2024-01-31 04:49:13,304:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-01-31 04:49:13,304:DEBUG:certbot._internal.main:Arguments: []
2024-01-31 04:49:13,304:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-01-31 04:49:14,118:DEBUG:certbot._internal.log:Root logging level set at 20
2024-01-31 04:49:14,119:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-01-31 04:49:14,157:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x050C0070> and installer <certbot._internal.cli.cli_utils._Default object at 0x050C0070>
2024-01-31 04:49:14,196:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-31 04:49:14,373:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-31 04:49:14,375:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer.
2024-01-31 04:49:14,379:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD
2024-01-31 04:49:14,386:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC.
2024-01-31 04:49:14,386:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-31 04:49:14,387:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-31 04:49:14,391:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0509BEF0>
Prep: True
2024-01-31 04:49:14,392:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0509BEF0> and installer None
2024-01-31 04:49:14,392:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-31 04:49:14,398:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-31 04:49:14,399:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-31 04:49:14,401:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-31 04:49:14,870:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-31 04:49:14,871:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:13 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "2xo6ZjP1L7c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-31 04:49:14,871:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-31 04:49:19,148:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7246_key-certbot.pem
2024-01-31 04:49:23,107:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7244_csr-certbot.pem
2024-01-31 04:49:23,107:DEBUG:acme.client:Requesting fresh nonce
2024-01-31 04:49:23,108:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-31 04:49:23,258:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-31 04:49:23,258:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:21 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5dWDIqpMg-vDEcjhDsOx0MIHv8R1pX7Be8evyhmm7lJY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-31 04:49:23,258:DEBUG:acme.client:Storing nonce: R3i4Vkc5dWDIqpMg-vDEcjhDsOx0MIHv8R1pX7Be8evyhmm7lJY
2024-01-31 04:49:23,259:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-31 04:49:23,264:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVkV0RJcXBNZy12REVjamhEc094ME1JSHY4UjFwWDdCZThldnlobW03bEpZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "rbOEhl6FfMJecL8sn_UZ1bow6epbdYM1zEEcmMAD5n1ewXYFcrEL9rnoNRK02wHgMAe7xpz5dBb9N9Lh6wB_lGOLZpPx68b0_SS5gJ6hqsGIUqJWk9hpAUOA3d6Q-lAqalL4XS2t3E-XsaR3P9HsZF-uJmCuvLhTSiapYRc5xZn0P06YtIyfkFOGCE8A-BLfH9TgI1C6pObd6YCQV4tqPH3sWfDwLXN-U0vYNxrPDc2byjPuWoS0V5M_MvDJXvk9TSCQJa9-VrrvmgJEQtLPmEJ80NPablSV5qYR5ETfGZhDQsx_IB9yAw6k55PHARp0jwImDNsG_U5JCRr9jGjnBg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-31 04:49:23,605:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-01-31 04:49:23,606:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 31 Jan 2024 03:49:22 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463125096
Replay-Nonce: R3i4Vkc5P5z7O_THXVbXkxDFVWgir6UzHeLXPpUea7zlD9TBRz8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:45:30Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463125096"
}
2024-01-31 04:49:23,606:DEBUG:acme.client:Storing nonce: R3i4Vkc5P5z7O_THXVbXkxDFVWgir6UzHeLXPpUea7zlD9TBRz8
2024-01-31 04:49:23,606:DEBUG:acme.client:JWS payload:
b''
2024-01-31 04:49:23,611:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVQNXo3T19USFhWYlhreERGVldnaXI2VXpIZUxYUHBVZWE3emxEOVRCUno4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyMDk3MTYifQ",
  "signature": "vnx7F2TQ-1f2GmA5LZRCUtQpHCzoaoq4LJeBiG2BcJZoZEHFHXgmlmFC5ZwdzKgrHYCfpG9zj-HopwvXDa_9hKgpt9IUgFNbvAU_Rcd6rAWfMLJ7pwM2cmbmM_K6NVisZoAbbKKsmeNxsHyzZdbBb4k6b5SLb8AGfh7c3LqRsw5YLGhkfI7jDw7uAfPDGPDUKxLiYDNMkDKzqUX2B6cMIgs19YYZJk0LlqWOOPkBGpEGxJdk2jC9KugVtdEcoC5r_vFzmJ_lhEcx4dUNOfubIj0ZdJbg7RkrTioJ0cToAqW33dZ-yIe--GyJeTXcburd6rPLgH0Q_eN_lMkM7jl_qA",
  "payload": ""
}
2024-01-31 04:49:23,781:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186209716 HTTP/1.1" 200 810
2024-01-31 04:49:23,782:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:22 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247YT9WKWl-WSYH3Vy5Dqg-F653SjZrOyP-C70uiaSwYBdA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:45:30Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/6f0kFQ",
      "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/TzPnqw",
      "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/f71chA",
      "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo"
    }
  ]
}
2024-01-31 04:49:23,782:DEBUG:acme.client:Storing nonce: VKfU247YT9WKWl-WSYH3Vy5Dqg-F653SjZrOyP-C70uiaSwYBdA
2024-01-31 04:49:23,782:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-31 04:49:23,783:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-01-31 04:49:23,783:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-31 04:49:23,783:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-31 04:49:23,787:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:49:23,787:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-31 04:49:23,787:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-31 04:49:23,788:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-31 04:49:23,793:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:49:23,830:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-31 04:49:24,077:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-31 04:49:24,078:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-31 04:49:24,079:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-31 04:49:24,083:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC.
2024-01-31 04:49:24,083:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-31 04:49:24,084:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-31 04:49:24,088:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x050C0490>
Prep: True
2024-01-31 04:49:24,089:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x050C0490> and installer None
2024-01-31 04:49:24,089:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-31 04:49:24,104:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-31 04:49:24,105:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-31 04:49:24,107:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-31 04:49:24,653:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-31 04:49:24,653:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:23 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "y9JZClIOG50": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-01-31 04:49:24,654:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-31 04:49:28,515:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7247_key-certbot.pem
2024-01-31 04:49:32,167:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7245_csr-certbot.pem
2024-01-31 04:49:32,168:DEBUG:acme.client:Requesting fresh nonce
2024-01-31 04:49:32,168:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-31 04:49:32,348:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-31 04:49:32,349:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:30 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLC_6wHXWiVC3wcJNPMP2yUpBJIUbq8GWkN2NAZ1oPXnLY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-31 04:49:32,349:DEBUG:acme.client:Storing nonce: Wkq6jgLC_6wHXWiVC3wcJNPMP2yUpBJIUbq8GWkN2NAZ1oPXnLY
2024-01-31 04:49:32,349:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-31 04:49:32,355:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENfNndIWFdpVkMzd2NKTlBNUDJ5VXBCSklVYnE4R1drTjJOQVoxb1BYbkxZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "pNbZg0wuSttbX6fxYaJWkfNORi-ZWvPGprzSH6T7rttJBFynBK-XridGBzWv3dsXyLmn3Vrp0gobMruBbEUDlwtvg5QIiWSkVOfKTFthP6EBL7nn3CDk1K4E6QLOt_Bhi1sWhYSoizKVJzUV3zrmKNsLbaBcAqdWSN8CsUU1GD-Lbj90ES2ZsRrtJgEH5WIuI1V6drH8l3YaCQTSiWf5qqShCXGfhgC1DYMCbcQwtYO9iNMMOtFKw1gINj_UyZcVHwRJOhTdZd-vkYE6DN3V_xpvo0n6QkSzJUttqBnIpMsyRCOk4KBE9TlvVjD4ftqaKuvq3bg3ZKsBT0THY4Y1OA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-31 04:49:32,570:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-01-31 04:49:32,571:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 31 Jan 2024 03:49:31 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463146186
Replay-Nonce: fBfjtdZFDaFATg0UTR92fHQBtzmCME4YAZWPRXQXNKgt5JCZn34
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:45:39Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463146186"
}
2024-01-31 04:49:32,571:DEBUG:acme.client:Storing nonce: fBfjtdZFDaFATg0UTR92fHQBtzmCME4YAZWPRXQXNKgt5JCZn34
2024-01-31 04:49:32,571:DEBUG:acme.client:JWS payload:
b''
2024-01-31 04:49:32,576:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZEYUZBVGcwVVRSOTJmSFFCdHptQ01FNFlBWldQUlhRWE5LZ3Q1SkNabjM0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNDA4MzYifQ",
  "signature": "UAMz0SVza9OTAE-wVAnQPxOWt-4h46pQ_CQ1IjUEhM7x09aFCOcSWoK8qBix1CeQTB2DsPkGwwyieVU9TmQ4h9iG21Yk-1QvqdRB0zLFXPu3LWk3iY64IGDUplnL6yEu577zPYAvy_OUQL_5_pEwxRBZO862ou8fhqygFkTV2orDJo9EcyQ0DEK9x81r2HK6WDmMSiz8gJCXT_Bmwca2ZcZPsDC5KKFxUkTktMCsIuk2cwn6shvuhWBOty5_LaEJ_nFzLWFTOW9wb7YuiUMtOAzEQi5UA1YMi3McjTTaBKaV5Bgi1SGit9BL7KpPuyCx9swLhk6dvTEpMOtykYyhfg",
  "payload": ""
}
2024-01-31 04:49:32,775:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186240836 HTTP/1.1" 200 804
2024-01-31 04:49:32,776:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:31 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCka4i-GDIyYTtzGc_2SjTV1PC27q7amkipWxRen-w2-4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:45:39Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/g8SMBA",
      "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/KdDipg",
      "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/N41DHw",
      "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I"
    }
  ]
}
2024-01-31 04:49:32,776:DEBUG:acme.client:Storing nonce: Wkq6jgLCka4i-GDIyYTtzGc_2SjTV1PC27q7amkipWxRen-w2-4
2024-01-31 04:49:32,776:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-31 04:49:32,776:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-01-31 04:49:32,777:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-31 04:49:32,777:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-31 04:49:32,778:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:49:32,778:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-31 04:49:32,778:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-31 04:49:32,778:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-31 04:49:32,779:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:49:32,829:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-31 04:49:33,027:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-31 04:49:33,029:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-01-31 04:49:33,030:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-01-31 04:49:33,036:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC.
