2024-01-28 01:10:06,078:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-01-28 01:10:06,078:DEBUG:certbot._internal.main:Arguments: []
2024-01-28 01:10:06,079:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-01-28 01:10:07,274:DEBUG:certbot._internal.log:Root logging level set at 20
2024-01-28 01:10:07,275:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-01-28 01:10:07,313:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04CA1530> and installer <certbot._internal.cli.cli_utils._Default object at 0x04CA1530>
2024-01-28 01:10:07,353:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-28 01:10:07,551:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-28 01:10:07,553:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer.
2024-01-28 01:10:07,557:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD
2024-01-28 01:10:07,566:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC.
2024-01-28 01:10:07,566:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-28 01:10:07,566:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-28 01:10:07,571:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0470EB10>
Prep: True
2024-01-28 01:10:07,572:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0470EB10> and installer None
2024-01-28 01:10:07,572:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-28 01:10:07,578:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-28 01:10:07,579:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-28 01:10:07,581:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-28 01:10:08,069:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-28 01:10:08,070:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:07 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "hRjimvwKJCg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-28 01:10:08,070:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-28 01:10:12,778:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7168_key-certbot.pem
2024-01-28 01:10:17,595:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7166_csr-certbot.pem
2024-01-28 01:10:17,596:DEBUG:acme.client:Requesting fresh nonce
2024-01-28 01:10:17,596:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-28 01:10:17,746:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-28 01:10:17,747:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:17 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5xSI6NC_t9_U-Ymx4y8feYeWkMcGErBnJh6lZCvXGR8U
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-28 01:10:17,747:DEBUG:acme.client:Storing nonce: R3i4Vkc5xSI6NC_t9_U-Ymx4y8feYeWkMcGErBnJh6lZCvXGR8U
2024-01-28 01:10:17,747:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-28 01:10:17,753:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzV4U0k2TkNfdDlfVS1ZbXg0eThmZVllV2tNY0dFckJuSmg2bFpDdlhHUjhVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "hShSCWQpUxZtJv--KHOv_o17ixsziLxj0IK6iFkY8RsFZIDBYls7sqbidqFMQDUHtCabt8Nbhv940T1XvRNu1I7lwYFHyNt1YSyS9MjEvoGwuJrYO9WnSuKLV1DSkbLYlharkYPvvOBNIcwoGutNgjTWxZ3lMvC3xPW_k68jVCyhCYTBEpfaP2vyT2H6DwiQ2sInWJIxiEyeXXYXEmIBBvo6EiEkH4A--WrcjFWK8wqIdCr9R0RPUs37NqakfIYNykWXDXV6NWSTvTMRzopzBtyOUAGGVWfy3EiBM9fj0363h_1OKjfZE7FtdSzrWbraDH8AUWXrxqTOYDLzptHr0w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-28 01:10:17,958:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-01-28 01:10:17,958:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 28 Jan 2024 00:10:17 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463125096
Replay-Nonce: R3i4Vkc5ngr890o0KGiT4uZ2qcamKlNfv1cHG_6HWTdtzgFjXOE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:45:30Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463125096"
}
2024-01-28 01:10:17,959:DEBUG:acme.client:Storing nonce: R3i4Vkc5ngr890o0KGiT4uZ2qcamKlNfv1cHG_6HWTdtzgFjXOE
2024-01-28 01:10:17,959:DEBUG:acme.client:JWS payload:
b''
2024-01-28 01:10:17,965:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVuZ3I4OTBvMEtHaVQ0dVoycWNhbUtsTmZ2MWNIR182SFdUZHR6Z0ZqWE9FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyMDk3MTYifQ",
  "signature": "oW8CsDRM_736fbGFvJT_MCUVAIJd8GyTAzLYbx4DW2KB_BTNCIBK4Cpc_4VxhkN3lHMhjOtthw_CLEI1j-C2xBa64MjY4VY_VLkzrBaAopvRjqKJ1-7-IVdPvMHFNvIoqFCvxpha8Oyp9MVnUIHPswy8_SNrCsirB_GowN6lYLlXikbOCktnjCp9kF7MGP3FQRqM741CEqIQLBtWJL6BrfLuTrdTZw2Pn051SqkXINqGpVYO-J1GeJVwLRqILsSHxp0ghFG4RpZwbUPG6jlsz78gHn7rH5wjFaF0NC6ZRYZwj3LIMD4sJ-0pIxorZAXC-xI9yBc16qveXR_UxhxXQg",
  "payload": ""
}
2024-01-28 01:10:18,142:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186209716 HTTP/1.1" 200 810
2024-01-28 01:10:18,142:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:17 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247YsTcuJESJq51u1gPQwAjfWzWjQsaMUviD-fjxj4M90Tg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:45:30Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/6f0kFQ",
      "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/TzPnqw",
      "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/f71chA",
      "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo"
    }
  ]
}
2024-01-28 01:10:18,143:DEBUG:acme.client:Storing nonce: VKfU247YsTcuJESJq51u1gPQwAjfWzWjQsaMUviD-fjxj4M90Tg
2024-01-28 01:10:18,143:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-28 01:10:18,144:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-01-28 01:10:18,144:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-28 01:10:18,144:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-28 01:10:18,148:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:10:18,148:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-28 01:10:18,148:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-28 01:10:18,149:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-28 01:10:18,156:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:10:18,197:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-28 01:10:19,140:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-28 01:10:19,141:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-28 01:10:19,142:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-28 01:10:19,146:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC.
2024-01-28 01:10:19,146:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-28 01:10:19,147:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-28 01:10:19,152:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C9D110>
Prep: True
2024-01-28 01:10:19,152:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C9D110> and installer None
2024-01-28 01:10:19,152:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-28 01:10:19,157:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-28 01:10:19,158:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-28 01:10:19,160:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-28 01:10:19,693:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-28 01:10:19,694:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:19 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "TaxzeyNRPOY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-28 01:10:19,694:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-28 01:10:24,286:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7169_key-certbot.pem
2024-01-28 01:10:28,998:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7167_csr-certbot.pem
2024-01-28 01:10:28,999:DEBUG:acme.client:Requesting fresh nonce
2024-01-28 01:10:28,999:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-28 01:10:29,178:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-28 01:10:29,178:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:28 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCyiH6Bk1-eJ149jv5WSg_r0JfAGBkeeKm6dPqVLVFFcI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-28 01:10:29,178:DEBUG:acme.client:Storing nonce: Wkq6jgLCyiH6Bk1-eJ149jv5WSg_r0JfAGBkeeKm6dPqVLVFFcI
2024-01-28 01:10:29,179:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-28 01:10:29,184:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEN5aUg2QmsxLWVKMTQ5anY1V1NnX3IwSmZBR0JrZWVLbTZkUHFWTFZGRmNJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "dSmvCoE-GFSEH_csqw7K-_yot5ANmTMPacy1PxA-RPdwgAO-K1vksdUDh0RYAuxA19MjHzt82Y_BIX3GFls-mr6-7CYkco8KB5ZhcQSyeWvxszKERujnYS3tssT-I_x2m652XUR-lGwy4FG2WvDXNyho9LPHcrl9lT3WMCpmw4PGKnnU7G3578LF_UAYFg9tjs_7tB-p0z71gAKm11IGvfG6ETnn1NfkYOEIDJx1_M4NAnogaLNqF08G8IBUvZ3d5g4bB-6c9FNgdM8ytR-5-zZb8jCU2lFB2kGfiyYe1muRM2lfpxI0gdNtKczQPWJFEe7TzQ2QFPqHMD02T4oyxQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-28 01:10:29,385:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-01-28 01:10:29,385:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 28 Jan 2024 00:10:28 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463146186
Replay-Nonce: Wkq6jgLCKMFyf8cUGEmevcL_skSZYDcEu5qLgb40h-i0JpqHA4E
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:45:39Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463146186"
}
2024-01-28 01:10:29,386:DEBUG:acme.client:Storing nonce: Wkq6jgLCKMFyf8cUGEmevcL_skSZYDcEu5qLgb40h-i0JpqHA4E
2024-01-28 01:10:29,386:DEBUG:acme.client:JWS payload:
b''
2024-01-28 01:10:29,391:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENLTUZ5ZjhjVUdFbWV2Y0xfc2tTWllEY0V1NXFMZ2I0MGgtaTBKcHFIQTRFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNDA4MzYifQ",
  "signature": "eZ009AEdUNzF-Gjm5YCNJupgwyrrktoDR-5z87PmAWb0SZ-ulcG5wpNdkUfNYnwyfWyRHT0ZSIm9R9iT2Vk02aDJyopVOv3_CmwXQ-NqMlwsuRO_X6CmjTtLtfikJ6QmjjL1mXyli9iwda0g-IfFSVXH-ha9PZr3HQl-VYCOCxiNL57Gx58YMfT7Iw45LfrrosSBA6C_qklBgi7qEe1KDBKcwyuqcNcC6VeMXreDQiVHzsz225Qtbu6jXgj33P_VZcwCN6Z7X3RqewJJNRYTOsdA2MV-yzTpJedJHZmj2laJJIUNmkZOIFxLhnjmEHzkzZCHSpAdIHaClYkYYFZQGg",
  "payload": ""
}
2024-01-28 01:10:29,587:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186240836 HTTP/1.1" 200 804
2024-01-28 01:10:29,588:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:29 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZF_7fZm5kvMN86JdIpeTPu7jq7K1lnOaDk12ra-FGM9II
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:45:39Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/g8SMBA",
      "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/KdDipg",
      "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/N41DHw",
      "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I"
    }
  ]
}
2024-01-28 01:10:29,588:DEBUG:acme.client:Storing nonce: fBfjtdZF_7fZm5kvMN86JdIpeTPu7jq7K1lnOaDk12ra-FGM9II
2024-01-28 01:10:29,588:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-28 01:10:29,589:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-01-28 01:10:29,589:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-28 01:10:29,590:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-28 01:10:29,590:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:10:29,590:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-28 01:10:29,591:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-28 01:10:29,591:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-28 01:10:29,592:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:10:29,632:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-28 01:10:29,899:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-28 01:10:29,900:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-01-28 01:10:29,901:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-01-28 01:10:29,904:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC.
