2024-02-03 14:53:08,110:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-02-03 14:53:08,111:DEBUG:certbot._internal.main:Arguments: []
2024-02-03 14:53:08,111:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-02-03 14:53:08,940:DEBUG:certbot._internal.log:Root logging level set at 20
2024-02-03 14:53:08,941:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-02-03 14:53:08,977:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04E52330> and installer <certbot._internal.cli.cli_utils._Default object at 0x04E52330>
2024-02-03 14:53:09,029:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-03 14:53:09,251:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-03 14:53:09,253:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer.
2024-02-03 14:53:09,257:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD
2024-02-03 14:53:09,264:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC.
2024-02-03 14:53:09,264:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-03 14:53:09,265:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-03 14:53:09,268:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048A44B0>
Prep: True
2024-02-03 14:53:09,269:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048A44B0> and installer None
2024-02-03 14:53:09,269:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-03 14:53:09,275:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-03 14:53:09,276:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-03 14:53:09,278:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-03 14:53:09,796:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-03 14:53:09,797:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:05 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "o9r6sCvx4w0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-03 14:53:09,798:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-03 14:53:14,194:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7337_key-certbot.pem
2024-02-03 14:53:18,306:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7335_csr-certbot.pem
2024-02-03 14:53:18,306:DEBUG:acme.client:Requesting fresh nonce
2024-02-03 14:53:18,306:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-03 14:53:18,461:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-03 14:53:18,462:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:14 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqiPB148RPLGbfzVQgdT3BtpFdxJ2wTGskwCxHep8Bwbg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-03 14:53:18,462:DEBUG:acme.client:Storing nonce: 5IXlosaqiPB148RPLGbfzVQgdT3BtpFdxJ2wTGskwCxHep8Bwbg
2024-02-03 14:53:18,462:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-03 14:53:18,468:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFpUEIxNDhSUExHYmZ6VlFnZFQzQnRwRmR4SjJ3VEdza3dDeEhlcDhCd2JnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ZDkqT23fdE47lSOqIBY9wW-I4jL0R-9XfLZ2x8P2sHU9R3-TtVDVN0ZH99opVExiD1oaUfs4P8g8j9do8b2cYvBGKtw4zeefS1wCxFAKwU1Vf6TAZGEVhOPLz-gWJszLvZdYKSN0hI5Za_b1aB3dqis9j_GCwsZvYH5icTZQWJi15eu-BHLVdSNyv6S5t9ShtrbVuemHOIQiIA5fManrp3z0xGI_DB4_KhiimRS0f_OYhNwiTOGO34gZtWih4hgRGf253GPwDfOWWxzthOWVtz9MXVxhS6qX_802nGiWeoWV1aNpON79KtdRZUVRJvSl72ySpc9MQ0Yr2rGHtACpjg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-03 14:53:18,632:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-02-03 14:53:18,633:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 03 Feb 2024 13:53:14 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308706407
Replay-Nonce: 3l89SrA7uSaEYiEiziPF30WXbzVN9S16mRl8Ukl4Xj0OXrKA5fI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:24Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308706407"
}
2024-02-03 14:53:18,633:DEBUG:acme.client:Storing nonce: 3l89SrA7uSaEYiEiziPF30WXbzVN9S16mRl8Ukl4Xj0OXrKA5fI
2024-02-03 14:53:18,633:DEBUG:acme.client:JWS payload:
b''
2024-02-03 14:53:18,638:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTd1U2FFWWlFaXppUEYzMFdYYnpWTjlTMTZtUmw4VWtsNFhqME9YcktBNWZJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxNTI0OTcifQ",
  "signature": "wzEzn7LD7WDWKp8MYIH53MdEc00H9Lke2woqDc5zxCO-p0RWM8IfluEA8-tnSRkA42N-KY9lRAvbevarb2rRHq5k1zcfaBGEFkQrK5zFJGTrB9X4QmU9HKG3Fa3eCa-TE4s4PdcmnPW6gUf1Vlk3VRpPjeaxJ647nX1pO1xsYUWKlVbfybaUUvyK3dtCYR-I9YTY_GL-2Iz9NOxWhquqp0QiHQBg8lWXntgo9roJPzviqOOesywrJIV_7LNQ98ax3CJiUM3ZQIBLd0ocyYByaz4RRHXXZZxCXxdDoPV8IzF3l7DOJQ5Mv9k-ORO-5zcP8N2fbh_4LYnSfH0i85cniw",
  "payload": ""
}
2024-02-03 14:53:18,798:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820152497 HTTP/1.1" 200 810
2024-02-03 14:53:18,798:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:14 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7lRo29zzq_u7VtjPXXE9ItvSf071g5vNyIJlwl9SrDpY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:24Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/GeKDkA",
      "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/sBY_pA",
      "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/dU31hg",
      "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI"
    }
  ]
}
2024-02-03 14:53:18,798:DEBUG:acme.client:Storing nonce: 3l89SrA7lRo29zzq_u7VtjPXXE9ItvSf071g5vNyIJlwl9SrDpY
2024-02-03 14:53:18,798:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-03 14:53:18,798:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-02-03 14:53:18,799:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-03 14:53:18,799:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-03 14:53:18,812:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:53:18,813:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-03 14:53:18,813:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-03 14:53:18,813:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-03 14:53:18,818:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:53:18,854:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-03 14:53:19,067:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-03 14:53:19,068:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-03 14:53:19,069:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-03 14:53:19,073:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC.
2024-02-03 14:53:19,073:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-03 14:53:19,074:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-03 14:53:19,085:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E52BF0>
Prep: True
2024-02-03 14:53:19,086:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E52BF0> and installer None
2024-02-03 14:53:19,086:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-03 14:53:19,090:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-03 14:53:19,091:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-03 14:53:19,093:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-03 14:53:19,633:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-03 14:53:19,634:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:15 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "HJ40J-SBuCQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-03 14:53:19,634:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-03 14:53:23,859:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7338_key-certbot.pem
2024-02-03 14:53:27,409:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7336_csr-certbot.pem
2024-02-03 14:53:27,409:DEBUG:acme.client:Requesting fresh nonce
2024-02-03 14:53:27,409:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-03 14:53:27,590:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-03 14:53:27,591:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:23 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUEflNFf6wenuKC6hmYi3F-B4zY4tVcKzSkl91YoQVDTk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-03 14:53:27,591:DEBUG:acme.client:Storing nonce: kRyagOpUEflNFf6wenuKC6hmYi3F-B4zY4tVcKzSkl91YoQVDTk
2024-02-03 14:53:27,591:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-03 14:53:27,596:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVFZmxORmY2d2VudUtDNmhtWWkzRi1CNHpZNHRWY0t6U2tsOTFZb1FWRFRrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "OMF4PgwCbJaJFhQl1nlYzgyaHY_Abz5c6Lrs_HZxquchTqlsVF9YZqnoxU5BO_Pfb-aatvbGYdggPWBuwzMZhJvTxvN194oq-czb7W236erXyztZGIPzuJVeRuk2-NlqiywUGthDejxwOkvj70rG6aZTUOCStQPcrMjcc-okG4IqcvGy1UqviMNDI1LVk0cfZNJF5ItEIysHR6cTP4s4qWx2F50UtOgjz9ljjJNMrvr-hJZP12c2ticpQrC1eUCCbFVQd9R4fRdm08DdsUbcgWjnUuJicvYZc-hfoIGMt7rvQt9fwd_zb76xknC_onKAGFKLdLrxmuPnwOh3gImeXA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-03 14:53:27,790:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-02-03 14:53:27,791:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 03 Feb 2024 13:53:23 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308730387
Replay-Nonce: kRyagOpUjxWvQteWdi_Vbcuk8-Ka-SQMseVZZp6OPuq16mthFTM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:33Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308730387"
}
2024-02-03 14:53:27,791:DEBUG:acme.client:Storing nonce: kRyagOpUjxWvQteWdi_Vbcuk8-Ka-SQMseVZZp6OPuq16mthFTM
2024-02-03 14:53:27,791:DEBUG:acme.client:JWS payload:
b''
2024-02-03 14:53:27,796:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVqeFd2UXRlV2RpX1ZiY3VrOC1LYS1TUU1zZVZaWnA2T1B1cTE2bXRoRlRNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxODg4NjcifQ",
  "signature": "egp_wCnCy1JuysB9-7ERNRwu0_aD4Wubbe62wLYJAsx7qCbTv-TiINTRdmfB4JhlYlp9PDiIKqORnG4lYOO_S5lb9iEqJBRBOrFouFE6gkgWydwRr8_PirO_14aI9b8YOJG-NmHe2_7l3ShhcJEWOnoEBm8F3UVhkTBPSxJyJqK5rRk-_iQReyS82qImtV_b19zSEcN7VCyybanPhAZOm4dUuMXgKTNPUqRCSiaXaLGWO8n7Zj3NKrdMA9fZaQPdXIqIQWYpXUNs4tKcL0c9OOTHHvtzaRDWeUVXP6RsyZCR2rIo8A5O5zcRM8uElAX0ReuD2kVM4Gi-N_qgZ9edRw",
  "payload": ""
}
2024-02-03 14:53:27,982:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820188867 HTTP/1.1" 200 804
2024-02-03 14:53:27,982:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:23 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUWPYBcDy67xkge3ssIMEex9hE-e-Ap0wQNsyIcGyLWJE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:33Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/Yq7npQ",
      "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/OkyE8g",
      "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/IRVMDw",
      "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU"
    }
  ]
}
2024-02-03 14:53:27,983:DEBUG:acme.client:Storing nonce: kRyagOpUWPYBcDy67xkge3ssIMEex9hE-e-Ap0wQNsyIcGyLWJE
2024-02-03 14:53:27,983:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-03 14:53:27,983:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-02-03 14:53:27,984:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-03 14:53:27,984:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-03 14:53:27,985:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:53:27,985:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-03 14:53:27,985:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-03 14:53:27,985:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-03 14:53:27,986:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:53:28,025:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-03 14:53:28,218:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-03 14:53:28,219:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-03 14:53:28,220:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-03 14:53:28,224:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC.
