2024-02-07 04:12:26,094:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-02-07 04:12:26,095:DEBUG:certbot._internal.main:Arguments: []
2024-02-07 04:12:26,095:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-02-07 04:12:26,820:DEBUG:certbot._internal.log:Root logging level set at 20
2024-02-07 04:12:26,820:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-02-07 04:12:26,866:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04E39E30> and installer <certbot._internal.cli.cli_utils._Default object at 0x04E39E30>
2024-02-07 04:12:26,907:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-07 04:12:27,154:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-07 04:12:27,167:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer.
2024-02-07 04:12:27,171:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD
2024-02-07 04:12:27,181:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC.
2024-02-07 04:12:27,181:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-07 04:12:27,181:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-07 04:12:27,186:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E11BF0>
Prep: True
2024-02-07 04:12:27,186:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E11BF0> and installer None
2024-02-07 04:12:27,186:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-07 04:12:27,191:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-07 04:12:27,192:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-07 04:12:27,194:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-07 04:12:27,747:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-07 04:12:27,748:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:12:52 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "HIsTMLakOm0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-07 04:12:27,750:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-07 04:12:31,398:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7415_key-certbot.pem
2024-02-07 04:12:34,953:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7413_csr-certbot.pem
2024-02-07 04:12:34,953:DEBUG:acme.client:Requesting fresh nonce
2024-02-07 04:12:34,953:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-07 04:12:35,130:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-07 04:12:35,130:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:12:59 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUTWA_lV9lWRkTbc6kx79lGOtwDsA_iSLNaDxH-IXArTA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-07 04:12:35,131:DEBUG:acme.client:Storing nonce: kRyagOpUTWA_lV9lWRkTbc6kx79lGOtwDsA_iSLNaDxH-IXArTA
2024-02-07 04:12:35,131:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-07 04:12:35,137:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVUV0FfbFY5bFdSa1RiYzZreDc5bEdPdHdEc0FfaVNMTmFEeEgtSVhBclRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "sVQvnqe6s7Gx3JByCqMzKFUbttf1L9FqsgEHlujU0AYNhYMvk3XwO1P3kR0tglRIjOXbHKvfowVGTpwi76xVSWUAUQJJWzgs6jq-0j2oJGjpxBt9I9rSZkSI4lE7HFkKF6aqxPONNPfaywDaRrDQrylNQMuT9P8Qsema2tUZuA_OnUsduwT4rjwVwzdu2YOv85zWhVnR2V3eb4iZ8W_5ocH1j3C3Uwfb9hQgjnMRX4w9VLPX-J6GsDhDxvsqzLOWot960ip_MFNapVsuNkM4ZlsRBpHyYUtSYw2104oORBBB5UmQHHCOPgnKW6tJHva1RshK-ZVMFzm0-N7x91xBcA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-07 04:12:35,410:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-02-07 04:12:35,412:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 07 Feb 2024 03:12:59 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308706407
Replay-Nonce: kRyagOpUKjKkMsqMl5QycnPVyYHoY-i7aFubI1-z8sYsqtPN-kw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:24Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308706407"
}
2024-02-07 04:12:35,412:DEBUG:acme.client:Storing nonce: kRyagOpUKjKkMsqMl5QycnPVyYHoY-i7aFubI1-z8sYsqtPN-kw
2024-02-07 04:12:35,413:DEBUG:acme.client:JWS payload:
b''
2024-02-07 04:12:35,421:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVLaktrTXNxTWw1UXljblBWeVlIb1ktaTdhRnViSTEtejhzWXNxdFBOLWt3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxNTI0OTcifQ",
  "signature": "yXwsXh6sX8zke3UBnbt5GUnl2kZ-b-FYSHvQKGz1Bx4f1k7SaobHaygG83_kiZb7tSq7yId4U383Y4fH5vY2jZadY4IF5Enw-ezg6PjJCrQhRJ45JvYCxcUnX46u73UQA5XReyWR-9j_E0sz_HwsBqYGJcaTqXUD6E9WFManlB-2kpsj8-DKt0BldyuwWxFssIu20T7_ZxWQ_eUfB1B4oN1461LKW0_JxVl43ldlhAplfquBzEhtSoND-KFxVlv2A_TsyAMTUzYkpz-sodL-UKX0A9RQTSKqrjs4zzM3SsLhoDE9AljfbmeMzMNykFtit1BmAC065qKFjvn_4YK2eQ",
  "payload": ""
}
2024-02-07 04:12:35,602:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820152497 HTTP/1.1" 200 810
2024-02-07 04:12:35,604:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:00 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUsBqFTSTgvkUT5gOZ_l9qsuNQia1IOJn57suvuFqSG_F8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:24Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/GeKDkA",
      "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/sBY_pA",
      "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/dU31hg",
      "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI"
    }
  ]
}
2024-02-07 04:12:35,604:DEBUG:acme.client:Storing nonce: 2ksh1KUsBqFTSTgvkUT5gOZ_l9qsuNQia1IOJn57suvuFqSG_F8
2024-02-07 04:12:35,605:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-07 04:12:35,606:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-02-07 04:12:35,606:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-07 04:12:35,607:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-07 04:12:35,621:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:12:35,621:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-07 04:12:35,621:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-07 04:12:35,621:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-07 04:12:35,626:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:12:35,664:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-07 04:12:35,886:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-07 04:12:35,888:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-07 04:12:35,890:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-07 04:12:35,898:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC.
2024-02-07 04:12:35,898:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-07 04:12:35,898:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-07 04:12:35,903:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E1F7B0>
Prep: True
2024-02-07 04:12:35,903:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E1F7B0> and installer None
2024-02-07 04:12:35,903:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-07 04:12:35,921:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-07 04:12:35,923:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-07 04:12:35,927:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-07 04:12:36,377:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-07 04:12:36,377:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:00 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "HWweCNPHim8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-07 04:12:36,378:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-07 04:12:40,205:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7416_key-certbot.pem
2024-02-07 04:12:43,889:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7414_csr-certbot.pem
2024-02-07 04:12:43,889:DEBUG:acme.client:Requesting fresh nonce
2024-02-07 04:12:43,890:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-07 04:12:44,105:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-07 04:12:44,106:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:08 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqgEN7joyFq6mq9EwEdOf0X_edIMe6Tz7EKJIzS5GCexs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-07 04:12:44,107:DEBUG:acme.client:Storing nonce: 5IXlosaqgEN7joyFq6mq9EwEdOf0X_edIMe6Tz7EKJIzS5GCexs
2024-02-07 04:12:44,107:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-07 04:12:44,119:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFnRU43am95RnE2bXE5RXdFZE9mMFhfZWRJTWU2VHo3RUtKSXpTNUdDZXhzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ft7XovjYLLb--oonNgiv1T3lqXviDs6rapdk4tp-obP8kU8GX9aeVDat7r6tryHPBAqWdFrH6dL7P0mDTK4G-bu04wWZ3ArcNpzlUT9GftC8JhMQ1BOsQi0e-GsEZGwO8QryX8l8fw_e8em32MeD6FBlOETHH0anLcUD6SDobhReFL2D0i1x9sJGHrQraQQREtmWR7QS-VoUhYiQx4oz9UnG8x-08rRexnCCi_RsYTtgoItAim7IZfz0bkEyd1dxNyMyBSNt6ubw6Obg_2sqJqJpvrFJq0Vl6pT7hBwSQdM16wE2p3jb5RNBpn3_BdBzDluRxZdqT0a70pg7belZNQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-07 04:12:44,295:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-02-07 04:12:44,296:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 07 Feb 2024 03:13:08 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308730387
Replay-Nonce: 5IXlosaqJ6B0UPfAfdwnyQnx0AewX7ciH7XS3V7ZPKVYsjw6Jn0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:33Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308730387"
}
2024-02-07 04:12:44,296:DEBUG:acme.client:Storing nonce: 5IXlosaqJ6B0UPfAfdwnyQnx0AewX7ciH7XS3V7ZPKVYsjw6Jn0
2024-02-07 04:12:44,297:DEBUG:acme.client:JWS payload:
b''
2024-02-07 04:12:44,309:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFKNkIwVVBmQWZkd255UW54MEFld1g3Y2lIN1hTM1Y3WlBLVllzanc2Sm4wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxODg4NjcifQ",
  "signature": "I-ih_ejvQzxYiezwRrgy2fnf80K3WG_EiSKJ_K1vMwNC_juBQ-iAcaJmFHiXRv9uqOdKEmuNS1Lu--j4p-cXxAJHxaDqgbHXoY1ubJ2rxlOOlBCzhOBFZtZGRVQipeKwq2wejA3ZJ_2PZ2rmuq9s25aZsnLBfhOYIobnBuz-tgiyd2EtfGU0vwMk4Rvi411noeAOpBgCEQU7r2qqP3IjmLPf-WOz43ClD0F6pZkc5XvgyxnnmaytDlBjjXQDawXgtg29vwgqEnjJzrcEeb0tTMctDAQXxX85rTOmhhte8JjGU_lb0dHpwp8QU0Hf9W2oTyH7ez85EXBLc-xuQ-ydgw",
  "payload": ""
}
2024-02-07 04:12:44,471:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820188867 HTTP/1.1" 200 804
2024-02-07 04:12:44,473:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:09 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7s-0PA_BhzxwvwjiILKG2BjwkVqZ8nis7N3qWp9mgeMQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:33Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/Yq7npQ",
      "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/OkyE8g",
      "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/IRVMDw",
      "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU"
    }
  ]
}
2024-02-07 04:12:44,473:DEBUG:acme.client:Storing nonce: 3l89SrA7s-0PA_BhzxwvwjiILKG2BjwkVqZ8nis7N3qWp9mgeMQ
2024-02-07 04:12:44,475:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-07 04:12:44,475:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-02-07 04:12:44,476:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-07 04:12:44,476:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-07 04:12:44,478:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:12:44,478:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-07 04:12:44,478:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-07 04:12:44,479:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-07 04:12:44,480:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:12:44,526:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-07 04:12:44,788:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-07 04:12:44,789:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-07 04:12:44,790:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-07 04:12:44,794:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC.
