2024-01-26 17:01:25,124:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-01-26 17:01:25,124:DEBUG:certbot._internal.main:Arguments: []
2024-01-26 17:01:25,124:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-01-26 17:01:26,293:DEBUG:certbot._internal.log:Root logging level set at 20
2024-01-26 17:01:26,293:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-01-26 17:01:26,332:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x048FD9B0> and installer <certbot._internal.cli.cli_utils._Default object at 0x048FD9B0>
2024-01-26 17:01:26,371:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-26 17:01:26,640:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-26 17:01:26,641:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer.
2024-01-26 17:01:26,646:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD
2024-01-26 17:01:26,655:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC.
2024-01-26 17:01:26,655:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-26 17:01:26,655:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-26 17:01:26,661:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x044629F0>
Prep: True
2024-01-26 17:01:26,661:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x044629F0> and installer None
2024-01-26 17:01:26,661:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-26 17:01:26,667:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-26 17:01:26,668:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-26 17:01:26,670:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-26 17:01:27,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-26 17:01:27,227:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:01:25 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "qY391bR90l8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-26 17:01:27,228:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-26 17:01:32,126:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7129_key-certbot.pem
2024-01-26 17:01:36,299:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7127_csr-certbot.pem
2024-01-26 17:01:36,300:DEBUG:acme.client:Requesting fresh nonce
2024-01-26 17:01:36,300:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-26 17:01:36,480:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-26 17:01:36,481:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:01:34 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFbji02lkq3IjkRzMwmJb_YEcgT-GOBSY8xRcKao1kva4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-26 17:01:36,481:DEBUG:acme.client:Storing nonce: fBfjtdZFbji02lkq3IjkRzMwmJb_YEcgT-GOBSY8xRcKao1kva4
2024-01-26 17:01:36,482:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-26 17:01:36,488:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZiamkwMmxrcTNJamtSek13bUpiX1lFY2dULUdPQlNZOHhSY0thbzFrdmE0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "CfNnfM_w68OnE_Js3t-BNNz_E9RAMSE9fyQRFUDnP_QDCAoTIxXkcDYPqLzhKCP0g6c8qiRqmvNZWqezfn2A1_iPmarvamjIY1UXXlx5ljoAR7r7vKeYEFCrLezYUFaf8V5xOWyAg1l_ntG9LSvlJEYrjPjQeMJpOd2uF2qXkCNl6EGsvEXu65aFLvoKM_0B67PJ_OZS2iWF5CBoOsl-yknCLBcIdxtWKfm9MeV0e52NXKwTyJfyhAp1IaQ9QoN4GAZJeJET_VSK0RK0Y3X5lufCeq5pQUUlOgnEWZAr807vU_OLQ4O_sFlKUw7aVkR03PV_PFTj1QVcSpoN0_g1rQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-26 17:01:36,678:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-01-26 17:01:36,679:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 26 Jan 2024 16:01:34 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463125096
Replay-Nonce: Wkq6jgLCXtspL4UJCnhWq0XebFuKbFk8_szPuYMvjKTnEQZhxyA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:45:30Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463125096"
}
2024-01-26 17:01:36,679:DEBUG:acme.client:Storing nonce: Wkq6jgLCXtspL4UJCnhWq0XebFuKbFk8_szPuYMvjKTnEQZhxyA
2024-01-26 17:01:36,679:DEBUG:acme.client:JWS payload:
b''
2024-01-26 17:01:36,685:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENYdHNwTDRVSkNuaFdxMFhlYkZ1S2JGazhfc3pQdVlNdmpLVG5FUVpoeHlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyMDk3MTYifQ",
  "signature": "r7oOKae62i56nR4fGoKwnfwFQ5eyPHMxc_1IYsrdO96Wl5WSBSrPamb4lf8mwjvcjwzT5QIMpK1iFae5mAyfgxKRrKhYb0os3BMZOtSfuIj31dz-sNESFWjuB9QuaqzoN1JbgcA4t8iQTNY8viCU_xm80lMQQerSWJJaDJiwwnDLENUAhn8LCp4yJTV748mdF5cDMmGSBwbZlRuK7Nj0pSahINfGZaX9W2x0pgRIU_wBirbCR6HRbC42re0UFQzieSuxIvZjzxVkjRWmL6CwrD2ORO_ndm7CoivILwS4f_RwCb-5BW3V3twaFTO-fZTLYCrQOJnHdLObjtUIR8CjWw",
  "payload": ""
}
2024-01-26 17:01:36,868:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186209716 HTTP/1.1" 200 810
2024-01-26 17:01:36,868:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:01:34 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCc-apHjdsXgsQ7mWG2iV3j_i1iBA-enwNWMc906C2Nq0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:45:30Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/6f0kFQ",
      "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/TzPnqw",
      "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/f71chA",
      "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo"
    }
  ]
}
2024-01-26 17:01:36,869:DEBUG:acme.client:Storing nonce: Wkq6jgLCc-apHjdsXgsQ7mWG2iV3j_i1iBA-enwNWMc906C2Nq0
2024-01-26 17:01:36,869:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-26 17:01:36,869:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-01-26 17:01:36,870:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-26 17:01:36,870:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-26 17:01:36,873:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:01:36,873:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-26 17:01:36,873:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-26 17:01:36,874:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-26 17:01:36,880:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:01:36,920:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-26 17:01:37,157:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-26 17:01:37,158:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-26 17:01:37,159:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-26 17:01:37,163:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC.
2024-01-26 17:01:37,163:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-26 17:01:37,164:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-26 17:01:37,169:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048DFF70>
Prep: True
2024-01-26 17:01:37,169:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048DFF70> and installer None
2024-01-26 17:01:37,169:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-26 17:01:37,174:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-26 17:01:37,174:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-26 17:01:37,176:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-26 17:01:37,643:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-26 17:01:37,643:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:01:35 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "oZF7qWF2dNg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-26 17:01:37,644:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-26 17:01:41,592:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7130_key-certbot.pem
2024-01-26 17:01:45,386:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7128_csr-certbot.pem
2024-01-26 17:01:45,386:DEBUG:acme.client:Requesting fresh nonce
2024-01-26 17:01:45,387:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-26 17:01:45,542:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-26 17:01:45,542:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:01:43 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247Y-bVTQCJmoYsLKsqS05jnzVY7cxXYEJXEla9aG6Ib8lk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-26 17:01:45,542:DEBUG:acme.client:Storing nonce: VKfU247Y-bVTQCJmoYsLKsqS05jnzVY7cxXYEJXEla9aG6Ib8lk
2024-01-26 17:01:45,543:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-26 17:01:45,548:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1ktYlZUUUNKbW9Zc0xLc3FTMDVqbnpWWTdjeFhZRUpYRWxhOWFHNkliOGxrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "i6JU8ZGZ9OaFFu95oHgKlgKMAqJOfwXLHZnxOkqmC81upXofFk02v0PMVFyH3V8GAsbEjCXQ809sBRK-X6sG6XQIhlSDvRHkHOknShirFzlsPBFKUxM3MOfVZXo1NJ1XopfMi5lQ-F6fx0ffumvEGlZdvSeiAQPTYnXG9bowSodvpS6jPR-N_i6ha3fbsctTCd6mNec4rya50_WOrBdYzyCEjz5PprAz022J0bbANIAqNFsb5aWo-lHAbmDij-nbHthbdwz5tHpjogA4H_MCfAJgnG8pt0VxOlNsZk55moeSS43CgV7mweYiulkfndckiV9c-l_VGEAjMe10VZZlRA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-26 17:01:45,728:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-01-26 17:01:45,729:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 26 Jan 2024 16:01:43 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463146186
Replay-Nonce: R3i4Vkc50n_hX1mDYlFdFGUdwfQgOynwEl26O35jAsnoKDEOLVE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:45:39Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463146186"
}
2024-01-26 17:01:45,729:DEBUG:acme.client:Storing nonce: R3i4Vkc50n_hX1mDYlFdFGUdwfQgOynwEl26O35jAsnoKDEOLVE
2024-01-26 17:01:45,729:DEBUG:acme.client:JWS payload:
b''
2024-01-26 17:01:45,735:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzUwbl9oWDFtRFlsRmRGR1Vkd2ZRZ095bndFbDI2TzM1akFzbm9LREVPTFZFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNDA4MzYifQ",
  "signature": "yt5s0fuZF-iD2uG6_VVffQLdpLGLTd9sXbe5ws9mHkrnjshwyqPypeN1-WRT9u4nJm2bgXXUWpfYL-6rqGQOF3VespcHKfjKodzNE_9FIhumuiKHPBS9qM4bQCRvHCPOJ9huyFwzW7j8XBvjFZa-y-uAN2AEtX2W3kFf7kipfifKZhhj3YkA53w240dXEK9sLhekAWbkXXz2gxTq-Kt1bmU5BKfBTVIEgEACSG1cpUfhLO5bYmdQQfyvsVKiJ_pyLenoMou4-5mX64003vpDzjlZfCbYCGTyWmmuekrRvZ4JCYG6uD6tI_nvMZVhJFSu26DEhQH5YfprF_KRDWO0mA",
  "payload": ""
}
2024-01-26 17:01:45,887:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186240836 HTTP/1.1" 200 804
2024-01-26 17:01:45,887:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:01:43 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5mFJV-tIOzSKaYe974iwatpZ42FQ2UGJH2k6mapjbi0w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:45:39Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/g8SMBA",
      "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/KdDipg",
      "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/N41DHw",
      "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I"
    }
  ]
}
2024-01-26 17:01:45,887:DEBUG:acme.client:Storing nonce: R3i4Vkc5mFJV-tIOzSKaYe974iwatpZ42FQ2UGJH2k6mapjbi0w
2024-01-26 17:01:45,888:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-26 17:01:45,888:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-01-26 17:01:45,889:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-26 17:01:45,889:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-26 17:01:45,890:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:01:45,890:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-26 17:01:45,890:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-26 17:01:45,890:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-26 17:01:45,891:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:01:45,944:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-26 17:01:46,168:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-26 17:01:46,169:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-01-26 17:01:46,170:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-01-26 17:01:46,174:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC.