2024-02-03 14:53:28,224:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-03 14:53:28,225:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-03 14:53:28,229:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E52230>
Prep: True
2024-02-03 14:53:28,229:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E52230> and installer None
2024-02-03 14:53:28,229:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-03 14:53:28,237:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-03 14:53:28,237:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-03 14:53:28,239:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-03 14:53:28,688:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-03 14:53:28,689:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:24 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "_lsWbgdJqyA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-03 14:53:28,689:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-03 14:53:32,558:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7339_key-certbot.pem
2024-02-03 14:53:36,112:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7337_csr-certbot.pem
2024-02-03 14:53:36,112:DEBUG:acme.client:Requesting fresh nonce
2024-02-03 14:53:36,112:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-03 14:53:36,262:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-03 14:53:36,263:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:31 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA75ZxB8xudH841XczPokMJsX-_VLHNuv0HgNyQvzw5YtE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-03 14:53:36,263:DEBUG:acme.client:Storing nonce: 3l89SrA75ZxB8xudH841XczPokMJsX-_VLHNuv0HgNyQvzw5YtE
2024-02-03 14:53:36,263:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-03 14:53:36,269:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTc1WnhCOHh1ZEg4NDFYY3pQb2tNSnNYLV9WTEhOdXYwSGdOeVF2enc1WXRFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "IVg2GVQYkUA3J4SWzyzMTQMz6RRYT8p1doMzIIbeZCLpatqXCVC1c92VxvG2Vi0YXonQOto48-vKX1W85ivQN_1pePcFl0a8v0cuNmPh4mmiW_Jr3HUuHyIbrla3smHHhRNqkNFAUza9t1LsyABQ5Tp8iMcfSU6O5reMTzHhQpc-szAj__7odzQthrleYyG42kXK7lqZdoijWe-tlgsrp6n5KReaNcqgvs8cIsJEogwhYxbZLdweVcX7JJ5XwCTIIbCnhgwbq5MLOCIj_vt3Yzzf7iHLu1MR_2S_xnwsiJcPc71KjrcugoYkpZ5z3uiMSnhQkOhaZ6QSWbvMbYVQbg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-03 14:53:36,509:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-02-03 14:53:36,510:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 03 Feb 2024 13:53:32 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308754257
Replay-Nonce: 3l89SrA79s54wJebi5SiucNq4y75SLoFx8u-AxGAkOeJtpIbbpA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:42Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308754257"
}
2024-02-03 14:53:36,510:DEBUG:acme.client:Storing nonce: 3l89SrA79s54wJebi5SiucNq4y75SLoFx8u-AxGAkOeJtpIbbpA
2024-02-03 14:53:36,511:DEBUG:acme.client:JWS payload:
b''
2024-02-03 14:53:36,516:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTc5czU0d0plYmk1U2l1Y05xNHk3NVNMb0Z4OHUtQXhHQWtPZUp0cEliYnBBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyMjA5MDcifQ",
  "signature": "ZcXsbCWby_KywwToAD1tzOp7oj8nivFjFuklk5rMw5ea71OVqpWhUdO6AhzaTHzqY35WBN7QgHoU_MXnWjdZhtrl8l1M7CmSyF0JaUxygXNXDAJPaGpBR6HS0-7DdFo5vZg8ajIpggAz9IaGjKNJm0WxK2J1f_8RtRyqCHMB6b8c3NCSQrXYSjZPYONRZoCILfRecvlsDhT2LxZ_5Ee_Pbma196URTCIdQ6KaFuXB776mPH2FWMSAHjOSWC_2bohqZYgmNZjSh-l8P2eaF3o-eJRiWhizAeKN0rCiQaguEVsbHlh7f3Lmbyd0-F-T2b--wnWo9d1XbNKIRQ7sRnXaw",
  "payload": ""
}
2024-02-03 14:53:36,672:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820220907 HTTP/1.1" 200 807
2024-02-03 14:53:36,673:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:32 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7-5X9ILavAm7OKAscYVokjXJbqnS0jE1d7eiuPJRahew
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:42Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/vlhqAg",
      "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/p9n_vg",
      "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/ul63Zg",
      "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA"
    }
  ]
}
2024-02-03 14:53:36,673:DEBUG:acme.client:Storing nonce: 3l89SrA7-5X9ILavAm7OKAscYVokjXJbqnS0jE1d7eiuPJRahew
2024-02-03 14:53:36,674:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-03 14:53:36,674:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-02-03 14:53:36,674:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-03 14:53:36,675:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-03 14:53:36,676:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:53:36,676:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-03 14:53:36,676:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-03 14:53:36,676:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-03 14:53:36,677:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:53:36,716:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-03 14:53:36,739:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-03 14:53:36,740:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-03 14:53:36,741:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-03 14:53:36,745:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC.