2024-02-07 04:12:44,795:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-07 04:12:44,795:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-07 04:12:44,799:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E115D0>
Prep: True
2024-02-07 04:12:44,799:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E115D0> and installer None
2024-02-07 04:12:44,799:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-07 04:12:44,815:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-07 04:12:44,816:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-07 04:12:44,817:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-07 04:12:45,356:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-07 04:12:45,358:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:09 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "9gR0nCqIbNc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-07 04:12:45,359:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-07 04:12:49,132:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7417_key-certbot.pem
2024-02-07 04:12:52,860:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7415_csr-certbot.pem
2024-02-07 04:12:52,861:DEBUG:acme.client:Requesting fresh nonce
2024-02-07 04:12:52,861:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-07 04:12:53,038:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-07 04:12:53,039:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:17 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUqhMBgfIlJlehmcWsAOXdPnSVleZXIemTh1cqt1KxqhU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-07 04:12:53,040:DEBUG:acme.client:Storing nonce: kRyagOpUqhMBgfIlJlehmcWsAOXdPnSVleZXIemTh1cqt1KxqhU
2024-02-07 04:12:53,040:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-07 04:12:53,046:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVxaE1CZ2ZJbEpsZWhtY1dzQU9YZFBuU1ZsZVpYSWVtVGgxY3F0MUt4cWhVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "k6Hj9UE7WuCP4rphu2A1hnJ8h_m1vi-G3-y9QVjDJSdGy378kNfiRdGjWUlCY0ksbEqkXZSwTVB-ENFm2UhvJKyM_IyN_0Ve1VXcjfp2SM5M8_XIaL4T_NL9FQgQ1F7GiGoEKR1rkxgVrgCzECynoNFpZ2vTF3VkldrD6UUUNnFcpUdajsWat32QKX0FXAz67_wNML2sAOOZdDd5o0d6v1s82nD3DbhyH-v8ey7JhEPKpI3cboBqhm3R6wJD9ubajuJdsBvTUjl6pQACYGzDc1EIwd_pgegQn2P51ELRMtNaNjlCypt8gCFMfQPDKJguOcYWCh5vZbihOD-hlYlNAg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-07 04:12:53,237:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-02-07 04:12:53,238:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 07 Feb 2024 03:13:17 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308754257
Replay-Nonce: 2ksh1KUsHKsL_Cka8NRCDZ7cUj4hWBDjJDnx67Zv5sG6PWn7Qls
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:42Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308754257"
}
2024-02-07 04:12:53,238:DEBUG:acme.client:Storing nonce: 2ksh1KUsHKsL_Cka8NRCDZ7cUj4hWBDjJDnx67Zv5sG6PWn7Qls
2024-02-07 04:12:53,239:DEBUG:acme.client:JWS payload:
b''
2024-02-07 04:12:53,251:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNIS3NMX0NrYThOUkNEWjdjVWo0aFdCRGpKRG54NjdadjVzRzZQV243UWxzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyMjA5MDcifQ",
  "signature": "eY0WzCIS1YktLobC6Mk6iL95OCxRvz6CHCZTgyJ9dCjc49nAM90sLFWNZVcOPNqe2JwOtVYv0cdAEjuyC7raClZgzeCMwXUfJD0ILa1kqxOJpZfSypgpw_3mPQShwowgvsxIB8Ejy1yG3YmgVosjOlUrniSi9gUwIbDQwCvR60vAsV48iFjgetFqHNjL8rWryfFVbqtswgUCJSDFmiRDCQbZ2rAtUmi8udNtGHMg6I_77Rr9lD4FKpwcjd2ce5SQ-LaSce7Q099L-IRz2_LIuYmoS0UxlD_-68kjGFzSKFneghy6iHIn1MYyiwfB5hpDw10xmLMR3qsuGdpcVb78og",
  "payload": ""
}
2024-02-07 04:12:53,435:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820220907 HTTP/1.1" 200 807
2024-02-07 04:12:53,436:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:17 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUs2W7_D-esb4Vn1Qwte0PipcR1MN3OqUWK3A12OP8RMP4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:42Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/vlhqAg",
      "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/p9n_vg",
      "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/ul63Zg",
      "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA"
    }
  ]
}
2024-02-07 04:12:53,437:DEBUG:acme.client:Storing nonce: 2ksh1KUs2W7_D-esb4Vn1Qwte0PipcR1MN3OqUWK3A12OP8RMP4
2024-02-07 04:12:53,438:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-07 04:12:53,439:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-02-07 04:12:53,440:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-07 04:12:53,440:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-07 04:12:53,442:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:12:53,442:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-07 04:12:53,442:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-07 04:12:53,443:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-07 04:12:53,446:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:12:53,494:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-07 04:12:53,686:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-07 04:12:53,689:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-07 04:12:53,690:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-07 04:12:53,699:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC.
