2024-02-02 16:25:17,655:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-02-02 16:25:17,655:DEBUG:certbot._internal.main:Arguments: []
2024-02-02 16:25:17,655:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-02-02 16:25:18,458:DEBUG:certbot._internal.log:Root logging level set at 20
2024-02-02 16:25:18,458:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-02-02 16:25:18,495:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04E9CA50> and installer <certbot._internal.cli.cli_utils._Default object at 0x04E9CA50>
2024-02-02 16:25:18,535:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-02 16:25:18,780:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-02 16:25:18,782:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer.
2024-02-02 16:25:18,785:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD
2024-02-02 16:25:18,793:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC.
2024-02-02 16:25:18,793:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-02 16:25:18,793:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-02 16:25:18,797:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E98590>
Prep: True
2024-02-02 16:25:18,797:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E98590> and installer None
2024-02-02 16:25:18,798:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-02 16:25:18,803:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-02 16:25:18,804:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-02 16:25:18,806:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-02 16:25:19,311:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-02 16:25:19,312:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:15 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "gNpE80Z0k-4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-02 16:25:19,312:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-02 16:25:24,029:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7311_key-certbot.pem
2024-02-02 16:25:28,136:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7309_csr-certbot.pem
2024-02-02 16:25:28,137:DEBUG:acme.client:Requesting fresh nonce
2024-02-02 16:25:28,137:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-02 16:25:28,292:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-02 16:25:28,293:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:24 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqszVrD1xL3vlVJOF5-1Eht09rcV6aL40MopZ-59totWQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-02 16:25:28,293:DEBUG:acme.client:Storing nonce: 5IXlosaqszVrD1xL3vlVJOF5-1Eht09rcV6aL40MopZ-59totWQ
2024-02-02 16:25:28,293:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-02 16:25:28,299:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFzelZyRDF4TDN2bFZKT0Y1LTFFaHQwOXJjVjZhTDQwTW9wWi01OXRvdFdRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "SWliklLLwDLsWSI6N5OKjAik0tIT5_gyOp3SBoN_TwCIBwRe7RRUpW37wF279iPPmS9zOMTVxqndKPJdVHxPGb4yKtAXB6s3NxHEsmxGmfQ2p0GycQDZqc5PV-C_m0Qs96d2Y1gB-e2hAcIDGUaAxzKEaOqBeZdKm73cHR2W6hdXrC6ZNEqZFDAWTs0dzg-JBBsOvuxZQmR90WlFwIy8phLOMt8NLJ_itcXFLV5oSjCnhiuN-yMbrwar9cfi8hPDmzNnbYtRmZC1oONnFPR1p2RX1Qv3I47Nz3QKxkgYMOaH2nD7AeGDxElpZwKpO3IgV6rn6htNFtKeTkvtmJCbBA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-02 16:25:28,634:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-02-02 16:25:28,635:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 02 Feb 2024 15:25:25 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308706407
Replay-Nonce: 3l89SrA7p5ANK3k7CPmHDXK5rKWtyBPxRKg1gOSV7RZi0p8r0oQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:24Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308706407"
}
2024-02-02 16:25:28,636:DEBUG:acme.client:Storing nonce: 3l89SrA7p5ANK3k7CPmHDXK5rKWtyBPxRKg1gOSV7RZi0p8r0oQ
2024-02-02 16:25:28,636:DEBUG:acme.client:JWS payload:
b''
2024-02-02 16:25:28,641:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdwNUFOSzNrN0NQbUhEWEs1cktXdHlCUHhSS2cxZ09TVjdSWmkwcDhyMG9RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxNTI0OTcifQ",
  "signature": "aj_5Lqb24bowwQveCn4mywFptJvO77WjArXfYZXiIdZ7bblTJNQclRSMaCyiUp3noJYyW3sbZNtSvYQ79sRVHC72W2Cx7Ox32Mvlv01-FNmmUKCXGcUszamptDrhD-C7D87g-mMoijxjiEp8-3oNJgEymJtmL1RctJIwJaUFaIKLnMPwyQQd2yuyJSU4oRZSs5KquaBXfNUwr5KFW4v57oYAxsbjTsggB5UtBsmKffPlz3D14WRtMD5xjrd0kmHgmQppW1EHQ4tbpWr7bkD_3rnSHvBrqDSLdc5d0MU_uXtRcXsvhyLUY_qbRoHgs3VwE3Tizew3iMy41duHUHpcMg",
  "payload": ""
}
2024-02-02 16:25:28,798:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820152497 HTTP/1.1" 200 810
2024-02-02 16:25:28,798:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:25 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7eAQEbKMvnpnkiv6kz3NAyC_w0vN37biKqe90iMA-TIk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:24Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/GeKDkA",
      "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/sBY_pA",
      "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/dU31hg",
      "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI"
    }
  ]
}
2024-02-02 16:25:28,798:DEBUG:acme.client:Storing nonce: 3l89SrA7eAQEbKMvnpnkiv6kz3NAyC_w0vN37biKqe90iMA-TIk
2024-02-02 16:25:28,799:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-02 16:25:28,799:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-02-02 16:25:28,800:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-02 16:25:28,800:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-02 16:25:28,803:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:25:28,803:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-02 16:25:28,803:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-02 16:25:28,804:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-02 16:25:28,809:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:25:28,845:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-02 16:25:29,013:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-02 16:25:29,015:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-02 16:25:29,015:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-02 16:25:29,021:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC.