2024-02-03 14:53:36,745:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-03 14:53:36,746:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-03 14:53:36,750:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E521D0>
Prep: True
2024-02-03 14:53:36,750:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E521D0> and installer None
2024-02-03 14:53:36,750:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-03 14:53:36,755:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-03 14:53:36,755:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-03 14:53:36,757:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-03 14:53:37,217:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-03 14:53:37,219:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:32 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "dBm6pH2lDbs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-03 14:53:37,220:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-03 14:53:41,126:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7340_key-certbot.pem
2024-02-03 14:53:44,708:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7338_csr-certbot.pem
2024-02-03 14:53:44,708:DEBUG:acme.client:Requesting fresh nonce
2024-02-03 14:53:44,708:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-03 14:53:44,900:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-03 14:53:44,900:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:40 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7nnqVL4bXdUqEoQG62CTKIDYX0igljrXsLQ8TdhEALDA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-03 14:53:44,900:DEBUG:acme.client:Storing nonce: 3l89SrA7nnqVL4bXdUqEoQG62CTKIDYX0igljrXsLQ8TdhEALDA
2024-02-03 14:53:44,901:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-02-03 14:53:44,906:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdubnFWTDRiWGRVcUVvUUc2MkNUS0lEWVgwaWdsanJYc0xROFRkaEVBTERBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "pb-bRsY4UImhKQqGN4aSAWT8hkDxt3xgrRbr-ptF_2K-grz6-AP193FBIt8SqLGzwE4tzEN_jvr0s57F3ENIMyEVnJ-uCRxLQ3SbY8mmjj_I8hGreR703-pigyXiS_HTHbOwp3IlNkR8J_Y_BDvVlyLOUANSVj-DiC7ZIZMyN1eQMYKcjwE8i0V4SKouGgTWHhB8pLh8-W94icR2eNy2waOFMoavXxObC47EqZCu0V0XAcWjPJDnOSBOKP4XRCUHYIB1rKDbqKtOpG1fjUa3dd4tzTA3ahZzvaIdtcL19SSHbiahU-87VT9Am7QqC6LOT0R7ta0NxPE4Mlgu6fl1kw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-03 14:53:45,143:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-02-03 14:53:45,143:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 03 Feb 2024 13:53:40 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308777647
Replay-Nonce: 3l89SrA7uCt0WGoM1mcTj07_hc98kngNviCsHxHVrc9HhZK2Vko
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:50Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308777647"
}
2024-02-03 14:53:45,143:DEBUG:acme.client:Storing nonce: 3l89SrA7uCt0WGoM1mcTj07_hc98kngNviCsHxHVrc9HhZK2Vko
2024-02-03 14:53:45,144:DEBUG:acme.client:JWS payload:
b''
2024-02-03 14:53:45,149:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTd1Q3QwV0dvTTFtY1RqMDdfaGM5OGtuZ052aUNzSHhIVnJjOUhoWksyVmtvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyNTIxNzcifQ",
  "signature": "xxUPtYRCb5qICx4VO90P3CCpcMlvPKOODzKvxmN4eQPWXhtHU3EbYDWh7DCIo9w1fRDuGHt_wLcBfp14lN_k8MbumJGg_V8mp4UuPEHy0tCkv8-kPCxLh7UukFQh5sDDrhE39H2eTOKrlrZNitnqq-ZhEfBdbt3THg0GNY7OsJ7RAcMa3BOxqrkf7e2IWdcmwxysX3LWHKdnpV_ekVmCslbWX26xZwYuVRzxMp2t1DH5606V-4uELt3OWoQbQ67QqIkhrPGcs1j6gFU-UA5xlKXf-gkBsG6fQwR5CeBLcFyoyV_Bjp4Vjk5OCpKdrD2oo_MKY55XGfHJjZhEacXUIg",
  "payload": ""
}
2024-02-03 14:53:45,367:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820252177 HTTP/1.1" 200 801
2024-02-03 14:53:45,368:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:40 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7rdvFoPiEJd8OVghGpN2F5V5y_gwb_2KP0GrgIP58BVY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:50Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/WXsY4w",
      "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/ZwqjFA",
      "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/HVTsug",
      "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8"
    }
  ]
}
2024-02-03 14:53:45,368:DEBUG:acme.client:Storing nonce: 3l89SrA7rdvFoPiEJd8OVghGpN2F5V5y_gwb_2KP0GrgIP58BVY
2024-02-03 14:53:45,369:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-03 14:53:45,369:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-02-03 14:53:45,369:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-03 14:53:45,369:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-03 14:53:45,370:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:53:45,370:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-03 14:53:45,370:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-03 14:53:45,371:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-03 14:53:45,372:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:53:45,410:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-03 14:53:45,599:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-03 14:53:45,600:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-03 14:53:45,601:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-03 14:53:45,605:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC.
2024-02-03 14:53:45,605:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-03 14:53:45,606:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-03 14:53:45,610:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E52DF0>
Prep: True
2024-02-03 14:53:45,611:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E52DF0> and installer None
2024-02-03 14:53:45,611:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-03 14:53:45,615:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-03 14:53:45,616:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-03 14:53:45,618:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-03 14:53:46,074:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-03 14:53:46,074:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:41 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "U9cL138p6dk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-03 14:53:46,074:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-03 14:53:49,825:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7341_key-certbot.pem
2024-02-03 14:53:53,394:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7339_csr-certbot.pem
2024-02-03 14:53:53,394:DEBUG:acme.client:Requesting fresh nonce
2024-02-03 14:53:53,394:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-03 14:53:53,545:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-03 14:53:53,546:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:49 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7qTD3FtdDLR738UdJ-9jICLBKif8A7hzGtdMXmzel3-o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-03 14:53:53,546:DEBUG:acme.client:Storing nonce: 3l89SrA7qTD3FtdDLR738UdJ-9jICLBKif8A7hzGtdMXmzel3-o
2024-02-03 14:53:53,546:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-03 14:53:53,552:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdxVEQzRnRkRExSNzM4VWRKLTlqSUNMQktpZjhBN2h6R3RkTVhtemVsMy1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "HLOLLVyIyv6y_WfbEq0osPUw9RC3k0I3FB2dlm_8Ds7UVLJGis1sgxyZw2RKMdEuskznJLRP85ATweW2OODwluFOxnAnkX9u3Hda6OCHenAqdWshDoMhvOAQI6wFwXDl94bBajNs7A_FPIa86xXjbgPboIsufCiYqWQSBIvy3R_hTkNUulbsf5lrUPFDmqoiQLL-ckGsjmX4RfsmScGMCz67PPYn6o-EzXVUjEBmHuJQKP1u4pnZfRxnYtjTFnvCnJi2oGJQTqJWBTTGbi3-oo-aFk1tGpP8fGqY1-EXGpJqUYMMSLfIU54LpE1bTfn3Ix4P8IFXOrYZmaXMM5ZiOg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-03 14:53:53,713:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-03 14:53:53,714:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 03 Feb 2024 13:53:49 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308800947
Replay-Nonce: 5IXlosaq-Tcd8aceNlSBj1-miCf6lGyX06b7RXdc9H3mInMrWKg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:59Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308800947"
}
2024-02-03 14:53:53,714:DEBUG:acme.client:Storing nonce: 5IXlosaq-Tcd8aceNlSBj1-miCf6lGyX06b7RXdc9H3mInMrWKg
2024-02-03 14:53:53,714:DEBUG:acme.client:JWS payload:
b''
2024-02-03 14:53:53,719:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXEtVGNkOGFjZU5sU0JqMS1taUNmNmxHeVgwNmI3UlhkYzlIM21Jbk1yV0tnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyODU4NTcifQ",
  "signature": "a_P1MXMZnxkvgeg89krKfuBpOhGXLfj8nEZ02NQk83KTCs-4xzp60stZyjWkh-FVibhSaPN_IXRZbXhvDfurmS93pmCRGY1wzL2ZBV_jPQHSeTNSYqVc4OxA-Wwd_0jwLpuAhNZQ9JJvnFeR37ZRRTJ7D6qJH2MrOU4LR472X5NO0SpphA4NhsYF0bXZzA3LYHNhkfkzlEQe1D7WFXfpPYzI1Egr1q457snfWGo8NPuDvstoFBjwLrOp769-3cGUeukgeY_rqhFwfh7eEynqjpp8brKzL4JCWajjV2d7bO88yzXnWuPRASwkOqfK0mPeSe0SH6HcGNuorJ20a0NI7Q",
  "payload": ""
}
2024-02-03 14:53:53,915:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820285857 HTTP/1.1" 200 805
2024-02-03 14:53:53,915:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:49 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7Ys13GFMeS3GcIba3q_YB5xfqc7y8OknearrEAn_M1E0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:59Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/6M2-8w",
      "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/NyT6VQ",
      "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/Wxujog",
      "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I"
    }
  ]
}
2024-02-03 14:53:53,916:DEBUG:acme.client:Storing nonce: 3l89SrA7Ys13GFMeS3GcIba3q_YB5xfqc7y8OknearrEAn_M1E0
2024-02-03 14:53:53,916:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-03 14:53:53,916:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-02-03 14:53:53,917:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-03 14:53:53,917:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-03 14:53:53,918:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:53:53,918:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-03 14:53:53,918:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-03 14:53:53,918:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-03 14:53:53,919:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:53:53,965:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-03 14:53:54,185:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-03 14:53:54,186:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-03 14:53:54,187:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-03 14:53:54,191:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC.
