03ZXlvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4NTA1NjcifQ",
  "signature": "DjSG6nL2lCrl2a5vPvPgmOlrFiIQDSy43AleM2KPEiCaPbQNVOS_Eary4c_BYjB6AokgzT_PLqdcFspZnplh0OViTrVLa6w_ngj-ykPaL9mYjUBtH4URBK_ouW1FMuDTpDUBL7z8O5ZVbjTn6sqNSiDhRfF86wFupljsfafTdxIzkc49pePZkhDkJSQL2TGZXuoGkhF9Ys5z5ucPOaI-y1hLzT0SxjX5n5MltLjKx7BsE_anisBmXa58-mCo4oF9C09VIdgNN2AWtYIGdlSfDAFc8k5sReiIQnVu66Q2HBD4Q1ry2hdQa97CCQEKIsDu5Ul3Ja1QkiRGJTHvLUMbiA",
  "payload": ""
}
2024-02-12 20:42:05,141:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540850567 HTTP/1.1" 200 805
2024-02-12 20:42:05,142:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:42:04 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HWHXB1ulp-BuQg6BVAHxVJHHSZSzvf-BWulPCDFnUHYK29WgrtQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-17T02:28:22Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/9KsoFg",
      "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/qRG9hA",
      "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/TwBIlQ",
      "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ"
    }
  ]
}
2024-02-12 20:42:05,143:DEBUG:acme.client:Storing nonce: HWHXB1ulp-BuQg6BVAHxVJHHSZSzvf-BWulPCDFnUHYK29WgrtQ
2024-02-12 20:42:05,144:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-12 20:42:05,144:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-02-12 20:42:05,145:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-12 20:42:05,145:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-12 20:42:05,146:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:42:05,146:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-12 20:42:05,146:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-12 20:42:05,147:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-12 20:42:05,148:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:42:05,195:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-12 20:42:05,477:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-12 20:42:05,480:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-12 20:42:05,481:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-12 20:42:05,490:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC.
2024-02-12 20:42:05,490:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-12 20:42:05,490:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-12 20:42:05,495:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x046D5AF0>
Prep: True
2024-02-12 20:42:05,495:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x046D5AF0> and installer None
2024-02-12 20:42:05,495:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-12 20:42:05,511:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-12 20:42:05,512:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-12 20:42:05,514:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-12 20:42:05,962:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-12 20:42:05,962:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:42:05 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "UOT9w1uwao4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-12 20:42:05,963:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-12 20:42:10,374:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7557_key-certbot.pem
2024-02-12 20:42:14,045:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7555_csr-certbot.pem
2024-02-12 20:42:14,045:DEBUG:acme.client:Requesting fresh nonce
2024-02-12 20:42:14,045:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-12 20:42:14,203:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-12 20:42:14,204:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:42:13 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6HUcA-o5EWNrNaxlnriy6iMlLKY4HW9kbSElfdw3DvyeeMnLDXU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-12 20:42:14,205:DEBUG:acme.client:Storing nonce: 6HUcA-o5EWNrNaxlnriy6iMlLKY4HW9kbSElfdw3DvyeeMnLDXU
2024-02-12 20:42:14,205:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-12 20:42:14,218:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVFV05yTmF4bG5yaXk2aU1sTEtZNEhXOWtiU0VsZmR3M0R2eWVlTW5MRFhVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "eI_BXJSSxW0fXJey9n_cPVHd9ztjPJ7zOVz9e-YVdOIaGSQGYj5zrzlBEGYOvApXgvYOjpVsOm4hGG-VB3MvO0Rbq55C5cqXiUihXuE8f_9D3xKZsy1_5IWRJgZ4VPnFa2Af2YUHsKZrQyFYDDSpm6sm7HuxHG8xhkG5oJCN_n_zzYK9SYWERRpykBeCA4a73cAQAJPVJ-DSiS3vD2hLc3Bo-lPJwI4jQnYEOcpCSgArx9TIh_Q0SsaVIuuFDkUCQUn13oZOKDeiwZcUy4lZJgef4qCPnAzCv1ybfjEUBywpBgxElk15J42-wx2se7SERJXqfp4aux9Hp2joKe1AtQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-12 20:42:14,385:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-12 20:42:14,385:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 12 Feb 2024 19:42:13 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256595137
Replay-Nonce: HWHXB1ule8O1fg_LcOszQdQKLylNWXBoL6qq2vEh8zTH8hnuw1g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-17T02:28:31Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540885967"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256595137"
}
2024-02-12 20:42:14,385:DEBUG:acme.client:Storing nonce: HWHXB1ule8O1fg_LcOszQdQKLylNWXBoL6qq2vEh8zTH8hnuw1g
2024-02-12 20:42:14,386:DEBUG:acme.client:JWS payload:
b''
2024-02-12 20:42:14,398:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540885967:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxlOE8xZmdfTGNPc3pRZFFLTHlsTldYQm9MNnFxMnZFaDh6VEg4aG51dzFnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4ODU5NjcifQ",
  "signature": "stje-fcQKsNfpLyOMgHcmgm7-_8907MLo2W1uigrLvHWvbY5ls7ic4LiORByWkwU0nikUtFTTaDTQFBIo19oa78kJJYsnRTIpSvKPrt9VnHjyHOOIpAMkYRn9uVc6kT3nTJvXy-SLGr0yJTUzCuDBwzHajmYju1XL7ZDvVo9SNU0mynQ9CBy43IvQKiQoTIEBu2BmNQBmFcTPKfvTY3MFoT3WEjLzG1xua7N6S-nN-LeL8PerB_09xrbJqfHeFUEjjzqP7GslABri4CvZkqs-lJz1t2yYS6s5eDX714BnjHHww-_2YhlKbPQZn8RFh2XHA_WIvkrzm_xP3nx5XIA_A",
  "payload": ""
}
2024-02-12 20:42:14,602:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540885967 HTTP/1.1" 200 805
2024-02-12 20:42:14,603:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 12 Feb 2024 19:42:13 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6HUcA-o5hTNtWPlEz035riDrmd08sV9Ox0viZU9gY_8qxBiI_wc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-17T02:28:31Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/OUXDhQ",
      "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/gxpKtA",
      "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/ovBk4w",
      "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw"
    }
  ]
}
2024-02-12 20:42:14,604:DEBUG:acme.client:Storing nonce: 6HUcA-o5hTNtWPlEz035riDrmd08sV9Ox0viZU9gY_8qxBiI_wc
2024-02-12 20:42:14,605:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-12 20:42:14,605:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-02-12 20:42:14,606:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-12 20:42:14,606:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-12 20:42:14,607:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:42:14,607:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-12 20:42:14,607:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-12 20:42:14,607:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-12 20:42:14,608:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-12 20:42:14,609:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-02-12 20:42:14,609:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-02-12 20:42:14,621:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-02-12 20:42:14,622:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)