2024-02-07 04:12:53,699:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-07 04:12:53,700:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-07 04:12:53,706:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048972B0>
Prep: True
2024-02-07 04:12:53,706:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048972B0> and installer None
2024-02-07 04:12:53,706:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-07 04:12:53,710:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-07 04:12:53,711:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-07 04:12:53,712:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-07 04:12:54,253:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-07 04:12:54,255:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:18 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Fp_WjK1Vk3k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-07 04:12:54,256:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-07 04:12:58,019:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7418_key-certbot.pem
2024-02-07 04:13:01,744:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7416_csr-certbot.pem
2024-02-07 04:13:01,744:DEBUG:acme.client:Requesting fresh nonce
2024-02-07 04:13:01,745:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-07 04:13:01,926:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-07 04:13:01,927:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:26 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUsuBL5h89c3SX4yRz9EiCKuqaWcanrwhOb92BPFYmKdNI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-07 04:13:01,927:DEBUG:acme.client:Storing nonce: 2ksh1KUsuBL5h89c3SX4yRz9EiCKuqaWcanrwhOb92BPFYmKdNI
2024-02-07 04:13:01,927:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-02-07 04:13:01,934:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXN1Qkw1aDg5YzNTWDR5Uno5RWlDS3VxYVdjYW5yd2hPYjkyQlBGWW1LZE5JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "uW3UlVNafC5YJskokCzScJKky_ay-OFubhZ0X8hf1WKT64zCd--q_AXxwwpgK1P9ArDaDYBiFOdbRvSZtprOCmyHy2nppIFizpXqYC_gH3J4P7axl27n9M5K5qlx0CPU4KZMOKwIUWlcNdgwp8NGzrKjn7o9eQwwZdDpJPmTs57gIEOzcDacSTpsMUjyeIZiu0SQb2CusTwoj0wZu855w0BWGAMrN2gyjQHL4_TuzWcEGL2pRNQWbCfJATNhYl-FnOCtiSAB8HWRS53E6qazWoByBBJUzdX9JHptgdXYhVX-3tb0_e2_tzIhqhZwbZGDIrGH6AnRxuPPKsh1zqC11A",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-07 04:13:02,125:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-02-07 04:13:02,128:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 07 Feb 2024 03:13:26 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308777647
Replay-Nonce: kRyagOpU2ag6HB4pnomPe60igcCnk3ol60WW4Ea5pUQ3tE-iszM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:50Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308777647"
}
2024-02-07 04:13:02,128:DEBUG:acme.client:Storing nonce: kRyagOpU2ag6HB4pnomPe60igcCnk3ol60WW4Ea5pUQ3tE-iszM
2024-02-07 04:13:02,129:DEBUG:acme.client:JWS payload:
b''
2024-02-07 04:13:02,136:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFUyYWc2SEI0cG5vbVBlNjBpZ2NDbmszb2w2MFdXNEVhNXBVUTN0RS1pc3pNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyNTIxNzcifQ",
  "signature": "l86Flgnum-JZbu6JfzDpb7qLGaNbu9siebXefk228bHZQfCJsYLVEqKIqwbycOfu6NvP4PFbkMxeVsF45utG0fpnbQQ_TpGXGm_shTyFmeMbj3pkmIdlnj12ZPZRHeJFAg0fJ3JvAcey2jhco7rlMf_XKEIbrYNyo3513FuyhzYyp7yW-TfdKVCJzQIVPMh8Ybh9O5i9qS_Um5TyPeCjjW3smgmK7KM4IXY5pGgKineyFaLd96PD8Km33Rx_wjR6RiQniG2a9TpHKO4Fksl_tsdsbk0QMGxSgTTjVwZVeqkFaHbCb2p5VlRp6stUkFhooXy7cnCRfeBW5p9iDLdBcw",
  "payload": ""
}
2024-02-07 04:13:02,320:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820252177 HTTP/1.1" 200 801
2024-02-07 04:13:02,322:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:26 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUs-1HaS0Oa3QLRfUKEd7ymxYJZe9p7QClkkxno5ELbjMo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:50Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/WXsY4w",
      "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/ZwqjFA",
      "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/HVTsug",
      "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8"
    }
  ]
}
2024-02-07 04:13:02,322:DEBUG:acme.client:Storing nonce: 2ksh1KUs-1HaS0Oa3QLRfUKEd7ymxYJZe9p7QClkkxno5ELbjMo
2024-02-07 04:13:02,323:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-07 04:13:02,324:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-02-07 04:13:02,325:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-07 04:13:02,325:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-07 04:13:02,326:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:13:02,327:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-07 04:13:02,327:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-07 04:13:02,327:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-07 04:13:02,329:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:13:02,361:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-07 04:13:02,595:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-07 04:13:02,596:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-07 04:13:02,597:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-07 04:13:02,602:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC.
2024-02-07 04:13:02,602:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-07 04:13:02,602:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-07 04:13:02,607:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04864FD0>
Prep: True
2024-02-07 04:13:02,607:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04864FD0> and installer None
2024-02-07 04:13:02,607:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-07 04:13:02,612:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-07 04:13:02,612:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-07 04:13:02,614:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-07 04:13:03,072:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-07 04:13:03,074:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:27 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "YDMdQMK36CU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-07 04:13:03,075:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-07 04:13:07,211:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7419_key-certbot.pem
2024-02-07 04:13:10,920:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7417_csr-certbot.pem
2024-02-07 04:13:10,921:DEBUG:acme.client:Requesting fresh nonce
2024-02-07 04:13:10,921:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-07 04:13:11,079:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-07 04:13:11,080:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:35 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqqVywpax2IJ22T7zaLXiiAUv68-Aud51sSnLSGypNzjU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-07 04:13:11,080:DEBUG:acme.client:Storing nonce: 5IXlosaqqVywpax2IJ22T7zaLXiiAUv68-Aud51sSnLSGypNzjU
2024-02-07 04:13:11,080:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-07 04:13:11,085:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFxVnl3cGF4MklKMjJUN3phTFhpaUFVdjY4LUF1ZDUxc1NuTFNHeXBOempVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "AaHLEyKs4iq2gNLKhBmSC-VVEOH3_jUUNHTZVokQ_Ir2no94EIv14pbl35oQvWicU_im_NEXzEMYXZGDSDV-4fa4nB5V316O-QINH11rKEhJYuQGue41YbwlrINHejP1NypyzwfvJRywf8S0RvSaMwsHCpBE1Q8OW_MTfNMtpVgdBXz76o8GNYvg1b0gEtxNmiVbxAUQHGFwX1QGiuKQNEujr2pLw4UhYpuK9UwJY0igqxZ0fSmVoWI1s4rqHM_i_gNwMRLjSasV95_JcLSMy8yoe4RK3M1idezzbk_DAwLXUiKN4VWKvlRea2hxs_Gb8Wjhds1C6VZzHT7Pkaq_Vw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-07 04:13:11,257:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-07 04:13:11,259:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 07 Feb 2024 03:13:35 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308800947
Replay-Nonce: 3l89SrA7VByeOy3z0Yp02eMdR1RhVhji3aHQfjyFhzrxqZrGeHE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:59Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308800947"
}
2024-02-07 04:13:11,259:DEBUG:acme.client:Storing nonce: 3l89SrA7VByeOy3z0Yp02eMdR1RhVhji3aHQfjyFhzrxqZrGeHE
2024-02-07 04:13:11,260:DEBUG:acme.client:JWS payload:
b''
2024-02-07 04:13:11,270:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdWQnllT3kzejBZcDAyZU1kUjFSaFZoamkzYUhRZmp5Rmh6cnhxWnJHZUhFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyODU4NTcifQ",
  "signature": "i3zBwK8268BzldUKZEuXLv1B1QyC5L1sCtioDVRbGYwNC8nog6UPesjRaIfsg3wM2qlM13OpK40qvqF_PaeyA87Yp0gK0-wwUhvNOpOdKc3pNjy4yAI-MmZ3Kx6MnHZ0rPbkc4Aaj81LxbwDxpMQ11ox3qVLOyFdZVec0G5ha6j_4rRkpbD6xyxPE0pV-rVjNvp79H-Fwk1XAQ7sMia5UjJjQwXltHq9eERkxdfUsQdCBfsRkjHXiGOVDSJpjN4Pdf4k18M4tImf6X0lRULlNQlocurVw4Yy3s8oYAOXgemcbc0suGlrGpZhb4rTLiHfIgkVJ-zNSgicmp7iPMSlCg",
  "payload": ""
}
2024-02-07 04:13:11,428:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820285857 HTTP/1.1" 200 805
2024-02-07 04:13:11,430:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:35 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7GE7KRRIF04RV8qMTKCnGO-2Jl7hkjeA28R9umZonCdc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:59Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/6M2-8w",
      "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/NyT6VQ",
      "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/Wxujog",
      "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I"
    }
  ]
}
2024-02-07 04:13:11,430:DEBUG:acme.client:Storing nonce: 3l89SrA7GE7KRRIF04RV8qMTKCnGO-2Jl7hkjeA28R9umZonCdc
2024-02-07 04:13:11,431:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-07 04:13:11,432:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-02-07 04:13:11,432:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-07 04:13:11,433:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-07 04:13:11,433:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:13:11,433:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-07 04:13:11,433:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-07 04:13:11,434:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-07 04:13:11,435:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:13:11,468:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-07 04:13:11,622:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-07 04:13:11,624:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-07 04:13:11,624:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-07 04:13:11,629:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC.
