2024-02-08 06:09:07,634:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-02-08 06:09:07,634:DEBUG:certbot._internal.main:Arguments: []
2024-02-08 06:09:07,634:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-02-08 06:09:08,394:DEBUG:certbot._internal.log:Root logging level set at 20
2024-02-08 06:09:08,395:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-02-08 06:09:08,433:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x0492CA50> and installer <certbot._internal.cli.cli_utils._Default object at 0x0492CA50>
2024-02-08 06:09:08,472:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-08 06:09:08,655:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-08 06:09:08,658:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer.
2024-02-08 06:09:08,665:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD
2024-02-08 06:09:08,672:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC.
2024-02-08 06:09:08,672:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-08 06:09:08,672:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-08 06:09:08,677:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04908850>
Prep: True
2024-02-08 06:09:08,677:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04908850> and installer None
2024-02-08 06:09:08,677:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-08 06:09:08,682:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-08 06:09:08,684:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-08 06:09:08,690:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-08 06:09:09,264:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-08 06:09:09,265:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:08 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "bDBfTzzSoAc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-08 06:09:09,265:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-08 06:09:13,763:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7441_key-certbot.pem
2024-02-08 06:09:17,670:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7439_csr-certbot.pem
2024-02-08 06:09:17,670:DEBUG:acme.client:Requesting fresh nonce
2024-02-08 06:09:17,670:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-08 06:09:17,852:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-08 06:09:17,854:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:17 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUsQW6yZMUq-sWW4ajYWyoOpHauzb_YeXoavepAgorOD9U
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-08 06:09:17,854:DEBUG:acme.client:Storing nonce: 2ksh1KUsQW6yZMUq-sWW4ajYWyoOpHauzb_YeXoavepAgorOD9U
2024-02-08 06:09:17,855:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-08 06:09:17,863:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNRVzZ5Wk1VcS1zV1c0YWpZV3lvT3BIYXV6Yl9ZZVhvYXZlcEFnb3JPRDlVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "imsqKnpXd4PvnoHHdVAA2h-5hSs-YptzPVMpFmvjKiq--JXDHPf5R4ECnhsB39x-rg3vFEWEu4naoyCRm1Yqlm9jcxmV3T613A7wQmIK1mdgZbWNEelTIIkfrpnyU2n6nuzQzEP1A_h1a_qDFIm3KJOzfHFaMTNdDDiUwVrNijY-HcMrckHjKmDldv90VA_IeRL4ygI_NruMHk_kuWmFLHVwLjomY281b-jhWkk_9HIfTScUaQIrp5KETRr0Pi73EyTgUjJy-AtPsbLHAqcKiq5sjUIgkY_4YTkg3cxmSbAtjNgjeGvyVZrGLtQ6lYc-hPYDEuTtHooA862Rouxyxw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-08 06:09:18,107:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-02-08 06:09:18,108:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 08 Feb 2024 05:09:17 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308706407
Replay-Nonce: kRyagOpUT6N3Z_bz6s00w-rT6rXWAqmaBB2cEnnLk0BrSrsk7ek
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:24Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308706407"
}
2024-02-08 06:09:18,108:DEBUG:acme.client:Storing nonce: kRyagOpUT6N3Z_bz6s00w-rT6rXWAqmaBB2cEnnLk0BrSrsk7ek
2024-02-08 06:09:18,108:DEBUG:acme.client:JWS payload:
b''
2024-02-08 06:09:18,116:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVUNk4zWl9iejZzMDB3LXJUNnJYV0FxbWFCQjJjRW5uTGswQnJTcnNrN2VrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxNTI0OTcifQ",
  "signature": "UCSR4g1q0O-zElTznAU19RKgIo5wnS4ufMtxqd66nZhDPbnxhfj_KpHMcif1Z3fE-cBN1Qcs6zxf1MRmrRqqu4bFzJNduHw_kYz6ZJAs1CgEJQAfR3bF0AgC7C9ssjISvasSJ3itiASTSpouiWDeqSb_LxyroqUso3TMjtx5XTFGZEc8RKBoHxj3weD3PhoqhEodresSd-CaZ39heLF0xbF_xSoWKJNQ-U0e88gd5g2FN4MAmRb49zuc9qBKt88hUSGWMGK1c7wuHrBgT53lDlxvaKojG5DlPA9rZD6FNYXZ2in8o4GFJghe3VEOzx7SeQgtnDsUvBl6BYbt4E_IKw",
  "payload": ""
}
2024-02-08 06:09:18,306:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820152497 HTTP/1.1" 200 810
2024-02-08 06:09:18,307:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:17 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUEAPc6uRSrkpMwmtxb2A86FmxgK2071NHq2xfbW9NGlQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:24Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/GeKDkA",
      "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/sBY_pA",
      "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/dU31hg",
      "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI"
    }
  ]
}
2024-02-08 06:09:18,308:DEBUG:acme.client:Storing nonce: kRyagOpUEAPc6uRSrkpMwmtxb2A86FmxgK2071NHq2xfbW9NGlQ
2024-02-08 06:09:18,309:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-08 06:09:18,309:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-02-08 06:09:18,309:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-08 06:09:18,310:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-08 06:09:18,324:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:09:18,324:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-08 06:09:18,324:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-08 06:09:18,324:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-08 06:09:18,329:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:09:18,372:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-08 06:09:18,640:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-08 06:09:18,642:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-08 06:09:18,643:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-08 06:09:18,653:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC.
2024-02-08 06:09:18,654:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-08 06:09:18,654:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-08 06:09:18,664:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0490EAD0>
Prep: True
2024-02-08 06:09:18,664:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0490EAD0> and installer None
2024-02-08 06:09:18,665:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-08 06:09:18,682:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-08 06:09:18,684:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-08 06:09:18,685:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-08 06:09:19,221:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-08 06:09:19,222:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:18 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "qwqs36S29pk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-08 06:09:19,223:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-08 06:09:23,555:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7442_key-certbot.pem
2024-02-08 06:09:27,520:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7440_csr-certbot.pem
2024-02-08 06:09:27,521:DEBUG:acme.client:Requesting fresh nonce
2024-02-08 06:09:27,521:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-08 06:09:27,700:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-08 06:09:27,701:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:27 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUso9trrmFmnqXCmWhxhJaVfXtTN-D2zbxa_CODxLcq2LQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-08 06:09:27,702:DEBUG:acme.client:Storing nonce: 2ksh1KUso9trrmFmnqXCmWhxhJaVfXtTN-D2zbxa_CODxLcq2LQ
2024-02-08 06:09:27,702:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-08 06:09:27,707:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNvOXRycm1GbW5xWENtV2h4aEphVmZYdFROLUQyemJ4YV9DT0R4TGNxMkxRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "MyraNxvbjVYjqpFJBhrUfBOZ38UHGf1onXyGALdi6PaVdjFwbFBQ3RwnOLRc7dmmwjgs6ea7BmUxf2CeojnBae_wxl0Pr3lCEeiasnKeeRB38ftfagN3NrJ1WAN95rZ4mVZf-_YMeF54uyoy7QbL4qpNRGzGD1yaVH1RP8uG5WatSNDSsgMZk-xsyZk2C_dp2iGnDBigFlatkwkI5878k5CrePpSt-F9baWcSH8KLQXpyH6rTPN84PDP7rgDza1_bIExRvI5bhQDczGeuZkx4Q2dJeIiCHVxi2ZFlt6uAxQlpH1RF0FXJkBXD30T5eEQx7Ap2Ll-avG2dC4vBAB2pA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-08 06:09:27,900:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-02-08 06:09:27,901:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 08 Feb 2024 05:09:27 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308730387
Replay-Nonce: kRyagOpUBUz6N9qPcnNczIxk0TnV2m5E7lmqyMKavAouvAYc-ls
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:33Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308730387"
}
2024-02-08 06:09:27,902:DEBUG:acme.client:Storing nonce: kRyagOpUBUz6N9qPcnNczIxk0TnV2m5E7lmqyMKavAouvAYc-ls
2024-02-08 06:09:27,902:DEBUG:acme.client:JWS payload:
b''
2024-02-08 06:09:27,911:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVCVXo2TjlxUGNuTmN6SXhrMFRuVjJtNUU3bG1xeU1LYXZBb3V2QVljLWxzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxODg4NjcifQ",
  "signature": "uFXsAAwAlwPVRGD9o7N_CCd8j9s2TN0s2aZDPZ3MSSMEnXQYkDBUvWg6t4ciHbWW5n3I1YDhX_aVG_e_A0ZlDkCq8u0ho4HxjO_mptNFZrSQA0qXKgJh2JCEZqxQiCA3pCiVw1tcxrt3_c9vAfmrL2FSrPlF0WtK0EsBrzJaNjcoF-qHa2o95ScnYK3tJk0Ethp9Up4ltoy-nPzCcuN_ooRiEEHxl5Xh_h3mhuRjoKk67D_RnuDDAPJobR8Ok1krTJUVz3O-7MwjjiV7tC7b2Dqq-u7Yy8onayLicfcV1N49XAAWBjKl54hucIvZPb0O9dyR1rmJmM0mHvwH0lSyKQ",
  "payload": ""
}
2024-02-08 06:09:28,094:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820188867 HTTP/1.1" 200 804
2024-02-08 06:09:28,095:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:27 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUssH7XOaISiqNr3qKGGKG-8hCvcqMaCU2pFQWgdrmIjuQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:33Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/Yq7npQ",
      "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/OkyE8g",
      "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/IRVMDw",
      "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU"
    }
  ]
}
2024-02-08 06:09:28,096:DEBUG:acme.client:Storing nonce: 2ksh1KUssH7XOaISiqNr3qKGGKG-8hCvcqMaCU2pFQWgdrmIjuQ
2024-02-08 06:09:28,097:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-08 06:09:28,097:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-02-08 06:09:28,098:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-08 06:09:28,099:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-08 06:09:28,100:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:09:28,100:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-08 06:09:28,101:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-08 06:09:28,101:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-08 06:09:28,103:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:09:28,151:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-08 06:09:28,567:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-08 06:09:28,569:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-08 06:09:28,571:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-08 06:09:28,580:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC.