2024-01-31 04:49:33,036:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-31 04:49:33,036:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-31 04:49:33,041:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x050C0BB0>
Prep: True
2024-01-31 04:49:33,041:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x050C0BB0> and installer None
2024-01-31 04:49:33,041:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-31 04:49:33,057:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-31 04:49:33,058:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-31 04:49:33,059:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-31 04:49:33,495:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-31 04:49:33,495:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:32 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "_okZ-9si5y0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-31 04:49:33,496:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-31 04:49:37,242:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7248_key-certbot.pem
2024-01-31 04:49:40,791:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7246_csr-certbot.pem
2024-01-31 04:49:40,791:DEBUG:acme.client:Requesting fresh nonce
2024-01-31 04:49:40,792:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-31 04:49:40,938:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-31 04:49:40,938:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:39 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5iXuNbuuFD5ZAsqTulJfMLmJCMqCyyuIifk859cdzDac
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-31 04:49:40,939:DEBUG:acme.client:Storing nonce: R3i4Vkc5iXuNbuuFD5ZAsqTulJfMLmJCMqCyyuIifk859cdzDac
2024-01-31 04:49:40,939:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-31 04:49:40,945:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVpWHVOYnV1RkQ1WkFzcVR1bEpmTUxtSkNNcUN5eXVJaWZrODU5Y2R6RGFjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "JYEnuLfpD8cukc1yoW9SpjhRT_ctKMOUFi185AQtC_a1PKPIyME7TmIxeNkhYMGkgdF_eqs8IwUvpzcUCN6rJbRlqGRkZ_ecsSig9owaadXSKp7893ub4CuVjGCf2qVoYstbE67y6u4vFvxhHzg8Z0a1jfASgBzpWSdh1xFm5T44MwO_j4G09uq7AmFZ_CEVj_cUxRLyZtrJg9qpxQ3umj6hOOHk2ZxAAogk1EJ1Jaz0eywFcnBGqDRkg4ORPYv3fQuxQ9KeDn_FrG0N15oq8iile3BF9A4a1H5ExXJ3INVXdQz0Qz1oNA7-XgFN6moghPYjbZcyhWmJQ5q420COPA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-31 04:49:41,126:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-01-31 04:49:41,127:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 31 Jan 2024 03:49:39 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463167526
Replay-Nonce: VKfU247Y20TS5_rvz41azzlvD6hGdfFrGt2DSn6_NE2K5uDInaw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:45:48Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463167526"
}
2024-01-31 04:49:41,127:DEBUG:acme.client:Storing nonce: VKfU247Y20TS5_rvz41azzlvD6hGdfFrGt2DSn6_NE2K5uDInaw
2024-01-31 04:49:41,127:DEBUG:acme.client:JWS payload:
b''
2024-01-31 04:49:41,133:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1kyMFRTNV9ydno0MWF6emx2RDZoR2RmRnJHdDJEU242X05FMks1dURJbmF3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNzM1OTYifQ",
  "signature": "HM2IrUNqA2ZyNApLeTGrCEccCItct2BRaSTQHVUtjT4QqoReTLj-ijsKGtdc8HUzmkBcIfepGmD84rkK98WWW9ID5NPV0UVLtl4sIvknTDoDBWiw7Y3dIbUUfRsOv8C--O2yZuvkz3-9CqkmanCVy1KrAi6JVuhBLkYAPMIbscuWC88XwSO-IfSpsNSpPoR43ZtDv-gR4GgSh1eygQw1kenmFzp2mEO0L-jZnNbw1GYeuz2qSKqH8_jbmdM1u-6Mbv6vcWx5rDG4PnMs8A70JwNSFWYpZk9HoqtZvkdWQk4Ao7UssgTk3S4q5mWz2GmrmTnnIxEnGP7JaT1gTC2Mbg",
  "payload": ""
}
2024-01-31 04:49:41,283:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186273596 HTTP/1.1" 200 807
2024-01-31 04:49:41,283:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:39 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5RXNYXTXShlwsSVUmzZ77xcvVouydXJPrC6rvB0xk6zA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:45:48Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KNqRXQ",
      "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KMda1w",
      "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/f-1bag",
      "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE"
    }
  ]
}
2024-01-31 04:49:41,283:DEBUG:acme.client:Storing nonce: R3i4Vkc5RXNYXTXShlwsSVUmzZ77xcvVouydXJPrC6rvB0xk6zA
2024-01-31 04:49:41,284:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-31 04:49:41,284:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-01-31 04:49:41,285:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-31 04:49:41,285:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-31 04:49:41,286:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:49:41,286:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-31 04:49:41,286:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-31 04:49:41,286:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-31 04:49:41,287:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:49:41,338:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-31 04:49:41,572:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-31 04:49:41,573:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-31 04:49:41,574:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-31 04:49:41,578:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC.