2024-02-02 16:25:29,021:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-02 16:25:29,022:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-02 16:25:29,027:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04394C50>
Prep: True
2024-02-02 16:25:29,028:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04394C50> and installer None
2024-02-02 16:25:29,028:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-02 16:25:29,032:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-02 16:25:29,033:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-02 16:25:29,035:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-02 16:25:29,579:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-02 16:25:29,579:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:25 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "MbWoHId3G2E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-02 16:25:29,580:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-02 16:25:33,339:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7312_key-certbot.pem
2024-02-02 16:25:36,907:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7310_csr-certbot.pem
2024-02-02 16:25:36,907:DEBUG:acme.client:Requesting fresh nonce
2024-02-02 16:25:36,908:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-02 16:25:37,089:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-02 16:25:37,090:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:33 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUQLboky5zQJgFZK5FZrEMi3aOuuuHO4DVu4SWQm10PMk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-02 16:25:37,090:DEBUG:acme.client:Storing nonce: kRyagOpUQLboky5zQJgFZK5FZrEMi3aOuuuHO4DVu4SWQm10PMk
2024-02-02 16:25:37,090:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-02 16:25:37,096:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVRTGJva3k1elFKZ0ZaSzVGWnJFTWkzYU91dXVITzREVnU0U1dRbTEwUE1rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "dueoDQttbRuuphSObsrz97d7bHBzM-AgrUUbTKsFK-ymAPUI9C_WBEFQtfjtfM9biwkfJThCLOw7s8udXo016AekBrImKt3iCedK_MS8XgUJF7LRlEhRL8CK-fhf-KnEJSTFzWTknGfZCVsgQyB0TDti_uylGY2LMH0fhz7XpVmmTF7XqSSIzp7Sp5nJ_dQCqt5qQkprG6fiW5gmkH-EjF5aESxMgIYT-fXXTo791d7007bTm5xmmzdZh6NBvcw2ju64d0L--qRcrx6EaC-XSOrNLUtavhIVQZd6oOlgI_y-wM6d13YqSLXaqHmnwDOPd1_mAV_VD7g-jMrFRx3kKA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-02 16:25:37,317:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-02-02 16:25:37,317:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 02 Feb 2024 15:25:33 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308730387
Replay-Nonce: 2ksh1KUs7fS2peNUiRDMnszsZIBFG9fbHybksyswlwaLFVJ-7xc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:33Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308730387"
}
2024-02-02 16:25:37,317:DEBUG:acme.client:Storing nonce: 2ksh1KUs7fS2peNUiRDMnszsZIBFG9fbHybksyswlwaLFVJ-7xc
2024-02-02 16:25:37,318:DEBUG:acme.client:JWS payload:
b''
2024-02-02 16:25:37,322:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXM3ZlMycGVOVWlSRE1uc3pzWklCRkc5ZmJIeWJrc3lzd2x3YUxGVkotN3hjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxODg4NjcifQ",
  "signature": "EUxl1ePQKcVDd5mp_DqELuNSaJmZ0V5uKzpay8K1LDck1H0IBojeE-TrarWdJe9moDVdCkVKbdvz7SMKNF7aJQ9n3FxcsFtnbILqEfmm8KsnqSnqk33a7ZppHAAttdNX2olzwnqUfVoMiJSI9uZhDD1HyolaW1JUWL7Zz7jrZkNnuq20O06uN_Fcduc-4BgomdxYJAvoKGx__PTLxO_wiLvq4gqC2eem2BjJP8WVIVz_YqU4ROV7utjdQHcu82LzGdMXRAYei8DzMlLvhEk80z2cO8xKWRw4fq_0C3v2WCVGzW2UVSrDug5VM5yf4p72b8gxgeGvv3wBp6TZdavPQg",
  "payload": ""
}
2024-02-02 16:25:37,520:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820188867 HTTP/1.1" 200 804
2024-02-02 16:25:37,521:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:33 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUsABlrOLAilDKKhtITjyKNZ83kBDwEUlKF7eByC4902hg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:33Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/Yq7npQ",
      "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/OkyE8g",
      "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/IRVMDw",
      "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU"
    }
  ]
}
2024-02-02 16:25:37,521:DEBUG:acme.client:Storing nonce: 2ksh1KUsABlrOLAilDKKhtITjyKNZ83kBDwEUlKF7eByC4902hg