2024-02-08 06:09:28,580:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-08 06:09:28,581:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-08 06:09:28,587:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0439DF50>
Prep: True
2024-02-08 06:09:28,587:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0439DF50> and installer None
2024-02-08 06:09:28,587:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-08 06:09:28,602:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-08 06:09:28,604:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-08 06:09:28,606:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-08 06:09:29,066:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-08 06:09:29,067:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:28 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "WN3FWaiOf_U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-08 06:09:29,067:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-08 06:09:33,653:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7443_key-certbot.pem
2024-02-08 06:09:37,554:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7441_csr-certbot.pem
2024-02-08 06:09:37,555:DEBUG:acme.client:Requesting fresh nonce
2024-02-08 06:09:37,555:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-08 06:09:37,711:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-08 06:09:37,713:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:37 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqFssk5Ox93Par5zVRNMzUpGJDAVxuE31DB2m2KSRGzKg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-08 06:09:37,714:DEBUG:acme.client:Storing nonce: 5IXlosaqFssk5Ox93Par5zVRNMzUpGJDAVxuE31DB2m2KSRGzKg
2024-02-08 06:09:37,714:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-08 06:09:37,726:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFGc3NrNU94OTNQYXI1elZSTk16VXBHSkRBVnh1RTMxREIybTJLU1JHektnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "uxDUOM1XiJ1uUj5XRf8mIibr92OAlsgHee67H67R3Z_tjZtwkvii_EO47XdfICsAR1d1XhiMl9M9zGtgEgLmM4T6QeazeyUuI1VSAioLXno0WQoCfln2oE5BH3PmjFgPIWQdcfHEir-iein3tCryaA0FIw14mSQppIDSQm9VBmpTeh2QfmaOvgGhOAB9h3qkPLD-ymb8pw96fcQNsfHt6q2gUtXpHBdlRipSHQVYnhXUng1ATC-IrSpxRYUFRXgLEQpbb61HED34wpS5z4uaqeb1sAHuZX8A5UDKCpOzDUq-dQLd0rFmrQa5VunOJbGy3KKWzFTu09BCzsLPGUheXQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-08 06:09:37,910:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-02-08 06:09:37,912:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 08 Feb 2024 05:09:37 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308754257
Replay-Nonce: 5IXlosaqH-kaPIa8Z1wImSzIx-LawedAU1e0RKew7eK3Lzw2hr8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:42Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308754257"
}
2024-02-08 06:09:37,912:DEBUG:acme.client:Storing nonce: 5IXlosaqH-kaPIa8Z1wImSzIx-LawedAU1e0RKew7eK3Lzw2hr8
2024-02-08 06:09:37,913:DEBUG:acme.client:JWS payload:
b''
2024-02-08 06:09:37,920:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFILWthUElhOFoxd0ltU3pJeC1MYXdlZEFVMWUwUktldzdlSzNMencyaHI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyMjA5MDcifQ",
  "signature": "tbijWRGebuWOcuoV2HIR8RM8Pa0dKneQhGWpT39wqd6Z92HpW3EgLQputFOS3GglfMIKHu8whhyzPQRwrdzxu_CZLsFfjN6AB3SXG8vIUg_0Eeju5Ko4UKW85A32JbCVJZOBODU8Pio1K0EzRSkJZjI3UVH9FgMD1LT3dfZ3d7e53D9sjGfsPQzjDg_MBlMKKQjOtEsqGBbajIxXPBdzRP5Hgx4-HFMcfQ6eqlLEIPNGnImx1ifzIe9O0iS2tboU21GXNpVQUAkqhyIATYC5OuxUv1lYZNmuItmhd3S25Lvgoq_pIyQHoKzQJ8Spj0U0QNVHg8c5wcd7d4_wU7BMKA",
  "payload": ""
}
2024-02-08 06:09:38,112:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820220907 HTTP/1.1" 200 807
2024-02-08 06:09:38,113:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:37 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7ml42ZQ_pZU8Jxi-IjETrtqgACR_6VT4YIXJYYkXdr50
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:42Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/vlhqAg",
      "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/p9n_vg",
      "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/ul63Zg",
      "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA"
    }
  ]
}
2024-02-08 06:09:38,113:DEBUG:acme.client:Storing nonce: 3l89SrA7ml42ZQ_pZU8Jxi-IjETrtqgACR_6VT4YIXJYYkXdr50
2024-02-08 06:09:38,115:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-08 06:09:38,115:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-02-08 06:09:38,116:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-08 06:09:38,116:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-08 06:09:38,118:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:09:38,118:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-08 06:09:38,118:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-08 06:09:38,119:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-08 06:09:38,121:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:09:38,170:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-08 06:09:38,360:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-08 06:09:38,363:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-08 06:09:38,364:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-08 06:09:38,368:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC.