2024-01-31 04:49:41,578:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-31 04:49:41,579:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-31 04:49:41,583:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x050C0D70>
Prep: True
2024-01-31 04:49:41,583:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x050C0D70> and installer None
2024-01-31 04:49:41,583:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-31 04:49:41,588:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-31 04:49:41,588:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-31 04:49:41,590:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-31 04:49:42,028:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-31 04:49:42,028:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:40 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "3yUlJ3yUniQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-31 04:49:42,029:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-31 04:49:45,917:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7249_key-certbot.pem
2024-01-31 04:49:49,572:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7247_csr-certbot.pem
2024-01-31 04:49:49,573:DEBUG:acme.client:Requesting fresh nonce
2024-01-31 04:49:49,573:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-31 04:49:49,721:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-31 04:49:49,721:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:48 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247YUhuBQr4G9I7EGFmJ3Zo8kl1s3o6aZT0skrPZeejkEmE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-31 04:49:49,721:DEBUG:acme.client:Storing nonce: VKfU247YUhuBQr4G9I7EGFmJ3Zo8kl1s3o6aZT0skrPZeejkEmE
2024-01-31 04:49:49,722:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-01-31 04:49:49,729:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lVaHVCUXI0RzlJN0VHRm1KM1pvOGtsMXMzbzZhWlQwc2tyUFplZWprRW1FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "E7SBP0GzKfnJ4QmYrH9NBrxnlvZNSSO9If51rDBgi9swLsfL7AcD8Dv_yuskvKylj8x3_lRJQ8Dv-EFw8AepDvnjCC9u0FBf6fSyc8f7LfuEKY6apqktAlp6A6rwg7h4e5zeUY7mcXtTHnGdG5Arg1AbEHooOH6E7lTEnXSBT9rk4YoZ_FCU6-ZLw1pEHo-VIrU09oz4FeZmK3jRZhM2r8BSneu5gqiZAe412xYvyFQqrK7lYKadu37JeBuVlogtP6-ymbDiU41EZQsv7a5G-Sau5HRG1_EDEdVt3co5xAU6JT9Gqyu9NnMkI1UB4Wm45-NmWxcJjIdvD3HStiA2zg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-31 04:49:49,978:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-01-31 04:49:49,979:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 31 Jan 2024 03:49:48 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463187546
Replay-Nonce: R3i4Vkc5dale9wpcQM4xFEpj7juQcqdibZ7_dCHSUpA2wzzXMTI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:45:58Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463187546"
}
2024-01-31 04:49:49,979:DEBUG:acme.client:Storing nonce: R3i4Vkc5dale9wpcQM4xFEpj7juQcqdibZ7_dCHSUpA2wzzXMTI
2024-01-31 04:49:49,979:DEBUG:acme.client:JWS payload:
b''
2024-01-31 04:49:49,984:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVkYWxlOXdwY1FNNHhGRXBqN2p1UWNxZGliWjdfZENIU1VwQTJ3enpYTVRJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzMDUyMzYifQ",
  "signature": "fggmsHf2Oi1_3c18NgKyL1UvxZpGP_qYSNl3erFASS-7E2CrxLDirpB4asVK1OQUYWcxTMZpDxSHrxkcvCVPcMztuBKuR9j7QhkICzAddqQqR4nYqwD5jLK-yBwwuOkwx0QPyqjuz6q8urWaIp9tQ33Ogo199a6cp6S7e6NHCaY5NMzEqXK0WpxNERJTYUh1ChnfePC22JffeQmRzGJjAK-zJR8FTkejMX2NWVFHGCXaCLbCkaE-KGBp-EXOvLoOHeDcyzP1kDD0sifRE47tc4-eZyakBYYJUaGCu4xYnD495BKzo8-XQVx7Cphuox39jYHZ9foRPOquKJwIn5xkIw",
  "payload": ""
}
2024-01-31 04:49:50,148:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186305236 HTTP/1.1" 200 801
2024-01-31 04:49:50,149:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:48 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247YVg7zK-X-ZzaH3NfJaHG4v4oIGbR0qGnbjhD2tSpURqI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:45:58Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/H-2NUg",
      "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/SPl0kw",
      "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/dBmW2A",
      "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY"
    }
  ]
}
2024-01-31 04:49:50,149:DEBUG:acme.client:Storing nonce: VKfU247YVg7zK-X-ZzaH3NfJaHG4v4oIGbR0qGnbjhD2tSpURqI
2024-01-31 04:49:50,149:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-31 04:49:50,150:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-01-31 04:49:50,150:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-31 04:49:50,150:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-31 04:49:50,151:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:49:50,151:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-31 04:49:50,151:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-31 04:49:50,152:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-31 04:49:50,153:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:49:50,190:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-31 04:49:50,461:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-31 04:49:50,463:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-31 04:49:50,463:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-31 04:49:50,467:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC.
2024-01-31 04:49:50,468:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-31 04:49:50,468:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-31 04:49:50,472:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x050C0BB0>
Prep: True
2024-01-31 04:49:50,473:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x050C0BB0> and installer None
2024-01-31 04:49:50,473:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-31 04:49:50,478:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-31 04:49:50,479:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-31 04:49:50,481:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-31 04:49:51,011:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-31 04:49:51,011:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:49 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "w8PlOqk0upc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-01-31 04:49:51,012:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-31 04:49:55,008:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7250_key-certbot.pem
2024-01-31 04:49:58,490:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7248_csr-certbot.pem
2024-01-31 04:49:58,490:DEBUG:acme.client:Requesting fresh nonce
2024-01-31 04:49:58,491:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-31 04:49:58,669:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-31 04:49:58,669:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:57 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCCWEELmKmoFUbGL0Oo_ATq0HT4xpZn6zKL8Jsi61nRKM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-31 04:49:58,669:DEBUG:acme.client:Storing nonce: Wkq6jgLCCWEELmKmoFUbGL0Oo_ATq0HT4xpZn6zKL8Jsi61nRKM
2024-01-31 04:49:58,670:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-31 04:49:58,675:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENDV0VFTG1LbW9GVWJHTDBPb19BVHEwSFQ0eHBabjZ6S0w4SnNpNjFuUktNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "bc1y4hMesi5UupZSTR80SOB6xbPqsmtKzWt8adnQlm1o9iradPa3ILfRW7a0QDOfQlqHnKptf5oIrSiLjEc81BJR4EKxpHMYTVSo1xN9HcAEo8ZMeVlJI7k3sFhl3c0cL05_o0toNAS9jvvlU5Dc8_ySEgyzHN4Xuw_Z0emFmnt0o09BkFrjzdu4kP9XHBnhRHnBbqx9IHjCs9qXJ3xgqJ2_9eeq8VC7c6FVBmzJrtLDKNiAka8o_C9sCn058ps0BL4qLwwHdF6lscXeIZ0KNghnoXCMbX6yNJrJglHS0PxyscuyD2vz4S6b1ZR0eFmluaky_TUNkVFw3iP-ZISmxA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-31 04:49:58,863:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-01-31 04:49:58,864:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 31 Jan 2024 03:49:57 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463215876
Replay-Nonce: Wkq6jgLC89dmmrFn2U4OFan5yKdpmf5EtCYTzI94RDkLtRteYAM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:07Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463215876"
}
2024-01-31 04:49:58,864:DEBUG:acme.client:Storing nonce: Wkq6jgLC89dmmrFn2U4OFan5yKdpmf5EtCYTzI94RDkLtRteYAM
2024-01-31 04:49:58,864:DEBUG:acme.client:JWS payload:
b''
2024-01-31 04:49:58,870:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEM4OWRtbXJGbjJVNE9GYW41eUtkcG1mNUV0Q1lUekk5NFJEa0x0UnRlWUFNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzNDM5MTYifQ",
  "signature": "KB_5ZqREjL5nRxN0ewviDqfRi_QmVMsE9f8TtWIeB9r9xAZYUKubUPCTGluNd5yyRNIrCL1kWI7686N1svYpYIpPvcpbKj6336iPiY9I8_590MfxM5lI0nH_6z6rWKwBGvGEZpOwYUg0WU63--zfYSfbGSQQpLclsR-6F9GYf71ifYTlREvwoPxmffaymypy57x9zXzVPt2TwVPzc_Hg0qLxnjhN-7VNzbNNqeiheBrS-bKSt8cKKZ028_OIhk-XLs8zOebiwdbpPsFswswdTQPIxZdLBmWJxMZRpofNdCFPscPgN1cEJljoHSByMVXVJq4ww6elemQudgrvytw5MQ",
  "payload": ""
}
2024-01-31 04:49:59,053:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186343916 HTTP/1.1" 200 805
2024-01-31 04:49:59,053:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:57 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFPRDH6WELL1AHTWZ3euDdqEWw6Y2LU11R7vRLgLKEk80
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:07Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/FQmNLA",
      "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/nw3Heg",
      "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/o7wJkQ",
      "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE"
    }
  ]
}
2024-01-31 04:49:59,054:DEBUG:acme.client:Storing nonce: fBfjtdZFPRDH6WELL1AHTWZ3euDdqEWw6Y2LU11R7vRLgLKEk80
2024-01-31 04:49:59,054:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-31 04:49:59,055:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-01-31 04:49:59,055:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-31 04:49:59,055:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-31 04:49:59,056:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:49:59,056:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-31 04:49:59,056:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-31 04:49:59,057:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-31 04:49:59,058:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:49:59,093:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-31 04:49:59,274:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-31 04:49:59,275:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-01-31 04:49:59,276:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-01-31 04:49:59,280:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC.