2024-02-03 14:53:54,191:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-03 14:53:54,191:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-03 14:53:54,196:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E52DD0>
Prep: True
2024-02-03 14:53:54,196:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E52DD0> and installer None
2024-02-03 14:53:54,196:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-03 14:53:54,200:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-03 14:53:54,201:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-03 14:53:54,203:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-03 14:53:54,737:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-03 14:53:54,738:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:50 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "pMS9lH71G-k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-03 14:53:54,738:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-03 14:53:58,707:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7342_key-certbot.pem
2024-02-03 14:54:02,282:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7340_csr-certbot.pem
2024-02-03 14:54:02,283:DEBUG:acme.client:Requesting fresh nonce
2024-02-03 14:54:02,283:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-03 14:54:02,461:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-03 14:54:02,462:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:58 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUtKOn_E4iuYS39eJa-3W9MdRfdujWxqi3v0np57u1iho
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-03 14:54:02,462:DEBUG:acme.client:Storing nonce: kRyagOpUtKOn_E4iuYS39eJa-3W9MdRfdujWxqi3v0np57u1iho
2024-02-03 14:54:02,462:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-03 14:54:02,468:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFV0S09uX0U0aXVZUzM5ZUphLTNXOU1kUmZkdWpXeHFpM3YwbnA1N3UxaWhvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "sDKhmedByMSeRc4Vc0tvkmtf25tz9exLQQY3q4AiuZbioGUoisAoB32uUgObMjIXV4F4b8MuecNQjMprGXfhLR3V8IHJ8eC5C5HqcF-K-kHBCtw5f1-9qqUV2QNC8GsCnQwKQmAmaOOqpWXGHl85ZxbB33N1K5gXKmnhayy01m79hCZuwWytvU2b1Twc9GnnRUiz-JQydNMVe0EL4fGiCJrOxT0tyXvWNmT72zyNzporQMjN6Ae-ddWmRNkWuYj5FevE_nIBHHBcEQBbmsVZI7jY_PrKY-MzWVOOQZJZzBSLE1rZNV6Y3ZENwmCm7PkrZmEz1yqtY5mXPH3ElhwS2g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-03 14:54:02,661:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-02-03 14:54:02,662:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 03 Feb 2024 13:53:58 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308831767
Replay-Nonce: kRyagOpUaPTCecltAE4VVXhtEPBQCW0DZEHNraA7eXi6xwqLC6E
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:08Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308831767"
}
2024-02-03 14:54:02,662:DEBUG:acme.client:Storing nonce: kRyagOpUaPTCecltAE4VVXhtEPBQCW0DZEHNraA7eXi6xwqLC6E
2024-02-03 14:54:02,662:DEBUG:acme.client:JWS payload:
b''
2024-02-03 14:54:02,668:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVhUFRDZWNsdEFFNFZWWGh0RVBCUUNXMERaRUhOcmFBN2VYaTZ4d3FMQzZFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzMjgxMzcifQ",
  "signature": "qH0pTX6PiGBGuO7fgPoVYoeoqQ4_UOxstzcJ1lSDlyKFyW03C3L2sJ7FgewLrw4vNKvHCQ4se6Tm6Whgp9_UXPOnYXE0raIl4i7wgHEYMnYMBkSmUEoS4pwMenZAH8oiH3-1nV0Ydf1hEsqa_9MMxAu6M_8BpndbTa5vJ8uyDUoD94jf8pNGJxcfpWOBIThb62ILG4ZQtDOmJ7QnsnhRi0-emPqt0LX6nT_gJ2MVZ4nY5Gbre_z0bmw1x_WDzWFJvBtFEl5aYzvitPhXlW1YWubfZC8R4C4Gu8tzxEgg5kiSHNr1JCStZ4wmOHIksn2D17ehdjqqLlROjz8aakH9OA",
  "payload": ""
}
2024-02-03 14:54:02,850:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820328137 HTTP/1.1" 200 809
2024-02-03 14:54:02,851:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:58 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUscpRTwYpAT40TyNLbv657BIZfQR3Mp0qF6CNa5-En2Hc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:08Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/EQtjAQ",
      "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/KonEuA",
      "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/buqaYg",
      "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM"
    }
  ]
}
2024-02-03 14:54:02,851:DEBUG:acme.client:Storing nonce: 2ksh1KUscpRTwYpAT40TyNLbv657BIZfQR3Mp0qF6CNa5-En2Hc
2024-02-03 14:54:02,851:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-03 14:54:02,852:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-02-03 14:54:02,852:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-03 14:54:02,852:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-03 14:54:02,853:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:54:02,853:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-03 14:54:02,853:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-03 14:54:02,854:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-03 14:54:02,855:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:54:02,905:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-03 14:54:03,075:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-03 14:54:03,077:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-03 14:54:03,078:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-03 14:54:03,083:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC.