2024-02-08 06:09:38,368:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-08 06:09:38,369:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-08 06:09:38,373:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04BC90F0>
Prep: True
2024-02-08 06:09:38,373:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04BC90F0> and installer None
2024-02-08 06:09:38,373:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-08 06:09:38,378:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-08 06:09:38,378:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-08 06:09:38,381:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-08 06:09:38,841:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-08 06:09:38,842:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:38 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "36AKHc50YZ8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-08 06:09:38,843:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-08 06:09:42,861:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7444_key-certbot.pem
2024-02-08 06:09:46,785:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7442_csr-certbot.pem
2024-02-08 06:09:46,785:DEBUG:acme.client:Requesting fresh nonce
2024-02-08 06:09:46,785:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-08 06:09:46,943:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-08 06:09:46,944:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:46 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqefv5m7eyBpAJ7G6Nt-j4RCV2OhfZKVVEgBecz2qgQMg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-08 06:09:46,944:DEBUG:acme.client:Storing nonce: 5IXlosaqefv5m7eyBpAJ7G6Nt-j4RCV2OhfZKVVEgBecz2qgQMg
2024-02-08 06:09:46,945:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-02-08 06:09:46,950:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFlZnY1bTdleUJwQUo3RzZOdC1qNFJDVjJPaGZaS1ZWRWdCZWN6MnFnUU1nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "uOdSvC9Lk-CR38NW0v-B5i-c2SQk2wFMt_ktKLDLFWS32QVTjf0IMiSdyCIAYlhIxEVov-JWL7qi05SQKibzOnaWbxJicnulBmYkytQhNfQYbZdom1UONKl30G-1CD6v-AfHEyrXkFZS2a34ABCKBHrREAkRVDLcwztclcKqyo7-xun5333hRKhV1TtNZgXL3GGIxYu87Iu05eZDEJRrz56vr7HLifxnca_0oLIlb_WAsRKGrA72RvOJmeU2IiiZmtQZOOnV8BrfFPS0_HBJ01t3N1WdIE7_rJt0g_MrqGVEImws__DHR5kF0ZM3HZh5IWD06I3gH8rS_b2YyaljwQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-08 06:09:47,227:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-02-08 06:09:47,228:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 08 Feb 2024 05:09:46 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308777647
Replay-Nonce: 3l89SrA7cbrGgcqTF0xZBl1Be201NcPonHYB6BYMV_R1vEpWPXY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:50Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308777647"
}
2024-02-08 06:09:47,229:DEBUG:acme.client:Storing nonce: 3l89SrA7cbrGgcqTF0xZBl1Be201NcPonHYB6BYMV_R1vEpWPXY
2024-02-08 06:09:47,229:DEBUG:acme.client:JWS payload:
b''
2024-02-08 06:09:47,241:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdjYnJHZ2NxVEYweFpCbDFCZTIwMU5jUG9uSFlCNkJZTVZfUjF2RXBXUFhZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyNTIxNzcifQ",
  "signature": "Ev_aOzX4Qg0zQmUusWlTaExg2FW_NNl6W2J0JICbUV3p68km5q3xoRHqmbTKJPTbceebPKYW6Owc2TxhO8T9VUfcwnjifm7P1BqFHwWnQfZ573tYUDo0cPhQoLSoFSXAa7Di40-gQmeJDWo5ICipDVBhs_XEVsU3Xs_du41XN5gm8tlUp2hv5T3OHzcKYKHXtL58JuPlwYp28EROSF7jjGWiDoIkaar6k-EDn0lel57liR3Y6qWqtqRN9e0ikgiIsB3q4wWmsHO6IyJoHYWvxyka5LMsx_TYR4n7Hu2KT7M_0VOfaZy3fV0HQhn6h4LFwtjVVe92v5u4yjPn7Wybqg",
  "payload": ""
}
2024-02-08 06:09:47,402:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820252177 HTTP/1.1" 200 801
2024-02-08 06:09:47,403:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:46 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqn-kBZK-73gJ2ZZKoezEWRhQimD4t1Z8ruuar-hwDub0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:50Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/WXsY4w",
      "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/ZwqjFA",
      "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/HVTsug",
      "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8"
    }
  ]
}
2024-02-08 06:09:47,403:DEBUG:acme.client:Storing nonce: 5IXlosaqn-kBZK-73gJ2ZZKoezEWRhQimD4t1Z8ruuar-hwDub0
2024-02-08 06:09:47,404:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-08 06:09:47,404:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-02-08 06:09:47,404:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-08 06:09:47,405:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-08 06:09:47,406:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:09:47,406:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-08 06:09:47,406:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-08 06:09:47,406:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-08 06:09:47,407:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:09:47,460:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-08 06:09:47,570:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-08 06:09:47,572:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-08 06:09:47,574:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-08 06:09:47,578:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC.
2024-02-08 06:09:47,578:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-08 06:09:47,579:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-08 06:09:47,588:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04908690>
Prep: True
2024-02-08 06:09:47,588:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04908690> and installer None
2024-02-08 06:09:47,588:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-08 06:09:47,593:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-08 06:09:47,594:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-08 06:09:47,595:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-08 06:09:48,045:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-08 06:09:48,045:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:47 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "x29lsNcLduo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-02-08 06:09:48,046:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-08 06:09:52,374:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7445_key-certbot.pem
2024-02-08 06:09:56,255:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7443_csr-certbot.pem
2024-02-08 06:09:56,256:DEBUG:acme.client:Requesting fresh nonce
2024-02-08 06:09:56,256:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-08 06:09:56,409:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-08 06:09:56,410:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:55 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7nh5BNzRaYOROvJKieu62ziQRquulARnskqHS5W7qDC8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-08 06:09:56,411:DEBUG:acme.client:Storing nonce: 3l89SrA7nh5BNzRaYOROvJKieu62ziQRquulARnskqHS5W7qDC8
2024-02-08 06:09:56,411:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-08 06:09:56,422:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTduaDVCTnpSYVlPUk92SktpZXU2MnppUVJxdXVsQVJuc2txSFM1VzdxREM4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "yZkBs9Ojds246ni8YaTx63zFqLs_LEIQKZFlfB6big84wcLM2Gw4YrrhURbZCxU4cYxu4g0nlWXR8rBv3MTyEJlZ8yGOZ8MGgmMLk9Q_B-Fqtz4Aoukx3EtJP8QMviMtxq2n1XPMDV5FSKYioyS4bNJ7IXbSfAZyx4ftbyPycyJhPoBRq49BEtMFMk8BzPJW-98L8xot7PYLGm50svxP-O77b-SeIwij1qs48ik9njXI1SN8CT8rHtNHPYIJtPFwMY45dv4CMA-kA--9cVlx4Sqw9yP1hR9hYgBdhiPLSLjIUaKpvY7pp-GwGX9eUFGzP-SORKXudN3SMTR0TQTGcw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-08 06:09:56,607:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-08 06:09:56,609:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 08 Feb 2024 05:09:56 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308800947
Replay-Nonce: 5IXlosaqZpJBrotwLNLSMIz9CuMYjjb7eqPa0uYpkPpURq2WASg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:59Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308800947"
}
2024-02-08 06:09:56,609:DEBUG:acme.client:Storing nonce: 5IXlosaqZpJBrotwLNLSMIz9CuMYjjb7eqPa0uYpkPpURq2WASg
2024-02-08 06:09:56,610:DEBUG:acme.client:JWS payload:
b''
2024-02-08 06:09:56,620:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFacEpCcm90d0xOTFNNSXo5Q3VNWWpqYjdlcVBhMHVZcGtQcFVScTJXQVNnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyODU4NTcifQ",
  "signature": "K0blhOOqV8DjNNUIAQZdjyRNjB9L0OLjAtEc5vSsLyfA9JkFL28ZXWNtw8WLm_jnHe4qatkF0zLu6te_hjeHPUy_bpl1Dw7qdCBjD_lAV9BJo6piU1do_I8NOprbV5PRg_RKZz-wXsSoPbnG-E0Wvs--bPobpr8kxMSYjGa6lSBuWVyEM0bYh72hRaz2Ix9ZDw62zFbK7pbAPM5k2eWYkOOTVQdOLjKvidr9k6ZgN9WKYWnGLaxqe1nmhYw_B2-JZebeo6LWNaXlc2Hp2m_ygct_nzQaw4tQhW53PsVzUoN8pvi4I4u5VraP8MgpofC1L54-QWMtJnjBLG9OWbBFHQ",
  "payload": ""
}
2024-02-08 06:09:56,783:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820285857 HTTP/1.1" 200 805
2024-02-08 06:09:56,785:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:56 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaq_iAN75SSUzao0n7RX72QVOlkFGwr0EGFVAwFgq8vQbA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:59Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/6M2-8w",
      "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/NyT6VQ",
      "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/Wxujog",
      "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I"
    }
  ]
}
2024-02-08 06:09:56,785:DEBUG:acme.client:Storing nonce: 5IXlosaq_iAN75SSUzao0n7RX72QVOlkFGwr0EGFVAwFgq8vQbA
2024-02-08 06:09:56,787:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-08 06:09:56,788:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-02-08 06:09:56,788:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-08 06:09:56,789:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-08 06:09:56,790:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:09:56,791:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-08 06:09:56,791:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-08 06:09:56,792:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-08 06:09:56,794:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:09:56,840:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-08 06:09:57,110:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-08 06:09:57,111:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-08 06:09:57,112:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-08 06:09:57,116:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC.