2024-02-07 04:13:11,629:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-07 04:13:11,630:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-07 04:13:11,642:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E39310>
Prep: True
2024-02-07 04:13:11,642:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E39310> and installer None
2024-02-07 04:13:11,642:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-07 04:13:11,647:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-07 04:13:11,648:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-07 04:13:11,650:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-07 04:13:12,111:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-07 04:13:12,112:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:36 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "El3OF_9czp8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-07 04:13:12,113:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-07 04:13:15,783:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7420_key-certbot.pem
2024-02-07 04:13:19,516:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7418_csr-certbot.pem
2024-02-07 04:13:19,516:DEBUG:acme.client:Requesting fresh nonce
2024-02-07 04:13:19,516:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-07 04:13:19,684:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-07 04:13:19,685:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:44 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA71rhFi3NwESyIbTvB4fjg60DDCKFOgFsJcBUTf8mYsVY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-07 04:13:19,685:DEBUG:acme.client:Storing nonce: 3l89SrA71rhFi3NwESyIbTvB4fjg60DDCKFOgFsJcBUTf8mYsVY
2024-02-07 04:13:19,686:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-07 04:13:19,693:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTcxcmhGaTNOd0VTeUliVHZCNGZqZzYwRERDS0ZPZ0ZzSmNCVVRmOG1Zc1ZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "iIn6ez0hv_v-o0II92uM5vF1OkzzW6izU6CO7CmLlRnwEhch3xvpGvtQIDqwiksxjXA3KCihAOD9Dtxi8Qw-RnBolMoutHRM77wZ2h7o3Eb7VK22CFf5qYHlqKOUuyCsde5P1feIKCbVvJcrXiXPS40lvKXx27uLnDME1COsKvUYvWDIX03610NL-IGns4uf52An2PGXTEfw9o0fnPwuNIpQHo7v76dwAGaDBoUOaI_t1e3jJXZ-6WV5anI63xh7k9LW4MeyLe3xriR8ZN074102GKtlDk8PWr2cgNVFnAxiNPbHgnfStjfDFpXj2BKDaA9o9JVV4sl32RZaJJxWKQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-07 04:13:19,873:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-02-07 04:13:19,875:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 07 Feb 2024 03:13:44 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308831767
Replay-Nonce: 3l89SrA7keZEr-oqDPJr8W_qF5dNQ4LxPxFDPAoYJ21IBJpZypo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:08Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308831767"
}
2024-02-07 04:13:19,875:DEBUG:acme.client:Storing nonce: 3l89SrA7keZEr-oqDPJr8W_qF5dNQ4LxPxFDPAoYJ21IBJpZypo
2024-02-07 04:13:19,876:DEBUG:acme.client:JWS payload:
b''
2024-02-07 04:13:19,882:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdrZVpFci1vcURQSnI4V19xRjVkTlE0THhQeEZEUEFvWUoyMUlCSnBaeXBvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzMjgxMzcifQ",
  "signature": "C_FpW7caUGXNIo5hd1MwRUXCLKrPHpNvcFBzq7J5u46Bc_wI23wjzbmWG_9Kk57hTa1W5y-94oPCVq65yOK1k0Pq7vTucPeUFI-pjDcOF3CDCIYviTCvfc9_KoWxLjGjhUxNdX6kIlKhSKIVFHNjOMxCYkwYVsOJnJOZw1mecYAgDA-Mq4FdDH9phDK6n3MO1eKgEUWLKtAhPSmTM_O8d8BEKF5qtlPi7sIsXgyrP1cB5P2MSa160Qmueq4cn4ZAozaHf2sDX542nk2uY6DM8T9a-YJi5bVRJH57MJPAI54IdjXVB0fR4eqVHjG680RPJWpJEi7EFg5ofdKbjFq3cQ",
  "payload": ""
}
2024-02-07 04:13:20,089:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820328137 HTTP/1.1" 200 809
2024-02-07 04:13:20,090:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:44 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqUXibA744CAlyGoP26qzqwYYifyCGd2NZw3CmR1YL-lg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:08Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/EQtjAQ",
      "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/KonEuA",
      "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/buqaYg",
      "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM"
    }
  ]
}
2024-02-07 04:13:20,090:DEBUG:acme.client:Storing nonce: 5IXlosaqUXibA744CAlyGoP26qzqwYYifyCGd2NZw3CmR1YL-lg
2024-02-07 04:13:20,091:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-07 04:13:20,092:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-02-07 04:13:20,093:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-07 04:13:20,093:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-07 04:13:20,095:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:13:20,095:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-07 04:13:20,095:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-07 04:13:20,096:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-07 04:13:20,099:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:13:20,145:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-07 04:13:20,329:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-07 04:13:20,331:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-07 04:13:20,333:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-07 04:13:20,342:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC.