2024-02-03 14:54:03,083:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-03 14:54:03,083:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-03 14:54:03,094:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05146EB0>
Prep: True
2024-02-03 14:54:03,095:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05146EB0> and installer None
2024-02-03 14:54:03,095:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-03 14:54:03,100:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-03 14:54:03,100:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-03 14:54:03,102:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-03 14:54:03,562:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-03 14:54:03,563:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:53:59 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "LIHpFWNYuw8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-03 14:54:03,563:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-03 14:54:07,503:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7343_key-certbot.pem
2024-02-03 14:54:11,085:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7341_csr-certbot.pem
2024-02-03 14:54:11,085:DEBUG:acme.client:Requesting fresh nonce
2024-02-03 14:54:11,085:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-03 14:54:11,239:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-03 14:54:11,240:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:06 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaq0CTKVGQ1nGma91zMhaIOZ384tAe98DzNvP21GDXyIZE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-03 14:54:11,240:DEBUG:acme.client:Storing nonce: 5IXlosaq0CTKVGQ1nGma91zMhaIOZ384tAe98DzNvP21GDXyIZE
2024-02-03 14:54:11,240:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-03 14:54:11,246:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXEwQ1RLVkdRMW5HbWE5MXpNaGFJT1ozODR0QWU5OER6TnZQMjFHRFh5SVpFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "xXHJcH3_bmRVUe68DEo3ljmboWfBjkYMsNwiL89GMHVj6mReALlv_irZ3_Go_ckyhq5XWgdrrqDO6ModJt6Vtzqypd_Hdr8DaaSOpQVMOlGRVbATJ7pwQYJfnQI8bB_bmVfvDmYHYnRIkyNvQXmgb-IICuYIlLrQVqWWPe3wXIvDk6HPAIWJw7Zqd8PJ5Tq-wz_3XWpbdh3uiM49wA1oMX55rSpTWJ0aM8exYTbs2tMPdBrJldTPBCR9JXNCoJ3HtYkBJuHvfBVb2puPXo1Oiw35RUp3kD4eRGmSXgvgaoFA1fbs1PphiyNsi19QOl004VO1aLJMsL0HoxgJBoUxgA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-03 14:54:11,426:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-02-03 14:54:11,427:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 03 Feb 2024 13:54:06 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308858697
Replay-Nonce: 5IXlosaqi-rqeRp97rsy4hC-RPjIY1-TRJatNo9KMR5CvqmJrjM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:17Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308858697"
}
2024-02-03 14:54:11,427:DEBUG:acme.client:Storing nonce: 5IXlosaqi-rqeRp97rsy4hC-RPjIY1-TRJatNo9KMR5CvqmJrjM
2024-02-03 14:54:11,427:DEBUG:acme.client:JWS payload:
b''
2024-02-03 14:54:11,433:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFpLXJxZVJwOTdyc3k0aEMtUlBqSVkxLVRSSmF0Tm85S01SNUN2cW1KcmpNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzNjc4NDcifQ",
  "signature": "bBauK297OZucFcKl-8i3BMNrn1nOzam5OZagh_4FBV7pP0XjWnAWeIKW5asaZvIt3EaO-s8oSeahbMVyc3oy1cdnBFRRbUnh_iXceNLU4cZ82EcuyOPfZ8fwwBFzjVQ2SE-NXdWSyAvT8ItGd_0sqRrvxAgRzuOYDTahX_EZKvTLOnXlnYVquE1olt-LO9_0YOj3pMiJ2X8Ujb6xZk3fME1Bo8j35oVSJlkSGwfLwgjy9jVDkxVzhz5Ean3_THXIO57xiVlSPPvvcFAsY8dpxbvm5FGlS45kO4xW4OczWaExOrqppLdkhsB525cZ-7H_BH1r6_pv-bJGYd_7kvDiJg",
  "payload": ""
}
2024-02-03 14:54:11,592:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820367847 HTTP/1.1" 200 806
2024-02-03 14:54:11,592:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:07 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqLQRtgcslLdBB67ulK5eAPSFtxl-tiuIOral6LUReA4U
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:17Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/666fkA",
      "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/UVRmBQ",
      "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/SNClog",
      "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM"
    }
  ]
}
2024-02-03 14:54:11,593:DEBUG:acme.client:Storing nonce: 5IXlosaqLQRtgcslLdBB67ulK5eAPSFtxl-tiuIOral6LUReA4U
2024-02-03 14:54:11,593:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-03 14:54:11,593:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-02-03 14:54:11,594:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-03 14:54:11,594:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-03 14:54:11,595:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:54:11,595:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-03 14:54:11,595:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-03 14:54:11,595:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-03 14:54:11,596:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:54:11,641:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-02-03 14:54:11,641:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-03 14:54:11,641:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-02-03 14:54:11,648:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-02-03 14:54:11,651:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-02-03 14:54:11,651:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-02-03 14:54:11,651:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-02-03 14:54:11,651:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-02-03 14:54:11,653:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-02-03 14:54:11,690:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-03 14:54:11,879:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-03 14:54:11,880:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-03 14:54:11,881:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-03 14:54:11,885:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC.
2024-02-03 14:54:11,885:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-03 14:54:11,886:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-03 14:54:11,890:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05154770>
Prep: True
2024-02-03 14:54:11,890:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05154770> and installer None
2024-02-03 14:54:11,890:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-03 14:54:11,894:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-03 14:54:11,895:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-03 14:54:11,897:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-03 14:54:12,426:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-03 14:54:12,427:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:07 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "lkcl7XnekIg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-03 14:54:12,427:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-03 14:54:16,235:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7344_key-certbot.pem
2024-02-03 14:54:19,811:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7342_csr-certbot.pem
2024-02-03 14:54:19,812:DEBUG:acme.client:Requesting fresh nonce
2024-02-03 14:54:19,812:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-03 14:54:19,989:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-03 14:54:19,989:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:15 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUPlwHD0H1_I08qiIWMFfW0K19NBfAGfQW5RQlNm7I-Uw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-03 14:54:19,989:DEBUG:acme.client:Storing nonce: kRyagOpUPlwHD0H1_I08qiIWMFfW0K19NBfAGfQW5RQlNm7I-Uw
2024-02-03 14:54:19,990:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-03 14:54:19,995:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVQbHdIRDBIMV9JMDhxaUlXTUZmVzBLMTlOQmZBR2ZRVzVSUWxObTdJLVV3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "LLnNRehX6KDpLnNtO8aqdyUOoCc_y1NsDXaValCkrEip_4v75aPOMMgmaxzhO2dFnk6ZmDmd5Y3b19nKcmAYq7wo2KBQ-DBlPWuebhzJUxRealn6hSiqxRqdQP5AuZk_Azz5bueplk-ps7oxmgt0792os3rKhvwxSynQ36k8oJPtIUZttNQvuKOObtTEXpLAao68JtCeRpB947-i3ogOIWjaThDiO_lY2dZrcIN9w_5-zTgmSoDtF4oP9JexLRvjTvxvalO__4SiKSLJwct5PVj6Ka1Dl-eidCAguT0Qp5lzaXjmiZJq1NZjP9Ve-RG9VvdaqofGeaYJaCvYrAAyDQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-03 14:54:20,182:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-02-03 14:54:20,182:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 03 Feb 2024 13:54:15 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308883057
Replay-Nonce: kRyagOpUzfSv8I1jIzjnCfMZ37prTijbRROd0z5Gap_l_b6jwbM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308883057"
}
2024-02-03 14:54:20,182:DEBUG:acme.client:Storing nonce: kRyagOpUzfSv8I1jIzjnCfMZ37prTijbRROd0z5Gap_l_b6jwbM
2024-02-03 14:54:20,182:DEBUG:acme.client:JWS payload:
b''
2024-02-03 14:54:20,188:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFV6ZlN2OEkxakl6am5DZk1aMzdwclRpamJSUk9kMHo1R2FwX2xfYjZqd2JNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MDQ2NjcifQ",
  "signature": "TtqZj9oTAsLb0MSSw-bNOY3c1Dy15dfKJABdPQtCDuJRYsbkrVV4W5d6E1gy454ySnsEJLJKjVgRzf2tQx1dSyfbLohzzpbp771If3SwRLlRGoodcEelAgEYUiGzE0aV1IjqYlqk7lHpq2J6fwubnSln7TvGV2g5D7QiCLBCvmzlEnA4YsHOnicwmePqZtpkJyufXDb-1MV-klNRY_3AozWc_gbQ6YwwDDEnLe4pMtnQaMt6pmyPLpimHGZlEkMN0D47ywMxeLtVppOXgr2EXh9aX_Ba3IgqYZukIV3fF8dd61XzlAcSoLOLlaVzYUndV9vHkJhfv5lsb1y6MUIz_w",
  "payload": ""
}
2024-02-03 14:54:20,369:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820404667 HTTP/1.1" 200 811
2024-02-03 14:54:20,370:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:15 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUsNLPfoZPdgVyS2izO7nCLs5DM2EnL4yklSjguXOv8bHk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:25Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/g54rZQ",
      "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/4yZXyw",
      "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/bXegoA",
      "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08"
    }
  ]
}
2024-02-03 14:54:20,370:DEBUG:acme.client:Storing nonce: 2ksh1KUsNLPfoZPdgVyS2izO7nCLs5DM2EnL4yklSjguXOv8bHk
2024-02-03 14:54:20,371:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-03 14:54:20,372:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-02-03 14:54:20,372:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-03 14:54:20,373:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-03 14:54:20,375:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:54:20,375:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-03 14:54:20,375:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-03 14:54:20,376:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-03 14:54:20,377:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:54:20,424:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-03 14:54:20,655:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-03 14:54:20,656:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-03 14:54:20,657:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-03 14:54:20,660:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC.