2024-02-08 06:09:57,116:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-08 06:09:57,116:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-08 06:09:57,127:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04BC99B0>
Prep: True
2024-02-08 06:09:57,127:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04BC99B0> and installer None
2024-02-08 06:09:57,128:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-08 06:09:57,142:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-08 06:09:57,143:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-08 06:09:57,145:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-08 06:09:57,608:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-08 06:09:57,609:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:09:57 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "u0mp8_mujqw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-02-08 06:09:57,610:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-08 06:10:01,616:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7446_key-certbot.pem
2024-02-08 06:10:05,374:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7444_csr-certbot.pem
2024-02-08 06:10:05,375:DEBUG:acme.client:Requesting fresh nonce
2024-02-08 06:10:05,375:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-08 06:10:05,542:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-08 06:10:05,543:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:05 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7NG4mVJdTjNdJM7gCBLp_qtVzwL3JV0NiR0qkQp8Az3U
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-08 06:10:05,544:DEBUG:acme.client:Storing nonce: 3l89SrA7NG4mVJdTjNdJM7gCBLp_qtVzwL3JV0NiR0qkQp8Az3U
2024-02-08 06:10:05,544:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-08 06:10:05,556:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdORzRtVkpkVGpOZEpNN2dDQkxwX3F0Vnp3TDNKVjBOaVIwcWtRcDhBejNVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "xQiEMciZFt0dt5BMX3LHWRvFukjWiV0WFrKTrHIHvl3nQieasPDK1iaNNozRS_hBRHlQCjXGOPjYmt1gOJbilHO9jzW5pFjYTYaI2orjNI3VtmbOz0Edhz-tLQmrMYst8UXrP5e0HWoNkn1LlZPMvIO6_t7LEB2ye_GqhOux5r6hk7h83B3LZ37B90XShRNDOAr_jbAf6z9oeY8wC-ALVIOYDSj35iDT2yAot5Tqf1l1J1752lz8Q2bcu5Uq0CDe_BLicAqD9GB-0tzNwqNZJTyafTqkMC4NkCGn-98tmox01HCfRaisyro1gBL-vJ-VIGp16t6ML8y8PT5sXh_FEQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-08 06:10:05,742:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-02-08 06:10:05,744:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 08 Feb 2024 05:10:05 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308831767
Replay-Nonce: 3l89SrA7BiKcF24CV6PywYInI44jBOTlgRd4iCSaUDgyWYMhttY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:08Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308831767"
}
2024-02-08 06:10:05,744:DEBUG:acme.client:Storing nonce: 3l89SrA7BiKcF24CV6PywYInI44jBOTlgRd4iCSaUDgyWYMhttY
2024-02-08 06:10:05,745:DEBUG:acme.client:JWS payload:
b''
2024-02-08 06:10:05,755:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdCaUtjRjI0Q1Y2UHl3WUluSTQ0akJPVGxnUmQ0aUNTYVVEZ3lXWU1odHRZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzMjgxMzcifQ",
  "signature": "hX3eN1Nmn3fUFisqEozfyLdMQQhmGbGPEL7tsG9yMixXW0kiXEAlbXqGWM2PoXDPeqdFEUrQxbGr3u-iQjixMLDlYcMjxfDYlLssVMporpp4pgLXdjo9KZA--vXI40jjesoXJtp-2zqnq6ep_hVWrjgWCB42XSYa8uc2aAwIhm83qa8iMBplLvYtGHhtDAMKNMLwJnj78w6EKVYLB4hhjZ3SKXL50nwv_KU6DM9TNCJJIcpfpStwQrp6a23rkMi-4w9dtmivAAMzOWxioGsyWBpWluu0NY4nnoAoYstxrVtCTcUcZp4KVA7AnB44wh2k68Dr5IbFhbx79oCHeJIrEw",
  "payload": ""
}
2024-02-08 06:10:05,938:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820328137 HTTP/1.1" 200 809
2024-02-08 06:10:05,940:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:05 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqiedsR6tpwNJqc_xP1mO7orCaA3T7XbBFMkh8QCRv8SY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:08Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/EQtjAQ",
      "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/KonEuA",
      "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/buqaYg",
      "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM"
    }
  ]
}
2024-02-08 06:10:05,940:DEBUG:acme.client:Storing nonce: 5IXlosaqiedsR6tpwNJqc_xP1mO7orCaA3T7XbBFMkh8QCRv8SY
2024-02-08 06:10:05,941:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-08 06:10:05,942:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-02-08 06:10:05,943:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-08 06:10:05,943:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-08 06:10:05,945:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:10:05,945:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-08 06:10:05,945:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-08 06:10:05,946:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-08 06:10:05,948:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:10:06,002:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-08 06:10:06,221:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-08 06:10:06,223:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-08 06:10:06,224:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-08 06:10:06,229:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC.