2024-02-07 04:13:20,342:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-07 04:13:20,343:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-07 04:13:20,348:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x038B2290>
Prep: True
2024-02-07 04:13:20,349:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x038B2290> and installer None
2024-02-07 04:13:20,349:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-07 04:13:20,353:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-07 04:13:20,354:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-07 04:13:20,356:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-07 04:13:20,813:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-07 04:13:20,814:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:45 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "W1rKVCZ-dEs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-07 04:13:20,815:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-07 04:13:24,514:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7421_key-certbot.pem
2024-02-07 04:13:28,178:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7419_csr-certbot.pem
2024-02-07 04:13:28,179:DEBUG:acme.client:Requesting fresh nonce
2024-02-07 04:13:28,179:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-07 04:13:28,330:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-07 04:13:28,331:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:52 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqy7q_66Z2cj6A4N_Fm3YbEVMO6Tz9EEvxJKR8TpklM8I
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-07 04:13:28,332:DEBUG:acme.client:Storing nonce: 5IXlosaqy7q_66Z2cj6A4N_Fm3YbEVMO6Tz9EEvxJKR8TpklM8I
2024-02-07 04:13:28,332:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-07 04:13:28,341:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXF5N3FfNjZaMmNqNkE0Tl9GbTNZYkVWTU82VHo5RUV2eEpLUjhUcGtsTThJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "fSZyZN-ay_eHOailIklUCr4qqYRYQj-wYcPgdl9qS3vQp5YmJR4oMO-bBKmcd5xBv7pmIcpD3L7LNaQJEo8EnQsKgcW8uMQaEHSPW2SUhxuNlmk_kG0pjZ56TxeXikjMFj37Ezh-oOYLIadqGEsrFj_jiiRJo7pRq3sVvVD_CMt94_1qWBVGq81EiLKU3de4WtbG8LpNXz7ZWE8-v_1xAQ2OpOXRgyMbw-yua6BVMHuWCi9pkXv7QRANEGCGeN6E90-dNLDzkDekfc9IAwbD-JmdsL4pXke0M6dxn3eaKLEFE_m9_p5rDo4P1h_oWrTdJTSegUBG0auR9kuxbfWSaw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-07 04:13:28,586:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-02-07 04:13:28,588:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 07 Feb 2024 03:13:53 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308858697
Replay-Nonce: 3l89SrA7uN9arVpyzySkc46nqOd4tnl6KIee_npPSHtYp_7tqiY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:17Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308858697"
}
2024-02-07 04:13:28,588:DEBUG:acme.client:Storing nonce: 3l89SrA7uN9arVpyzySkc46nqOd4tnl6KIee_npPSHtYp_7tqiY
2024-02-07 04:13:28,589:DEBUG:acme.client:JWS payload:
b''
2024-02-07 04:13:28,595:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTd1TjlhclZweXp5U2tjNDZucU9kNHRubDZLSWVlX25wUFNIdFlwXzd0cWlZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzNjc4NDcifQ",
  "signature": "HIrxl-Uc4vnBXkWxqFuGPwXmN0oaKqIsEYVOghTXV_JN8gXmt3aQEyP_xKc7RZtgcjOXhT7oSLBz-9uY8BLiWTuFLyVno2sgPjKza0PRTJAusNilPexBsHCg7E3aSX0necF52o0JLwNJxHyHru5KVevZyObfjAXgdmFFKJw75HePD8Ycd6iIkrM1QwLCZDgjlTExUc7lH1WOt2dmr7NdGGJjZeJH3_cBUc2fVWLPIKCAZozrJK_wgC5ssKVTzuls8jEO8GrfZPh16w1lsPllYdrjj-ov8cV2xvSpKxLZwVyyK-bLpa0L5WmAB45-OCmbTv6tXA_bpRURgzHeNn071A",
  "payload": ""
}
2024-02-07 04:13:28,752:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820367847 HTTP/1.1" 200 806
2024-02-07 04:13:28,754:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:53 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqg5iOF7pcQNv4uE0iPsn1Uh07R8gcrl-fhEg1rl6tKJs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:17Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/666fkA",
      "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/UVRmBQ",
      "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/SNClog",
      "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM"
    }
  ]
}
2024-02-07 04:13:28,754:DEBUG:acme.client:Storing nonce: 5IXlosaqg5iOF7pcQNv4uE0iPsn1Uh07R8gcrl-fhEg1rl6tKJs
2024-02-07 04:13:28,755:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-07 04:13:28,756:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-02-07 04:13:28,757:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-07 04:13:28,757:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-07 04:13:28,758:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:13:28,758:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-07 04:13:28,758:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-07 04:13:28,759:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-07 04:13:28,760:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:13:28,803:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-02-07 04:13:28,803:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-07 04:13:28,803:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-02-07 04:13:28,810:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-02-07 04:13:28,812:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-02-07 04:13:28,812:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-02-07 04:13:28,812:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-02-07 04:13:28,813:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-02-07 04:13:28,814:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-02-07 04:13:28,850:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-07 04:13:29,078:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-07 04:13:29,081:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-07 04:13:29,082:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-07 04:13:29,090:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC.
2024-02-07 04:13:29,090:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-07 04:13:29,090:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-07 04:13:29,094:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E495F0>
Prep: True
2024-02-07 04:13:29,094:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E495F0> and installer None
2024-02-07 04:13:29,094:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-07 04:13:29,098:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-07 04:13:29,099:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-07 04:13:29,101:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-07 04:13:29,562:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-07 04:13:29,563:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:13:54 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "BbNHX05y3Y4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-07 04:13:29,564:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-07 04:13:33,424:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7422_key-certbot.pem
2024-02-07 04:13:37,102:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7420_csr-certbot.pem
2024-02-07 04:13:37,103:DEBUG:acme.client:Requesting fresh nonce
2024-02-07 04:13:37,103:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-07 04:13:37,259:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-07 04:13:37,260:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:01 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7qPqRtotvr5ZrLYzKrgdUAsoDCgPVaYU2kXl1i7oV90g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-07 04:13:37,260:DEBUG:acme.client:Storing nonce: 3l89SrA7qPqRtotvr5ZrLYzKrgdUAsoDCgPVaYU2kXl1i7oV90g
2024-02-07 04:13:37,260:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-07 04:13:37,265:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdxUHFSdG90dnI1WnJMWXpLcmdkVUFzb0RDZ1BWYVlVMmtYbDFpN29WOTBnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ycm_TO78cZXJfSKSg7ERMnmU_EQg8_FFaohhtcsxfZiWX6KPVrk5CmyWN5M23HkM8zEeep3aCA-MVV1YGtdHSfwJZYhz5MoEokKqDpnixebt73rWKZnGX4ZSuApD-STVLezi06wrCYKZ-pLxtJiBLmeauEz4hLA_r-syGTTmL919P8ZgvnnrrcXu5uQj4TYaJCoMri_m2woc5fz2CoaKh6kQfmOZijigUHpIFImTkZhEjmPECorDVEAVLob7916TyT5geAjqVGmFJbPGYNS3rJtXim_DTIKsduDWJAJCjnnWjQkOllAMwQtlRVm-taSJ_u3yTdbh4vUT8GemkQY7Nw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-07 04:13:37,471:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-02-07 04:13:37,472:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 07 Feb 2024 03:14:02 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308883057
Replay-Nonce: 5IXlosaqcdusN5MZlKKjzTIxMp1sze8DCwc5--fxSEPh5rJtqqU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308883057"
}
2024-02-07 04:13:37,472:DEBUG:acme.client:Storing nonce: 5IXlosaqcdusN5MZlKKjzTIxMp1sze8DCwc5--fxSEPh5rJtqqU
2024-02-07 04:13:37,472:DEBUG:acme.client:JWS payload:
b''
2024-02-07 04:13:37,485:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFjZHVzTjVNWmxLS2p6VEl4TXAxc3plOERDd2M1LS1meFNFUGg1ckp0cXFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MDQ2NjcifQ",
  "signature": "daCXNgKWsiW6XsBl_qIPj0wupEZNOYXiyicYVVreDybFxhhfFJuXJs1s_D0P-i8HlosldscEQHqyPptJLxr_x_yonucT_oFQCxQVres2iUpx4nvLfSYYr-bBivG7B6myfHFSkl7MGnPVvPyKxlNgO-ZlcI2GGEoa_2ajy-FPmXzngEOUMpMdzpC18WY9bj4UhpIBYrsVcdMkhMy-oQGK0ryO-XaiKJp7zOhkihtY2QdPemJVkt8b1EoIJGqrC847uLk7OGx6eczaJTYrqBMV0TIX5zRWa2_69qT5LydEcP9QdRwKCGUQ0Sj8EXVsADOy7pZ71RCjpg8rjD0WyBTSBQ",
  "payload": ""
}
2024-02-07 04:13:37,654:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820404667 HTTP/1.1" 200 811
2024-02-07 04:13:37,655:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:02 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7cbbuhhVUTr6YcsXK9aTCByLGbZhL7sODRFrUWO4K2DE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:25Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/g54rZQ",
      "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/4yZXyw",
      "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/bXegoA",
      "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08"
    }
  ]
}
2024-02-07 04:13:37,655:DEBUG:acme.client:Storing nonce: 3l89SrA7cbbuhhVUTr6YcsXK9aTCByLGbZhL7sODRFrUWO4K2DE
2024-02-07 04:13:37,655:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-07 04:13:37,656:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-02-07 04:13:37,656:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-07 04:13:37,656:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-07 04:13:37,657:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:13:37,657:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-07 04:13:37,657:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-07 04:13:37,658:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-07 04:13:37,659:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:13:37,704:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-07 04:13:37,962:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-07 04:13:37,965:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-07 04:13:37,966:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-07 04:13:37,971:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC.