2024-01-31 04:49:59,280:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-31 04:49:59,280:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-31 04:49:59,285:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x050C0910>
Prep: True
2024-01-31 04:49:59,285:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x050C0910> and installer None
2024-01-31 04:49:59,285:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-31 04:49:59,290:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-31 04:49:59,290:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-31 04:49:59,292:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-31 04:49:59,732:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-31 04:49:59,733:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:49:58 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "f7b5bvmoNF8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-31 04:49:59,734:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-31 04:50:03,841:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7251_key-certbot.pem
2024-01-31 04:50:07,413:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7249_csr-certbot.pem
2024-01-31 04:50:07,414:DEBUG:acme.client:Requesting fresh nonce
2024-01-31 04:50:07,414:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-31 04:50:07,563:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-31 04:50:07,564:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:06 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247YVUiMQWWWuCPw5gkA0HDFSr4GFgtxgerTMHLXKQENjH0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-31 04:50:07,564:DEBUG:acme.client:Storing nonce: VKfU247YVUiMQWWWuCPw5gkA0HDFSr4GFgtxgerTMHLXKQENjH0
2024-01-31 04:50:07,564:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-31 04:50:07,569:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lWVWlNUVdXV3VDUHc1Z2tBMEhERlNyNEdGZ3R4Z2VyVE1ITFhLUUVOakgwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Uz4DN7lrfoAWGmqzxtGBiutomYLL_kQGrYenPzQ-8nzhoE5DqMjE20Dbn7gt5tkuvh0S2A4AZl2ryEMaW0Mvfdl1u8ZCTM58miG8Cg02w-7dcYy0P5wloMOfcEzbSXsm-y2PqBvX3Ile1gDzu3EczxniZLBjc5jotF-Wrcg3mbniayNe_JY-eWLCjUoDbkA88nUk-NwIiKnP4CsRZ8C3j8Z4dKZluBZF-Hd5WYmKa0ypFhdCKHuEcjfwbt-Kb652MMTNanCHwEekYhQdLRFDbO9ynlMn-SO-Sm0i3wkQ4TV8CniqakEvEeyPFSytDyyckUSSq9mFUJCoEsEXXGguxg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-01-31 04:50:07,767:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-01-31 04:50:07,768:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 31 Jan 2024 03:50:06 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463242076
Replay-Nonce: VKfU247YU0f5kpQ84uSF0G0Gr_OLEo1jLqAGdjF1a3u5yEuQ7T0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:16Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463242076"
}
2024-01-31 04:50:07,768:DEBUG:acme.client:Storing nonce: VKfU247YU0f5kpQ84uSF0G0Gr_OLEo1jLqAGdjF1a3u5yEuQ7T0
2024-01-31 04:50:07,768:DEBUG:acme.client:JWS payload:
b''
2024-01-31 04:50:07,775:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lVMGY1a3BRODR1U0YwRzBHcl9PTEVvMWpMcUFHZGpGMWEzdTV5RXVRN1QwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzODQ1MTYifQ",
  "signature": "abYk08fXhJQM08ZlPIcVHJ1rf3tu_0-RdjqU3fva6DrgP4T22-SQqD9jYhuj0IRX0o-g3r-EDGpuDqs9o3NpUmSVYFsRdEm0UHF5xQ3Vz2wGD2UYnMKaiDg4LADmAfgnMVRXdlLNGT45asGvFZorvlFBv38DorfwhW7ivS8YgnuR2VsVOYZqp97NDVOEXHx2nJOr43T7pe8Dk9jdCtzIu_Lkih7bg3IOxwrfqxuSxbKtG0t8leavNaWCQKBfBZN3XaGofGlKRZxxyIbPVz2DrFK2F9zgNVBq5hQTn5fyfNnIeF_UKaFA9TdR11sFxgjFcOUj1eGBVkPst_E2js4h_g",
  "payload": ""
}
2024-01-31 04:50:07,974:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186384516 HTTP/1.1" 200 809
2024-01-31 04:50:07,975:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:06 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247Y1To-kAUvvTJ9utImhFG4cxLVIl6B62kZ4QqSc_g_rKQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:16Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/iy166A",
      "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/FJ3duA",
      "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/0qWA8w",
      "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY"
    }
  ]
}
2024-01-31 04:50:07,975:DEBUG:acme.client:Storing nonce: VKfU247Y1To-kAUvvTJ9utImhFG4cxLVIl6B62kZ4QqSc_g_rKQ
2024-01-31 04:50:07,976:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-31 04:50:07,976:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-01-31 04:50:07,977:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-31 04:50:07,977:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-31 04:50:07,978:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:50:07,978:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-31 04:50:07,978:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-31 04:50:07,978:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-31 04:50:07,979:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:50:08,027:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-31 04:50:08,229:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-31 04:50:08,230:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-31 04:50:08,231:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-31 04:50:08,235:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC.