2024-01-26 17:01:46,174:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-26 17:01:46,174:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-26 17:01:46,179:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048FD310>
Prep: True
2024-01-26 17:01:46,179:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048FD310> and installer None
2024-01-26 17:01:46,179:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-26 17:01:46,196:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-26 17:01:46,197:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-26 17:01:46,200:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-26 17:01:46,680:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-26 17:01:46,680:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:01:44 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "1deOHetLvcE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-26 17:01:46,681:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-26 17:01:50,779:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7131_key-certbot.pem
2024-01-26 17:01:54,486:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7129_csr-certbot.pem
2024-01-26 17:01:54,486:DEBUG:acme.client:Requesting fresh nonce
2024-01-26 17:01:54,487:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-26 17:01:54,646:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-26 17:01:54,647:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:01:52 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247YdPc1Cf0f5adRXLrwGn0mxCUMBacrWTkRKxbbFcIxi1w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-26 17:01:54,648:DEBUG:acme.client:Storing nonce: VKfU247YdPc1Cf0f5adRXLrwGn0mxCUMBacrWTkRKxbbFcIxi1w
2024-01-26 17:01:54,648:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-26 17:01:54,653:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lkUGMxQ2YwZjVhZFJYTHJ3R24wbXhDVU1CYWNyV1RrUkt4YmJGY0l4aTF3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "DP383RjMmWg0BaAQKYSEIaJZ40sCOBOXMc-uY4QET7Kq7g2pfTx0PZ8dIp3e04ixvtkK1Y6j6zs4v-R8uTq0ENNYE4MstpBnSYY43wvkVzVRfNuGzZefR1a5oDuHX3RjeCITK7O8riJSd_ZHzcrSZMcRYF46TNYHw2MjS2WrOMX_YXw4-K923m7_tbPjEdcVNYWm9l1GfVZnJHWTbtkZs6RMIijXsRVNpTM6lUgSfQM63jYyGem7Df5cKBtdUSIAu5LBYmwxJnDtfyQ9MlbcdZ5SIu3Nk6dYT_7SAquW3sPjhiE_YWfG4YJvddfl7A7BWjTuTCpypfFiKXmcPEx2Vg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-26 17:01:54,826:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-01-26 17:01:54,826:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 26 Jan 2024 16:01:52 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463167526
Replay-Nonce: VKfU247YzO-gJVL7zCgVRsMdg8AoyIAgo4C_2y6RvnFfldM_W8Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:45:48Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463167526"
}
2024-01-26 17:01:54,827:DEBUG:acme.client:Storing nonce: VKfU247YzO-gJVL7zCgVRsMdg8AoyIAgo4C_2y6RvnFfldM_W8Y
2024-01-26 17:01:54,827:DEBUG:acme.client:JWS payload:
b''
2024-01-26 17:01:54,832:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1l6Ty1nSlZMN3pDZ1ZSc01kZzhBb3lJQWdvNENfMnk2UnZuRmZsZE1fVzhZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNzM1OTYifQ",
  "signature": "oz7TQXV4K4ktrjVHr7LuxvBDak-Ds1iVTAobOnRngwoLxp2ROgxH2mBN_G2Tb6he4AeVPUOhie2yaKLxdlCjf-uaKj7vjvTaDExPOiliyCMQFVynzcSPSSLL0uKTZFWfqMERGLPogWTJpyjWZNa-jwedxIPBiFVH5AgiUn9q5F6oF-_aDgHGfI_lVTD9FUajnAQVn9dLd-6M19JTfAPsIj4c-WI9R8XUZNqaWtUslck9VWWGieHVqJTWr93G3XPuyud5DxMYDdhtqFAOaa8wFOEsmGT2Z8Li0IiKNasQS4J2eDEc-9DeEZzZAQjifnz7mYcbaOO8SH0wZ1J2hYKr-g",
  "payload": ""
}
2024-01-26 17:01:55,016:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186273596 HTTP/1.1" 200 807
2024-01-26 17:01:55,016:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:01:53 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5ifOnvO2tjrFINQ4qLcg2es3UKxfnxJpJ3NLJ3xEncM4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:45:48Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KNqRXQ",
      "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KMda1w",
      "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/f-1bag",
      "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE"
    }
  ]
}
2024-01-26 17:01:55,017:DEBUG:acme.client:Storing nonce: R3i4Vkc5ifOnvO2tjrFINQ4qLcg2es3UKxfnxJpJ3NLJ3xEncM4
2024-01-26 17:01:55,017:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-26 17:01:55,017:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-01-26 17:01:55,018:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-26 17:01:55,018:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-26 17:01:55,019:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:01:55,019:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-26 17:01:55,019:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-26 17:01:55,019:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-26 17:01:55,020:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:01:55,060:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-26 17:01:55,241:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-26 17:01:55,243:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-26 17:01:55,244:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-26 17:01:55,249:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC.