2024-02-07 04:13:37,971:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-07 04:13:37,972:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-07 04:13:37,976:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05145C50>
Prep: True
2024-02-07 04:13:37,976:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05145C50> and installer None
2024-02-07 04:13:37,976:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-07 04:13:37,980:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-07 04:13:37,981:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-07 04:13:37,983:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-07 04:13:38,529:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-07 04:13:38,530:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:03 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "iDLZEB9SmV4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-07 04:13:38,531:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-07 04:13:42,321:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7423_key-certbot.pem
2024-02-07 04:13:46,026:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7421_csr-certbot.pem
2024-02-07 04:13:46,026:DEBUG:acme.client:Requesting fresh nonce
2024-02-07 04:13:46,026:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-07 04:13:46,208:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-07 04:13:46,209:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:10 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUPR5i-2reGRk2LPr99yTW4_84x2B6u3_xe-KK7cgYPes
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-07 04:13:46,210:DEBUG:acme.client:Storing nonce: kRyagOpUPR5i-2reGRk2LPr99yTW4_84x2B6u3_xe-KK7cgYPes
2024-02-07 04:13:46,210:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-07 04:13:46,221:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVQUjVpLTJyZUdSazJMUHI5OXlUVzRfODR4MkI2dTNfeGUtS0s3Y2dZUGVzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "R0PZWZ5QGg_U7Wg8LpaEL5TZP5a-zpubZ03zw7a8AWA-Eapt1WSxVGWuGBobRDthn1tNAnr6Vu6csEmgGdO-zHZbs0mCLKS7VALgcDTuvQrWJRjxW6VURn6a2dUPc8S9tAi7oHk5gThEXS_fJiEMgo5ZW80Igrvi8OuUwBzXHbBk2LhLpjAPMNr7UnGtv0wOtjiNlaQTnMScOlqzrfT1BM7bHNHb4ec7K-at6B27snDxEBWYXKiDC70r9NxejVS186mBZzeH4QZpKreqfNAvhUBaWjKrpBukm-Tj153f7HNtWL8L-7vMcbMvuWSXNBhEtmyp0vt9nI1Pz_caj8OLIg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-07 04:13:46,411:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-02-07 04:13:46,412:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 07 Feb 2024 03:14:10 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308906667
Replay-Nonce: kRyagOpUCOL4s-gR-TudSRN7zImjeCCJQZ_WeoN18oyn8Tsbs90
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308906667"
}
2024-02-07 04:13:46,413:DEBUG:acme.client:Storing nonce: kRyagOpUCOL4s-gR-TudSRN7zImjeCCJQZ_WeoN18oyn8Tsbs90
2024-02-07 04:13:46,413:DEBUG:acme.client:JWS payload:
b''
2024-02-07 04:13:46,418:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVDT0w0cy1nUi1UdWRTUk43ekltamVDQ0pRWl9XZW9OMThveW44VHNiczkwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MzgxMjcifQ",
  "signature": "ZeztrLScYMc3ZyjfRyEbahcSER-oHKDuu2ojncToHifqU9yHjwLWXqy-JcMZATAZdoLrY7cCZNNqt6UOAMivXFl2nlCdUuUolGD6gDDs0rSbiDox8YJeGJ-h_7QYz7-DBgyKFhE5-6T9Uvez9dGHXnuECZuz4LR_rwimkBHqt7YH2JmgLQuBapC55Eo4UnpUKDa_uEcyBi5ky8AYsTC0L_R4olH8JK6cluZgHFlpvmdOPqHgl3XURLE9XhSmYS0yjZKPUggZ413kCUc-Jaz7CwIfxuCDwfSMAqJWjzWEjPADtCk3d7KxWDvG7ShcMwWgLBSYDhp62mvBKlSltryY5w",
  "payload": ""
}
2024-02-07 04:13:46,603:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820438127 HTTP/1.1" 200 810
2024-02-07 04:13:46,604:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:11 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUsB-FYtkIOYNJmhMNpQhCb2C7St36lf6ZufS-e7fVRhI4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:34Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/rIGBzA",
      "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/SWtTfQ",
      "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/R74bXA",
      "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs"
    }
  ]
}
2024-02-07 04:13:46,605:DEBUG:acme.client:Storing nonce: 2ksh1KUsB-FYtkIOYNJmhMNpQhCb2C7St36lf6ZufS-e7fVRhI4
2024-02-07 04:13:46,606:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-07 04:13:46,607:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-02-07 04:13:46,608:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-07 04:13:46,608:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-07 04:13:46,609:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:13:46,609:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-07 04:13:46,610:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-07 04:13:46,610:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-07 04:13:46,611:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:13:46,649:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-07 04:13:46,829:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-07 04:13:46,830:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2024-02-07 04:13:46,831:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2024-02-07 04:13:46,836:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC.
2024-02-07 04:13:46,836:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-07 04:13:46,836:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-07 04:13:46,841:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05145950>
Prep: True
2024-02-07 04:13:46,842:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05145950> and installer None
2024-02-07 04:13:46,842:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-07 04:13:46,846:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-07 04:13:46,846:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-07 04:13:46,848:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-07 04:13:47,379:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-07 04:13:47,380:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:11 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "aiHr5X66u60": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-07 04:13:47,380:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-07 04:13:51,172:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7424_key-certbot.pem
2024-02-07 04:13:54,839:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7422_csr-certbot.pem
2024-02-07 04:13:54,840:DEBUG:acme.client:Requesting fresh nonce
2024-02-07 04:13:54,840:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-07 04:13:55,016:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-07 04:13:55,017:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:19 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUWcEIMLfhyfa8JIHY2Mj91ZJJRp3AwH1BExdqByx7BsU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-07 04:13:55,018:DEBUG:acme.client:Storing nonce: kRyagOpUWcEIMLfhyfa8JIHY2Mj91ZJJRp3AwH1BExdqByx7BsU
2024-02-07 04:13:55,018:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-07 04:13:55,026:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVXY0VJTUxmaHlmYThKSUhZMk1qOTFaSkpScDNBd0gxQkV4ZHFCeXg3QnNVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "WS20RUzgKzKJlt6cylPh7lT8YnU4ecFeZfqJv-sL1S8iEvkOFJ662cttE11o9yga8uav6j0Axho1tWJ2iECEySesV2-7FCP1xPtUV5GNj5NLcoDuqeqHNVIyXb_AZCTygr50VYZNYgweLTFKiiSv8XE4bRSqPR8YlccTlXPFQgFRxbgDBvNDhbVYr5XO1G6dLfmGrPXwtcwih0tFP94XtpVa4vob1y37-NK6CbtbMmpp3fQJbtN0KpekCtgmzZ6-aQUxci21RgIKkWgG_N3Wfs5l8Sz2SccJvP6FlUV31GFfAtTEJKEV48DKFze6IryMi3m3w8hdxRAPFa4QrTgdcQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-07 04:13:55,214:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-02-07 04:13:55,215:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 07 Feb 2024 03:14:19 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308929257
Replay-Nonce: kRyagOpUOEwaEgEJasyg7RGtFW95ugvxdyiAjgmwDK1JBlUiRTg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:43Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308929257"
}
2024-02-07 04:13:55,215:DEBUG:acme.client:Storing nonce: kRyagOpUOEwaEgEJasyg7RGtFW95ugvxdyiAjgmwDK1JBlUiRTg
2024-02-07 04:13:55,215:DEBUG:acme.client:JWS payload:
b''
2024-02-07 04:13:55,222:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVPRXdhRWdFSmFzeWc3Ukd0Rlc5NXVndnhkeWlBamdtd0RLMUpCbFVpUlRnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0NjkxOTcifQ",
  "signature": "Jq-Xc405QVvPDGaGl7O_M8Zj3K9MluTJG_ctolrGEgrrAdeJXAntJhosIYpz9Z3geGVHrou7_JPkAeAxhY1mlhl0FiP73pqCAmRl31BpekTjdRq3Je13PMZ8fMpnO6R8Gbqt6Y-OZxoUusJIczYABx4e7vC0oWI0ohvCL2gkWC7S6hdAy58AJBY8-AcKiBXXb2d69XDpomyz6U98OligDISsViUuoY_O4706n46VWmrJyHHzpOVbixfaYvgDzQivVSylhcUT-r6iVXT5W2Ew3CbXbYB2cnE2DsIxvtZOmZmPqPZKpwzoV-YV2FE77dIa4WhrJH-cZTH_9bkbJeqQXw",
  "payload": ""
}
2024-02-07 04:13:55,403:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820469197 HTTP/1.1" 200 809
2024-02-07 04:13:55,404:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:19 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUNQy6u4hm5RylJ12JZnerw04stHfOaQzfJZ4optx2uM8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:43Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/PqKyzA",
      "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/nQMx2Q",
      "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/ZJc1Yg",
      "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0"
    }
  ]
}
2024-02-07 04:13:55,405:DEBUG:acme.client:Storing nonce: kRyagOpUNQy6u4hm5RylJ12JZnerw04stHfOaQzfJZ4optx2uM8
2024-02-07 04:13:55,406:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-07 04:13:55,407:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-02-07 04:13:55,408:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-07 04:13:55,408:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-07 04:13:55,410:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:13:55,410:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-07 04:13:55,410:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-07 04:13:55,411:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-07 04:13:55,413:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:13:55,459:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-07 04:13:55,659:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-07 04:13:55,662:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer.