2024-01-28 01:10:29,904:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-28 01:10:29,905:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-28 01:10:29,909:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04CA1870>
Prep: True
2024-01-28 01:10:29,910:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04CA1870> and installer None
2024-01-28 01:10:29,910:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-28 01:10:29,925:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-28 01:10:29,926:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-28 01:10:29,928:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-28 01:10:30,458:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-28 01:10:30,459:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:29 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "T-MpnIcLA74": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-28 01:10:30,460:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-28 01:10:34,511:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7170_key-certbot.pem
2024-01-28 01:10:38,173:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7168_csr-certbot.pem
2024-01-28 01:10:38,174:DEBUG:acme.client:Requesting fresh nonce
2024-01-28 01:10:38,174:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-28 01:10:38,351:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-28 01:10:38,352:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:37 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFX8M0Gx2_7JxqIGlW9L9JoYXUEIpdzjmb4DTLHiq6dEk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-28 01:10:38,352:DEBUG:acme.client:Storing nonce: fBfjtdZFX8M0Gx2_7JxqIGlW9L9JoYXUEIpdzjmb4DTLHiq6dEk
2024-01-28 01:10:38,352:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-28 01:10:38,358:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZYOE0wR3gyXzdKeHFJR2xXOUw5Sm9ZWFVFSXBkemptYjREVExIaXE2ZEVrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "WOOrxOjcho4YFVR6Q1tPKHhdFETi1wkoAO0GfQh1wgRwGyy3nYa6tu2m9r5-eAJwT1KayZsLsB4TPzVuXt2HSxQbBLaqa5aiTl9ZL2Tpsl1gPZgOsc3pqO9TIdtXQBI1tMQzpwkYccsl6sJwdjY902vWn9L_Y_AgBE1X02R4PDRIp0pkARUkV2DZ-lhWyzsfqzSB-zaKciYAvoX-yXHK2yEU9YQZRxFBBI86jbL6TTn9_uE6XepxM1Xpf3SLDvXfJQXgmj6NQy168k6LjqdTrhF5drWeGc4zOXUtga0Os-kBzYC4hG9EyE311fenQnPB9GhVDMEVStTfKs05C65Ehw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-28 01:10:38,818:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-01-28 01:10:38,819:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 28 Jan 2024 00:10:38 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463167526
Replay-Nonce: Wkq6jgLCvKiS98MH7ID0wVlI4Txb4OysQ_ETlRkGCJvnqMKz9AE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:45:48Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463167526"
}
2024-01-28 01:10:38,819:DEBUG:acme.client:Storing nonce: Wkq6jgLCvKiS98MH7ID0wVlI4Txb4OysQ_ETlRkGCJvnqMKz9AE
2024-01-28 01:10:38,819:DEBUG:acme.client:JWS payload:
b''
2024-01-28 01:10:38,825:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEN2S2lTOThNSDdJRDB3VmxJNFR4YjRPeXNRX0VUbFJrR0NKdm5xTUt6OUFFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNzM1OTYifQ",
  "signature": "unWEw2R69REPTGJkJQHwrx-dGWMojz4iGCkI0tWYH_JhW6IY2sKYSrhb2Ku9wiY2wO_SFB3qQcVkHKwRsdxe4ftxW9Lq8Fvst9B0P56ONu60DZRbpQfiafowSKmFiMt8mrok-N2MdSzra67I9xeYsXEyVA0o5zJY1s0W2qkS1bbtATz7HupEdCl8xyZJGtKbULTUstJZKi6u3lP7aYJMQcpx59lMFcPWb4HX1sSnlk4WB1RUTcPpKpevIO4qjkFjuQ4EREjKSTvTe1MJFzAOgYYMPEyaUhqg-WLRwgQiwOd3S9HvcCj10-b6EOYSVuGXvl-3lWa9nc6rPROwjPYd0w",
  "payload": ""
}
2024-01-28 01:10:39,018:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186273596 HTTP/1.1" 200 807
2024-01-28 01:10:39,018:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:38 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZF0rQ5uVLaglaSiGq_jbPvIIh7kth3ckPvgAtpt9VDOfE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:45:48Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KNqRXQ",
      "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KMda1w",
      "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/f-1bag",
      "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE"
    }
  ]
}
2024-01-28 01:10:39,019:DEBUG:acme.client:Storing nonce: fBfjtdZF0rQ5uVLaglaSiGq_jbPvIIh7kth3ckPvgAtpt9VDOfE
2024-01-28 01:10:39,019:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-28 01:10:39,019:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-01-28 01:10:39,020:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-28 01:10:39,020:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-28 01:10:39,021:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:10:39,021:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-28 01:10:39,021:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-28 01:10:39,021:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-28 01:10:39,022:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:10:39,063:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-28 01:10:39,277:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-28 01:10:39,278:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-28 01:10:39,279:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-28 01:10:39,283:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC.