2024-01-26 17:01:55,249:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-26 17:01:55,249:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-26 17:01:55,254:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04462EB0>
Prep: True
2024-01-26 17:01:55,254:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04462EB0> and installer None
2024-01-26 17:01:55,254:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-26 17:01:55,259:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-26 17:01:55,260:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-26 17:01:55,262:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-26 17:01:55,787:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-26 17:01:55,788:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:01:53 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "e1GnFh0Mkig": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-26 17:01:55,788:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-26 17:01:59,539:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7132_key-certbot.pem
2024-01-26 17:02:03,259:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7130_csr-certbot.pem
2024-01-26 17:02:03,260:DEBUG:acme.client:Requesting fresh nonce
2024-01-26 17:02:03,260:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-26 17:02:03,433:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-26 17:02:03,434:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:01 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCfT6QY82wngBn_yVR1Jly6EalT85sbGdaN1xdfqf1gms
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-26 17:02:03,434:DEBUG:acme.client:Storing nonce: Wkq6jgLCfT6QY82wngBn_yVR1Jly6EalT85sbGdaN1xdfqf1gms
2024-01-26 17:02:03,434:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-01-26 17:02:03,440:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENmVDZRWTgyd25nQm5feVZSMUpseTZFYWxUODVzYkdkYU4xeGRmcWYxZ21zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "CVFY6SujgA72qr9vyZPRyJzu9ihPSkJ0rcOz-sa_di13yx3mtUM8tymDSNEs0cXer_bKCTPW33IZzqrktYEBXYh9QjK_UqHyP0SXZyvYKjZtdCE4Qq8L9VBpoSa5Yh2DxqyTe5uvPCYtApI0bAXQxKW6kKNKRtT7q_E9t-Mf-KvPzJYt9nzdx6-mLpeLkYZ6DvvtKXdp8Y2COKd5tytzuP4j-hoNRDMbcKdUbaFS7BPV96njggywvKq5mz9Kc291COWnlIBx5SsB5ogvy4AZN8m29JCmKPCYTHvewZMXy331q9_cdjzz628mHEZ_aprFVczPJhPekSRobL5jqGxl6Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-26 17:02:03,629:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-01-26 17:02:03,630:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 26 Jan 2024 16:02:01 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463187546
Replay-Nonce: Wkq6jgLCZGaBfY7Dqx7KQsZi2Ag-aJybGE582tsKSRY7qpCC_8A
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:45:58Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463187546"
}
2024-01-26 17:02:03,630:DEBUG:acme.client:Storing nonce: Wkq6jgLCZGaBfY7Dqx7KQsZi2Ag-aJybGE582tsKSRY7qpCC_8A
2024-01-26 17:02:03,630:DEBUG:acme.client:JWS payload:
b''
2024-01-26 17:02:03,636:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENaR2FCZlk3RHF4N0tRc1ppMkFnLWFKeWJHRTU4MnRzS1NSWTdxcENDXzhBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzMDUyMzYifQ",
  "signature": "Oi91aI7U8NuNgTCIzmm2O9UL-JN2aRiQgOJhqEaRujAazatJtx4UTMiPmrkL53P9TU06mcdRKCXr-yQTiELSWjCOgBHknQT1JgF2Vh0CaS49NU13BMFgmI0MOzjzIwoTxXoa5frOu5dC94NcNm2U8AjL95Ju0sul1PqpdBup2x57BuIDgOuUWS_v0dgshBbNdJgd34Z49TNMuHmBrbXQG1f-XyeFZuTs2trBN2ug2JT3ydBbNSS2hxkPWFDCvoRkxjo3hOUQS62oHF9psNBKrW573DSAVSuanE4ird8AjTqQ3AZ4YK9RAXhhe2Xq8y2dW4ZivXHetDSnCPiaKCbD6Q",
  "payload": ""
}
2024-01-26 17:02:03,825:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186305236 HTTP/1.1" 200 801
2024-01-26 17:02:03,826:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:01 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFqPX0gb8A_PlOhmsLE-YC0WiOWhorbGfM11egHjuFR1U
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:45:58Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/H-2NUg",
      "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/SPl0kw",
      "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/dBmW2A",
      "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY"
    }
  ]
}
2024-01-26 17:02:03,826:DEBUG:acme.client:Storing nonce: fBfjtdZFqPX0gb8A_PlOhmsLE-YC0WiOWhorbGfM11egHjuFR1U
2024-01-26 17:02:03,826:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-26 17:02:03,827:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-01-26 17:02:03,827:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-26 17:02:03,827:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-26 17:02:03,828:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:02:03,828:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-26 17:02:03,828:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-26 17:02:03,829:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-26 17:02:03,830:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:02:03,871:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-26 17:02:04,056:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-26 17:02:04,058:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-26 17:02:04,058:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-26 17:02:04,062:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC.
2024-01-26 17:02:04,063:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-26 17:02:04,063:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-26 17:02:04,066:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048FDD10>
Prep: True
2024-01-26 17:02:04,067:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048FDD10> and installer None
2024-01-26 17:02:04,067:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-26 17:02:04,071:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-26 17:02:04,072:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-26 17:02:04,074:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-26 17:02:04,620:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-26 17:02:04,621:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:02 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "KAhtmW8QDrY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-26 17:02:04,622:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-26 17:02:08,586:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7133_key-certbot.pem
2024-01-26 17:02:12,267:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7131_csr-certbot.pem
2024-01-26 17:02:12,268:DEBUG:acme.client:Requesting fresh nonce
2024-01-26 17:02:12,268:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-26 17:02:12,450:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-26 17:02:12,450:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:10 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFxq2Q9aSAoAWvRI2RWxzvF1hgHKcgVErvbTOM3vzfYuM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-26 17:02:12,450:DEBUG:acme.client:Storing nonce: fBfjtdZFxq2Q9aSAoAWvRI2RWxzvF1hgHKcgVErvbTOM3vzfYuM
2024-01-26 17:02:12,451:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-26 17:02:12,456:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZ4cTJROWFTQW9BV3ZSSTJSV3h6dkYxaGdIS2NnVkVydmJUT00zdnpmWXVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "SGuHVCp5dP2NBNzq2jiYfkadED-2JVMFSgbbJmYk1pBgJMk_6AVFSyFLRG8qBMA0QZL8HBIpVCbhN_LRSmXiBfakoNKoKAix44MxT-_QUe-pxnKbd0VEvgx955u6PnfnB8BQSWUWVRlEu7_VzfbAbYxwHQiD1g8wEXz7Hd5usQWTuD2rv2D3t44BDhdDBbmrHou4vPdLKGZq6WqURSeE0PorIGxNxjVSEynn-P1CnJQOqvYXZu01rQoZT6knUniZ1AR8iYs0wDpEcSiZ6NxQs9yoQKRK50iExSgCKtn9IezWl5L22bXVOqkkyFJRhsB0SLyJRfKSnGbMXbVJW-l_vw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-26 17:02:12,652:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-01-26 17:02:12,653:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 26 Jan 2024 16:02:10 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463215876
Replay-Nonce: fBfjtdZF9voEYcUbx8VdvcBLBjbZNU_ev70zODh4mMkzQ65V-Fs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:07Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463215876"
}
2024-01-26 17:02:12,653:DEBUG:acme.client:Storing nonce: fBfjtdZF9voEYcUbx8VdvcBLBjbZNU_ev70zODh4mMkzQ65V-Fs
2024-01-26 17:02:12,653:DEBUG:acme.client:JWS payload:
b''
2024-01-26 17:02:12,661:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkY5dm9FWWNVYng4VmR2Y0JMQmpiWk5VX2V2NzB6T0RoNG1Na3pRNjVWLUZzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzNDM5MTYifQ",
  "signature": "ua9Okal03JFnhg0_fYVDmQ4v5GjRD_NqSaJlojBz3HOl3dGNW5onAL8JbbXcAyK9Ib2eDgGWWpvmW7KHVQNbdwH39oxZeuhmDm5GnFoNTyyFiK8S3JX3Lomdc2oIx1u38rbaMSb-dkEcxOBsFy8Kq11jiKmbDhHtHUMq2So7hi59EeG4dQ8hw1hlCe5uSf7vufk2f1AVzuZJ1VzxxDXccIk7C8yEOd65Nzq-JuY4EqV3t-WMaElcD_39pmLrhHDAnUkyw4lVGCoCVoC6ImrA6Je6qtNK95bDOXVqarJYuSkJnQVkJ3-04g_xfUtZprkRF8alExqhJ6-7-pLCXy7V7Q",
  "payload": ""
}
2024-01-26 17:02:12,849:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186343916 HTTP/1.1" 200 805
2024-01-26 17:02:12,850:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:10 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFf-cCRUyWsY75qnpaOKA4OPrPG-DulWoS5lx2UAUMG2U
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:07Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/FQmNLA",
      "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/nw3Heg",
      "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/o7wJkQ",
      "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE"
    }
  ]
}
2024-01-26 17:02:12,850:DEBUG:acme.client:Storing nonce: fBfjtdZFf-cCRUyWsY75qnpaOKA4OPrPG-DulWoS5lx2UAUMG2U
2024-01-26 17:02:12,851:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-26 17:02:12,851:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-01-26 17:02:12,852:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-26 17:02:12,853:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-26 17:02:12,855:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:02:12,855:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-26 17:02:12,856:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-26 17:02:12,856:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-26 17:02:12,859:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:02:12,897:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-26 17:02:13,102:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-26 17:02:13,104:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-01-26 17:02:13,104:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-01-26 17:02:13,109:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC.