2024-02-08 06:10:06,229:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-08 06:10:06,229:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-08 06:10:06,234:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C256D0>
Prep: True
2024-02-08 06:10:06,234:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C256D0> and installer None
2024-02-08 06:10:06,234:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-08 06:10:06,238:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-08 06:10:06,239:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-08 06:10:06,241:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-08 06:10:06,870:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-08 06:10:06,871:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:06 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "AtDUaUWHNho": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-08 06:10:06,872:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-08 06:10:11,501:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7447_key-certbot.pem
2024-02-08 06:10:15,362:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7445_csr-certbot.pem
2024-02-08 06:10:15,362:DEBUG:acme.client:Requesting fresh nonce
2024-02-08 06:10:15,362:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-08 06:10:15,540:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-08 06:10:15,542:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:14 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUOGfqyxwxtTZEVJ_gAr5x7vpTHhV_e9J09Rj6br4Jl6w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-08 06:10:15,542:DEBUG:acme.client:Storing nonce: kRyagOpUOGfqyxwxtTZEVJ_gAr5x7vpTHhV_e9J09Rj6br4Jl6w
2024-02-08 06:10:15,543:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-08 06:10:15,549:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVPR2ZxeXh3eHRUWkVWSl9nQXI1eDd2cFRIaFZfZTlKMDlSajZicjRKbDZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "EOGdeNpSVUzBYpL4XKDPBabv7b-J3VEkAode2WfhqP_VhTtbR9FrhyhqSNBkN0tydsgEq09PPG9BiGoKeYQDlKnOm9U4tJ4_ri3CTsT7mNQdjygOAZiMh8wnwdG9x7PDZ3sXA-e3BZS-VKPrQmk3cBVkWd3Rv65wyeEY89VCKsycP6s8kgTfdDUZCUN_MNEh6PDcY1_lJSsJwTOvyhVCqrxCwkJG3zHPJFKmhM15jzTTj8-TPa-UE6_2euXOKzEtoR7WKlpGqH8z-YQiQ_ds7lXu3AupUquRpDSEJmK1HkIcu14cRQMtPjoDU0CqVMMhfunYx-RoraYfDdMPUqw0Ng",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-08 06:10:15,737:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-02-08 06:10:15,739:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 08 Feb 2024 05:10:15 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308858697
Replay-Nonce: 2ksh1KUsJkd81dRsrlC4iiGT9-ZFvXYsg8hV5w1fhB1tyMPhsrA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:17Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308858697"
}
2024-02-08 06:10:15,739:DEBUG:acme.client:Storing nonce: 2ksh1KUsJkd81dRsrlC4iiGT9-ZFvXYsg8hV5w1fhB1tyMPhsrA
2024-02-08 06:10:15,740:DEBUG:acme.client:JWS payload:
b''
2024-02-08 06:10:15,751:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNKa2Q4MWRSc3JsQzRpaUdUOS1aRnZYWXNnOGhWNXcxZmhCMXR5TVBoc3JBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzNjc4NDcifQ",
  "signature": "L-LQt57Xf9FLL5fYsHKJW-70RCJ8EbG6yiTRIrJYYy9j_zCk4cc8kFpCQdNtAO_eh_sKjtjkVJlifJC1fFHFOJiISq7V-BMCvWKnJ3mro0mPY0OyWUCVQTvZ-JCeFQ-Qy3zpbHgnJ3XPnAjoH9JVyDV45gOPgiQJOVAvxq2Pg_YeBkHbzmNjU79Xq3vu8caUuHAIi4c92XshIlPUmAa6CORmfFXLpxNlZ-oQFVpDZUD1nRkcCuwRHa3mu6X79nsCibV7q0QFNkxxV5_81iCMRo_Uqlmu2K1x-pFgzau2SxFLbOiDanRjtN3FUI_2Sru_nCLryKOk52ghhR2iq0ySBw",
  "payload": ""
}
2024-02-08 06:10:15,935:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820367847 HTTP/1.1" 200 806
2024-02-08 06:10:15,937:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:15 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUKjO3YBarRd8vgUdvvOzMLTUXfyb3JhlqFCnmmNKt1a4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:17Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/666fkA",
      "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/UVRmBQ",
      "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/SNClog",
      "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM"
    }
  ]
}
2024-02-08 06:10:15,937:DEBUG:acme.client:Storing nonce: kRyagOpUKjO3YBarRd8vgUdvvOzMLTUXfyb3JhlqFCnmmNKt1a4
2024-02-08 06:10:15,938:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-08 06:10:15,939:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-02-08 06:10:15,940:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-08 06:10:15,940:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-08 06:10:15,942:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:10:15,942:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-08 06:10:15,943:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-08 06:10:15,943:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-08 06:10:15,946:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:10:15,991:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-02-08 06:10:15,991:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-08 06:10:15,991:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-02-08 06:10:15,998:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-02-08 06:10:16,000:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-02-08 06:10:16,000:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-02-08 06:10:16,000:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-02-08 06:10:16,001:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-02-08 06:10:16,003:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-02-08 06:10:16,040:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-08 06:10:16,233:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-08 06:10:16,235:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-08 06:10:16,238:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-08 06:10:16,243:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC.
2024-02-08 06:10:16,243:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-08 06:10:16,243:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-08 06:10:16,248:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C25510>
Prep: True
2024-02-08 06:10:16,248:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C25510> and installer None
2024-02-08 06:10:16,248:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-08 06:10:16,266:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-08 06:10:16,267:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-08 06:10:16,269:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-08 06:10:16,816:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-08 06:10:16,817:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:16 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "fppPggcaU2E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-08 06:10:16,818:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-08 06:10:20,978:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7448_key-certbot.pem
2024-02-08 06:10:24,831:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7446_csr-certbot.pem
2024-02-08 06:10:24,832:DEBUG:acme.client:Requesting fresh nonce
2024-02-08 06:10:24,832:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-08 06:10:25,013:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-08 06:10:25,014:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:24 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUs_nSqWGcVL-1pg2WCjBIbV_xEaF2sUcNrXzsm2sKPtKg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-08 06:10:25,015:DEBUG:acme.client:Storing nonce: 2ksh1KUs_nSqWGcVL-1pg2WCjBIbV_xEaF2sUcNrXzsm2sKPtKg
2024-02-08 06:10:25,015:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-08 06:10:25,026:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNfblNxV0djVkwtMXBnMldDakJJYlZfeEVhRjJzVWNOclh6c20yc0tQdEtnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Rt6TwZ7-h4cdDjTHOdufSeBpJxrA0rmarYUdGNLk5YuUrLXCBYPO1Xyo9Ca4WK8sRkIj8MkqJJ4VCUtiWy2xbw8-edKlqWYf7FpyOHDS7fPDQvYki36n-LK5za5D2GIb3SbxmXVpguGaP03c27jBgqe_BhBxNAziedW56X_IYyQwz9QBDdrDQo9M0j-uKR46dzddqUlmoh2GZV2D_n04ASL1ETKJ4DvYkaDoIVm-_yoR9YA4EuxhBFA42FMGA6Iq8bklQCll2oA14fb_rAhiACARagMSwd1KECD-yexVvYqzkG-gWJ63hF-O-6A7OQIXmqm0u038BmI0YnlLzZqhlA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-08 06:10:25,219:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-02-08 06:10:25,220:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 08 Feb 2024 05:10:24 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308883057
Replay-Nonce: 2ksh1KUs5WYo-Gbn683Ljxqfk8mdqDKfqsiSlBaTZM1yPIJM0-Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308883057"
}
2024-02-08 06:10:25,220:DEBUG:acme.client:Storing nonce: 2ksh1KUs5WYo-Gbn683Ljxqfk8mdqDKfqsiSlBaTZM1yPIJM0-Y
2024-02-08 06:10:25,221:DEBUG:acme.client:JWS payload:
b''
2024-02-08 06:10:25,228:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXM1V1lvLUdibjY4M0xqeHFmazhtZHFES2Zxc2lTbEJhVFpNMXlQSUpNMC1ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MDQ2NjcifQ",
  "signature": "k8LVY_ykVuqFSHsMd-P9Dg7V5e8txz5dFEUxoHHAt-bS9KnyCe6iv8z71NFwVEuxsgUf3sRb_BytyT3DE4uvALEq1XEtR99TsnHJRV1iaMUn6tPZA-A6Je6gMm826PNvJAdbU9II9ceVUdlqGi0OuaYHwomwY6hBXqCgdhUsfdmSaYlO1uD49qe32C-9SUuzobWAiQM9JWRT3PU6XrERPm55LaBJzdsh3Oiz783P0YJm7Y3g_LidzTImyVS__ZeLJnhZWM2d4vosP5JrahS0OpNQ8UhcY3RVKCzODPXUeQKEmgiGHT2fVYxcH_1DqJPp1axOI6JYyFRYBK1DdI0aBQ",
  "payload": ""
}
2024-02-08 06:10:25,414:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820404667 HTTP/1.1" 200 811
2024-02-08 06:10:25,416:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:24 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUGHWIrQB5g4Wg7QFGDEcwBRxL0PcFVHxh5GwPWGiFvEA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:25Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/g54rZQ",
      "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/4yZXyw",
      "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/bXegoA",
      "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08"
    }
  ]
}
2024-02-08 06:10:25,416:DEBUG:acme.client:Storing nonce: kRyagOpUGHWIrQB5g4Wg7QFGDEcwBRxL0PcFVHxh5GwPWGiFvEA
2024-02-08 06:10:25,417:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-08 06:10:25,418:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-02-08 06:10:25,418:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-08 06:10:25,419:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-08 06:10:25,420:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:10:25,420:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-08 06:10:25,420:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-08 06:10:25,420:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-08 06:10:25,421:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:10:25,468:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-08 06:10:25,654:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-08 06:10:25,656:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-08 06:10:25,658:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-08 06:10:25,662:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC.