2024-01-28 01:10:39,283:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-28 01:10:39,283:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-28 01:10:39,288:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C9DA30>
Prep: True
2024-01-28 01:10:39,288:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C9DA30> and installer None
2024-01-28 01:10:39,288:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-28 01:10:39,293:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-28 01:10:39,294:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-28 01:10:39,296:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-28 01:10:39,830:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-28 01:10:39,831:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:39 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "GnAnty9409M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-28 01:10:39,831:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-28 01:10:43,615:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7171_key-certbot.pem
2024-01-28 01:10:47,269:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7169_csr-certbot.pem
2024-01-28 01:10:47,269:DEBUG:acme.client:Requesting fresh nonce
2024-01-28 01:10:47,270:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-28 01:10:47,447:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-28 01:10:47,448:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:46 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFTShqgEWnlUxs-RzI57UN5qNAzc05VYNajANdpIjyYxU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-28 01:10:47,448:DEBUG:acme.client:Storing nonce: fBfjtdZFTShqgEWnlUxs-RzI57UN5qNAzc05VYNajANdpIjyYxU
2024-01-28 01:10:47,448:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-01-28 01:10:47,454:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZUU2hxZ0VXbmxVeHMtUnpJNTdVTjVxTkF6YzA1VllOYWpBTmRwSWp5WXhVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "wAxINPIUxzh-OpKW0I7DpXLq4ovrghgPEFQaSHHkH57v9rhK2we11BJShilZ8zONJmZIbDhOz_J_rBDucGqTZ675NEx_NKRMc4ZoSIVHAcbQEFsGItjZ7TDsvcHbPCjzTv4_VCx66-JBX-YhdQjeCWG7d2QGw2QZfe0hT6ueP4VQBJP-khc0nQFHg0hyYxitrFN4VPD4S0mH90MamAfhaqIT2A6o559WC1iA0Tzlgf0vnSeGRmpfE3kf7DvRa7a5t_lJnRF2L_1rTX50JrwwuWq2r-Hn9fkAEWEabbaJe3Y40kXcfF4jX-Yz9oI8ZGbmMLJfeHmAd-MFVeAXeFwZ2Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-28 01:10:47,656:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-01-28 01:10:47,657:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 28 Jan 2024 00:10:47 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463187546
Replay-Nonce: fBfjtdZFFifopUCVwgnrhpjseNEuHOXnSBijtPwuWzNJACtsHow
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:45:58Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463187546"
}
2024-01-28 01:10:47,657:DEBUG:acme.client:Storing nonce: fBfjtdZFFifopUCVwgnrhpjseNEuHOXnSBijtPwuWzNJACtsHow
2024-01-28 01:10:47,657:DEBUG:acme.client:JWS payload:
b''
2024-01-28 01:10:47,662:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZGaWZvcFVDVndnbnJocGpzZU5FdUhPWG5TQmlqdFB3dVd6TkpBQ3RzSG93IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzMDUyMzYifQ",
  "signature": "f1UXqfWGlTGzVnU7BIjRh9kW98scaoaUoD5mfT92gBBum5ttfpK6OKeMKQCTuRMowyc48RnQXMwECLyWmfqb9GSV7KgVHErLw9A8NHz915u01FmKPqTAtyJo0wObsX5gpey4JgnNbsuey_c6TdxJ3EyJvVhBb6JVH-g_QIjQ_IhcHe8K7QlNcuTdDaMY2MaU_Ppz8z53gMjEdrJhUh6fwQn_0vzWyujJsJXwpEkt7Gvxv53hlSCFP_igueVOAmwaeMAm6gt8VqYmfe_4Vfgluk1ek7Fy6Pl6LAVi-ELQh5fHnjOkTXjLDb9y5zeWI5eleGItjXRCO7LonzQQwEUj9Q",
  "payload": ""
}
2024-01-28 01:10:47,860:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186305236 HTTP/1.1" 200 801
2024-01-28 01:10:47,861:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:47 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFDgRS-ENGO7dDsaRUkCsJa9eYHu1oW5fSBpzOUK_PX50
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:45:58Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/H-2NUg",
      "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/SPl0kw",
      "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/dBmW2A",
      "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY"
    }
  ]
}
2024-01-28 01:10:47,861:DEBUG:acme.client:Storing nonce: fBfjtdZFDgRS-ENGO7dDsaRUkCsJa9eYHu1oW5fSBpzOUK_PX50
2024-01-28 01:10:47,862:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-28 01:10:47,862:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-01-28 01:10:47,863:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-28 01:10:47,863:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-28 01:10:47,864:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:10:47,864:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-28 01:10:47,864:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-28 01:10:47,864:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-28 01:10:47,866:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:10:47,909:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-28 01:10:48,127:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-28 01:10:48,129:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-28 01:10:48,129:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-28 01:10:48,134:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC.
2024-01-28 01:10:48,134:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-28 01:10:48,134:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-28 01:10:48,139:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C7D790>
Prep: True
2024-01-28 01:10:48,140:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C7D790> and installer None
2024-01-28 01:10:48,140:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-28 01:10:48,144:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-28 01:10:48,145:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-28 01:10:48,147:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-28 01:10:48,584:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-28 01:10:48,585:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:48 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "lyQhOALPpkg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-28 01:10:48,585:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-28 01:10:52,642:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7172_key-certbot.pem
2024-01-28 01:10:56,251:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7170_csr-certbot.pem
2024-01-28 01:10:56,252:DEBUG:acme.client:Requesting fresh nonce
2024-01-28 01:10:56,252:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-28 01:10:56,399:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-28 01:10:56,399:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:55 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5VvNnOeVJIwT-vFWWGPwB9r5bcTXCv5BMGv4twpzaPOE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-28 01:10:56,399:DEBUG:acme.client:Storing nonce: R3i4Vkc5VvNnOeVJIwT-vFWWGPwB9r5bcTXCv5BMGv4twpzaPOE
2024-01-28 01:10:56,400:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-28 01:10:56,404:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVWdk5uT2VWSkl3VC12RldXR1B3QjlyNWJjVFhDdjVCTUd2NHR3cHphUE9FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "DDCocN1QAApPUWwffwzwBpxaFKrahLkmtJvuoh4JiV-ixr1F6RMOltYsrUxaTkppx4VYZeWWWJ0KoQxZF87KQymP327__LQp2qUCiiL7OWBzmjbFKCUtfZmyvenSzElwNhwUNbtODXa6pox6x69yYMBIVn-6YcEYOUTM5lSI6pdCJi7dhNl9P5cOw17Wur8gQ5Fe3OGP--WaY15NszrFMabq0VBSobCH0MsCZpeTTNVa2h_4U8JAvDLKZWcUWMvHkc51PfcLJI8ubBY4lSQGI2BPLQrgKD5x_jYN9Xqks1hDtt5Vpj9niTE3nA-0Oy2naofe6IbGEJBENi4oEjzT8g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-28 01:10:56,643:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-01-28 01:10:56,644:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 28 Jan 2024 00:10:56 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463215876
Replay-Nonce: VKfU247Y_IDDA4NDyes9wCsX3IXzzCXkcOsOSDlD_Qw7L5Fmpds
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:07Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463215876"
}
2024-01-28 01:10:56,644:DEBUG:acme.client:Storing nonce: VKfU247Y_IDDA4NDyes9wCsX3IXzzCXkcOsOSDlD_Qw7L5Fmpds
2024-01-28 01:10:56,644:DEBUG:acme.client:JWS payload:
b''
2024-01-28 01:10:56,650:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lfSUREQTRORHllczl3Q3NYM0lYenpDWGtjT3NPU0RsRF9RdzdMNUZtcGRzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzNDM5MTYifQ",
  "signature": "rIoppYgK6x_Q2sa2Z2PB6nGo2hqVBSUP9ZNB6NSFYEEh5porrAVFawlwhKDxi8dUjDriz0teSog-6lILkr6a_fnRmbVEJ5Wc2mHVsrErkuhDwQTYKZ3y2q_f3SoPGIIDnNRjRaVqx-koaiefdnuKniHmKN0NqOy316qRwE2KNnA8iqaV9D7hZRLjPXex0W26TzdjH9DYkr1mm-DpQwju_lV8kFNnk6-SvpjwI2KpA73suSBMQj29oFr--2_gsENNCen5qbd_H3xPqEmoPAUPeEZyTEkHddGNn2JcKozjWMBiVJ_cbjL9lctF0sJYAKRz_t9W70hn7gbBXjQagX7KFg",
  "payload": ""
}
2024-01-28 01:10:56,812:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186343916 HTTP/1.1" 200 805
2024-01-28 01:10:56,812:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:56 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247YktrE5dPDBCjMsXdCNgcbzZOFqOUtKEKFsaLvymYjYjw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:07Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/FQmNLA",
      "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/nw3Heg",
      "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/o7wJkQ",
      "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE"
    }
  ]
}
2024-01-28 01:10:56,813:DEBUG:acme.client:Storing nonce: VKfU247YktrE5dPDBCjMsXdCNgcbzZOFqOUtKEKFsaLvymYjYjw
2024-01-28 01:10:56,813:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-28 01:10:56,814:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-01-28 01:10:56,814:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-28 01:10:56,815:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-28 01:10:56,815:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:10:56,815:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-28 01:10:56,816:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-28 01:10:56,816:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-28 01:10:56,817:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:10:56,857:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-28 01:10:57,060:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-28 01:10:57,061:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-01-28 01:10:57,062:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-01-28 01:10:57,066:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC.