2024-01-26 17:02:13,109:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-26 17:02:13,109:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-26 17:02:13,114:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048FD310>
Prep: True
2024-01-26 17:02:13,114:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048FD310> and installer None
2024-01-26 17:02:13,114:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-26 17:02:13,120:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-26 17:02:13,121:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-26 17:02:13,123:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-26 17:02:13,582:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-26 17:02:13,583:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:11 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "StLfCGCpJqo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-26 17:02:13,583:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-26 17:02:17,652:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7134_key-certbot.pem
2024-01-26 17:02:21,504:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7132_csr-certbot.pem
2024-01-26 17:02:21,504:DEBUG:acme.client:Requesting fresh nonce
2024-01-26 17:02:21,504:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-26 17:02:21,659:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-26 17:02:21,660:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:19 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc59A3IyvoNyb2RwFAjAyDM9OOQG5HkegMCL2L1foKp924
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-26 17:02:21,660:DEBUG:acme.client:Storing nonce: R3i4Vkc59A3IyvoNyb2RwFAjAyDM9OOQG5HkegMCL2L1foKp924
2024-01-26 17:02:21,661:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-26 17:02:21,671:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzU5QTNJeXZvTnliMlJ3RkFqQXlETTlPT1FHNUhrZWdNQ0wyTDFmb0twOTI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "u4aGFd2SNpzOWVKhnJwZ9t1toO1lZKM9uepxoXFOktBnNHinqayxiRTdVOl49_UhXvimZKelFKpOb9vt7USpFMMz86sjTkH52CVjsbnXI2IhZdRvFSxCdtd6BiApcE51UEXHGlkBo-Aa-WVjb3hosaVRSCyXOCtqU3-LUk-A7K4KTAtnSkikPtfgpQ2zdrTMo8YfixByv-zd_obdyLOkR2AGeMaWS4EkHkoCi41b2XpsAm1YVX4_EbHFTFz6kstHLSnjQG37amInaHAu-HvFbPuhTKjR48EA62Y-Y5riYyLyQ1I1MLqHIwhQCSPDH_TWeAOmd81J4BDxmcpEWS3Egg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-01-26 17:02:21,848:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-01-26 17:02:21,849:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 26 Jan 2024 16:02:19 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463242076
Replay-Nonce: VKfU247YRZFT62hRY2F0NPJUjc73pKZrc-lxWNYuqu0JS8htcnk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:16Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463242076"
}
2024-01-26 17:02:21,849:DEBUG:acme.client:Storing nonce: VKfU247YRZFT62hRY2F0NPJUjc73pKZrc-lxWNYuqu0JS8htcnk
2024-01-26 17:02:21,849:DEBUG:acme.client:JWS payload:
b''
2024-01-26 17:02:21,856:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lSWkZUNjJoUlkyRjBOUEpVamM3M3BLWnJjLWx4V05ZdXF1MEpTOGh0Y25rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzODQ1MTYifQ",
  "signature": "NH6nYi7nbvL-NQt3L4I_xj-tx7TvI-i7WRldw7_6lBkm6CPF-ZmYO68vOuzRFK-gfADENYe9TylpBPhvG-S1CBjNI69PCtF7FPg9piN9qT1YAE8SFBGJarjC7szPnoxvBlAyTYis7mYqRqo1Zm97t8NIOEpoAYjvlXjzDtHQ1172jC2wkjSm3TRW-xBKfa-Tek6Ikk6V2H_wPIYjgKv4PcTXEmeWMZcGfUE8apjmCS5aHgkzYL3hP9ib68XN4Sk40Z0ajNTWPfViWMl6jqSxHi9WgmTDF-DFsmGmKp-H9EdF8gBzZem0g5287WfIBPeIiNyHQVqwP6VN5glzd2L8rA",
  "payload": ""
}
2024-01-26 17:02:22,018:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186384516 HTTP/1.1" 200 809
2024-01-26 17:02:22,019:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:20 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247Y4BnxOpNekDKvn_664NKHRK0c0xMvHpiXj3C5S1z4OLQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:16Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/iy166A",
      "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/FJ3duA",
      "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/0qWA8w",
      "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY"
    }
  ]
}
2024-01-26 17:02:22,019:DEBUG:acme.client:Storing nonce: VKfU247Y4BnxOpNekDKvn_664NKHRK0c0xMvHpiXj3C5S1z4OLQ
2024-01-26 17:02:22,020:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-26 17:02:22,020:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-01-26 17:02:22,021:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-26 17:02:22,021:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-26 17:02:22,022:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:02:22,022:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-26 17:02:22,022:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-26 17:02:22,023:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-26 17:02:22,024:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:02:22,073:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-26 17:02:22,268:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-26 17:02:22,270:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-26 17:02:22,272:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-26 17:02:22,281:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC.