2024-02-07 04:13:55,663:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD
2024-02-07 04:13:55,669:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC.
2024-02-07 04:13:55,669:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-07 04:13:55,670:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-07 04:13:55,682:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x038B2290>
Prep: True
2024-02-07 04:13:55,682:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x038B2290> and installer None
2024-02-07 04:13:55,683:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-07 04:13:55,687:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-07 04:13:55,688:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-07 04:13:55,690:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-07 04:13:56,151:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-07 04:13:56,152:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:20 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "dk8yZIuzfhA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-07 04:13:56,153:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-07 04:13:59,923:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7425_key-certbot.pem
2024-02-07 04:14:03,608:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7423_csr-certbot.pem
2024-02-07 04:14:03,608:DEBUG:acme.client:Requesting fresh nonce
2024-02-07 04:14:03,608:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-07 04:14:03,765:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-07 04:14:03,765:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:28 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA78wNkcX-SRnTg5-A4M5j5WEvpQ82PQAADjTBGtZNnT3s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-07 04:14:03,765:DEBUG:acme.client:Storing nonce: 3l89SrA78wNkcX-SRnTg5-A4M5j5WEvpQ82PQAADjTBGtZNnT3s
2024-02-07 04:14:03,766:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-07 04:14:03,772:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTc4d05rY1gtU1JuVGc1LUE0TTVqNVdFdnBRODJQUUFBRGpUQkd0Wk5uVDNzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "oWWxM9Tm7_rRN7PShUDnSwip-BpuWaSLzmN32bX7E7ogmo9rSWzXjaLc7dHrai9tCYivFzpmqpA6t0uXz5EkrTxsmlxUBziKIr4-wLpH9_ktJQ9cWpPwXhIIo-SZZih0SQwx7Y6uGboLsUOlNr3zxQu_--AzTSDCaFCZt3hhPn8uNxVREIx0wfWj5dbzjEYx-4KivN9271S4uD2SEyWm-YwtdUrwll_9QNHZT-NEpJawaE3A0tHD0CTlYsFNsP488WpHqSlxJSHcsEfUQfTMUSi7ScMFh9BLjzHFeWP7LKh1_87wa_iTEm2C7tcOfAeJVbuDky6VbAmTV-8I5H4DUQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-07 04:14:03,976:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-07 04:14:03,978:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 07 Feb 2024 03:14:28 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308951787
Replay-Nonce: 5IXlosaqdlTlTBUhC2jeisSccDXgRWrQIy-_-NZW-eRWRw3WnCA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308951787"
}
2024-02-07 04:14:03,978:DEBUG:acme.client:Storing nonce: 5IXlosaqdlTlTBUhC2jeisSccDXgRWrQIy-_-NZW-eRWRw3WnCA
2024-02-07 04:14:03,978:DEBUG:acme.client:JWS payload:
b''
2024-02-07 04:14:03,983:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFkbFRsVEJVaEMyamVpc1NjY0RYZ1JXclFJeS1fLU5aVy1lUldSdzNXbkNBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MDE0NTcifQ",
  "signature": "mEo7FVdjG7ia-QBaMc0wimHwSzXsDjpPFbnUK6Aom2IAn7yVtXh68i6AqAIvcqD8Ht8FvD01gr9rGu3eBoEuccjrnot7egnedXv6IHV-28LUumgtg_dA3BEYSJunmC_KHHUWpY0H8tLOTlAL41gaKUmRgWcsD7o4pYaPk-eGAM8rvMKL3Nlgp35HVxAvHyQWth0HDAVeCCkespL5KfAkmLia-ovUZ7GVR8IWBk3ZlHEO6nem_8JWh7q45Hr9rojC-x4UNhtx1zJf3BBXFp4sWx97z4_KzwnU1c0zDatr84sRo0cTnKFRomN7L1lt9_BY5Mf7xUYhp_AqnzGn5_pXpg",
  "payload": ""
}
2024-02-07 04:14:04,152:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820501457 HTTP/1.1" 200 805
2024-02-07 04:14:04,155:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:28 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqcuWjEb8B9xSEkYvq6KjBnZE53IoP8Lfs42WLKXNaQ6k
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:52Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/nfOlPQ",
      "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/ptX2uw",
      "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/u4UgEQ",
      "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw"
    }
  ]
}
2024-02-07 04:14:04,155:DEBUG:acme.client:Storing nonce: 5IXlosaqcuWjEb8B9xSEkYvq6KjBnZE53IoP8Lfs42WLKXNaQ6k
2024-02-07 04:14:04,156:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-07 04:14:04,156:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-02-07 04:14:04,157:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-07 04:14:04,157:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-07 04:14:04,159:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:14:04,159:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-07 04:14:04,159:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-07 04:14:04,159:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-07 04:14:04,161:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:14:04,206:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-07 04:14:04,414:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-07 04:14:04,415:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-07 04:14:04,416:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-07 04:14:04,420:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC.