2024-02-03 14:54:20,660:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-03 14:54:20,660:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-03 14:54:20,664:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x055D7350>
Prep: True
2024-02-03 14:54:20,665:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x055D7350> and installer None
2024-02-03 14:54:20,665:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-03 14:54:20,669:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-03 14:54:20,670:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-03 14:54:20,671:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-03 14:54:21,201:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-03 14:54:21,202:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:16 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "MxHyRQGyyIg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-03 14:54:21,202:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-03 14:54:24,878:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7345_key-certbot.pem
2024-02-03 14:54:28,431:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7343_csr-certbot.pem
2024-02-03 14:54:28,431:DEBUG:acme.client:Requesting fresh nonce
2024-02-03 14:54:28,431:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-03 14:54:28,673:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-03 14:54:28,674:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:24 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUsoaTaUo1UWZf5mI3w2yoUonC3pASAovqeaMHMhXvaxWE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-03 14:54:28,674:DEBUG:acme.client:Storing nonce: 2ksh1KUsoaTaUo1UWZf5mI3w2yoUonC3pASAovqeaMHMhXvaxWE
2024-02-03 14:54:28,677:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-03 14:54:28,682:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNvYVRhVW8xVVdaZjVtSTN3MnlvVW9uQzNwQVNBb3ZxZWFNSE1oWHZheFdFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "DAtiJBw7-l_ZMCyP4MwGRFoe5nOM3eYpn3AbfR3y467GOZQJGpkNsbkuV1vtoEn176LQ7sJeGCUnsZLLp1V3Lc86Xqq6KF_jxnJyKmVnoGw_u0qFKPcLBLn2VxxcczhAFDUMMTW_3F1XAo5-rmh9YNFxJ6lUeoOeZGLp7rwdlYOkVj7k0AwwSVJHYIH1dxky7UYZLiop2LcbWKIJLA7CE6j9zKJb_5Xn2KBUFbw_CBdgcSfhd7W9cUzScj-q6wgTcYYJ9unvfuMPcgVgO32c8oygVl9IVnAgFJ0yGL0a6VHj3IABp0gEAKaKH4Y_Bnpmp99puXL6odL0J_iqLi7cmg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-03 14:54:28,976:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-02-03 14:54:28,976:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 03 Feb 2024 13:54:24 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308906667
Replay-Nonce: kRyagOpUjmCN-9JKS75uEB15Nt8hsVEFROLXy9wNL-dlC7qAYrE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308906667"
}
2024-02-03 14:54:28,977:DEBUG:acme.client:Storing nonce: kRyagOpUjmCN-9JKS75uEB15Nt8hsVEFROLXy9wNL-dlC7qAYrE
2024-02-03 14:54:28,977:DEBUG:acme.client:JWS payload:
b''
2024-02-03 14:54:28,982:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVqbUNOLTlKS1M3NXVFQjE1TnQ4aHNWRUZST0xYeTl3TkwtZGxDN3FBWXJFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MzgxMjcifQ",
  "signature": "Oyv-5cgMUE7mZYKiaBST9JAMMoFed7u4C_OKzQ_yF0sH4GdT_tja860V1VbxencDtCE0JFOb-OE5F0Qbyy6ovTWEKdgFDo4dyhWo7QjOTbw9DDkyqi3y44SC-qYV9Imqb4TGDC9vc7yZN3BYXwpFRh7KL-N5qn_U618wFZ05Hsc9Lx5QD4U-BG2vuepLraGLlUpt_9w0YpbBefCinjTrpZhGNflBRaPxQtE9rGheWsuUc-iP0f10EQ6MV8JyVqTlTdxiK3vdQaeS5S-v14RF18cdtj7voE999nvvpGzp_vLcXYJu26hb_YuI19V3JHMKjiWwbNNK0P8wgnyWB6ymuQ",
  "payload": ""
}
2024-02-03 14:54:29,174:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820438127 HTTP/1.1" 200 810
2024-02-03 14:54:29,175:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:24 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUU6I7cGN6-lRKBofMVyTl8hAWW0vaqrt3TIddrznqTzo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:34Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/rIGBzA",
      "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/SWtTfQ",
      "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/R74bXA",
      "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs"
    }
  ]
}
2024-02-03 14:54:29,175:DEBUG:acme.client:Storing nonce: kRyagOpUU6I7cGN6-lRKBofMVyTl8hAWW0vaqrt3TIddrznqTzo
2024-02-03 14:54:29,176:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-03 14:54:29,176:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-02-03 14:54:29,177:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-03 14:54:29,177:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-03 14:54:29,178:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:54:29,178:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-03 14:54:29,178:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-03 14:54:29,178:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-03 14:54:29,180:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:54:29,224:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-03 14:54:29,462:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-03 14:54:29,463:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2024-02-03 14:54:29,464:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2024-02-03 14:54:29,467:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC.
2024-02-03 14:54:29,468:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-03 14:54:29,468:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-03 14:54:29,481:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05154990>
Prep: True
2024-02-03 14:54:29,481:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05154990> and installer None
2024-02-03 14:54:29,481:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-03 14:54:29,485:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-03 14:54:29,486:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-03 14:54:29,488:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-03 14:54:30,176:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-03 14:54:30,177:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:25 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "OP7MoYm1EaI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-03 14:54:30,179:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-03 14:54:33,918:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7346_key-certbot.pem
2024-02-03 14:54:37,516:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7344_csr-certbot.pem
2024-02-03 14:54:37,517:DEBUG:acme.client:Requesting fresh nonce
2024-02-03 14:54:37,517:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-03 14:54:37,741:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-03 14:54:37,742:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:33 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUs-px6oW5en67u1ANtYCrhcpdkqFApa7C9puwx_h30z8s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-03 14:54:37,742:DEBUG:acme.client:Storing nonce: 2ksh1KUs-px6oW5en67u1ANtYCrhcpdkqFApa7C9puwx_h30z8s
2024-02-03 14:54:37,742:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-03 14:54:37,747:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXMtcHg2b1c1ZW42N3UxQU50WUNyaGNwZGtxRkFwYTdDOXB1d3hfaDMwejhzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "AQgeJItEF7WDJs3NvB893WsVumpw-yfwlWM3YP8eTbgn-qpSGB1mdL1_qzJiIFEcj0U3cpKnkQVP4GgW7itB87UG4zqh2b9IkCWWp4no5VGphRPYX__U1GXtCJg4aB-K2D2TCVgkUCfO2Yze1Y4CuUNhGlzxDo7cxSLxH6eVKa7eVmp4i1qe4Ku0rZkxbnl-b6ns_KdX_QZcVxRyfq4NSrDKXJqH3c2iqFS89nt1Rh7MMGEUN5kNYRLyGF2ESsSyitbIfenDn8R1lY-on_K0jd0PWOnhNVKOiPwhUNZdLYKsCFWnvydJBbAWoJ4D2Uvzgptb0UH02fH2zNyBM479Ig",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-03 14:54:37,974:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-02-03 14:54:37,975:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 03 Feb 2024 13:54:33 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308929257
Replay-Nonce: kRyagOpUZj_2w4pMVKUZMhE1zvzbepJ4rkgyotEAueMWLsyERTE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:43Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308929257"
}
2024-02-03 14:54:37,975:DEBUG:acme.client:Storing nonce: kRyagOpUZj_2w4pMVKUZMhE1zvzbepJ4rkgyotEAueMWLsyERTE
2024-02-03 14:54:37,975:DEBUG:acme.client:JWS payload:
b''
2024-02-03 14:54:37,982:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVaal8ydzRwTVZLVVpNaEUxenZ6YmVwSjRya2d5b3RFQXVlTVdMc3lFUlRFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0NjkxOTcifQ",
  "signature": "UwNsv0p_PCM-tcpIGXcLYnfUEHM_HO65eIINnuQhol6Jmmtvmub_C1Ydaa1fo0wvo5EAgyldMHDthWqli80fOdIrPgCLBtNEsH6qUV9CEmFMO9uFljr790B42jhRNeXmhdxCjsrYM1M97UBWDg5VXCSXNRSxTdDWAYaQ-WOXzE68lPVpOi8QH2Lxeh0vVGmvGsWy-AylUEBZEn8_kbf67CYuSpFJz9Pl0h-3yC3un91e38nxfGUIxLCT50X07g0BKoxwBDw_N468w4Br26B6D7JSbunFJe9_NwdLa_Hxi7F2_1tg5Oz3JtrLhL1FQn_4oQ5jyd5kpAww5osRy-9jEg",
  "payload": ""
}
2024-02-03 14:54:38,181:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820469197 HTTP/1.1" 200 809
2024-02-03 14:54:38,181:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:33 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpU4vl7yo2bJg4LoysNVfih_jwtRW8x-PK8vJZhf8hWX3Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:43Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/PqKyzA",
      "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/nQMx2Q",
      "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/ZJc1Yg",
      "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0"
    }
  ]
}
2024-02-03 14:54:38,181:DEBUG:acme.client:Storing nonce: kRyagOpU4vl7yo2bJg4LoysNVfih_jwtRW8x-PK8vJZhf8hWX3Y
2024-02-03 14:54:38,182:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-03 14:54:38,182:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-02-03 14:54:38,183:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-03 14:54:38,183:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-03 14:54:38,184:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:54:38,184:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-03 14:54:38,184:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-03 14:54:38,185:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-03 14:54:38,186:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:54:38,236:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-03 14:54:38,419:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-03 14:54:38,421:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer.