2024-01-26 17:02:22,281:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-26 17:02:22,282:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-26 17:02:22,286:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048F2F70>
Prep: True
2024-01-26 17:02:22,287:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048F2F70> and installer None
2024-01-26 17:02:22,287:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-26 17:02:22,292:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-26 17:02:22,293:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-26 17:02:22,295:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-26 17:02:22,735:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-26 17:02:22,735:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:20 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "ie3Mu9cj9A8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-26 17:02:22,736:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-26 17:02:26,659:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7135_key-certbot.pem
2024-01-26 17:02:30,466:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7133_csr-certbot.pem
2024-01-26 17:02:30,466:DEBUG:acme.client:Requesting fresh nonce
2024-01-26 17:02:30,466:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-26 17:02:30,633:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-26 17:02:30,634:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:28 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247YdKGe6Y9OJtOsA1ltvwmbrqxov4i4t0Zvh-E6j_lcd_4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-26 17:02:30,634:DEBUG:acme.client:Storing nonce: VKfU247YdKGe6Y9OJtOsA1ltvwmbrqxov4i4t0Zvh-E6j_lcd_4
2024-01-26 17:02:30,634:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-26 17:02:30,641:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lkS0dlNlk5T0p0T3NBMWx0dndtYnJxeG92NGk0dDBadmgtRTZqX2xjZF80IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "j9VUJo9J2B5Uo8zsqKE44sCoVjIpzlAqi58f1U_uGBYqM-d_YF7XIFX_yBs6hGR4YDnHi2Eh1Dql6yPqf9ra2CxleAVlEInhOlIcjlmEYfU7zuyBw60U26lk0Z7PoWX0Ah64idGo4loGiC0PyBFAgN4aZzo7wnr6fpvddkRIYsndmlNbbVP2rtL2_ETa4Ozsx6um_eCrZOyNaxCm-eWeg-lf_xDemniv_Dw73dAkO0PTyugBOe_zJR5E3ys6AkojGwbnbKghTRFweTBjM7t0YFcYfY28JH4iKm1Slqk6BVXPPG4pS8f199HMpXjyy6SKWbylVv0Rf3idM3ZWjmQIrA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-01-26 17:02:30,825:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-01-26 17:02:30,826:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 26 Jan 2024 16:02:28 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463267436
Replay-Nonce: VKfU247YPpx2E1QOdDDJecSxyLOtaRYRl9QW_rrinQHcUQf9Y8I
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463267436"
}
2024-01-26 17:02:30,826:DEBUG:acme.client:Storing nonce: VKfU247YPpx2E1QOdDDJecSxyLOtaRYRl9QW_rrinQHcUQf9Y8I
2024-01-26 17:02:30,827:DEBUG:acme.client:JWS payload:
b''
2024-01-26 17:02:30,832:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lQcHgyRTFRT2REREplY1N4eUxPdGFSWVJsOVFXX3JyaW5RSGNVUWY5WThJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0MjM2MTYifQ",
  "signature": "f60uu2H1-MqO1B6v9tHiYQaqcdAjuZZOdOLOWLAzxdUIbq2hYZDeuiqVQ8olcvXg23qfeUGvf1GCGtIIGNuNMzzMmJhywYHy8R67MJt5IWusAYQKSLich1dW_XcVSLjgBxOBZIGpyx22Hb5RJGx_8j_LOy0ziiYkzdFqKglU46gdX-jbBPpmxbT2PtPrgxXkwuPvUuXsiQXOg8c_rDwQj3HuHpgVnJTx5l1wwIOdPyBi6pWNgp8TOSSIGa8MrFZo3fxihiG1H04eoxe_Jt32SDSHx_42PCg6S5EmSjMZJFe1B_eIx9J25B8vMHdqtqnal6soTzzvwmSqD7ctn9_hXQ",
  "payload": ""
}
2024-01-26 17:02:31,545:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186423616 HTTP/1.1" 200 806
2024-01-26 17:02:31,546:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:29 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247YGjKx5nS9CJrNJfcsaHuJqrUAHj_1yU2RffOk3AcIKNs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:25Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/sGt3LQ",
      "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/-siQUw",
      "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/rUgQOA",
      "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg"
    }
  ]
}
2024-01-26 17:02:31,547:DEBUG:acme.client:Storing nonce: VKfU247YGjKx5nS9CJrNJfcsaHuJqrUAHj_1yU2RffOk3AcIKNs
2024-01-26 17:02:31,548:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-26 17:02:31,549:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-01-26 17:02:31,549:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-26 17:02:31,550:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-26 17:02:31,550:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:02:31,551:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-26 17:02:31,551:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-26 17:02:31,551:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-26 17:02:31,553:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:02:31,590:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-01-26 17:02:31,590:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-26 17:02:31,590:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-01-26 17:02:31,598:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-01-26 17:02:31,601:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-01-26 17:02:31,601:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-01-26 17:02:31,601:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-01-26 17:02:31,602:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-01-26 17:02:31,604:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-01-26 17:02:31,642:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-26 17:02:31,865:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-26 17:02:31,865:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-26 17:02:31,866:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-26 17:02:31,870:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC.
2024-01-26 17:02:31,870:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-26 17:02:31,870:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-26 17:02:31,875:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04CF9EB0>
Prep: True
2024-01-26 17:02:31,875:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04CF9EB0> and installer None
2024-01-26 17:02:31,875:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-26 17:02:31,891:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-26 17:02:31,892:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-26 17:02:31,895:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-26 17:02:32,437:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-26 17:02:32,437:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:30 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "XZqKlCK5hiQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-26 17:02:32,438:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-26 17:02:36,458:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7136_key-certbot.pem
2024-01-26 17:02:40,296:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7134_csr-certbot.pem
2024-01-26 17:02:40,296:DEBUG:acme.client:Requesting fresh nonce
2024-01-26 17:02:40,296:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-26 17:02:40,486:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-26 17:02:40,487:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:38 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFY-L0XC5sLxAN2x-kyb7Ik_RneLPMypHrN9FB53k1o8Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-26 17:02:40,487:DEBUG:acme.client:Storing nonce: fBfjtdZFY-L0XC5sLxAN2x-kyb7Ik_RneLPMypHrN9FB53k1o8Y
2024-01-26 17:02:40,487:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-26 17:02:40,493:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZZLUwwWEM1c0x4QU4yeC1reWI3SWtfUm5lTFBNeXBIck45RkI1M2sxbzhZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "iIotjhHZpH8xzXSZtoz_fUMUCQ5FdQwA3msCLHqcfbqeN46Ja0r5AiFSOFQP6meXBDZluqYKYecmA09ku5uWwvHpS9iy2hU60ydnevPpR0ndeZd9Je-7DpgxfV9-5xSURKMdI3qmyJWB_HbaaclkCrs_YFBZ320e5yb4z2kHyzq1PTr8o92fY3iVq0EctQrUwnkA0VSwelrJD3_L0Aive_IEtzeVjEqRWW5N-b5sp8-avHJfGwTUiqsEiCk_1TTv4vzTQqbSuvrMHI10MA0JiIF73I6-gob15mDiRsELectH4czX-O4rFPzHE2_fCw9GPTxCLSMGcqPKQbVYaczlXw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-26 17:02:40,688:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-01-26 17:02:40,689:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 26 Jan 2024 16:02:38 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463293726
Replay-Nonce: fBfjtdZFu9U8mp0E2n1eOipWyUbkp8uuKf-iSlUzmOfquD3Y50E
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463293726"
}
2024-01-26 17:02:40,689:DEBUG:acme.client:Storing nonce: fBfjtdZFu9U8mp0E2n1eOipWyUbkp8uuKf-iSlUzmOfquD3Y50E
2024-01-26 17:02:40,690:DEBUG:acme.client:JWS payload:
b''
2024-01-26 17:02:40,697:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZ1OVU4bXAwRTJuMWVPaXBXeVVia3A4dXVLZi1pU2xVem1PZnF1RDNZNTBFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0Njc1NDYifQ",
  "signature": "EdOaVS6sVhU4m5FW_4v_LKIgk8J2d6_2STbUvoZBlYBnaWfhBWmxiwdQQkcrk_C080IB-0SltjuU7xXka7KETv94o5AugjN-lLc_CkZW4gwKcrjwKhzSiw03hWRHpIB2DXNNggDkgGAzRnQ-GYI4G8rCEVnKqvzxkMPUZS596WFtXQ9aY0__Zx8SIbjaMOWZIJ_2ENK5RDnqB68i6X7mq1FnD3cYIxNWhpUJIeIHFZvKsgX_3u72R0t3V1XbJJLGcLLiorj7S15aDu9wdtYyydF_3pbsoyp7RBf-dGrZUve-rdDa10cXzVzeh4UuNVC5LTRH13a17M0quh1yLd1EDA",
  "payload": ""
}
2024-01-26 17:02:40,883:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186467546 HTTP/1.1" 200 811
2024-01-26 17:02:40,884:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:38 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCqCmusLCOZKePTfD6LE9tXSAZ0Y3Ex0vafE5UszBl_JQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:34Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/n-ZWjw",
      "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/NYrS2A",
      "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/g51OFg",
      "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU"
    }
  ]
}
2024-01-26 17:02:40,885:DEBUG:acme.client:Storing nonce: Wkq6jgLCqCmusLCOZKePTfD6LE9tXSAZ0Y3Ex0vafE5UszBl_JQ
2024-01-26 17:02:40,886:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-26 17:02:40,887:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-01-26 17:02:40,888:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-26 17:02:40,888:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-26 17:02:40,888:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:02:40,889:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-26 17:02:40,889:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-26 17:02:40,889:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-26 17:02:40,891:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:02:40,930:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-26 17:02:41,178:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-26 17:02:41,180:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-26 17:02:41,182:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-26 17:02:41,188:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC.