2024-02-08 06:10:25,663:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-08 06:10:25,663:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-08 06:10:25,670:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C39F10>
Prep: True
2024-02-08 06:10:25,670:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C39F10> and installer None
2024-02-08 06:10:25,670:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-08 06:10:25,676:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-08 06:10:25,677:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-08 06:10:25,680:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-08 06:10:26,216:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-08 06:10:26,217:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:25 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "n3jPN8n4-5w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-08 06:10:26,218:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-08 06:10:30,264:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7449_key-certbot.pem
2024-02-08 06:10:34,204:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7447_csr-certbot.pem
2024-02-08 06:10:34,204:DEBUG:acme.client:Requesting fresh nonce
2024-02-08 06:10:34,204:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-08 06:10:34,868:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-08 06:10:34,869:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:34 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUsHURqrEg8m9BV4q7GAFY_BTY9hdsofdiXWCT2sA_3SD8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-08 06:10:34,870:DEBUG:acme.client:Storing nonce: 2ksh1KUsHURqrEg8m9BV4q7GAFY_BTY9hdsofdiXWCT2sA_3SD8
2024-02-08 06:10:34,870:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-08 06:10:34,884:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNIVVJxckVnOG05QlY0cTdHQUZZX0JUWTloZHNvZmRpWFdDVDJzQV8zU0Q4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "YF1F0turUdu2aCTXmrqbCwDsVpFgOdo00rsPAwLzxw2-qGRA6JAA_ioxRzW1nfSiaY47bJf5t2zpgwZt09AVRCfnv6-0tPajpj4zC0gzc2Q-4KR2JMNL2GUdj0fi5j68JSpH86X8Om99gOYqO7z4Huo4ihQlGQJ8nI3ix1SOP3rELkHjQMvTjSC_KHDWFa0_PplEPlBf_y1dbgc2HHiHvetGYHgJaCvoVqki5L6R8Q5C9PN5ArQ4tvS9RzXG6eISCqblZyz0EPZr9je3Po0DNtOENrgbDn_tnoBlckkeiaId8C4EUMdVjqbIBT-ftv-4HAuoKGHg4OoH3sfxEsU6pw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-08 06:10:35,085:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-02-08 06:10:35,087:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 08 Feb 2024 05:10:34 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308906667
Replay-Nonce: 2ksh1KUsWjqZ0orfGuNCQP4We2Akg7Gf9gn4vDcTv22Gd1eRFzQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308906667"
}
2024-02-08 06:10:35,087:DEBUG:acme.client:Storing nonce: 2ksh1KUsWjqZ0orfGuNCQP4We2Akg7Gf9gn4vDcTv22Gd1eRFzQ
2024-02-08 06:10:35,088:DEBUG:acme.client:JWS payload:
b''
2024-02-08 06:10:35,096:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNXanFaMG9yZkd1TkNRUDRXZTJBa2c3R2Y5Z240dkRjVHYyMkdkMWVSRnpRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MzgxMjcifQ",
  "signature": "tdWkrJ_uzmeG_Dumoe3ZH3K3xDLBYWe-RbWKCUU5e1wt5BkFyG14tNpXoZpZwFgkc70MN7dItBhTncwEnM1VJt5gkxW0EEY2CHBstMFV_EaJHklSJOMoGUdybS715DpnI7m5SaYhUi5EZJ3L_k9xpYsdy3IMs2dwK-eYVpJV-qZ_mrITzGQbyhBgeC-phednfmVcaBW1n3E74rvlX8_90WSplAmITvaC0RFvr_e75erWUbIWFFIu8_nfjEyzfzcQEHLo_NZ2_XFcMYMAUqBMcPTBJ_dZVjU-A7mApNYT444kLQrVHq3t0zXnwBCBM1P19AOzaX90yosvmFi7JeISeQ",
  "payload": ""
}
2024-02-08 06:10:35,280:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820438127 HTTP/1.1" 200 810
2024-02-08 06:10:35,281:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:34 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUupTcFrqPLE_m0E7t9H5uQKhbBMW6_BZ-K6VBbfhqbaI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:34Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/rIGBzA",
      "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/SWtTfQ",
      "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/R74bXA",
      "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs"
    }
  ]
}
2024-02-08 06:10:35,281:DEBUG:acme.client:Storing nonce: kRyagOpUupTcFrqPLE_m0E7t9H5uQKhbBMW6_BZ-K6VBbfhqbaI
2024-02-08 06:10:35,282:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-08 06:10:35,282:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-02-08 06:10:35,283:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-08 06:10:35,283:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-08 06:10:35,284:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:10:35,284:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-08 06:10:35,284:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-08 06:10:35,284:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-08 06:10:35,286:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:10:35,340:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-08 06:10:35,567:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-08 06:10:35,569:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2024-02-08 06:10:35,571:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2024-02-08 06:10:35,577:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC.
2024-02-08 06:10:35,577:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-08 06:10:35,577:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-08 06:10:35,581:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C2C7D0>
Prep: True
2024-02-08 06:10:35,582:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C2C7D0> and installer None
2024-02-08 06:10:35,582:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-08 06:10:35,598:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-08 06:10:35,598:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-08 06:10:35,600:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-08 06:10:36,138:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-08 06:10:36,138:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:35 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "FQ7ZFlhCxlc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-08 06:10:36,139:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-08 06:10:40,177:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7450_key-certbot.pem
2024-02-08 06:10:44,119:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7448_csr-certbot.pem
2024-02-08 06:10:44,119:DEBUG:acme.client:Requesting fresh nonce
2024-02-08 06:10:44,120:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-08 06:10:44,298:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-08 06:10:44,299:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:43 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUsvG6tLaEuOlAYhPvpi1vOTOiQ-hbCwK_eNvchBpKDYhE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-08 06:10:44,300:DEBUG:acme.client:Storing nonce: 2ksh1KUsvG6tLaEuOlAYhPvpi1vOTOiQ-hbCwK_eNvchBpKDYhE
2024-02-08 06:10:44,301:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-08 06:10:44,308:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXN2RzZ0TGFFdU9sQVloUHZwaTF2T1RPaVEtaGJDd0tfZU52Y2hCcEtEWWhFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "uPzuStByFqQnsbwSseek3XVf4aBHwtEYyM9kTWcOaLQFpooy5urEL2TrFmUTKr4p-jVkmDURCJFekW1f7u9TqYvrOtPYHQ3mYB1nFaoHk8zhAZrwMvb0CkFZHpaoegVAEaZsljn8b1AyjR7PrjxtGkPT7kKR4t6LvzGE6GlarnFwbfiiZ4MdBCjFjN-z3-2OKrskViaCh3z4tsFfvtp1803RUzfbmcal5AIZh70Q3U-r1ZugKFUXHhJ7h4uwabi48vIjj7G2N7X0q19c8GEwzsQ1BgQsv_4BmWAxzr428y0xr9KB8P9K9U7YBRGzE_39P7vzYYIni7gI7Xd6l02iiw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-08 06:10:44,494:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-02-08 06:10:44,496:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 08 Feb 2024 05:10:43 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308929257
Replay-Nonce: 2ksh1KUsoYP1zMb02gcvXwhmklGcT62ggM-5EElNgKK0DRLCziQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:43Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308929257"
}
2024-02-08 06:10:44,496:DEBUG:acme.client:Storing nonce: 2ksh1KUsoYP1zMb02gcvXwhmklGcT62ggM-5EElNgKK0DRLCziQ
2024-02-08 06:10:44,497:DEBUG:acme.client:JWS payload:
b''
2024-02-08 06:10:44,503:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNvWVAxek1iMDJnY3ZYd2hta2xHY1Q2MmdnTS01RUVsTmdLSzBEUkxDemlRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0NjkxOTcifQ",
  "signature": "qXq9uPkkMxQR8Pr9zOYhUTXmqUb4ar_VWIW8tp0sxR8hOkYPQfVyieRcS_JigR7u9VgP6Zw2dhoPDFcL6plKAc3Y_1dTQ1DChyrqRcy77b4WwGa-a7GEBXkIHKszT_DveOqD24AVSoEhInJUI85pq2dIZdR1ylcMmu61h8aDmTibNlqI9NTzVs4lQfXJPSuJRROFizvlcn9IGjeGDF3FPdH8L_pNzoxt8k6eo6JqRz1X2JZvVN86pu0_hsfa6Lj36Ng8CmdqVmmRc0Z7iDSccMuUwJ8ZU3eYPfg7gtCTgDxPONyWapRqpU4dFox30pca0tzVajMJYHWPGafmx5viIg",
  "payload": ""
}
2024-02-08 06:10:44,685:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820469197 HTTP/1.1" 200 809
2024-02-08 06:10:44,686:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:44 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUsAwdP8NaQhyMxvWcCfT_J0HFRGilhf23nSYC_gkhgBSQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:43Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/PqKyzA",
      "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/nQMx2Q",
      "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/ZJc1Yg",
      "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0"
    }
  ]
}
2024-02-08 06:10:44,687:DEBUG:acme.client:Storing nonce: 2ksh1KUsAwdP8NaQhyMxvWcCfT_J0HFRGilhf23nSYC_gkhgBSQ
2024-02-08 06:10:44,688:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-08 06:10:44,688:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-02-08 06:10:44,689:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-08 06:10:44,690:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-08 06:10:44,691:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:10:44,691:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-08 06:10:44,692:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-08 06:10:44,692:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-08 06:10:44,694:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:10:44,746:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-08 06:10:44,932:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-08 06:10:44,934:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer.