2024-02-02 16:25:37,521:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-02 16:25:37,522:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-02-02 16:25:37,522:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-02 16:25:37,522:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-02 16:25:37,523:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:25:37,523:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-02 16:25:37,523:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-02 16:25:37,524:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-02 16:25:37,524:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:25:37,574:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-02 16:25:37,789:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-02 16:25:37,791:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-02 16:25:37,791:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-02 16:25:37,796:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC.
2024-02-02 16:25:37,796:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-02 16:25:37,796:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-02 16:25:37,801:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E76630>
Prep: True
2024-02-02 16:25:37,801:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E76630> and installer None
2024-02-02 16:25:37,801:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-02 16:25:37,804:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-02 16:25:37,805:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-02 16:25:37,807:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-02 16:25:38,256:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-02 16:25:38,257:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:34 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "WSjsxmqUGXU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-02 16:25:38,257:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-02 16:25:41,883:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7313_key-certbot.pem
2024-02-02 16:25:45,467:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7311_csr-certbot.pem
2024-02-02 16:25:45,467:DEBUG:acme.client:Requesting fresh nonce
2024-02-02 16:25:45,467:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-02 16:25:45,620:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-02 16:25:45,621:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:42 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqf6RN1buaBZJ4lDiWfXuA4U_Ek9N0bjyPeQ1BH4YOemg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-02 16:25:45,621:DEBUG:acme.client:Storing nonce: 5IXlosaqf6RN1buaBZJ4lDiWfXuA4U_Ek9N0bjyPeQ1BH4YOemg
2024-02-02 16:25:45,621:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-02 16:25:45,627:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFmNlJOMWJ1YUJaSjRsRGlXZlh1QTRVX0VrOU4wYmp5UGVRMUJINFlPZW1nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Sknj0JxxmQllJBE0UAvRdO5xZKYg0eOPqGtPEtoOvv-u41ZfGuJ5jDB84PTipWzjvN2gIrsUE8pdgyJOG6vXr0rQzGR0EOrfQsnHi6BHZObW8fbqyVlWFyd1kh2xcVl6mXQMHU3OKgLG7kx4QdgI3YK-mSvCrP5Stbs9hG9ix-yyL5Q4bKpbsH5cyMiCJhztZWIThNB_nG--9HORMnBongmL_i4YP25lYGXNkdeSbaY70SQZWE12FcABKxh-b5nvImPXCBWu-GXEwylpv1Qre8EG8pwpP7iRffFuDnHzULa-qg-30ECy894R0je772JA7x9XwsiGSAU0RHW_sqV6ZQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-02 16:25:45,946:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-02-02 16:25:45,947:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 02 Feb 2024 15:25:42 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308754257
Replay-Nonce: 3l89SrA7RQ5E688i5-Y2Fg3IIRJKTx_dItA5OTsAusnulSxKZho
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:42Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308754257"
}
2024-02-02 16:25:45,947:DEBUG:acme.client:Storing nonce: 3l89SrA7RQ5E688i5-Y2Fg3IIRJKTx_dItA5OTsAusnulSxKZho
2024-02-02 16:25:45,947:DEBUG:acme.client:JWS payload:
b''
2024-02-02 16:25:45,953:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdSUTVFNjg4aTUtWTJGZzNJSVJKS1R4X2RJdEE1T1RzQXVzbnVsU3hLWmhvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyMjA5MDcifQ",
  "signature": "MY4WPX1MyUXrDNDDKMjS_r0gYBW6ALTceIore3SoyFmTdISwi7NilVRYoG7F1Tw5ePkMaXu4ax3daZHPmJTSraRvP6S33ZyDIjnoFL_B7kYX6vlQZS0iVS2EEnkEe_NQKiYv2peA63N_bSYsexIiowBI9mOCrfjPrqSBrok429U3QmaR3TP8mrpjHXejbE2FltL_cUAPJ1k5cm8FvUcbfnl145V8Afo4r65RkY3jj6vTwuRpOTxIwg32_oBr-iUT13MIlFJ9DTOVAO3Rbb91_euo9J82Mk7R9L7p9PJVDBKC72dyQOtm5zPUNQ5uWFcj0t7FeYrQnVQ7zwCaEKiJdQ",
  "payload": ""
}