2024-01-26 17:02:41,188:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-26 17:02:41,189:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-26 17:02:41,195:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0516FA70>
Prep: True
2024-01-26 17:02:41,196:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0516FA70> and installer None
2024-01-26 17:02:41,196:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-26 17:02:41,200:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-26 17:02:41,201:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-26 17:02:41,203:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-26 17:02:41,674:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-26 17:02:41,675:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:39 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "bG-ZXwqHMGw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-26 17:02:41,676:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-26 17:02:45,827:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7137_key-certbot.pem
2024-01-26 17:02:49,737:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7135_csr-certbot.pem
2024-01-26 17:02:49,737:DEBUG:acme.client:Requesting fresh nonce
2024-01-26 17:02:49,737:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-26 17:02:49,896:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-26 17:02:49,897:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:47 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5zchTWROAyMX2DfRDE1wJ-HSZ6jUd8xx1Iug8EZl6j5o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-26 17:02:49,897:DEBUG:acme.client:Storing nonce: R3i4Vkc5zchTWROAyMX2DfRDE1wJ-HSZ6jUd8xx1Iug8EZl6j5o
2024-01-26 17:02:49,899:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-26 17:02:49,905:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzV6Y2hUV1JPQXlNWDJEZlJERTF3Si1IU1o2alVkOHh4MUl1ZzhFWmw2ajVvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "tscMDHCOPqQ93TcudcDL-uR7tmbtZAR5Ea_10pWaTI4-4n2DEgJXuRqCVwkt8-u5ej80p6MbZKrPUlFGuJ3JGrvG0I_LSKL77zWkgOtfAMuMePKXg7zc4wsURBA4gjlJ-314SN7rHx477ZDWrN5WRsd-AcoD1hdTJautKyiyfR4LFrRNH74x92iXwm6Jsk3XQmeBtZ59EIpMJEpFHt537HEXt8l_mp9ZUHDDKtLhsuMZatOfgYFeHZ0bMAAvW5HypkvYXuqTk9NTyCP50iJrS6SnPcX6QDyjtQ6uC8z9CWXMzzWfLr-0Je0bjrVrTT8662cxQF89s28gnGs9tz4wrQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-26 17:02:50,092:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-01-26 17:02:50,092:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 26 Jan 2024 16:02:48 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463315236
Replay-Nonce: R3i4Vkc5T4MOU9l1XL9a5vIwV_LX0n1A-2akTySzd1wmXbnB9Hg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:43Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463315236"
}
2024-01-26 17:02:50,093:DEBUG:acme.client:Storing nonce: R3i4Vkc5T4MOU9l1XL9a5vIwV_LX0n1A-2akTySzd1wmXbnB9Hg
2024-01-26 17:02:50,093:DEBUG:acme.client:JWS payload:
b''
2024-01-26 17:02:50,099:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVUNE1PVTlsMVhMOWE1dkl3Vl9MWDBuMUEtMmFrVHlTemQxd21YYm5COUhnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MDAzMzYifQ",
  "signature": "b8dOT1V72DSrqoIRBMhhRXskeawOMvjh-wX7Ap2db5rsgvXcvo8044YjV72ATLNnB0jZmUddxlRonm7UKyff6vGgFVxIakiJymyQFE4TvlWPkt29B6MWYSeCSRZx0nfBeawvWguYKvPWOf4EPCEegDzbU7wTggY2uWi2PTJpi4Z1hBbHM47EZjx-ypa9vanQ4dv62J4n9KNtIdExYTVgH9HOAJlCHdXF_zEFmt9ciUgw2cnBTVjiiAMwLqlCehbIFYrNmqsINU_f5SoTICbPi-uxie40VENZXzt98sLyiUqD9vepZ9Q0Ur6SW_saxyUP8fi6kyBGR1cN_CQWpqp2Sw",
  "payload": ""
}
2024-01-26 17:02:50,258:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186500336 HTTP/1.1" 200 810
2024-01-26 17:02:50,259:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:48 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5QFshklAidb7E3xC2VyCQ05-7gUgDj9R2NYNqFf-zqUE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:43Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/MLFeSA",
      "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/NegWfw",
      "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/0vtuKQ",
      "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0"
    }
  ]
}
2024-01-26 17:02:50,259:DEBUG:acme.client:Storing nonce: R3i4Vkc5QFshklAidb7E3xC2VyCQ05-7gUgDj9R2NYNqFf-zqUE
2024-01-26 17:02:50,259:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-26 17:02:50,260:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-01-26 17:02:50,260:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-26 17:02:50,261:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-26 17:02:50,261:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:02:50,262:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-26 17:02:50,262:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-26 17:02:50,262:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-26 17:02:50,263:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:02:50,300:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-26 17:02:50,542:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-26 17:02:50,544:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2024-01-26 17:02:50,545:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2024-01-26 17:02:50,551:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC.
2024-01-26 17:02:50,551:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-26 17:02:50,551:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-26 17:02:50,556:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04CF9270>
Prep: True
2024-01-26 17:02:50,556:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04CF9270> and installer None
2024-01-26 17:02:50,556:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-26 17:02:50,560:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-26 17:02:50,561:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-26 17:02:50,563:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-26 17:02:51,024:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-26 17:02:51,024:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:49 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "0h1gXSGiXcY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-26 17:02:51,025:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-26 17:02:55,848:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7138_key-certbot.pem
2024-01-26 17:02:59,742:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7136_csr-certbot.pem
2024-01-26 17:02:59,742:DEBUG:acme.client:Requesting fresh nonce
2024-01-26 17:02:59,742:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-26 17:02:59,898:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-26 17:02:59,898:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:57 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5FGSQxP3gDLpiWeJJv5zFQr4JIJyAyLRoCD8sD9X0CXs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-26 17:02:59,898:DEBUG:acme.client:Storing nonce: R3i4Vkc5FGSQxP3gDLpiWeJJv5zFQr4JIJyAyLRoCD8sD9X0CXs
2024-01-26 17:02:59,899:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-26 17:02:59,904:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVGR1NReFAzZ0RMcGlXZUpKdjV6RlFyNEpJSnlBeUxSb0NEOHNEOVgwQ1hzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "bJnLa3LW0uAb5zrG3Y7l918sQEw3z2Ki3g71so0fByHG7WbuvJFhf6zb5pLuJGMZA_HLd1vjNB6hmU-3DXtfNB33EnON6hl6GJj9uVzr49HrCZELnBaoWteEqp0dn4B6kFWu9eSTqbk5IVruR8zYQ1JBtLA64DXm4ThhKNNse0502a1g332LeVEMRF4j5x7MrxAG6IwqulWx5mr5L3igRRpe4iTtPqmzPzlLXC2mcDiGcXq8LXGelNpxsi5da5-3oov2OKanSzZ6ZWw4rkhdEK2YFo7p8QWsKatCfRBrk-hlO95acj7KFqOTOByUr5uTXygLsBrvY00skd7_5cx6yg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-01-26 17:03:00,185:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-01-26 17:03:00,186:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 26 Jan 2024 16:02:58 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463336576
Replay-Nonce: R3i4Vkc512Fo3cbDJ4v_auax7DWzeATHhve95gbj8viOf0_ANVM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463336576"
}
2024-01-26 17:03:00,186:DEBUG:acme.client:Storing nonce: R3i4Vkc512Fo3cbDJ4v_auax7DWzeATHhve95gbj8viOf0_ANVM
2024-01-26 17:03:00,186:DEBUG:acme.client:JWS payload:
b''
2024-01-26 17:03:00,191:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzUxMkZvM2NiREo0dl9hdWF4N0RXemVBVEhodmU5NWdiajh2aU9mMF9BTlZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MzA0NTYifQ",
  "signature": "ucZrxsBx21-7e8mDpOAw1a5ve0wBU-DoJYDXYqs2EzUT7X-npyvJZrGoyAg9rlTVav_bPQ78PRc2SW4Xf7HexwmbJjt35xCsvRG3MiedRmmk8xKv6Ka6zNITZ-ftMpcdDn8DfVG2zvv4qeSSHrtDE7ijzp7dlJAMDs4-uAWmhg5gsA0l_Us0ehV87j9WN8Br8xwGTQ659er1Rbw3_Qn8VO68_dLjK3wrq5l5ZwiAlycHngBTORtLqU3oolS6wYKkwflOX6XoZR-8xYLFzjxXynHicePqP293T0fI7QaweKCJaQzFlAjnFyjABkYqjvI43_j8OvF7veEohvYMl0rCpQ",
  "payload": ""
}
2024-01-26 17:03:00,364:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186530456 HTTP/1.1" 200 809
2024-01-26 17:03:00,365:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:58 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247Y8NtCPiWAG6FORBb6uJWOXyfLIqxBecVQRYYlplotk-k
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:52Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/ibbbOA",
      "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/W42erg",
      "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/xDGKCQ",
      "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI"
    }
  ]
}
2024-01-26 17:03:00,365:DEBUG:acme.client:Storing nonce: VKfU247Y8NtCPiWAG6FORBb6uJWOXyfLIqxBecVQRYYlplotk-k
2024-01-26 17:03:00,365:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-26 17:03:00,366:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-01-26 17:03:00,366:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-26 17:03:00,367:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-26 17:03:00,367:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:03:00,367:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-26 17:03:00,368:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-26 17:03:00,368:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-26 17:03:00,369:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:03:00,411:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-26 17:03:00,634:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-26 17:03:00,635:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer.