2024-02-03 14:54:38,421:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD
2024-02-03 14:54:38,425:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC.
2024-02-03 14:54:38,425:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-03 14:54:38,426:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-03 14:54:38,437:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E34710>
Prep: True
2024-02-03 14:54:38,437:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E34710> and installer None
2024-02-03 14:54:38,437:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-03 14:54:38,441:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-03 14:54:38,442:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-03 14:54:38,444:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-03 14:54:39,422:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-03 14:54:39,423:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:34 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "aLhtVIaJPRI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-03 14:54:39,423:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-03 14:54:43,244:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7347_key-certbot.pem
2024-02-03 14:54:46,814:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7345_csr-certbot.pem
2024-02-03 14:54:46,815:DEBUG:acme.client:Requesting fresh nonce
2024-02-03 14:54:46,815:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-03 14:54:47,169:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-03 14:54:47,169:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:42 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUJxjnsTtX8tnZ5CTyijQhpeCqgXZ4FjJey2TVOo0PcDc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-03 14:54:47,170:DEBUG:acme.client:Storing nonce: kRyagOpUJxjnsTtX8tnZ5CTyijQhpeCqgXZ4FjJey2TVOo0PcDc
2024-02-03 14:54:47,170:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-03 14:54:47,174:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVKeGpuc1R0WDh0blo1Q1R5aWpRaHBlQ3FnWFo0RmpKZXkyVFZPbzBQY0RjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "haNPij5bRzjmbpLxhekZrhxu8btnR_o0lvbnZ_LADnlvCKVDLO6mcs3ewFJugXO6UzHHLqxrrHVcRk23bzEkAf3W-apNbtb-yp5-ZZ5bHWJtKbHvxn_TOIPzNE0cxcQ6AuiRWZ03vasafwpNIXFbtc7-DzFSudiSw_w4Cd1i1wFnBOCXYwLGIGXWI4gDgPx1LcH-8ON5DPFY7CnAGDnJkl4bshYknVeO4EOkfgxWAB3opIe1M10PL6553waY8I4EQc7UrrYazwUbuXC8ImOqHUzudl6Y9Za7Gyt1V6a5l3DEdmjM1waEVfcyVbkHOEfQtUlq3wZ2lNfVvBZs9iKBcQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-03 14:54:47,516:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-03 14:54:47,516:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 03 Feb 2024 13:54:42 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308951787
Replay-Nonce: kRyagOpUo9ED5UW3T-_9O1uTR5U9hpvLYwRVaapR39JFnarzUqU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308951787"
}
2024-02-03 14:54:47,516:DEBUG:acme.client:Storing nonce: kRyagOpUo9ED5UW3T-_9O1uTR5U9hpvLYwRVaapR39JFnarzUqU
2024-02-03 14:54:47,517:DEBUG:acme.client:JWS payload:
b''
2024-02-03 14:54:47,522:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVvOUVENVVXM1QtXzlPMXVUUjVVOWhwdkxZd1JWYWFwUjM5SkZuYXJ6VXFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MDE0NTcifQ",
  "signature": "lZeGgVXg45IgZXkaAZIOx7Ds0GzJO8MLqUKMPK1s583pxF1NKEwS-379lFrSX4D0Kqdt9rYQuESnUTagrl-gH_7hD8CwxkPyfqCqLd4sk5RR-bQVJ0hl41s5X8hmHhiXWEI7gERupA80dmVorx3nw3kLkh4uusq0K0IXeLmQqzSb9EIwCocLVoR1zRnt_VSKfXPrhmt7z2iVB-bSssfSjVFD0P0Y92aP3kglOB0gQFFQTbu72VJMAzB2m10x8rKHLGOp0dGugUzDNUC2s_IEpKnZ4UqOErmmvEU_pnxEg9Ga5g6V6cffK59EBhyb0MZTAwT6e1oUQYAhVOszv02tIg",
  "payload": ""
}
2024-02-03 14:54:47,831:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820501457 HTTP/1.1" 200 805
2024-02-03 14:54:47,832:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:43 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUs4mPZWuE4X-wirXx8G5vLusv98_WWZ2Y_h3sX9DMAlxk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:52Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/nfOlPQ",
      "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/ptX2uw",
      "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/u4UgEQ",
      "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw"
    }
  ]
}
2024-02-03 14:54:47,832:DEBUG:acme.client:Storing nonce: 2ksh1KUs4mPZWuE4X-wirXx8G5vLusv98_WWZ2Y_h3sX9DMAlxk
2024-02-03 14:54:47,833:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-03 14:54:47,833:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-02-03 14:54:47,834:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-03 14:54:47,834:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-03 14:54:47,835:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:54:47,835:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-03 14:54:47,835:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-03 14:54:47,835:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-03 14:54:47,836:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:54:47,884:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-03 14:54:48,103:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-03 14:54:48,105:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-03 14:54:48,106:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-03 14:54:48,113:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC.