2024-01-28 01:10:57,066:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-28 01:10:57,067:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-28 01:10:57,071:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x046E5270>
Prep: True
2024-01-28 01:10:57,071:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x046E5270> and installer None
2024-01-28 01:10:57,071:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-28 01:10:57,076:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-28 01:10:57,077:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-28 01:10:57,079:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-28 01:10:57,608:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-28 01:10:57,609:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:10:57 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "aZ4Ue0fyzsU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-28 01:10:57,609:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-28 01:11:01,458:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7173_key-certbot.pem
2024-01-28 01:11:05,046:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7171_csr-certbot.pem
2024-01-28 01:11:05,047:DEBUG:acme.client:Requesting fresh nonce
2024-01-28 01:11:05,047:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-28 01:11:05,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-28 01:11:05,227:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:04 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFghRR8K28wl7W8uoDz4olfQ9UfTkc7Cou_DnqqPRF440
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-28 01:11:05,227:DEBUG:acme.client:Storing nonce: fBfjtdZFghRR8K28wl7W8uoDz4olfQ9UfTkc7Cou_DnqqPRF440
2024-01-28 01:11:05,227:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-28 01:11:05,233:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZnaFJSOEsyOHdsN1c4dW9EejRvbGZROVVmVGtjN0NvdV9EbnFxUFJGNDQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ql7ofM1zuzCbxYKs84kO1lSW1DjHV_WGNtMwLnNV6-uKrLn38rQjFKeanl4Ffpq-1ejHyguqyFz6AA5MOc6edwgy3Y6jutLWNv6m-WE0VK2DXQsGaPR8hDTtk_T91fLTcX09XpLMiXLjWjDtswnJfZ7NSJ3YXt7oWDNK4v0INbmcGYfbr1V6rrtMnCFM5eDc189ruzFu7stMu0hR6Y0C-0sdwkotkUKw9tMGsI8V-OueKa_53ANoEG5j3qiCQPCGGVgrnHiWZBjPKIetkMzr53bIsezUVwH5rwlRKSCcIlJABFevVH9v8kuRPAs8mHhf9pCfRbEpen6GAFb9vOf8aw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-01-28 01:11:05,435:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-01-28 01:11:05,436:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 28 Jan 2024 00:11:04 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463242076
Replay-Nonce: fBfjtdZFSMpSfJuzS1enMdOAzLYMx9APzsk8OnTyLQ8f1EvU3-0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:16Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463242076"
}
2024-01-28 01:11:05,436:DEBUG:acme.client:Storing nonce: fBfjtdZFSMpSfJuzS1enMdOAzLYMx9APzsk8OnTyLQ8f1EvU3-0
2024-01-28 01:11:05,436:DEBUG:acme.client:JWS payload:
b''
2024-01-28 01:11:05,442:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZTTXBTZkp1elMxZW5NZE9BekxZTXg5QVB6c2s4T25UeUxROGYxRXZVMy0wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzODQ1MTYifQ",
  "signature": "nFQYuo9zthJRMnKBp0Xy995emLDwLRYaOLZQN3rzvilb9v3m5YmShGRNijClRX3XhcIU-N5pbgxbLz50BLMLU6etOWh7BlZGwzrMJ1OW5Qv1A0kLPog4oQWoRH_eeOmJLaX2cjsOzZAValgX5UkalFgRnYe8t19h_UUupLrZdUFcd_ZNobpjsLfqbIsCczqY4X8IQwwyBzYcmgJnfL-x7NcA2Fn79WlyIPrayRyDT15UL6QmYHmZ8jayQ74jeQOPIrfvOcqf9kVmPtrNqSYEc-vdN92-Psi4n864iWtl0L-U-nCe5eUHmEdr5vlUawulRgkkio-HpeGK04B_QAjrcw",
  "payload": ""
}
2024-01-28 01:11:05,623:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186384516 HTTP/1.1" 200 809
2024-01-28 01:11:05,624:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:05 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCN4H-cRtEaRFSLeCyvsDkOm1J6BgPA3jxxvyUWvivrBE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:16Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/iy166A",
      "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/FJ3duA",
      "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/0qWA8w",
      "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY"
    }
  ]
}
2024-01-28 01:11:05,624:DEBUG:acme.client:Storing nonce: Wkq6jgLCN4H-cRtEaRFSLeCyvsDkOm1J6BgPA3jxxvyUWvivrBE
2024-01-28 01:11:05,626:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-28 01:11:05,626:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-01-28 01:11:05,627:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-28 01:11:05,627:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-28 01:11:05,627:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:11:05,628:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-28 01:11:05,628:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-28 01:11:05,628:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-28 01:11:05,629:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:11:05,668:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-28 01:11:05,866:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-28 01:11:05,867:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-28 01:11:05,868:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-28 01:11:05,872:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC.
2024-01-28 01:11:05,872:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-28 01:11:05,873:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-28 01:11:05,877:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C83A10>
Prep: True
2024-01-28 01:11:05,878:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C83A10> and installer None
2024-01-28 01:11:05,878:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-28 01:11:05,881:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-28 01:11:05,882:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-28 01:11:05,884:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-28 01:11:06,334:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-28 01:11:06,335:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:05 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "BskgUy47uMQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-28 01:11:06,336:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-28 01:11:10,334:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7174_key-certbot.pem
2024-01-28 01:11:13,949:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7172_csr-certbot.pem
2024-01-28 01:11:13,950:DEBUG:acme.client:Requesting fresh nonce
2024-01-28 01:11:13,950:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-28 01:11:14,110:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-28 01:11:14,110:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:13 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5mExAt1C9NGBC858rzCoiNLS5PyBen34SothCi1uvWNs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-28 01:11:14,111:DEBUG:acme.client:Storing nonce: R3i4Vkc5mExAt1C9NGBC858rzCoiNLS5PyBen34SothCi1uvWNs
2024-01-28 01:11:14,111:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-28 01:11:14,117:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVtRXhBdDFDOU5HQkM4NThyekNvaU5MUzVQeUJlbjM0U290aENpMXV2V05zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "RFDhAcMAJjUrejUJhWCoSEzF1zIfX-wj6ibyNsHpn4KIrHRDMa9mIZhsbD1eM-Or2Y-pwCEoRf6vcOc_bqMpzp98EGyNNDje8UTEMtuhjZ7kt-VJsQEUBp57D7mC6Vd3Sp3RGLcBx-Sez1aHJd0oc8OzuW9ZBlYZ4Ik_7Qk1NpDZS7tzgYiHmhAgV6JWt9SYax72Uxho203tx_ieyAnEvtOUKAQzhgi2xsyxVDgPx6LOvMFgiQADJe6_TBsLTUypuQiCZVGj3SqijUcF8Vu1ZjpnBcsrFL_Q5Fd1HHYiwkvjw1ihGyNqEC0xCE87XlVEQd8k8LIKYV3rua9wQjWqaw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-01-28 01:11:14,296:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-01-28 01:11:14,296:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 28 Jan 2024 00:11:13 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463267436
Replay-Nonce: VKfU247Ya05sUcXBYkzYAX2yw-j7D1fUFcDHzGFFzAN0yU63EH4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463267436"
}
2024-01-28 01:11:14,296:DEBUG:acme.client:Storing nonce: VKfU247Ya05sUcXBYkzYAX2yw-j7D1fUFcDHzGFFzAN0yU63EH4
2024-01-28 01:11:14,297:DEBUG:acme.client:JWS payload:
b''