2024-01-26 17:03:00,636:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD
2024-01-26 17:03:00,639:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC.
2024-01-26 17:03:00,639:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-26 17:03:00,640:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-26 17:03:00,644:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04458470>
Prep: True
2024-01-26 17:03:00,645:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04458470> and installer None
2024-01-26 17:03:00,645:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-26 17:03:00,660:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-26 17:03:00,661:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-26 17:03:00,662:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-26 17:03:01,120:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-26 17:03:01,121:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:02:59 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "PmQL7IOjewA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-26 17:03:01,121:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-26 17:03:05,331:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7139_key-certbot.pem
2024-01-26 17:03:09,181:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7137_csr-certbot.pem
2024-01-26 17:03:09,181:DEBUG:acme.client:Requesting fresh nonce
2024-01-26 17:03:09,182:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-26 17:03:09,345:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-26 17:03:09,347:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:03:07 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247Y-mury2P7Y1fN9a83sXyjzRfy7VR_yWl9sqIxHwhx7Ok
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-26 17:03:09,347:DEBUG:acme.client:Storing nonce: VKfU247Y-mury2P7Y1fN9a83sXyjzRfy7VR_yWl9sqIxHwhx7Ok
2024-01-26 17:03:09,348:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-26 17:03:09,355:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1ktbXVyeTJQN1kxZk45YTgzc1h5anpSZnk3VlJfeVdsOXNxSXhId2h4N09rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "SthwJS7CqYjKR6sdqJbW3YXjJxXR2NgtmjhsDSxnZg6gxa9HFMZpEkIiZFmmXCt_f_HuySoK20RhX5Xipq10XwVzrfy1L-0iGiZl-tQkezH6XOaM_jUTjaAx-XkaaZLKN5-qPjlSrJx2Viah71ajmzf704bBAJarXvfoOCrCyRQuKXxcNREsqkUUFK0rjEnkKxSAauokhTyxFXen_a1x8SELE4O3JjzgO45VaSG6--bT_dZ1O0rZ9fXtpG8r2_9wEXz3MN-awsGPpNfFFxmAlt0zo6EW3uRMvmRauDc0lufCUBo5h3iG6v124zxXQ3WGKg9ndm6CM7IBEU7iAzWZtQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-26 17:03:09,631:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-01-26 17:03:09,632:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 26 Jan 2024 16:03:07 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463357966
Replay-Nonce: R3i4Vkc5hrSXC-g8Zvm-DbmctLSkvxFPiYI_UL40gqAalDyu2Fg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:47:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463357966"
}
2024-01-26 17:03:09,632:DEBUG:acme.client:Storing nonce: R3i4Vkc5hrSXC-g8Zvm-DbmctLSkvxFPiYI_UL40gqAalDyu2Fg
2024-01-26 17:03:09,632:DEBUG:acme.client:JWS payload:
b''
2024-01-26 17:03:09,637:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVoclNYQy1nOFp2bS1EYm1jdExTa3Z4RlBpWUlfVUw0MGdxQWFsRHl1MkZnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1NjIyMzYifQ",
  "signature": "YcY1fi5eK_jnwCcpqREd02qY9D0XrmpT4v-yKMdZuteLTjlN2-J2F34QRVH3qw-afgIbt-BwzI_DfWmJngFpuekDtzD2MPDUbmNBgX4D0DRxHjBxF6ktlyqKyBIzy8TAQoxKRjfuWr2SAgtdYRBzVuM7xa7k7XFGn4jXXsNfb4xkHFTuG6G5Nuf1OBSUyIbFNKWBYPNrd7R5Eq1PjVWake0JijnO3dodCCh5MklusGM6UhnSbh42ooyRYV1rwNqkedwcZmDjrMAHVms4OWPO7gzF1UTQ5IEvqrxvvL0BC0gTzYtensZbNrvjh3azaZIB8zE87kaHg1Ws4Mft-1rb1A",
  "payload": ""
}
2024-01-26 17:03:09,815:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186562236 HTTP/1.1" 200 805
2024-01-26 17:03:09,816:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:03:07 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247YCNFpKcnqticFflYsCsUYDTvGR542fR7Ik8aPL5XJyb4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:47:01Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/d2C2Aw",
      "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/yk_m2Q",
      "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/2CxhFQ",
      "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE"
    }
  ]
}
2024-01-26 17:03:09,816:DEBUG:acme.client:Storing nonce: VKfU247YCNFpKcnqticFflYsCsUYDTvGR542fR7Ik8aPL5XJyb4
2024-01-26 17:03:09,817:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-26 17:03:09,818:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-01-26 17:03:09,818:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-26 17:03:09,818:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-26 17:03:09,819:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:03:09,819:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-26 17:03:09,820:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-26 17:03:09,820:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-26 17:03:09,821:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:03:09,862:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-26 17:03:10,095:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-26 17:03:10,096:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-26 17:03:10,097:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-26 17:03:10,101:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC.