2024-02-07 04:14:04,420:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-07 04:14:04,420:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-07 04:14:04,424:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05145FD0>
Prep: True
2024-02-07 04:14:04,424:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05145FD0> and installer None
2024-02-07 04:14:04,425:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-07 04:14:04,428:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-07 04:14:04,429:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-07 04:14:04,431:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-07 04:14:04,892:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-07 04:14:04,892:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:29 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "IHncummq0GY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-07 04:14:04,893:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-07 04:14:08,922:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7426_key-certbot.pem
2024-02-07 04:14:12,558:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7424_csr-certbot.pem
2024-02-07 04:14:12,559:DEBUG:acme.client:Requesting fresh nonce
2024-02-07 04:14:12,559:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-07 04:14:12,723:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-07 04:14:12,724:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:37 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqBBBHDjzgwP62nOJUuiYUpiR9AnG358cM0myxvBZQ__8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-07 04:14:12,725:DEBUG:acme.client:Storing nonce: 5IXlosaqBBBHDjzgwP62nOJUuiYUpiR9AnG358cM0myxvBZQ__8
2024-02-07 04:14:12,725:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-07 04:14:12,739:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFCQkJIRGp6Z3dQNjJuT0pVdWlZVXBpUjlBbkczNThjTTBteXh2QlpRX184IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "blc0TSa1f5KhFXBhbaD__YyIIxkQ98X6Eex018mmCf5s7oquHQFG0VK1L3_tQrGuWLPW6Y6rBavkDDXcQJ_GKq1BUyJcOSyJI1ZQQctKvJm9pmXyR5-5k-PU1K7PA7YmtjcZuiGNjCGe7N1RLFPzlxMxrv_g_-cT5_ZUV5CzcCSpjSGP6auAud05l8l8lR2G10GdyJqKLvjv1el2sVx_RV2Lv65Wog2lqtmShh-9ZNFc0gKaKDJPYg2hydOvCTId-CxOWaN7R_cdcRY0Lcob3G3yp5j6jrcYdnLVjmjDelnaNhwMWnYjfdAbliT_9k9YRycGgcBHgE31Un9uLKsImw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-07 04:14:12,931:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-07 04:14:12,931:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 07 Feb 2024 03:14:37 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308975127
Replay-Nonce: 3l89SrA7-Zq6rtwt5cR507jmVvxjE3fRYdRGwAyA1FHIZ3eR-z8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:27:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308975127"
}
2024-02-07 04:14:12,932:DEBUG:acme.client:Storing nonce: 3l89SrA7-Zq6rtwt5cR507jmVvxjE3fRYdRGwAyA1FHIZ3eR-z8
2024-02-07 04:14:12,932:DEBUG:acme.client:JWS payload:
b''
2024-02-07 04:14:12,940:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTctWnE2cnR3dDVjUjUwN2ptVnZ4akUzZlJZZFJHd0F5QTFGSElaM2VSLXo4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MzM3MzcifQ",
  "signature": "NaiOE7-W6Aws5RpetmukXP9rThQHMtNCXPUwH5pe0g6jcj88QCetoMBQTQxDv6NO3veCZO-TkqXgn_BDPbUHPjuflTDi-BDMDFPN5Y45SOD0PsBOWtcQubdaxc0_DSGc25IOCVzaDL8-EiARxth-AavEXs_rt1NuMSjIeLfBAv5SmouUnNN--lUJY1aC3dibCut5mV4-3CIRvFITzqNnaWKWjADEOLIIA8kBJqDnkMEq-Fv3s4-UfLGrgtHp0Q8EySqTOn8YxN7iITQNx3bDv_gFxO6y8rOB2RRkZVUbP2dZl1oHhJt_zTT11vd_qePsQJoZUkqk9XCSFs56o6gNgg",
  "payload": ""
}
2024-02-07 04:14:13,104:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820533737 HTTP/1.1" 200 805
2024-02-07 04:14:13,105:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:37 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7E8SGTIgSOGKo-KFxu3XVRtpxM90CeHKtQ1RuHs76sUw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:27:01Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/u7lnsw",
      "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/kawHqw",
      "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/Xsywzg",
      "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs"
    }
  ]
}
2024-02-07 04:14:13,105:DEBUG:acme.client:Storing nonce: 3l89SrA7E8SGTIgSOGKo-KFxu3XVRtpxM90CeHKtQ1RuHs76sUw
2024-02-07 04:14:13,105:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-07 04:14:13,106:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-02-07 04:14:13,106:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-07 04:14:13,106:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-07 04:14:13,107:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:14:13,107:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-07 04:14:13,107:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-07 04:14:13,108:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-07 04:14:13,109:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:14:13,146:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-07 04:14:13,354:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-07 04:14:13,356:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-07 04:14:13,357:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-07 04:14:13,365:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC.
2024-02-07 04:14:13,365:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-07 04:14:13,366:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-07 04:14:13,375:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E11BF0>
Prep: True
2024-02-07 04:14:13,376:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E11BF0> and installer None
2024-02-07 04:14:13,376:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-07 04:14:13,383:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-07 04:14:13,384:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-07 04:14:13,386:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-07 04:14:13,848:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-07 04:14:13,848:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:38 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "bPwy4EMvtcs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-07 04:14:13,849:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-07 04:14:17,466:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7427_key-certbot.pem
2024-02-07 04:14:21,073:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7425_csr-certbot.pem
2024-02-07 04:14:21,073:DEBUG:acme.client:Requesting fresh nonce
2024-02-07 04:14:21,073:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-07 04:14:21,260:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-07 04:14:21,261:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:45 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7dQZL-ZBgiqE5VgP-FV2iKl4xGUcTBS-wwOI_R9BJcLY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-07 04:14:21,262:DEBUG:acme.client:Storing nonce: 3l89SrA7dQZL-ZBgiqE5VgP-FV2iKl4xGUcTBS-wwOI_R9BJcLY
2024-02-07 04:14:21,262:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-07 04:14:21,274:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdkUVpMLVpCZ2lxRTVWZ1AtRlYyaUtsNHhHVWNUQlMtd3dPSV9SOUJKY0xZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "MBT1pWT15NKZv31O4dTbjbIuR6c73qvdnpKimgS2Vghdtb24gSGJW0vORHDxdbp9yPsttJontCq3GDwSPjR1WRGUtHqF5rnWxT0ZxrurS3sbXvxI4Hm5Js7TSqNgTqOa9C7KZban39De3MxhVn2wFiPvZpkCC2kCLmNUGyLv3J1XpOMNWGWEsUGXCS6FFDRCq1bVfMe3ffYrV0Vkw5YKs1ORL5TZmv_G2Da1ourWeAA75-D7eJCwPXxBWRy1804UsBwOuToWB3qXBWaRcANXQlgRKDNqYcw2vhFw_hWxsb3vaW92oHg-lHak3H9BpOQqH7uTvaMRpBz7SNaMsVxcKA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-07 04:14:21,529:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-07 04:14:21,531:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 07 Feb 2024 03:14:46 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241309008647
Replay-Nonce: 5IXlosaqnXMqrdxQkPWAY0og6WqYjsePqUDB_PQBveToO6C_sCQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:27:10Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241309008647"
}
2024-02-07 04:14:21,531:DEBUG:acme.client:Storing nonce: 5IXlosaqnXMqrdxQkPWAY0og6WqYjsePqUDB_PQBveToO6C_sCQ
2024-02-07 04:14:21,532:DEBUG:acme.client:JWS payload:
b''
2024-02-07 04:14:21,543:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFuWE1xcmR4UWtQV0FZMG9nNldxWWpzZVBxVURCX1BRQnZlVG9PNkNfc0NRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1ODAxNjcifQ",
  "signature": "mfgMouZiGKqeoZ02TE7PaP6XinhmoVAxlK1zbOne-wTIYaAEejtgwy9mJKnle8H7p9lsxnxnP-s2wM5HrUcNialRdnn6p_Js3fgFhCQRZjULRLLPUwNwWF798TAEs1CIaXaZa5DdHTHsZWVIGnaaEZIhgrRvwI9dxCR6xzqwmeYTq-NNTWpHAAv6gCPETycxmvIQT5jS3PknbHdOFlkIwpKCJTEh4AGohFm1Sd8PspxjEr3BNUwXLcureNjJdFx00MBsLnakEWR_fdocW8hN8OK_CD0QuDlMjA7RlVfLDzXDu5_De9K1ipEgaT9XRDA__YrwwooIFMm9Ch2c93Tjgg",
  "payload": ""
}
2024-02-07 04:14:21,702:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820580167 HTTP/1.1" 200 805
2024-02-07 04:14:21,703:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 07 Feb 2024 03:14:46 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaq9QCIuwOydFvk_iqPdfRvzMCotbNtAhMMrxJkXXfk8iM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:27:10Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/yNgMJw",
      "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/JW2Bpw",
      "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/iioLug",
      "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc"
    }
  ]
}
2024-02-07 04:14:21,703:DEBUG:acme.client:Storing nonce: 5IXlosaq9QCIuwOydFvk_iqPdfRvzMCotbNtAhMMrxJkXXfk8iM
2024-02-07 04:14:21,704:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-07 04:14:21,704:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-02-07 04:14:21,705:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-07 04:14:21,706:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-07 04:14:21,708:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:14:21,708:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-07 04:14:21,708:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-07 04:14:21,709:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-07 04:14:21,711:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-07 04:14:21,712:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-02-07 04:14:21,712:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-02-07 04:14:21,714:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-02-07 04:14:21,717:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)