2024-02-02 16:25:46,110:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820220907 HTTP/1.1" 200 807
2024-02-02 16:25:46,111:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:42 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7573h27scSPuJn-JVWA4Kt4fA_TMM8ttGofN_17zKWco
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:42Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/vlhqAg",
      "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/p9n_vg",
      "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/ul63Zg",
      "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA"
    }
  ]
}
2024-02-02 16:25:46,111:DEBUG:acme.client:Storing nonce: 3l89SrA7573h27scSPuJn-JVWA4Kt4fA_TMM8ttGofN_17zKWco
2024-02-02 16:25:46,112:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-02 16:25:46,112:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-02-02 16:25:46,112:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-02 16:25:46,113:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-02 16:25:46,113:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:25:46,113:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-02 16:25:46,114:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-02 16:25:46,114:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-02 16:25:46,115:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:25:46,155:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-02 16:25:46,320:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-02 16:25:46,321:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-02 16:25:46,321:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-02 16:25:46,326:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC.
2024-02-02 16:25:46,326:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-02 16:25:46,326:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-02 16:25:46,331:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048F8A70>
Prep: True
2024-02-02 16:25:46,331:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048F8A70> and installer None
2024-02-02 16:25:46,332:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-02 16:25:46,336:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-02 16:25:46,337:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-02 16:25:46,338:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-02 16:25:46,809:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-02 16:25:46,809:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:43 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "IgkRWDlmuqs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-02 16:25:46,810:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-02 16:25:50,434:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7314_key-certbot.pem
2024-02-02 16:25:53,998:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7312_csr-certbot.pem
2024-02-02 16:25:53,998:DEBUG:acme.client:Requesting fresh nonce
2024-02-02 16:25:53,998:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-02 16:25:54,158:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-02 16:25:54,158:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:50 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7l0oP8suiQTZQdCh-eUNvzQzIeMYC5Q-XLN0U53SPkmk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-02 16:25:54,159:DEBUG:acme.client:Storing nonce: 3l89SrA7l0oP8suiQTZQdCh-eUNvzQzIeMYC5Q-XLN0U53SPkmk
2024-02-02 16:25:54,159:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-02-02 16:25:54,165:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdsMG9QOHN1aVFUWlFkQ2gtZVVOdnpRekllTVlDNVEtWExOMFU1M1NQa21rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "YKSIWQGJmP4jrFQO0Zv7sYlm8uR0kThTniK3hbZZ03UJEdDmtNjfnx2IhSSbIyc9pUVu7dUVD72SoJLiJR8VpZ0wy_-Ni3-q8gVWExIAbRwpAuPQWjLEU3N3fLd4b29wBDNODrxHc7Z7jU1Y3bnp9A_2kSZk2YfY0EwvQ_okJEig0sw9857PKZhFPkeoKlwZYPtMhTildg9J1iy0KpUReG2dixReb981AmuH7hAucRylqJDgoDP7cMEfa_KvlSn9qTdP0YMdPUnei3GS6PzJSjerSIo6DRAYEa60FXLNNCh57J613rGoMda3ky63n3n9VVOOPWKy1vgYCA4Z648fjg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-02 16:25:54,610:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-02-02 16:25:54,611:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 02 Feb 2024 15:25:51 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308777647
Replay-Nonce: 5IXlosaq3c7jXKO4J2LLoe8OuZYMVU15iRiDEpmwe9fkcwoRwqQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:50Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308777647"