2024-01-31 04:50:08,235:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-31 04:50:08,236:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-31 04:50:08,240:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x050C5930>
Prep: True
2024-01-31 04:50:08,240:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x050C5930> and installer None
2024-01-31 04:50:08,240:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-31 04:50:08,245:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-31 04:50:08,246:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-31 04:50:08,248:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-31 04:50:08,704:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-31 04:50:08,704:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:07 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "9oVBV9eqwYg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-31 04:50:08,705:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-31 04:50:12,508:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7252_key-certbot.pem
2024-01-31 04:50:16,051:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7250_csr-certbot.pem
2024-01-31 04:50:16,051:DEBUG:acme.client:Requesting fresh nonce
2024-01-31 04:50:16,052:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-31 04:50:16,229:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-31 04:50:16,230:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:14 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247Y2vXSOVsuvtsXwvJGke6DQjfYkLz-lTCEChmXsTwg4G0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-31 04:50:16,230:DEBUG:acme.client:Storing nonce: VKfU247Y2vXSOVsuvtsXwvJGke6DQjfYkLz-lTCEChmXsTwg4G0
2024-01-31 04:50:16,230:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-31 04:50:16,236:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1kydlhTT1ZzdXZ0c1h3dkpHa2U2RFFqZllrTHotbFRDRUNobVhzVHdnNEcwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "vzk8jyjkNPmHExxoDVs6KHXjMJE3W1oR--YypndUVGyrYMMT2fXohNYjTEdpwAhYq0CQVH2SjoSusT0pGTnItjFsKYSkcRZlhtDRzNk_I6Pu4J0Naj6C8LV7sRiZsvTvSEwKu26nfAR3jtpGDuMfFDOgUeE7zTxA0c33VwdunUYqG32QIfpfOip-1ucEMC1X6_xX5Lwvy-Jmo8xumIWHlKwzgx6Fst3Br0zNldDvZI430ai0HjdtBOycBqrHE3Y3kk8z3EdzrkNTdIUzY5M8racEXHFnukiSrh2G-ZbEDU-oCuxf1tA4xTlBLujQ3i7TeqF0vq9OKD65EXwFy1xPsA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-01-31 04:50:16,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-01-31 04:50:16,414:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 31 Jan 2024 03:50:15 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463267436
Replay-Nonce: R3i4Vkc5gixP3eZatttadOaNrYTh1YYnhOVWk1-f0Va1uVYMvDk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463267436"
}
2024-01-31 04:50:16,414:DEBUG:acme.client:Storing nonce: R3i4Vkc5gixP3eZatttadOaNrYTh1YYnhOVWk1-f0Va1uVYMvDk
2024-01-31 04:50:16,414:DEBUG:acme.client:JWS payload:
b''
2024-01-31 04:50:16,419:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVnaXhQM2VaYXR0dGFkT2FOcllUaDFZWW5oT1ZXazEtZjBWYTF1VllNdkRrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0MjM2MTYifQ",
  "signature": "w9xd8VPDxCXelE7GjgmLP2fZFZBr_r3wsBgrkoLFP3UmdO5dRIMFdmwINiK0r375vsAsHmu8tUHcDtarKYAiwkoPoNCgaVFxoo1ND7pLnrHoKP9_T0GsAkzVw7xivq6nNaX3uIosZNJKt_JHa85DtNdq9-BTgN-eyjPYN95f6BHURbYgBX7s66AW-p_ysOgjJ8pj3yRSVXr8FdVmzYMGkhx9kH6FyFmyryBCfUapTOuFxVyCVVuqjZAFBDevGbfV_IfNrGMlQvrSrnxHgEo-2HBgXE2Q3Drh5Tfs33UjRw_k21r3IcyaBZp78r7gHfbP03V-koD6Og_KPz1GvCfMag",
  "payload": ""
}
2024-01-31 04:50:16,608:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186423616 HTTP/1.1" 200 806
2024-01-31 04:50:16,608:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:15 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247YJTQNqteYJmrv78QT_3KY6cHOFExj0EHbNHR-zGqoYH8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:25Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/sGt3LQ",
      "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/-siQUw",
      "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/rUgQOA",
      "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg"
    }
  ]
}
2024-01-31 04:50:16,609:DEBUG:acme.client:Storing nonce: VKfU247YJTQNqteYJmrv78QT_3KY6cHOFExj0EHbNHR-zGqoYH8
2024-01-31 04:50:16,609:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-31 04:50:16,609:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-01-31 04:50:16,610:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-31 04:50:16,610:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-31 04:50:16,611:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:50:16,611:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-31 04:50:16,611:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-31 04:50:16,611:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-31 04:50:16,614:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:50:16,648:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-01-31 04:50:16,649:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-31 04:50:16,649:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-01-31 04:50:16,656:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-01-31 04:50:16,658:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-01-31 04:50:16,658:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-01-31 04:50:16,659:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-01-31 04:50:16,659:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-01-31 04:50:16,661:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-01-31 04:50:16,698:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-31 04:50:16,929:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-31 04:50:16,931:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-31 04:50:16,931:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-31 04:50:16,936:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC.
2024-01-31 04:50:16,936:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-31 04:50:16,936:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-31 04:50:16,941:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x053B1F50>
Prep: True
2024-01-31 04:50:16,941:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x053B1F50> and installer None
2024-01-31 04:50:16,941:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-31 04:50:16,945:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-31 04:50:16,946:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-31 04:50:16,948:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-31 04:50:17,467:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-31 04:50:17,467:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:16 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "W_XhFysjosc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-31 04:50:17,468:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-31 04:50:21,531:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7253_key-certbot.pem
2024-01-31 04:50:25,245:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7251_csr-certbot.pem
2024-01-31 04:50:25,245:DEBUG:acme.client:Requesting fresh nonce
2024-01-31 04:50:25,245:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-31 04:50:25,418:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-31 04:50:25,419:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:24 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFbmcvryTtfcVmYsvrFk6yVs2JXPWd1ELH-nH6EjJwHeI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-31 04:50:25,419:DEBUG:acme.client:Storing nonce: fBfjtdZFbmcvryTtfcVmYsvrFk6yVs2JXPWd1ELH-nH6EjJwHeI
2024-01-31 04:50:25,419:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-31 04:50:25,424:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZibWN2cnlUdGZjVm1Zc3ZyRms2eVZzMkpYUFdkMUVMSC1uSDZFakp3SGVJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ulmBTYgJH3z9VPoPQTEOvk0LF3zaYn5DVUCDQf2Z358mNSZwVNlbC7aAC_yI1t9puFqZ46KGHzPlR9oNHHg8DPKqg8ZzmT5jJr4g7PRPaJt5BaUVbCETEi-J2qrqkeBS0tGlu-BOVQu3ppD7zxYTxzyMRMmO6q_JKdmKIx1uYbxuaDCoME_cf2RSsGvcwQV6EA_Pu52mTw0eHD4Ao_TEwcZYao6SEcxpIQ-8bLjw3dhQJemX8gj7bA0-Nu6tJQFFWmOee3J7F2_smJMJikrnUlxIyeip4CPCi-OVu7J9xxSESgVCQsQyPO1ChsPV0wIIma8N7ohVY3jTV8iwq_Pwnw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-31 04:50:25,607:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-01-31 04:50:25,608:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 31 Jan 2024 03:50:24 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463293726
Replay-Nonce: Wkq6jgLCffow0Xxtzb2ZPqgg8YDXi2DWFEH9cfR3l0UmNo1N60E
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463293726"
}
2024-01-31 04:50:25,608:DEBUG:acme.client:Storing nonce: Wkq6jgLCffow0Xxtzb2ZPqgg8YDXi2DWFEH9cfR3l0UmNo1N60E
2024-01-31 04:50:25,608:DEBUG:acme.client:JWS payload:
b''
2024-01-31 04:50:25,613:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENmZm93MFh4dHpiMlpQcWdnOFlEWGkyRFdGRUg5Y2ZSM2wwVW1ObzFONjBFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0Njc1NDYifQ",
  "signature": "PN9DL-9rbCQVxwatABsee7nUG0l4yy8SQ2siOG2Me5umAzng7djrzb7XYe0y5-GzK268pWOYw_h7dhJr8N86QQlV7R49WP9G6YQDfJbAcGAQMpFB9IZpru-AWmb8Wvsxs6HSMz0IUG8DD_-dsgKEI1mwfW-UHyZXEvvWnujs_duNTzbpc2LqJZuCmYaBH0lYVAC10ULtwm12-hImBeoQXGoD7XVRgNyspaHWJOdK6vV3mQzOL2iYdPQu_SgyCZdaXsxHA9WmRWwN318a-0TrDCb-gs2tNcyW_-_EKLRGGClJX4WW_EsRpfhtos8JyjNKvRke401_-YX6VDibfNDY6g",
  "payload": ""
}
2024-01-31 04:50:25,792:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186467546 HTTP/1.1" 200 811
2024-01-31 04:50:25,792:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:24 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFtJ5U8-voWcxh9Df5Z6UZuM4WCTmfe42IlVprxHfDwwM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:34Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/n-ZWjw",
      "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/NYrS2A",
      "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/g51OFg",
      "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU"
    }
  ]
}
2024-01-31 04:50:25,792:DEBUG:acme.client:Storing nonce: fBfjtdZFtJ5U8-voWcxh9Df5Z6UZuM4WCTmfe42IlVprxHfDwwM
2024-01-31 04:50:25,793:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-31 04:50:25,793:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-01-31 04:50:25,794:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-31 04:50:25,794:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-31 04:50:25,795:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:50:25,795:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-31 04:50:25,795:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-31 04:50:25,795:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-31 04:50:25,796:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:50:25,870:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-31 04:50:26,104:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-31 04:50:26,105:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-31 04:50:26,106:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-31 04:50:26,110:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC.