2024-01-28 01:11:14,302:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lhMDVzVWNYQllrellBWDJ5dy1qN0QxZlVGY0RIekdGRnpBTjB5VTYzRUg0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0MjM2MTYifQ",
  "signature": "b6WvixBq6DoOAqVg5mQnsXCWDsO00Xejo5C1LZzQcqbw6a_WkyWP7uz5CXRDEGa5w0pCbFIw-DtHCwq8IfOdUXJM_1OgD55Pkc4pOdpabHdiOI4NMiDNQzaEzBp5TZLurBRJk8dlx7NyidoDY9jIAZGTgs4_cWkeaku3DrWl3O2PG2Rrz1azshNxsm614KIsCQj6nxDuSo6lwgK5_kDq8rt3EHk0dX2rsi-M5oASW9IDFYRujS-lVnYRDG8dlWOrKYsg_ABDd46AljLmoOKxCfaIp9W_ngNwVXJ5JUM3vFxFzW09lEIOsRouEKaKrwgTubYQtPap59PvuweCG3Ki9Q",
  "payload": ""
}
2024-01-28 01:11:14,471:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186423616 HTTP/1.1" 200 806
2024-01-28 01:11:14,472:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:13 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5VE0qSBB8lWCFZ2KRYixjbJ_ME-aMXVTqQqI3qSn9pRw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:25Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/sGt3LQ",
      "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/-siQUw",
      "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/rUgQOA",
      "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg"
    }
  ]
}
2024-01-28 01:11:14,472:DEBUG:acme.client:Storing nonce: R3i4Vkc5VE0qSBB8lWCFZ2KRYixjbJ_ME-aMXVTqQqI3qSn9pRw
2024-01-28 01:11:14,472:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-28 01:11:14,473:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-01-28 01:11:14,473:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-28 01:11:14,473:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-28 01:11:14,474:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:11:14,474:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-28 01:11:14,474:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-28 01:11:14,475:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-28 01:11:14,475:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:11:14,513:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-01-28 01:11:14,513:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-28 01:11:14,513:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-01-28 01:11:14,519:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-01-28 01:11:14,523:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-01-28 01:11:14,523:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-01-28 01:11:14,523:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-01-28 01:11:14,524:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-01-28 01:11:14,526:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-01-28 01:11:14,565:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-28 01:11:14,824:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-28 01:11:14,825:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-28 01:11:14,826:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-28 01:11:14,830:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC.
2024-01-28 01:11:14,830:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-28 01:11:14,831:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-28 01:11:14,836:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04F9BF70>
Prep: True
2024-01-28 01:11:14,836:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04F9BF70> and installer None
2024-01-28 01:11:14,836:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-28 01:11:14,841:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-28 01:11:14,842:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-28 01:11:14,844:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-28 01:11:15,302:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-28 01:11:15,303:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:14 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "qXwRRkhaGfM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-28 01:11:15,303:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-28 01:11:19,076:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7175_key-certbot.pem
2024-01-28 01:11:22,673:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7173_csr-certbot.pem
2024-01-28 01:11:22,673:DEBUG:acme.client:Requesting fresh nonce
2024-01-28 01:11:22,673:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-28 01:11:22,845:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-28 01:11:22,845:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:22 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247YTzOrchIXUKJjB3wMarIH0efaOHD3mmcgJqNRUbBLf9U
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-28 01:11:22,845:DEBUG:acme.client:Storing nonce: VKfU247YTzOrchIXUKJjB3wMarIH0efaOHD3mmcgJqNRUbBLf9U
2024-01-28 01:11:22,845:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-28 01:11:22,850:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lUek9yY2hJWFVLSmpCM3dNYXJJSDBlZmFPSEQzbW1jZ0pxTlJVYkJMZjlVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "QcV5Dgy0voiEEv06UULIPN83W-POY0ddyJjFX-PgmaTnBWkkyS40ZBqECVvz8Vga9_6Kt9TVUp-vqWc0D-qFoSbUdiECK3Dgxidlx_U-j6cfYTmTfnqraP4zu4jREGltg05xX8iPDkj1a3H4Lt_g8kiZ2nbGTwD3jX5VVXVm8fpWiCprn0kUiETFE2_1-4fpjCoKEg1jiG32YLQwomRoZhPZUqfIRKPYI_miDbypc5XIWGl5HlpUHC_BTokoYF0kKqngZWuS2ehXr2ssXwiEo0_XpZdp7MF-6A5SMfBmk7dwqhx2AEaFQVj4LXTdKGnSIzkRW8FNuBAsJkuYwQrXWQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-28 01:11:23,059:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-01-28 01:11:23,059:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 28 Jan 2024 00:11:22 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463293726
Replay-Nonce: VKfU247YwR6fsDwjoAaeTfBEQrcoV0iuW3QJxkAeygNtn_wHFS8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463293726"
}
2024-01-28 01:11:23,059:DEBUG:acme.client:Storing nonce: VKfU247YwR6fsDwjoAaeTfBEQrcoV0iuW3QJxkAeygNtn_wHFS8
2024-01-28 01:11:23,060:DEBUG:acme.client:JWS payload:
b''
2024-01-28 01:11:23,065:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1l3UjZmc0R3am9BYWVUZkJFUXJjb1YwaXVXM1FKeGtBZXlnTnRuX3dIRlM4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0Njc1NDYifQ",
  "signature": "hQzQn2fF2JpTOsss8oAY2INW38Nju5tJ3UIHkSd2VK-NTgSw2ddC59X2Fy6d8fVOUTU6c67hzy_83XQ_0fytPvG5ECECqC2VDmDxw4HknaLEOOSTEddI3w4kMCZiHSuD-xZXP6Q6DKdDxhBjJiWY5G1V89m55JXYU5A7X3vPEE-KYGTKnYPcUWN1WCCAEknyiPNnoFQrY76wGZA1_dBkR8QABldvMKryueVenuO0-muo2mlv6E-pCb7s0FggM-M_wqkD7UXyvIdb2_Pk5Eym3USZTM_Sh04PxRLXK6dK4fT6H72AgcsDuowMen3s3NAOL4B1hDISac3Y8oBcBhjAjw",
  "payload": ""
}
2024-01-28 01:11:23,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186467546 HTTP/1.1" 200 811
2024-01-28 01:11:23,226:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:22 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: VKfU247Y2mWatU65tBahGOF1zMRXGAlkuoKCT79J9ufuI4siPVA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:34Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/n-ZWjw",
      "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/NYrS2A",
      "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/g51OFg",
      "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU"
    }
  ]
}
2024-01-28 01:11:23,226:DEBUG:acme.client:Storing nonce: VKfU247Y2mWatU65tBahGOF1zMRXGAlkuoKCT79J9ufuI4siPVA
2024-01-28 01:11:23,227:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-28 01:11:23,227:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-01-28 01:11:23,228:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-28 01:11:23,228:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-28 01:11:23,229:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:11:23,229:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-28 01:11:23,229:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-28 01:11:23,230:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-28 01:11:23,230:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:11:23,269:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-28 01:11:23,968:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-28 01:11:23,969:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-28 01:11:23,970:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-28 01:11:23,974:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC.