2024-01-26 17:03:10,101:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-26 17:03:10,102:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-26 17:03:10,107:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04CEF170>
Prep: True
2024-01-26 17:03:10,107:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04CEF170> and installer None
2024-01-26 17:03:10,108:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-26 17:03:10,125:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-26 17:03:10,126:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-26 17:03:10,128:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-26 17:03:10,669:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-26 17:03:10,670:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:03:08 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "vFs1zAt5hyE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-01-26 17:03:10,671:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-26 17:03:14,717:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7140_key-certbot.pem
2024-01-26 17:03:18,626:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7138_csr-certbot.pem
2024-01-26 17:03:18,627:DEBUG:acme.client:Requesting fresh nonce
2024-01-26 17:03:18,627:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-26 17:03:18,804:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-26 17:03:18,805:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:03:16 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCtLEiQqAeTE4V1LJPWPAwUxVzZezxvXAnoNvWAnVeY4g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-26 17:03:18,805:DEBUG:acme.client:Storing nonce: Wkq6jgLCtLEiQqAeTE4V1LJPWPAwUxVzZezxvXAnoNvWAnVeY4g
2024-01-26 17:03:18,805:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-26 17:03:18,814:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEN0TEVpUXFBZVRFNFYxTEpQV1BBd1V4VnpaZXp4dlhBbm9OdldBblZlWTRnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "GXu9YEqcDXlP-CGQb2BzpJpVc9AmafLoDaQCgWLkuXgQJTCWjUMnoi7QOH_x11lYRXUH8Ih3amu7P9FNvunSWrVu7MhhIImNF_96s7pnDXpRG4qRKkKjFGBxYjSY-y4NkdqCY_8JMMoG5jqTjSN3lxJAL3yJrmPAXMYzkl2QijCfeagWdfNum_6B3jEXVGgz74RKxMj3SFxQ_6pAtKFRNYJXz_3rxEu0PNoVpZ2bFTn_xDrijx03QJL__MUMPnYaCk-i07oxcT5RMTWmPF1JOqq3GRkujGTlN1gMZ6b99Zm9SEPvPiOBj8aQDyYJf2l9HM3xuN4V5_zEAqq-wacmAg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-26 17:03:19,015:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-01-26 17:03:19,016:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 26 Jan 2024 16:03:17 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463390816
Replay-Nonce: fBfjtdZFYeRhbL8txIQh_3AreZuu7vj7SR_Ls05xxzMMlebgWlU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:47:11Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463390816"
}
2024-01-26 17:03:19,016:DEBUG:acme.client:Storing nonce: fBfjtdZFYeRhbL8txIQh_3AreZuu7vj7SR_Ls05xxzMMlebgWlU
2024-01-26 17:03:19,017:DEBUG:acme.client:JWS payload:
b''
2024-01-26 17:03:19,027:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZZZVJoYkw4dHhJUWhfM0FyZVp1dTd2ajdTUl9MczA1eHh6TU1sZWJnV2xVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2MDk2MDYifQ",
  "signature": "rEABN4r5ZsgQ7WfoOKZ748FwpVxiZJy12sAT7h5PcUmNXsC6CaYuF3uIH-BSK1tXRLrk2sgk3H6I7z_k0sv6-1Wv3wC5alMbJ11AKXsSMW0ZXQpeqEvZSj6C5-jR-wFhVFrWDwhCIOzTW9fmmIRX6KJLTcAyyow1aFP88PF_grTELVHnXKClfDhKgo_NaeUnAaP9zjSLmKsOIbtN3VNOsEh7G2ERWjogRlGSfsGXQgelLbwIoKPe1an_itcxHd38vdf25jRhtDJUArOP8s30jSnNTbFWtV7sIoGeDydeoHwI050-Lr6ysbJcxEmeVzYCMpsO4yZUWk_ca9tZMy3pmQ",
  "payload": ""
}
2024-01-26 17:03:19,207:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186609606 HTTP/1.1" 200 805
2024-01-26 17:03:19,208:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:03:17 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCQgLxLTDgKBDM59F8tFFyVwhuv7z9YRCXv0bNxgq1wd0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:47:11Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/u86J_A",
      "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/GMvoKw",
      "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/skcDcA",
      "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA"
    }
  ]
}
2024-01-26 17:03:19,208:DEBUG:acme.client:Storing nonce: Wkq6jgLCQgLxLTDgKBDM59F8tFFyVwhuv7z9YRCXv0bNxgq1wd0
2024-01-26 17:03:19,209:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-26 17:03:19,209:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-01-26 17:03:19,210:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-26 17:03:19,210:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-26 17:03:19,211:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:03:19,211:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-26 17:03:19,211:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-26 17:03:19,212:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-26 17:03:19,213:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:03:19,263:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-26 17:03:19,469:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-26 17:03:19,470:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-01-26 17:03:19,471:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-01-26 17:03:19,475:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC.
2024-01-26 17:03:19,475:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-26 17:03:19,475:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-26 17:03:19,479:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0516F770>
Prep: True
2024-01-26 17:03:19,480:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0516F770> and installer None
2024-01-26 17:03:19,480:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-26 17:03:19,487:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-26 17:03:19,488:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-26 17:03:19,490:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-26 17:03:20,032:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-26 17:03:20,032:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:03:18 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "JW0cc-wuOv8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-26 17:03:20,033:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-26 17:03:24,035:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7141_key-certbot.pem
2024-01-26 17:03:27,881:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7139_csr-certbot.pem
2024-01-26 17:03:27,882:DEBUG:acme.client:Requesting fresh nonce
2024-01-26 17:03:27,882:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-26 17:03:28,060:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-26 17:03:28,060:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:03:26 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZF10t1zegRiUqXLLCCMwKq7M0etFM63bILieyh-CU68wo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-26 17:03:28,061:DEBUG:acme.client:Storing nonce: fBfjtdZF10t1zegRiUqXLLCCMwKq7M0etFM63bILieyh-CU68wo
2024-01-26 17:03:28,061:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-26 17:03:28,068:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkYxMHQxemVnUmlVcVhMTENDTXdLcTdNMGV0Rk02M2JJTGlleWgtQ1U2OHdvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ZrYqprgypZCAqnH2P7Q5X78LZkj2r6COttPds2Yu3MQgiC6DP3EZUhPb-hrWHbwrhw2G_cXy_0ka0BXotg_kXy7DOe_i-YTvbIK5RZ5-8X2yttvh42vvD6GYIUrXkB0336oddRW-FekhgUgUhneSLSDLFkjUDW4IOhR4pwL9MBAD1Ca3vPz4FJDgXKuuzbIEgGNa-3yxnvTVcX96LqN9ZKTyx34bsu-Ze3I2CEPyF923XsKtm86lYyIO3cJms4gjmWsFc5s8drvH4PIZBxMGVcQeP1mUWBnTsgyfGCwM41I0ZRUB6L1UU9m9k1dtQEOX_EB2a1ikUIVEVeFpwq9PgA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-26 17:03:28,285:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-01-26 17:03:28,286:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 26 Jan 2024 16:03:26 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463415626
Replay-Nonce: Wkq6jgLCIXMgJQNPtRWVGx9UgOPotiW_TWYf0sxxpVGQrrElJIo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:47:20Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463415626"
}
2024-01-26 17:03:28,286:DEBUG:acme.client:Storing nonce: Wkq6jgLCIXMgJQNPtRWVGx9UgOPotiW_TWYf0sxxpVGQrrElJIo
2024-01-26 17:03:28,286:DEBUG:acme.client:JWS payload:
b''
2024-01-26 17:03:28,292:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENJWE1nSlFOUHRSV1ZHeDlVZ09Qb3RpV19UV1lmMHN4eHBWR1FyckVsSklvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2NDgzODYifQ",
  "signature": "aPCC0ThrNBuyA9W2OG5CUpwrq_s34ttrq9y3i5EDVYIQkz0AdwBzBxry2RTES4aR8Yv0gl8rlNQVcDPu6QSKABdt8z1FDdNoY4-umyx3k-lTSKciobWAXImSLbyy5pTiRF4jYZncqqIu_eyoYD4P_kqDVUDtpLnsQngqi8sjCxKfDK2m6GVBOHOnplWUgslgltLBZMjdJNhWK9ghDegaVof2QhgW8tmxSdeVhog75jgMwBV8oWx07sndVdbdedT1ECUArhCfkkmI1MMo7MhYzfXBDmaEvH7U7GW78M26VhC1Ncaabll_KAQXiyoliK0-1Q62vd38-RxHrqp6diFXbw",
  "payload": ""
}
2024-01-26 17:03:28,472:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186648386 HTTP/1.1" 200 805
2024-01-26 17:03:28,473:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 26 Jan 2024 16:03:26 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLC5e9B-HzbNtEnn0UV5sXOcFREAS97KpTZibBXSfsiB34
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:47:20Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/AfqDTw",
      "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/2qup_g",
      "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/cLgsJg",
      "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE"
    }
  ]
}
2024-01-26 17:03:28,473:DEBUG:acme.client:Storing nonce: Wkq6jgLC5e9B-HzbNtEnn0UV5sXOcFREAS97KpTZibBXSfsiB34
2024-01-26 17:03:28,473:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-26 17:03:28,473:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-01-26 17:03:28,473:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-26 17:03:28,474:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-26 17:03:28,474:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:03:28,475:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-26 17:03:28,475:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-26 17:03:28,475:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-26 17:03:28,477:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-26 17:03:28,477:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-01-26 17:03:28,477:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-01-26 17:03:28,479:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-01-26 17:03:28,481:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)