2024-01-31 04:50:26,110:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-31 04:50:26,110:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-31 04:50:26,115:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0139C170>
Prep: True
2024-01-31 04:50:26,115:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0139C170> and installer None
2024-01-31 04:50:26,115:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-31 04:50:26,122:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-31 04:50:26,123:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-31 04:50:26,125:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-31 04:50:26,666:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-31 04:50:26,667:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:25 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "lji-JjanWjY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-31 04:50:26,667:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-31 04:50:30,639:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7254_key-certbot.pem
2024-01-31 04:50:34,356:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7252_csr-certbot.pem
2024-01-31 04:50:34,357:DEBUG:acme.client:Requesting fresh nonce
2024-01-31 04:50:34,357:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-31 04:50:34,538:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-31 04:50:34,540:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:33 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCN4OYK1Im42R2jfmvASD4ZRh2aDyLAToThNXB8-8wIgo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-31 04:50:34,540:DEBUG:acme.client:Storing nonce: Wkq6jgLCN4OYK1Im42R2jfmvASD4ZRh2aDyLAToThNXB8-8wIgo
2024-01-31 04:50:34,545:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-31 04:50:34,550:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENONE9ZSzFJbTQyUjJqZm12QVNENFpSaDJhRHlMQVRvVGhOWEI4LTh3SWdvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "hCkFLJ88hgmlQtx9cf3dE_IiPqXOZ-Y00RLeVRZLHCIuqVRDcQ6u_qz3gowMIXcddYlOqZJ1Me_5CH9RBtWpoxKos02s5hRH4Syl7JdyUw5zp_-0dwGpGM7uaHAye-ZzoRbX-Jvdg1TcWdLFe6CwyBaaFIgWyy86EzeFa975orAcW2MVkGhmkE66ws-rbLifLJCok0LenjoaSv-3k_8jthJKYqDoLmJjzvPGhOYfUWcx1OicZvRM3tHiPVvYPGRtZ4zGStQ0Z_VsCj_Kc35NvU_Zd5VRiqWtJuZ35OkeiVF4TtoIU75ydaCvNnnCxlJxbSc0MRW5fdaY743948fUug",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-31 04:50:34,751:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-01-31 04:50:34,752:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 31 Jan 2024 03:50:33 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463315236
Replay-Nonce: fBfjtdZFXCwFicee82dDWscn6N7-pFzcFjjV9EKjB33-9ONsctU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:43Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463315236"
}
2024-01-31 04:50:34,752:DEBUG:acme.client:Storing nonce: fBfjtdZFXCwFicee82dDWscn6N7-pFzcFjjV9EKjB33-9ONsctU
2024-01-31 04:50:34,752:DEBUG:acme.client:JWS payload:
b''
2024-01-31 04:50:34,757:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZYQ3dGaWNlZTgyZERXc2NuNk43LXBGemNGampWOUVLakIzMy05T05zY3RVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MDAzMzYifQ",
  "signature": "WC3hQVY7Ky-eHvEc-FaTPkOGATeRCtxldBAfJpmbr0shJYrKsQOBVhoA7LxQXOD94KUFOzO6JHMfml0cZcAWp1PHwVZIp46xybrEAOco69_FlNdsLaRaHFV9qo3-0gUMUuQ5uDz8ye4El_Bw7djC463cUw-hZd4KKTfMkuS2N4eG8SC3Sj7PMQ2C_OjR5tEMjqMi2e5HLH0vQInLFGJB5lpqbm8TEZ7fcua6JD2MtdugHfqJUZG-ohApZw3J-OV0kS5FSZuRpK90kCEeJqPh-_WaUsTpYqSl9rbn-bHwXEoyJfbJhqET3HeszLiHhBo_53MQXrOPScTW_yjFKfqKrg",
  "payload": ""
}
2024-01-31 04:50:34,944:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186500336 HTTP/1.1" 200 810
2024-01-31 04:50:34,945:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:33 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCTeRJQdefArd_ftsAkKLJ1oQ_Ztd3bHiblgg9gVom_dI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:43Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/MLFeSA",
      "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/NegWfw",
      "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/0vtuKQ",
      "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0"
    }
  ]
}
2024-01-31 04:50:34,945:DEBUG:acme.client:Storing nonce: Wkq6jgLCTeRJQdefArd_ftsAkKLJ1oQ_Ztd3bHiblgg9gVom_dI
2024-01-31 04:50:34,946:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-31 04:50:34,946:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-01-31 04:50:34,946:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-31 04:50:34,947:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-31 04:50:34,947:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:50:34,947:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-31 04:50:34,948:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-31 04:50:34,948:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-31 04:50:34,950:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:50:34,995:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-31 04:50:35,224:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-31 04:50:35,225:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2024-01-31 04:50:35,226:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2024-01-31 04:50:35,230:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC.
2024-01-31 04:50:35,230:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-31 04:50:35,230:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-31 04:50:35,235:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x053B1170>
Prep: True
2024-01-31 04:50:35,235:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x053B1170> and installer None
2024-01-31 04:50:35,235:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-31 04:50:35,240:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-31 04:50:35,241:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-31 04:50:35,242:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-31 04:50:35,786:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-31 04:50:35,787:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:34 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "tWvzogwhEB0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-01-31 04:50:35,787:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-31 04:50:40,332:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7255_key-certbot.pem
2024-01-31 04:50:44,129:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7253_csr-certbot.pem
2024-01-31 04:50:44,130:DEBUG:acme.client:Requesting fresh nonce
2024-01-31 04:50:44,130:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-31 04:50:44,311:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-31 04:50:44,312:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:42 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFjnVmCXuicDcyi34EU0OZwv4KRgmiVQO5W9xETVc1Jeo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-31 04:50:44,312:DEBUG:acme.client:Storing nonce: fBfjtdZFjnVmCXuicDcyi34EU0OZwv4KRgmiVQO5W9xETVc1Jeo
2024-01-31 04:50:44,312:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-31 04:50:44,317:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZqblZtQ1h1aWNEY3lpMzRFVTBPWnd2NEtSZ21pVlFPNVc5eEVUVmMxSmVvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "cXVNCnP4RX-imBAP82MVT0ShjSMAs9d2n6L_mFNx49Z-dQiDcm8g3ZarhWRRc9Apt2UmipUKeeQr0S9BKvtnFuMLbtl61DZdS8kXkvsNtm1QwFybWBgrY2G_4VH2ix5wZzqnN8iHQxi6x9127rMvv9nEV8iOhRAZRw5cMO3wqqcIEHU93krfG2IQ2-wa_3cJzvl9vrWabXUrk7_s_pkl7lGnCutpW-2foBGDXhGT4Femo3Py8c6frub-GJJxFi9orZUtjGXicIDCGthk3zLAAn27Oz3Cts_7zJSmB_wFD-eHgvZkUhbcLclPx4tz_KY8qzjFz3KqEIxsCq1nE4G55A",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-01-31 04:50:44,507:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-01-31 04:50:44,508:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 31 Jan 2024 03:50:43 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463336576
Replay-Nonce: fBfjtdZFQEv4hrzxfXkbuAgHJULVCm-fKluPQMLncJWtiXVuuNs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463336576"
}
2024-01-31 04:50:44,508:DEBUG:acme.client:Storing nonce: fBfjtdZFQEv4hrzxfXkbuAgHJULVCm-fKluPQMLncJWtiXVuuNs
2024-01-31 04:50:44,508:DEBUG:acme.client:JWS payload:
b''
2024-01-31 04:50:44,514:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZRRXY0aHJ6eGZYa2J1QWdISlVMVkNtLWZLbHVQUU1MbmNKV3RpWFZ1dU5zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MzA0NTYifQ",
  "signature": "B5vikMXB8E8m4_MhRjYRC_M0ftgVJIKirLRDo_FewAupsQeNBluV6lAu5WpvDSFci8jyQaCB9hiWpEab93ib6SqvKe41A2GkYUnOMj0gJzJShkdFPbFDvYakAa6w0otS92YEwm8wJxOedkNQeCCxmvJ8ze2qRFpNVtEN6JauNdYSo8KFfL9b0XXzjiPjHhXEw6xJKiDcWU_p_B7HGXfGvrheQqwnp4lkRyL8P-OEwvy79y9rMK7KJCgbIRjFKbGsRTkgPIZVfs3BS4ptaFDLg6joCwVpPY7pyKamt0u8kbqiWTvY0d4wdy2jDaTneVwySffJQ3CYbjQQJgl8CRNpuw",
  "payload": ""
}
2024-01-31 04:50:44,700:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186530456 HTTP/1.1" 200 809
2024-01-31 04:50:44,700:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:43 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCL67GZudi-KyTVFurPeWHCBao1m6dWWDqC7DepfZNuJg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:52Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/ibbbOA",
      "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/W42erg",
      "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/xDGKCQ",
      "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI"
    }
  ]
}
2024-01-31 04:50:44,701:DEBUG:acme.client:Storing nonce: Wkq6jgLCL67GZudi-KyTVFurPeWHCBao1m6dWWDqC7DepfZNuJg
2024-01-31 04:50:44,701:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-31 04:50:44,702:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-01-31 04:50:44,702:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-31 04:50:44,703:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-31 04:50:44,703:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:50:44,703:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-31 04:50:44,704:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-31 04:50:44,704:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-31 04:50:44,705:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:50:44,756:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-31 04:50:44,922:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-31 04:50:44,923:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer.