2024-01-28 01:11:23,974:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-28 01:11:23,974:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-28 01:11:23,979:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x00F500D0>
Prep: True
2024-01-28 01:11:23,979:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x00F500D0> and installer None
2024-01-28 01:11:23,979:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-28 01:11:23,983:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-28 01:11:23,984:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-28 01:11:23,986:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-28 01:11:24,522:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-28 01:11:24,523:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:23 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "oGWupJSaMng": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-28 01:11:24,523:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-28 01:11:28,905:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7176_key-certbot.pem
2024-01-28 01:11:32,540:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7174_csr-certbot.pem
2024-01-28 01:11:32,540:DEBUG:acme.client:Requesting fresh nonce
2024-01-28 01:11:32,540:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-28 01:11:32,720:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-28 01:11:32,720:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:32 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFohjPoyF6Ig5JZF54XGpkg-QjjwBm42sKFpmP96jZKbo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-28 01:11:32,721:DEBUG:acme.client:Storing nonce: fBfjtdZFohjPoyF6Ig5JZF54XGpkg-QjjwBm42sKFpmP96jZKbo
2024-01-28 01:11:32,724:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-28 01:11:32,730:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZvaGpQb3lGNklnNUpaRjU0WEdwa2ctUWpqd0JtNDJzS0ZwbVA5NmpaS2JvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "qCDbgR6knEdgzMZoiZV_XEAyzSmAiTavYWMMK-0TLtWbU3oCHrz-b2SJ0paG44elMzxVTOZLsK1oPO8omEjZKicAeiQWcheTjPSorB9Fx1LZpMD5rU4HiYBaInMtZQJN9xiNIxIEPuRrAJWg6vDeduRJJnbpmEAqtUWqVVmZTQAtVlziXlBeJUnXbQ1ujPyLaRV50RETVQaEb7QvX1gqd7gHQXWlbB-9Z6fHXYxN-fKsJJW5iwlSijUICa7DUMKFxXU2VXJyr-f9cumlXWe0k-DSRoAjsjekI--OGnt1-BuoPsJIeGmvIRNSUt1Tz8PY8B6VSfymq_-_66dhVQv5Ew",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-01-28 01:11:32,925:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-01-28 01:11:32,926:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 28 Jan 2024 00:11:32 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463315236
Replay-Nonce: Wkq6jgLCz5BUj43ONAUcM_cfbd9Hw8peXC5V-Xu3GwIH60flv6M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:43Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463315236"
}
2024-01-28 01:11:32,926:DEBUG:acme.client:Storing nonce: Wkq6jgLCz5BUj43ONAUcM_cfbd9Hw8peXC5V-Xu3GwIH60flv6M
2024-01-28 01:11:32,926:DEBUG:acme.client:JWS payload:
b''
2024-01-28 01:11:32,932:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEN6NUJVajQzT05BVWNNX2NmYmQ5SHc4cGVYQzVWLVh1M0d3SUg2MGZsdjZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MDAzMzYifQ",
  "signature": "uknB1icah1GlhWB54bTErF67YVh0CfuAuEfDl_HzhJ75RH8SATdm3LhXlp89Hz_Y4vI135V4lmHiYjlcJunRYR7urpDcbmL4JCY1o6A6_dwhRBJBiNCirivTKeyLJImy2zFbJuKJIupzzHjiKnJoDAyGgmdOrxwy2CHgLBmIQMV6363EnPRyRf4DwDg08mZ6EZPvbaLCxQh2AVDWcmTSQvEeeTtCLEmxJfg96gDdfy_vfb-Y0hPB12thXVNv2kpcGGlnUuAj864puFjJP1JeoXwq7TG-WmYM5oQnl22ADeLikb1ULe8BDqpZzC2EPKvqeRAiRgFapUbi_oKlam1HeA",
  "payload": ""
}
2024-01-28 01:11:33,115:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186500336 HTTP/1.1" 200 810
2024-01-28 01:11:33,115:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:32 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCZ6-aI572cb8M3YuQxhmDW_qGaoi2vI7TL11BvCO8IKE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:43Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/MLFeSA",
      "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/NegWfw",
      "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/0vtuKQ",
      "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0"
    }
  ]
}
2024-01-28 01:11:33,116:DEBUG:acme.client:Storing nonce: Wkq6jgLCZ6-aI572cb8M3YuQxhmDW_qGaoi2vI7TL11BvCO8IKE
2024-01-28 01:11:33,116:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-28 01:11:33,117:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-01-28 01:11:33,117:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-28 01:11:33,117:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-28 01:11:33,118:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:11:33,119:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-28 01:11:33,119:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-28 01:11:33,119:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-28 01:11:33,120:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:11:33,161:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-28 01:11:33,416:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-28 01:11:33,417:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2024-01-28 01:11:33,418:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2024-01-28 01:11:33,422:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC.
2024-01-28 01:11:33,422:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-28 01:11:33,423:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-28 01:11:33,426:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04F9B8D0>
Prep: True
2024-01-28 01:11:33,427:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04F9B8D0> and installer None
2024-01-28 01:11:33,427:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-28 01:11:33,431:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-28 01:11:33,432:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-28 01:11:33,434:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-28 01:11:33,977:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-28 01:11:33,977:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:33 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "cKI0T7rrOMk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-28 01:11:33,978:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-28 01:11:37,770:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7177_key-certbot.pem
2024-01-28 01:11:41,417:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7175_csr-certbot.pem
2024-01-28 01:11:41,417:DEBUG:acme.client:Requesting fresh nonce
2024-01-28 01:11:41,417:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-28 01:11:41,599:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-28 01:11:41,599:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:41 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFCq1OgoEPA2TZOLrv1GfVMICAKt4o5SX9G1ngc25Vw0o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-28 01:11:41,600:DEBUG:acme.client:Storing nonce: fBfjtdZFCq1OgoEPA2TZOLrv1GfVMICAKt4o5SX9G1ngc25Vw0o
2024-01-28 01:11:41,600:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-28 01:11:41,606:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZDcTFPZ29FUEEyVFpPTHJ2MUdmVk1JQ0FLdDRvNVNYOUcxbmdjMjVWdzBvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "n9greDwm0YvHwvXZ8UZMNv4PgmM4XYNHXR2BTkW7FVhBbbRVVGzTeTEw9Nf_NCIhgG4C45e7pOKdOpkMC7V-EvQOgDt2jEwlOsQEIxCo35ZuhNc6L5n6gEnGNbUD2j2z7GIzs7wqv7PANAbPUDUZvMDo0YxUU4pkHkcT3mOYYVnh0FB11OEPkz2KVcy4B9JdhIrUguKXRN3Wpu_mRVKKPbs7YRe_2_eXxnq3eBzZRZiefe2Dvfn3YFc_J-ykph9YSd5VCWab-SQ7xgooKMmhps5V4f_QGprLpGIk_hUOUpDCkZnah9rDsq5ToezjuGRlEHlym0Z_8OilpDMOF-Bsfw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-01-28 01:11:41,800:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-01-28 01:11:41,801:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 28 Jan 2024 00:11:41 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463336576
Replay-Nonce: Wkq6jgLCshAiWeX0avGQBTUgiEWgYCJ_DFjI0ZezBpVJYj0lb-4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:46:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463336576"
}
2024-01-28 01:11:41,801:DEBUG:acme.client:Storing nonce: Wkq6jgLCshAiWeX0avGQBTUgiEWgYCJ_DFjI0ZezBpVJYj0lb-4
2024-01-28 01:11:41,801:DEBUG:acme.client:JWS payload:
b''
2024-01-28 01:11:41,807:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENzaEFpV2VYMGF2R1FCVFVnaUVXZ1lDSl9ERmpJMFplekJwVkpZajBsYi00IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MzA0NTYifQ",
  "signature": "SwiS7DzfB13a80N_pov16ErD0NRQWj8pT2keKmGdCbuzmqYN1oPOs3IJBC-iJoOo16gRXOreacRjobe_VKbfidEGD5-dSF9LsA5J1vKiW55xb4f3HReSKDQ1oInVy-yGA5-YBW_63Cp2d-UClUIdMyUTkzJUDJa1WF6xZHLxrlqrNqtqWINwCmHdRhx823Pl3rPF9vbQc79PgUvN66mZG6sSrcTWmj1q4Qslr764LKoL5Ucxm4Y0qRzYZ5cMx_oZbIwcliVldempaJmT8zYUIJQrCb-vhKrZfig4-DFkoHcD9nI_-fI085kCuUR4mb_VEmDhSzrue8OiI3JcbqO3lA",
  "payload": ""
}
2024-01-28 01:11:41,995:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186530456 HTTP/1.1" 200 809
2024-01-28 01:11:41,995:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:41 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: fBfjtdZFQdi5nRgNuu6_pggObBLEgKEkBpgzjMxZl1qm95_Q85M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:46:52Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/ibbbOA",
      "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/W42erg",
      "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/xDGKCQ",
      "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI"
    }
  ]
}
2024-01-28 01:11:41,996:DEBUG:acme.client:Storing nonce: fBfjtdZFQdi5nRgNuu6_pggObBLEgKEkBpgzjMxZl1qm95_Q85M
2024-01-28 01:11:41,996:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-28 01:11:41,996:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-01-28 01:11:41,997:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-28 01:11:41,997:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-28 01:11:41,998:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:11:41,998:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-28 01:11:41,998:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-28 01:11:41,998:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-28 01:11:41,999:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:11:42,042:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-28 01:11:42,299:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-28 01:11:42,300:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer.