2024-02-03 14:54:48,113:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-03 14:54:48,113:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-03 14:54:48,117:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0489C6D0>
Prep: True
2024-02-03 14:54:48,118:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0489C6D0> and installer None
2024-02-03 14:54:48,118:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-03 14:54:48,122:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-03 14:54:48,123:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-03 14:54:48,124:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-03 14:54:48,665:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-03 14:54:48,665:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:44 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "P0QueyIEcwk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-03 14:54:48,666:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-03 14:54:52,716:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7348_key-certbot.pem
2024-02-03 14:54:56,301:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7346_csr-certbot.pem
2024-02-03 14:54:56,301:DEBUG:acme.client:Requesting fresh nonce
2024-02-03 14:54:56,301:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-03 14:54:56,482:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-03 14:54:56,483:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:52 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUscyFgw6Iaj3fjnd2Z4bXfMhRUWHD9oUpT2aD31pu4HCA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-03 14:54:56,483:DEBUG:acme.client:Storing nonce: 2ksh1KUscyFgw6Iaj3fjnd2Z4bXfMhRUWHD9oUpT2aD31pu4HCA
2024-02-03 14:54:56,483:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-03 14:54:56,489:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNjeUZndzZJYWozZmpuZDJaNGJYZk1oUlVXSEQ5b1VwVDJhRDMxcHU0SENBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "vaJTqDXWmrnJ8AKVLoPXLni4z1KIiLjLpodhm2bEnm0J-0jDuKFyiH_KLTQpBMcqoJfAw0CgyohNPwBU2So30Jhhw_9aZXVdWrNHOsLjhOJER7K5iLYkY1Y00MOqDTmnnMBX0efOV6jiRAoZnzXAgEX0Gk8_2fgQB7P5fum64TZIG9CtHb2Mgv7rj86rftnWh7z_esJQ-dW5tJwcjxFmHC9xtEaAHhR6Fa2lZucFSMlRd1iBKODLw51L7c_dcwzU5mxRxIIWO1HNr5ZGsecDNp_dmgHwlrPYzoxoiHk_zFa_wC3pyo_qhdSYE_Ei6giW7o9L-Ll8opFuTkeWPbDd4w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-03 14:54:56,683:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-03 14:54:56,684:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 03 Feb 2024 13:54:52 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308975127
Replay-Nonce: 2ksh1KUszcCUkT5TZPmQVYr5ceU4BXmfPMnzqivcFGRWR18LPCI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:27:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308975127"
}
2024-02-03 14:54:56,684:DEBUG:acme.client:Storing nonce: 2ksh1KUszcCUkT5TZPmQVYr5ceU4BXmfPMnzqivcFGRWR18LPCI
2024-02-03 14:54:56,685:DEBUG:acme.client:JWS payload:
b''
2024-02-03 14:54:56,690:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXN6Y0NVa1Q1VFpQbVFWWXI1Y2VVNEJYbWZQTW56cWl2Y0ZHUldSMThMUENJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MzM3MzcifQ",
  "signature": "Jkt5e8MKoirC6bxc4w7AS0tywd5bsU60MuiWt-Ylw4Y9YjsDt23y-77zgSmOFsYfe4LRt86JcpSXlesXwXqeKkU6DBoaobi_3jc-jPWIVc0tA5dUVU723PTYFAaXkIsKA3LboNps4UgeQLthXv_BMk9Kfj_DunDaoAWzn10RFHYYfII24AOi2cqkm8GYwmVWDKT_cL3-x4Vo-rc-8jPcB6N7rUn0fVcJ-_C3-b7fFQntYoFDkrKslMjyAOccxZ4yAnDji7BEfDBCXS51uHs2eSzOrobir4O1C4wM0tbRpt8aUo79ZAIy1aVIn7rKNMVinhIKrSrX0ZrjzNSxXOBwOw",
  "payload": ""
}
2024-02-03 14:54:56,874:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820533737 HTTP/1.1" 200 805
2024-02-03 14:54:56,875:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:52 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUs8S1kI4pPA10b_bbcVjQ0Drjpq7xRsnZ_N5M-Qpztlvk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:27:01Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/u7lnsw",
      "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/kawHqw",
      "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/Xsywzg",
      "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs"
    }
  ]
}
2024-02-03 14:54:56,875:DEBUG:acme.client:Storing nonce: 2ksh1KUs8S1kI4pPA10b_bbcVjQ0Drjpq7xRsnZ_N5M-Qpztlvk
2024-02-03 14:54:56,875:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-03 14:54:56,876:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-02-03 14:54:56,876:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-03 14:54:56,877:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-03 14:54:56,877:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:54:56,877:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-03 14:54:56,878:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-03 14:54:56,878:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-03 14:54:56,879:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:54:56,915:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-03 14:54:57,155:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-03 14:54:57,156:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-03 14:54:57,157:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-03 14:54:57,161:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC.
2024-02-03 14:54:57,161:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-03 14:54:57,161:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-03 14:54:57,166:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05146ED0>
Prep: True
2024-02-03 14:54:57,166:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05146ED0> and installer None
2024-02-03 14:54:57,166:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-03 14:54:57,170:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-03 14:54:57,171:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-03 14:54:57,173:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-03 14:54:57,630:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-03 14:54:57,631:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:54:53 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "VUxI4K2yhbY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-03 14:54:57,631:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-03 14:55:01,373:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7349_key-certbot.pem
2024-02-03 14:55:04,974:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7347_csr-certbot.pem
2024-02-03 14:55:04,974:DEBUG:acme.client:Requesting fresh nonce
2024-02-03 14:55:04,974:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-03 14:55:05,127:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-03 14:55:05,128:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:55:00 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqU5yILLnZ78bNcT8vVV6Ae3M_AZAFj4kOqc2m8DMfO7M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-03 14:55:05,128:DEBUG:acme.client:Storing nonce: 5IXlosaqU5yILLnZ78bNcT8vVV6Ae3M_AZAFj4kOqc2m8DMfO7M
2024-02-03 14:55:05,128:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-03 14:55:05,134:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFVNXlJTExuWjc4Yk5jVDh2VlY2QWUzTV9BWkFGajRrT3FjMm04RE1mTzdNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "LDjV5QsUu9EY4mmCD84pWzQs3ITyAVSvfdDS20CeAZ5m73tPwuDnEtX-HYEsetPEnxAk3fhyqU6Wf0eYx-BqsmjdwgMwo9FtNyptzq5Gh_u9tJPGg8h6aaEbmYTN2YBgRBKfxofGR2B3MYLvfMTvupaNPgfWeamKZzeI8Wuwr2KSduv4RBjzfdlLAiMiLSk_goNcLw68UYMl_ekJqh2nQS4V9bYkYj-ewaHM4kXJmzGgcS7HUF0tAjHjqvEm1q7KPZhV53pCFbUPdCR6bTcoCfT_MwpmI1wv-j7ORlY46YCj_W1hmxLX5pc8KjSH1szRj8NqffzpYv7QxS6UPagWnA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-03 14:55:05,332:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-03 14:55:05,333:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 03 Feb 2024 13:55:00 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241309008647
Replay-Nonce: 5IXlosaqDZePloXOsV3K0m5B4_Upc4wqxzFe8hpeomgqRX__c9k
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:27:10Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241309008647"
}
2024-02-03 14:55:05,333:DEBUG:acme.client:Storing nonce: 5IXlosaqDZePloXOsV3K0m5B4_Upc4wqxzFe8hpeomgqRX__c9k
2024-02-03 14:55:05,334:DEBUG:acme.client:JWS payload:
b''
2024-02-03 14:55:05,342:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFEWmVQbG9YT3NWM0swbTVCNF9VcGM0d3F4ekZlOGhwZW9tZ3FSWF9fYzlrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1ODAxNjcifQ",
  "signature": "tLC1BFyf3ET0wIhIUslk0MF6QHlcimqmWH85obypp4TgxvkMl9_gup1-j0L6O15R2-nmlFI8e970JuzDbCGKksW_qFUfiw0XXylJRLlgZbFvxcIBydbcTmZ9L8HzsyOmp2EMoyiv7oeka8TBZ66hG4q-QbTJbQYKI8zEbg0OPpk2LC6Ujkcg7uzXdmS9H7sl_3aGnBMPv8mU45XUweQ_Juc2MxVqAW5GTNKTe6fhnLa1BsUbEDPKJ-5cEyV2ZZ_JrFs2cBNgK4BwR4PmKoJJpbi-XXVIvNa85hkGKdySSsoRtDcleckLOLWZ-5noY1ySZhcsCMoUAFWeOyrPLDvElA",
  "payload": ""
}
2024-02-03 14:55:05,513:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820580167 HTTP/1.1" 200 805
2024-02-03 14:55:05,513:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 03 Feb 2024 13:55:01 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7XfBGVehrR-CSk4Ca2NU_NHCMLqm47U44E-7zY2v1rOE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:27:10Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/yNgMJw",
      "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/JW2Bpw",
      "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/iioLug",
      "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc"
    }
  ]
}
2024-02-03 14:55:05,514:DEBUG:acme.client:Storing nonce: 3l89SrA7XfBGVehrR-CSk4Ca2NU_NHCMLqm47U44E-7zY2v1rOE
2024-02-03 14:55:05,514:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-03 14:55:05,515:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-02-03 14:55:05,515:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-03 14:55:05,515:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-03 14:55:05,516:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:55:05,516:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-03 14:55:05,516:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-03 14:55:05,517:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-03 14:55:05,518:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-03 14:55:05,518:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-02-03 14:55:05,518:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-02-03 14:55:05,520:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-02-03 14:55:05,522:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)