2024-01-31 04:50:44,924:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD
2024-01-31 04:50:44,929:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC.
2024-01-31 04:50:44,929:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-31 04:50:44,930:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-31 04:50:44,939:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04F8C830>
Prep: True
2024-01-31 04:50:44,939:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04F8C830> and installer None
2024-01-31 04:50:44,939:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-31 04:50:44,944:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-31 04:50:44,945:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-31 04:50:44,947:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-31 04:50:45,477:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-31 04:50:45,478:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:44 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "GO08rm2qjcE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-31 04:50:45,478:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-31 04:50:49,471:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7256_key-certbot.pem
2024-01-31 04:50:53,157:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7254_csr-certbot.pem
2024-01-31 04:50:53,158:DEBUG:acme.client:Requesting fresh nonce
2024-01-31 04:50:53,158:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-31 04:50:53,392:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-31 04:50:53,392:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:51 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCfwcoktIKjh9hVYQUEtKDmzyZbd6K7u_c8ArqjtHckoA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-31 04:50:53,393:DEBUG:acme.client:Storing nonce: Wkq6jgLCfwcoktIKjh9hVYQUEtKDmzyZbd6K7u_c8ArqjtHckoA
2024-01-31 04:50:53,393:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-31 04:50:53,398:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENmd2Nva3RJS2poOWhWWVFVRXRLRG16eVpiZDZLN3VfYzhBcnFqdEhja29BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "uSEGPR0fP-H26NHVclreEpc4ETyHe5WB8A1_JsGsfP_CVhAzMx8NPVE9lR2oo4q31rmysoHVo2CiHHlrOSeXbzB0782rnvdIGVDJ84WxENL7M9zvf-Z3rcOAd7qe5tO-Gzdi9cAftO07Yp5LS32UUmK36_iQpUw7IyOyIX5e-I76u5e5MTXZmtlCKo6mOAgt-0eYHAcM-yWU00HeuJqBW7tEFF4BQ297cfUDn6d50XEVEIQukx-cKCRHhXkTlRkuROGGHOvzpiV2jfwwNkxNv6YmDhVBu6zP7hxKhSTXeIRktKxkTjJhX75z95SWMEQ9-cvho87_rptlVZ7LTBVDeg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-31 04:50:53,600:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-01-31 04:50:53,602:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 31 Jan 2024 03:50:52 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463357966
Replay-Nonce: fBfjtdZFvor40yxa1j6I2_B_jL03wx59YGLLI7W3KFd0tZZlikY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:47:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463357966"
}
2024-01-31 04:50:53,602:DEBUG:acme.client:Storing nonce: fBfjtdZFvor40yxa1j6I2_B_jL03wx59YGLLI7W3KFd0tZZlikY
2024-01-31 04:50:53,603:DEBUG:acme.client:JWS payload:
b''
2024-01-31 04:50:53,611:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZ2b3I0MHl4YTFqNkkyX0JfakwwM3d4NTlZR0xMSTdXM0tGZDB0WlpsaWtZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1NjIyMzYifQ",
  "signature": "PsnQfCvimxBdYeAAXAD0hF2Ai2K-EkefxNdMP-obEpyNbKj6YdH77hu--fPFraJSmwQLn2qKy2QoKNBjrzaf35RGUyM4UzNT_KYe7fkmj1L_Yn0j-CXb9KD9gp9n4xuBhOCziIg6mC0TzOLM4R0L11Q3mYkRfTuii880OzsOJPxTn14wulg8WBcj3SuRpmjNkD1daaXspNg68x1kUtLm25TcxO__Rsl0afpzSeyAHJMFdw12h8jhRP8D2RW8-zyWkBR9u8gDDuVLlW3JBR5s5ldqMZz__Nd4J1fv_BLrV1aQ32IeG2KD1341oqqm71sV54WfGMC2n3QvGXmTc6YVzw",
  "payload": ""
}
2024-01-31 04:50:53,793:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186562236 HTTP/1.1" 200 805
2024-01-31 04:50:53,794:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:52 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFAGWi_9dI-wFXI6SYStl6B3MeWJ9hto2eOnZOOqcudvw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:47:01Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/d2C2Aw",
      "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/yk_m2Q",
      "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/2CxhFQ",
      "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE"
    }
  ]
}
2024-01-31 04:50:53,794:DEBUG:acme.client:Storing nonce: fBfjtdZFAGWi_9dI-wFXI6SYStl6B3MeWJ9hto2eOnZOOqcudvw
2024-01-31 04:50:53,794:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-31 04:50:53,795:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-01-31 04:50:53,795:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-31 04:50:53,795:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-31 04:50:53,796:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:50:53,796:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-31 04:50:53,796:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-31 04:50:53,797:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-31 04:50:53,798:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:50:53,845:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-31 04:50:54,077:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-31 04:50:54,078:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-31 04:50:54,078:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-31 04:50:54,082:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC.