2024-01-28 01:11:42,301:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD
2024-01-28 01:11:42,305:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC.
2024-01-28 01:11:42,305:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-28 01:11:42,306:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-28 01:11:42,310:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04B69790>
Prep: True
2024-01-28 01:11:42,310:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04B69790> and installer None
2024-01-28 01:11:42,311:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-28 01:11:42,315:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-28 01:11:42,316:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-28 01:11:42,318:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-28 01:11:42,837:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-28 01:11:42,837:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:42 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "TP-Bsb1J7Uw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-28 01:11:42,838:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-28 01:11:46,776:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7178_key-certbot.pem
2024-01-28 01:11:50,547:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7176_csr-certbot.pem
2024-01-28 01:11:50,547:DEBUG:acme.client:Requesting fresh nonce
2024-01-28 01:11:50,547:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-28 01:11:50,720:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-28 01:11:50,721:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:50 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLC8Klzuzc_zyjWXFhQ_72bcK-jel4ueTWN2KzBdDcfE7E
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-28 01:11:50,721:DEBUG:acme.client:Storing nonce: Wkq6jgLC8Klzuzc_zyjWXFhQ_72bcK-jel4ueTWN2KzBdDcfE7E
2024-01-28 01:11:50,721:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-28 01:11:50,727:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEM4S2x6dXpjX3p5aldYRmhRXzcyYmNLLWplbDR1ZVRXTjJLekJkRGNmRTdFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Q37X739DA87ec3NH0jNS7jCJrrNGPXTalCX6FBYOEWL-Zv-1GKugkDqonCXPbPfONEUFbJroesP60BQL_3Se8p6luxwJ7qwSCW13Y_JsjFabKLeQ7hTlWLtf-bdabTXxB9w3DDJVGXQsT-M-vbIg8lrC5kJfHeO4FfEIKFufb6ZvsmcEliOZh3xwjUxaVIY_UrSowDKOoghPlDXiJeGcWGBMpoNmQPN9JwXtTDm9TdXAARYgaelZtpX1SAVIm3-axo_C_TTaR3aMKRrEFkzPEMaoBNRRJQZAIpbeWyhWMmXK-Ey34FyWCpyAVDKB0va9_foslEFy3zkA8Avdeu7fUQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-28 01:11:50,931:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-01-28 01:11:50,931:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 28 Jan 2024 00:11:50 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463357966
Replay-Nonce: fBfjtdZFjuMic3dU6xPGa91TXDYuM4F059gpesYOxDL4YHBpgDs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:47:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463357966"
}
2024-01-28 01:11:50,931:DEBUG:acme.client:Storing nonce: fBfjtdZFjuMic3dU6xPGa91TXDYuM4F059gpesYOxDL4YHBpgDs
2024-01-28 01:11:50,932:DEBUG:acme.client:JWS payload:
b''
2024-01-28 01:11:50,937:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZqdU1pYzNkVTZ4UEdhOTFUWERZdU00RjA1OWdwZXNZT3hETDRZSEJwZ0RzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1NjIyMzYifQ",
  "signature": "Z2KW4wrkcXVoJHc_PM49Ygh7gHcCsIOiAm4hIRD6WgUhhb4d3_YOCofIQm1XmcUQK70aZDlIJZ3_f2oyKhQrGwZ4gRpkw5m3fMrUc9vx5gGX03Npb-pL0BKBw-Cx-xB7CTwIIxbkmlRwT9GXyjh1-8JKELTZq08ulPZmfMhrOh1101YPosYAZ-x0Nw6y44Tb-wBkFyyGKElrc36ZA1Vu2cbNecbMt6ca7dSRfEy3diALaQWVJXPByl4VQ2rSB-agIDL8_CP_INkCgxeZoxgJeAKzvBaUwQZ6KaWJgITU-rNPT2FczMDVy_KiqdGUyH0s5bxOqpigKn1w-L6rc_Oq8A",
  "payload": ""
}
2024-01-28 01:11:51,116:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186562236 HTTP/1.1" 200 805
2024-01-28 01:11:51,117:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:50 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Wkq6jgLCUx4E85ZzAUmsBWq1JRCyQy6NbsPNmrH0vd3mPKTiako
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:47:01Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/d2C2Aw",
      "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/yk_m2Q",
      "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/2CxhFQ",
      "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE"
    }
  ]
}
2024-01-28 01:11:51,117:DEBUG:acme.client:Storing nonce: Wkq6jgLCUx4E85ZzAUmsBWq1JRCyQy6NbsPNmrH0vd3mPKTiako
2024-01-28 01:11:51,117:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-28 01:11:51,118:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-01-28 01:11:51,118:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-28 01:11:51,119:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-28 01:11:51,119:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:11:51,119:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-28 01:11:51,119:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-28 01:11:51,120:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-28 01:11:51,121:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:11:51,160:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-28 01:11:51,413:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-28 01:11:51,414:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-01-28 01:11:51,415:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-01-28 01:11:51,419:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC.