2024-02-08 06:10:44,935:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD
2024-02-08 06:10:44,939:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC.
2024-02-08 06:10:44,939:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-08 06:10:44,939:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-08 06:10:44,944:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04BC9B10>
Prep: True
2024-02-08 06:10:44,944:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04BC9B10> and installer None
2024-02-08 06:10:44,944:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-08 06:10:44,948:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-08 06:10:44,949:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-08 06:10:44,951:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-08 06:10:45,424:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-08 06:10:45,425:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:44 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "foQP4g2SKI4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-08 06:10:45,427:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-08 06:10:49,463:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7451_key-certbot.pem
2024-02-08 06:10:53,395:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7449_csr-certbot.pem
2024-02-08 06:10:53,396:DEBUG:acme.client:Requesting fresh nonce
2024-02-08 06:10:53,396:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-08 06:10:53,552:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-08 06:10:53,553:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:53 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7vSbXyljsHpD-sQjfLuQP6b4lI_-YoV6dccwfZK06KxE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-08 06:10:53,554:DEBUG:acme.client:Storing nonce: 3l89SrA7vSbXyljsHpD-sQjfLuQP6b4lI_-YoV6dccwfZK06KxE
2024-02-08 06:10:53,554:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-08 06:10:53,562:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTd2U2JYeWxqc0hwRC1zUWpmTHVRUDZiNGxJXy1Zb1Y2ZGNjd2ZaSzA2S3hFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "WSiGccL9IQH9FsbIFNBg66tohNG8K5B6V2tYzKGY6azSg90CgRBOKfEBpTioejrXHv4tDo6E_gn5EimVrFgpSpxXfbtTLmGpqNjAiCOyeuurYinjVh2fp4LTJCFZOZPJ0npH4QSuvJDZZeMa7JDbWh7qOPV-oFBzUsOxzGSJJXxNeuNPoFPIsQ5MSVWBeEEDkuwL0D76k-qLD3CxjuebH3QgaPNQzXkAB8x9mDgMV6G5n62hjdpWAN6HAZ68WAqmHoBuXna9wXSxqqYkvBK04dxqkG26e8SzFLjirHjqokvwZ9Bjycuumf8ux1MpX5P7yx9Af-tpU552chpGCZxiTA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-08 06:10:53,744:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-08 06:10:53,746:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 08 Feb 2024 05:10:53 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308951787
Replay-Nonce: 5IXlosaqH7jsU85RVY186XBpxOJy79TkszZieyy_XVBBKpcOxOQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308951787"
}
2024-02-08 06:10:53,746:DEBUG:acme.client:Storing nonce: 5IXlosaqH7jsU85RVY186XBpxOJy79TkszZieyy_XVBBKpcOxOQ
2024-02-08 06:10:53,747:DEBUG:acme.client:JWS payload:
b''
2024-02-08 06:10:53,756:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFIN2pzVTg1UlZZMTg2WEJweE9KeTc5VGtzelppZXl5X1hWQkJLcGNPeE9RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MDE0NTcifQ",
  "signature": "evmIEDjIPtwereAL1LM5u5Ptgohe5qgOeS1FsifTv7NGSpY445h7qzw4EMOkq8oNzFmBXMzanJ-K2CFpAg8o90n6mXx3lTF7uLUYHj686_1STPMXzhj72W_W_7M4sN9Fo8ANIUMJomnm0NXnu3Gwpdn7ZS3TEKTP6qXyccNTMoZ13B2OetSKch7i7GZ6KaOIBns45hb7djTY3HhkocQ_vjYaJubGDCyhrIr-RlBD3VO-xxQn8LvZtKVU1zvdpXJh76mc1WrDqJf_Z3Ju2mhDnlIwqxE1SXFGkbhaF8RmnxIqdLabA1Ex2u1-Vg5n4LYIMJrfsxrgaZGGkzf33YUdOA",
  "payload": ""
}
2024-02-08 06:10:53,917:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820501457 HTTP/1.1" 200 805
2024-02-08 06:10:53,917:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:53 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7p06PHM9ObXefUQklV0q0GVEByhRzje0V2auJeycTOZU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:52Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/nfOlPQ",
      "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/ptX2uw",
      "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/u4UgEQ",
      "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw"
    }
  ]
}
2024-02-08 06:10:53,918:DEBUG:acme.client:Storing nonce: 3l89SrA7p06PHM9ObXefUQklV0q0GVEByhRzje0V2auJeycTOZU
2024-02-08 06:10:53,918:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-08 06:10:53,918:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-02-08 06:10:53,919:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-08 06:10:53,919:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-08 06:10:53,920:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:10:53,920:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-08 06:10:53,921:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-08 06:10:53,921:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-08 06:10:53,922:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:10:53,968:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-08 06:10:54,186:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-08 06:10:54,187:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-08 06:10:54,188:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-08 06:10:54,192:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC.