2024-01-31 04:50:54,082:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-31 04:50:54,083:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-31 04:50:54,087:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x053B1B10>
Prep: True
2024-01-31 04:50:54,087:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x053B1B10> and installer None
2024-01-31 04:50:54,087:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-31 04:50:54,094:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-31 04:50:54,094:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-31 04:50:54,096:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-31 04:50:54,541:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-31 04:50:54,542:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:50:53 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "kzhaHYwCBhw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-31 04:50:54,543:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-31 04:50:58,578:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7257_key-certbot.pem
2024-01-31 04:51:02,362:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7255_csr-certbot.pem
2024-01-31 04:51:02,363:DEBUG:acme.client:Requesting fresh nonce
2024-01-31 04:51:02,363:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-31 04:51:02,513:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-31 04:51:02,513:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:51:01 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247Y7nRA7-awzPo12Z8gyS25BX4nHjJvOI02PQd-bRy4GWE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-31 04:51:02,514:DEBUG:acme.client:Storing nonce: VKfU247Y7nRA7-awzPo12Z8gyS25BX4nHjJvOI02PQd-bRy4GWE
2024-01-31 04:51:02,514:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-31 04:51:02,521:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1k3blJBNy1hd3pQbzEyWjhneVMyNUJYNG5Iakp2T0kwMlBRZC1iUnk0R1dFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "n42hMiVVZZfXBmE2hfB0La88C2ZHS6R06v_Oz5DISM2fkiQ0QiaTCBsfJn6Dj26fNI4w4rD4UmUXiIZZQ1Bs8n2L5OdpPzFQ6wYf727Oxxj2aMwd99Md4AJl6VRs6uJD37Kj_mh3BTU7bsKbrVZLTZfs131VGgOL_ZwA4MRIc1p_CuY0sLhRbLmmBsM5tcF0nJQAwjaMhW1ZwEULE3Vmysvaoo-rm4IRKAArFq4YgLOsoZqPP3wsDu4M8wN2ZQk7hCAdflgAviBs2GCvR4JC0JO5zpPMJV0Fc0EWN0UxA9tN-XN5R8nMLzHpEDYvjDZZI3K9gC2z13e25e4iXggCEg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-31 04:51:02,690:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-01-31 04:51:02,691:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 31 Jan 2024 03:51:01 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463390816
Replay-Nonce: R3i4Vkc5IYJN4JdbRMQe90XNvREWJ7tg7Xs0j-U4Js_b3DIrVGc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:47:11Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463390816"
}
2024-01-31 04:51:02,691:DEBUG:acme.client:Storing nonce: R3i4Vkc5IYJN4JdbRMQe90XNvREWJ7tg7Xs0j-U4Js_b3DIrVGc
2024-01-31 04:51:02,691:DEBUG:acme.client:JWS payload:
b''
2024-01-31 04:51:02,697:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVJWUpONEpkYlJNUWU5MFhOdlJFV0o3dGc3WHMwai1VNEpzX2IzRElyVkdjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2MDk2MDYifQ",
  "signature": "wbQIzOBdtKYFgDa6AB2ab3w3Jbzb7RVcbWO1xkaH01VyGd4vSTyWHifaMkueyUzyROjxehUjDO1p_5CGZDgPpd0Yq7vP3mShZMVXOUFrvW2HB6tjF24YJYn25_pXlyulTBPxbhQ5ekSde3Yr87tD40yoQXuMhNUybiEldUMbeBvc3VEBv6T5VEQ2sr5hZp6OjUfnbxpm20urR252eJZLsheer-DMAYryMhXA5eHI00A04gXEdnCkA1zN72qwvcxbT9h7dlnfHAfiSkBWB0QNpG3pljaHRZnTSBrLA0YgJOpwZVCpIk7xXOjm8-qIJsis-Jbw1lROev5EazqdPdn_yQ",
  "payload": ""
}
2024-01-31 04:51:02,863:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186609606 HTTP/1.1" 200 805
2024-01-31 04:51:02,864:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:51:01 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5SKfElLdKWuqxIeVDJMOZMHwxgePCqReFUCw4mv2GVMU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:47:11Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/u86J_A",
      "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/GMvoKw",
      "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/skcDcA",
      "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA"
    }
  ]
}
2024-01-31 04:51:02,864:DEBUG:acme.client:Storing nonce: R3i4Vkc5SKfElLdKWuqxIeVDJMOZMHwxgePCqReFUCw4mv2GVMU
2024-01-31 04:51:02,864:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-31 04:51:02,865:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-01-31 04:51:02,866:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-31 04:51:02,866:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-31 04:51:02,868:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:51:02,868:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-31 04:51:02,869:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-31 04:51:02,869:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-31 04:51:02,872:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:51:02,920:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-31 04:51:02,967:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-31 04:51:02,968:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-01-31 04:51:02,969:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-01-31 04:51:02,973:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC.
2024-01-31 04:51:02,973:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-31 04:51:02,973:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-31 04:51:02,978:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x053B12D0>
Prep: True
2024-01-31 04:51:02,978:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x053B12D0> and installer None
2024-01-31 04:51:02,978:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-31 04:51:02,982:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-31 04:51:02,983:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-31 04:51:02,985:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-31 04:51:03,444:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-31 04:51:03,444:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:51:02 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "rTVkWlTEDnQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-31 04:51:03,445:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-31 04:51:07,478:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7258_key-certbot.pem
2024-01-31 04:51:11,218:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7256_csr-certbot.pem
2024-01-31 04:51:11,218:DEBUG:acme.client:Requesting fresh nonce
2024-01-31 04:51:11,218:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-31 04:51:11,373:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-31 04:51:11,374:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:51:09 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc59R3yVCX6xjPuRe035yHcut1dU3UO7lLeVtS_3CbQxAo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-31 04:51:11,374:DEBUG:acme.client:Storing nonce: R3i4Vkc59R3yVCX6xjPuRe035yHcut1dU3UO7lLeVtS_3CbQxAo
2024-01-31 04:51:11,374:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-31 04:51:11,379:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzU5UjN5VkNYNnhqUHVSZTAzNXlIY3V0MWRVM1VPN2xMZVZ0U18zQ2JReEFvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "bVizv-ySPTCAjp1T0kqLn61FuiupIQ9IJqpadh9rkca5B6_BXtdjB4hxNYKlnMQYNx8C_H0swkCA-0VgEYH5qRxyb2WO6NQcy3c2pOuux0KojA6a_Gt37TQUC4Py3SN91QCiE2cDXl7E9yJ6_yI83yapJgZW1v1si3uPUPQK0MpybkHY_BxqKWJHp5f-H9XNbiyxRRQwSrFZ2_NSUyfkIuviQmphKdLwFhKmM2cGGnkPNaEvF_xZL4KCPOib84uTE8nJPEjfr-mOzKdcNsIO0suI6Vf-aw4txARe9Uc3vy96lEKk9GVpoMNSOWapakoIc6HnaqMT3-F3u3I-1RHtEA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-31 04:51:11,594:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-01-31 04:51:11,594:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 31 Jan 2024 03:51:10 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463415626
Replay-Nonce: VKfU247Y4d7PWRr5PqEUBBlXQfiN1rtNNQYPFLKkYs-bemMkXo0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:47:20Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463415626"
}
2024-01-31 04:51:11,595:DEBUG:acme.client:Storing nonce: VKfU247Y4d7PWRr5PqEUBBlXQfiN1rtNNQYPFLKkYs-bemMkXo0
2024-01-31 04:51:11,595:DEBUG:acme.client:JWS payload:
b''
2024-01-31 04:51:11,600:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1k0ZDdQV1JyNVBxRVVCQmxYUWZpTjFydE5OUVlQRkxLa1lzLWJlbU1rWG8wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2NDgzODYifQ",
  "signature": "ahv1ChW7Ys6PSlFouxQaHZAg9bGoqPRRFbdFHGnqnkFQu_xKDmCluebNRjrmqWEYFCnfHkx4TMBoy7vkRTG9rMxo3ygfGqb4ANRhlixOSfc0Yp56qNxAb4OCjyYJVdAk8ld8S97SVtD8pj27wKWPffCNHrGPTyBaj5FC-m9Im71cyb54mvA8TGr1jc-awIYZAf43yZoZ2HuMLLOn_8x49cxDGm8Cpu4qi8apMjoCGt6LR8DPqVE1Tkaz3U43Sesd8G_fpRUbj-Bzxdc3Swba26sUet-NFG0ERQwhDdDma2PlaZJPIvWBlFTuxfvGe3cv4Xi00Cxua3dg0THvX02-EA",
  "payload": ""
}
2024-01-31 04:51:11,769:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186648386 HTTP/1.1" 200 805
2024-01-31 04:51:11,770:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 31 Jan 2024 03:51:10 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247YAIc6ttTKE9Ia3_1vnpR8s1BTWlMHZAa8C-jJdOlUMN4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:47:20Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/AfqDTw",
      "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/2qup_g",
      "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/cLgsJg",
      "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE"
    }
  ]
}
2024-01-31 04:51:11,770:DEBUG:acme.client:Storing nonce: VKfU247YAIc6ttTKE9Ia3_1vnpR8s1BTWlMHZAa8C-jJdOlUMN4
2024-01-31 04:51:11,771:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-31 04:51:11,771:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-01-31 04:51:11,772:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-31 04:51:11,773:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-31 04:51:11,774:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:51:11,775:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-31 04:51:11,775:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-31 04:51:11,776:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-31 04:51:11,777:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-31 04:51:11,777:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-01-31 04:51:11,777:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-01-31 04:51:11,789:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-01-31 04:51:11,791:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)