2024-01-28 01:11:51,420:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-28 01:11:51,420:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-28 01:11:51,426:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04F9BF90>
Prep: True
2024-01-28 01:11:51,426:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04F9BF90> and installer None
2024-01-28 01:11:51,426:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-28 01:11:51,430:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-28 01:11:51,431:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-28 01:11:51,433:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-28 01:11:51,882:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-28 01:11:51,883:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:51 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "juSR51D9bVg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-28 01:11:51,883:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-28 01:11:55,802:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7179_key-certbot.pem
2024-01-28 01:11:59,609:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7177_csr-certbot.pem
2024-01-28 01:11:59,609:DEBUG:acme.client:Requesting fresh nonce
2024-01-28 01:11:59,609:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-28 01:11:59,766:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-28 01:11:59,767:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:59 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5uqtGx3oe6_MQNBV49WZi2Biy_QhF2qBMQu-MldTIGCk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-28 01:11:59,767:DEBUG:acme.client:Storing nonce: R3i4Vkc5uqtGx3oe6_MQNBV49WZi2Biy_QhF2qBMQu-MldTIGCk
2024-01-28 01:11:59,767:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-28 01:11:59,774:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzV1cXRHeDNvZTZfTVFOQlY0OVdaaTJCaXlfUWhGMnFCTVF1LU1sZFRJR0NrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "SCOZhfJn7zfGS5pimpBovDxGxoYfnuAD49J5G0lfN7HJa7p4Wt79tCSL_Dm1M1RpbZ4EVq1ouLyVGvbxY51q58GkQpwHxU3GEP_uwOc_7P4aJPkwYCRGn9zjwC_NNyOHMOy-0SekI_op-AmPVTpa7zKmYde4f7cGwSCSeUqHhuzXH5jsPGv8100Q8UJfcPiw5zUT1qDpnr11QcvE6aH7npy3sHe72aUkXGAUbiIvH8qwvOYqWEbM7RpCYpXMoaLvv7ODmWDI-cASDOeBbiouHco6v7q_Wy6vgxQo5QXZqFeMDvgWfPbRhiVu9i26U33IOpiHoXMr7eGcty17UFDHKg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-28 01:11:59,951:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-01-28 01:11:59,952:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 28 Jan 2024 00:11:59 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463390816
Replay-Nonce: VKfU247YxsCivqM4kh9cklg0840Ng8wyRBuURYpmzp30OsPOFhI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:47:11Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463390816"
}
2024-01-28 01:11:59,952:DEBUG:acme.client:Storing nonce: VKfU247YxsCivqM4kh9cklg0840Ng8wyRBuURYpmzp30OsPOFhI
2024-01-28 01:11:59,953:DEBUG:acme.client:JWS payload:
b''
2024-01-28 01:11:59,957:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1l4c0NpdnFNNGtoOWNrbGcwODQwTmc4d3lSQnVVUllwbXpwMzBPc1BPRmhJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2MDk2MDYifQ",
  "signature": "YPxCIasdelyvNG61PFspeIWp_A19pN-ZOCL1wx0miiumHq67Wf660msz46y99RO4UsF26BTN_McydfjPKfpOgaC4SebVePjTtutsGtu8j79dTeNV4W3nv8LaTV3laJ1jrXyXMxtJMGu4IoZabcXWO53UQNZqIR-J1AQhgNLYCUpP8aG80slvGPSTq5_R8GiyZFUZ6RNCTgFJOtawbnPVg7fAAJNktLfGP7vaAV0ni6xSOmVG4ErSZhsJD-XoGG1HQgHK07ftYJD2zZZ3J9D0_gVwur9rWKNUVLHuxGxZktaa10HSTUEMIUGfgI-lV30c061XsfbVba5KXD_66BtB6A",
  "payload": ""
}
2024-01-28 01:12:00,114:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186609606 HTTP/1.1" 200 805
2024-01-28 01:12:00,114:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:11:59 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5UPsGOoO74nOIovu0qTfTkN2Bli2FgTGyS8t2WtL9FsU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:47:11Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/u86J_A",
      "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/GMvoKw",
      "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/skcDcA",
      "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA"
    }
  ]
}
2024-01-28 01:12:00,115:DEBUG:acme.client:Storing nonce: R3i4Vkc5UPsGOoO74nOIovu0qTfTkN2Bli2FgTGyS8t2WtL9FsU
2024-01-28 01:12:00,115:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-28 01:12:00,116:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-01-28 01:12:00,116:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-28 01:12:00,116:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-28 01:12:00,117:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:12:00,117:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-28 01:12:00,117:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-28 01:12:00,118:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-28 01:12:00,119:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:12:00,160:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-01-28 01:12:00,384:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-01-28 01:12:00,385:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-01-28 01:12:00,385:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-01-28 01:12:00,389:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC.
2024-01-28 01:12:00,390:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-01-28 01:12:00,390:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-01-28 01:12:00,394:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04B69F70>
Prep: True
2024-01-28 01:12:00,395:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04B69F70> and installer None
2024-01-28 01:12:00,395:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-01-28 01:12:00,399:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-01-28 01:12:00,400:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-01-28 01:12:00,402:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-01-28 01:12:00,848:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-01-28 01:12:00,849:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:12:00 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "05WGcF4HXJ4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-01-28 01:12:00,849:INFO:certbot._internal.main:Renewing an existing certificate
2024-01-28 01:12:04,912:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7180_key-certbot.pem
2024-01-28 01:12:08,846:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7178_csr-certbot.pem
2024-01-28 01:12:08,847:DEBUG:acme.client:Requesting fresh nonce
2024-01-28 01:12:08,847:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-01-28 01:12:09,006:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-01-28 01:12:09,006:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:12:08 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5fggcD2-z5snuf2mWxm4U7J9P8KsURGxZWqYUHL8Jtwo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-01-28 01:12:09,007:DEBUG:acme.client:Storing nonce: R3i4Vkc5fggcD2-z5snuf2mWxm4U7J9P8KsURGxZWqYUHL8Jtwo
2024-01-28 01:12:09,007:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-01-28 01:12:09,013:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVmZ2djRDItejVzbnVmMm1XeG00VTdKOVA4S3NVUkd4WldxWVVITDhKdHdvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "acPmh8g_Hqbpx8zEu3G0i6Ufzd8Y8g-Ima3nZ4N3WODfoJuLzFwe17tAbK0pALgnTnRdm91G2d-AgEe5Jx4LJ9MEaPTC-9rgE6WSY_gmVtLZTsjSgNG7GZlJxJqTUc5fGBfY9aUOxKi7ymUqffbjlFQNclyb98fvSSJVnEfB4CcHvPGJzbzEKb1tO8jPaMa1u1TK_zjMFOqGkX1StliFHCl0BOHwGWD7WMGj_MnZvbT5kPVTCVJfhKUMxpkajmVjnj2Ep-RINcAYFmwFsRk1S5cuQsgOPL7KGgsGMI7zDMhcX5e6tqY-GFNNO9D6DNajbOMVM1ntjszF8gL8H6iZdw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-01-28 01:12:09,207:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-01-28 01:12:09,207:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 28 Jan 2024 00:12:08 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463415626
Replay-Nonce: R3i4Vkc5eHny2QeSC3AGf0dYfFXnz8HuwC8h2IE1amW5KrDWk_Q
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-02T02:47:20Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463415626"
}
2024-01-28 01:12:09,208:DEBUG:acme.client:Storing nonce: R3i4Vkc5eHny2QeSC3AGf0dYfFXnz8HuwC8h2IE1amW5KrDWk_Q
2024-01-28 01:12:09,208:DEBUG:acme.client:JWS payload:
b''
2024-01-28 01:12:09,213:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVlSG55MlFlU0MzQUdmMGRZZkZYbno4SHV3QzhoMklFMWFtVzVLckRXa19RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2NDgzODYifQ",
  "signature": "dLWy4Olr6UqUUypcM5eBO1QZDaxO70csM0IYZvlbO3im3W9ta0Z29nGbQ2yymT1hEzihRszTMY02IzfgzLm9KYYjNAqGlNnWw0GqJ7sGmGBS9T4PRoc7wnE6UJYG_VStfI-tIhkuDVsQWB3cNmFXnUa6CY6ZXELiaozGGIScZa1LSbxHLJKh4WA7erxfWvhGO3TyKEezBuoq-F72zg8IbwaIFqfevNkjMARKgcmf7a7vKqzEMN5hl63Q8njr_rGvOyybq86Y2bKMsM0B00aa_yMk6nwiJ4fz5UeyfCQDehl8hUlkS__UYFCiSYK-fraHyQhlx2dFu20_xuZHchZNLA",
  "payload": ""
}
2024-01-28 01:12:09,381:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186648386 HTTP/1.1" 200 805
2024-01-28 01:12:09,382:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 28 Jan 2024 00:12:08 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: R3i4Vkc5Rqqj746lA-KnW7cIAOeFvnKTN-iWIIY-CNPA7RbpGYI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-02T02:47:20Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/AfqDTw",
      "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/2qup_g",
      "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/cLgsJg",
      "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE"
    }
  ]
}
2024-01-28 01:12:09,382:DEBUG:acme.client:Storing nonce: R3i4Vkc5Rqqj746lA-KnW7cIAOeFvnKTN-iWIIY-CNPA7RbpGYI
2024-01-28 01:12:09,383:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-01-28 01:12:09,383:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-01-28 01:12:09,384:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-01-28 01:12:09,384:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-01-28 01:12:09,385:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:12:09,385:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-01-28 01:12:09,385:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-01-28 01:12:09,385:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-01-28 01:12:09,386:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-01-28 01:12:09,387:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-01-28 01:12:09,387:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-01-28 01:12:09,388:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-01-28 01:12:09,390:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)