2024-02-08 06:10:54,192:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-08 06:10:54,192:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-08 06:10:54,197:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x00C02D30>
Prep: True
2024-02-08 06:10:54,197:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x00C02D30> and installer None
2024-02-08 06:10:54,197:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-08 06:10:54,201:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-08 06:10:54,202:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-08 06:10:54,204:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-08 06:10:54,738:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-08 06:10:54,739:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:10:54 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "2Egwefmtv6c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-08 06:10:54,740:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-08 06:10:58,596:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7452_key-certbot.pem
2024-02-08 06:11:02,295:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7450_csr-certbot.pem
2024-02-08 06:11:02,295:DEBUG:acme.client:Requesting fresh nonce
2024-02-08 06:11:02,295:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-08 06:11:02,475:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-08 06:11:02,476:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:11:01 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUsMq0zDF_q4MP8xWYynf5cPzr23e15SC3cfY9pUyriDTc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-08 06:11:02,477:DEBUG:acme.client:Storing nonce: 2ksh1KUsMq0zDF_q4MP8xWYynf5cPzr23e15SC3cfY9pUyriDTc
2024-02-08 06:11:02,477:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-08 06:11:02,487:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNNcTB6REZfcTRNUDh4V1l5bmY1Y1B6cjIzZTE1U0MzY2ZZOXBVeXJpRFRjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "QQQd1ByuwCD6H2QppD8mGRl-0zjyFJ4f7RSg_zjVmYtnLwbK6j4jO-lkb78m8jYe7FbFwq_L7mvprZ-rMAfs3htvEPVptBVlLIy7UctqyqSd0wieiy5Aep_JlNFlyDWMh_QsbOTeHbYhUFvBCWhYwzP9v_rncUPh9i0Hj7rnYktPyyITfN_xMB-v0OCG0na5Qkr750OuIRpVyZ4fcgL3IuLWkgkJ_B7rLbvVjLG903BEauiz4uqKx4Za9RQ5tjR1_r_exVqWEzj07Uj-Ipt6XItwol86HdlsEByYE2A_TjNsYc6K-eWfNJ_QvBNRVT6e_-G6A7tjIVOUd2EQmB3evA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-08 06:11:02,674:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-08 06:11:02,676:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 08 Feb 2024 05:11:02 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308975127
Replay-Nonce: 2ksh1KUsdjZ2DHA3xm2T2Zw-ulZkLRKMasBzVvBmVneuUxNB4QQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:27:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308975127"
}
2024-02-08 06:11:02,676:DEBUG:acme.client:Storing nonce: 2ksh1KUsdjZ2DHA3xm2T2Zw-ulZkLRKMasBzVvBmVneuUxNB4QQ
2024-02-08 06:11:02,677:DEBUG:acme.client:JWS payload:
b''
2024-02-08 06:11:02,683:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNkaloyREhBM3htMlQyWnctdWxaa0xSS01hc0J6VnZCbVZuZXVVeE5CNFFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MzM3MzcifQ",
  "signature": "XsrxfIw8OC2DhZzhLeZlcVUFEUEjchMXf2F0x58rvWz9Vpk5EvKOWg_tJTeT8aWn5Wt0NbX16T1V8Ajfoqz2HWmFyl1v1QnAIJwQtqVW0C4gd4iKvvaSdwAsN5UdViipsGD12KwTLV9m4ZbNJ9Ady8vlIYmsc-OI_lMcxLI8YWDCD5ViNxYnise4woyrXs981h5unZncZDHkKZfw3rhNmE5S8jNN3WrS9okiza37Aky9zyuF72Xn0u1cfqRQCytegFWogXrhvu6Ig1UPe7dxUYriSdSqceMDZKlUzHWKqLx9BCFi-sGkJxgjz58l0F6NQ6q9J8CdtQrsDn_RQn8eng",
  "payload": ""
}
2024-02-08 06:11:02,864:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820533737 HTTP/1.1" 200 805
2024-02-08 06:11:02,865:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:11:02 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpU6uBEsoG4SKouXlHEvDk5UvJBNi4KOxgUSHl58BcITlk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:27:01Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/u7lnsw",
      "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/kawHqw",
      "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/Xsywzg",
      "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs"
    }
  ]
}
2024-02-08 06:11:02,865:DEBUG:acme.client:Storing nonce: kRyagOpU6uBEsoG4SKouXlHEvDk5UvJBNi4KOxgUSHl58BcITlk
2024-02-08 06:11:02,865:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-08 06:11:02,866:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-02-08 06:11:02,866:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-08 06:11:02,867:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-08 06:11:02,867:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:11:02,868:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-08 06:11:02,868:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-08 06:11:02,868:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-08 06:11:02,870:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:11:02,917:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-08 06:11:03,105:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-08 06:11:03,106:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-08 06:11:03,107:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-08 06:11:03,112:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC.
2024-02-08 06:11:03,112:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-08 06:11:03,112:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-08 06:11:03,117:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C2C470>
Prep: True
2024-02-08 06:11:03,117:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C2C470> and installer None
2024-02-08 06:11:03,117:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-08 06:11:03,121:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-08 06:11:03,122:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-08 06:11:03,124:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-08 06:11:03,659:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-08 06:11:03,659:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:11:03 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "BzyFZ85Ka18": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-08 06:11:03,661:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-08 06:11:08,053:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7453_key-certbot.pem
2024-02-08 06:11:11,782:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7451_csr-certbot.pem
2024-02-08 06:11:11,782:DEBUG:acme.client:Requesting fresh nonce
2024-02-08 06:11:11,783:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-08 06:11:11,962:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-08 06:11:11,963:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:11:11 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUse3tzo4vAh87owAq96jSX-I2REgqkAhYIZ_XtQipj8Ck
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-08 06:11:11,964:DEBUG:acme.client:Storing nonce: 2ksh1KUse3tzo4vAh87owAq96jSX-I2REgqkAhYIZ_XtQipj8Ck
2024-02-08 06:11:11,964:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-08 06:11:11,969:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNlM3R6bzR2QWg4N293QXE5NmpTWC1JMlJFZ3FrQWhZSVpfWHRRaXBqOENrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Hl6vEztVrlJZ1HcvFD_LffbpzrBVyA5fkXkkExM00TYnPaEpgNNueksMaxuXdWxGjZgAi34INcu8ugkzNia_9pw4wG-AmYpI0UBBwORHN9lL29l6zLSC7qAWvZ184Ae6lVYfyey6FMKTpptKt4luI3iynluWCXjFrGgpwZcDm-e6P16AJ0aLeYlCuIlBYAodmMMYvfGqjCYYwtEm7vUYdP5jbB4OqLpHI8g796MNyY-gLoo3_np25XDEk9SULVbcLAXakWh7vV7Vwf24RRZdT4NQDkOVOTZBdWBsLlE23jFd_HuLPq-OPUbvghlUtA-TfQzsMk8E8-ib60jr2IJyfA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-08 06:11:12,159:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-08 06:11:12,161:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 08 Feb 2024 05:11:11 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241309008647
Replay-Nonce: kRyagOpUNkf6VdvnP_RMhdGWsDRRDPjkBMvAnVEct1jIJqyhGK4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:27:10Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241309008647"
}
2024-02-08 06:11:12,161:DEBUG:acme.client:Storing nonce: kRyagOpUNkf6VdvnP_RMhdGWsDRRDPjkBMvAnVEct1jIJqyhGK4
2024-02-08 06:11:12,162:DEBUG:acme.client:JWS payload:
b''
2024-02-08 06:11:12,174:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVOa2Y2VmR2blBfUk1oZEdXc0RSUkRQamtCTXZBblZFY3QxaklKcXloR0s0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1ODAxNjcifQ",
  "signature": "d10pOTB8svo4_e3CXs-Zlb0mEeB4NvZjpdWKHHl2hl1aykbNG2iCiC38SGMC9zXUBbuj_8E9qdusokHJvA1PxNwOmPD3NqImLzZ5KG-EOkBBrZpWYCQk44qyoogzwL_LfwFTXvfYlxf694P2yEDtx_I33RKFghwTUUnpYA7ymUjwgTbJHLw3shrGMj4qHC4gDiW9D4Bdn2nxcQopzJOzAB46R3dbDLqBfiveifjDyYrzIXB0x3yjA9rzUfiez3tkLvbzD3o_PIEv6T1zRG94zLVk1NznVVIgbNLpPoAPdlIHAgdMbx5EJD1KZQTMWLvPjXY7wJgCmyzm7LFOb5U-0w",
  "payload": ""
}
2024-02-08 06:11:12,354:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820580167 HTTP/1.1" 200 805
2024-02-08 06:11:12,355:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 08 Feb 2024 05:11:11 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUsfN9lJvbNhgOFPLI4nDOwwbeWulb6h9KcPdEOFsgIcI0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:27:10Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/yNgMJw",
      "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/JW2Bpw",
      "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/iioLug",
      "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc"
    }
  ]
}
2024-02-08 06:11:12,355:DEBUG:acme.client:Storing nonce: 2ksh1KUsfN9lJvbNhgOFPLI4nDOwwbeWulb6h9KcPdEOFsgIcI0
2024-02-08 06:11:12,356:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-08 06:11:12,357:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-02-08 06:11:12,358:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-08 06:11:12,358:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-08 06:11:12,360:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:11:12,360:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-08 06:11:12,361:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-08 06:11:12,362:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-08 06:11:12,363:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-08 06:11:12,363:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-02-08 06:11:12,364:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-02-08 06:11:12,375:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-02-08 06:11:12,377:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)