}
2024-02-02 16:25:54,611:DEBUG:acme.client:Storing nonce: 5IXlosaq3c7jXKO4J2LLoe8OuZYMVU15iRiDEpmwe9fkcwoRwqQ
2024-02-02 16:25:54,612:DEBUG:acme.client:JWS payload:
b''
2024-02-02 16:25:54,616:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXEzYzdqWEtPNEoyTExvZThPdVpZTVZVMTVpUmlERXBtd2U5Zmtjd29Sd3FRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyNTIxNzcifQ",
  "signature": "h1Rrsu5jZdHfoWI2N9_LnyJvuMXjxC0c1VEPgfIbftqYvo4LRbCbXgiG0oY_1Gql9VHdtOoLKSF00KML9QWUFZTpGRvSbg6ca5_sdIbggacYFlEx-B7aUmLWfjd0ws2tkBSHBiQ_zDQj3X6QkCjEyeu2HdZnjuxb9ZNhGedtfcBO2sDMeeXujwSnOy5ly04Ig8jhGuktMcRXdqqKPUbWF6wTeXD-E-AkbxYUZMz47bmUysnidd5zokYhnF7dye1eHSWyjfCFFZTk-7Wj1-8_sQEmqKVMrw-Evl-xpeUKnsGOjchzorXbLpa7qAmksSvPtWSE_G7oxTKmhdAhcg4pVQ",
  "payload": ""
}
2024-02-02 16:25:54,781:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820252177 HTTP/1.1" 200 801
2024-02-02 16:25:54,782:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:51 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqjKlneyXx9X81F9ORiwWTXqc2CBQkouNC_caOw47ff-8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:50Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/WXsY4w",
      "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/ZwqjFA",
      "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/HVTsug",
      "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8"
    }
  ]
}
2024-02-02 16:25:54,782:DEBUG:acme.client:Storing nonce: 5IXlosaqjKlneyXx9X81F9ORiwWTXqc2CBQkouNC_caOw47ff-8
2024-02-02 16:25:54,783:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-02 16:25:54,783:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-02-02 16:25:54,783:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-02 16:25:54,784:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-02 16:25:54,784:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:25:54,784:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-02 16:25:54,785:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-02 16:25:54,785:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-02 16:25:54,786:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:25:54,833:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-02 16:25:55,060:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-02 16:25:55,061:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-02 16:25:55,062:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-02 16:25:55,067:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC.
2024-02-02 16:25:55,067:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-02 16:25:55,067:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-02 16:25:55,073:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04E7DF90>
Prep: True
2024-02-02 16:25:55,073:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04E7DF90> and installer None
2024-02-02 16:25:55,073:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-02 16:25:55,077:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-02 16:25:55,078:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-02 16:25:55,080:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-02 16:25:55,538:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-02 16:25:55,539:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:51 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "dewSfuvxC5Y": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-02 16:25:55,539:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-02 16:25:59,249:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7315_key-certbot.pem
2024-02-02 16:26:02,833:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7313_csr-certbot.pem
2024-02-02 16:26:02,834:DEBUG:acme.client:Requesting fresh nonce
2024-02-02 16:26:02,834:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-02 16:26:02,987:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-02 16:26:02,988:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:59 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqEgDBex0o8drfe42AQGeOeIV59UXWgAmq3hOzPjW-urY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-02 16:26:02,988:DEBUG:acme.client:Storing nonce: 5IXlosaqEgDBex0o8drfe42AQGeOeIV59UXWgAmq3hOzPjW-urY
2024-02-02 16:26:02,988:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-02 16:26:02,993:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFFZ0RCZXgwbzhkcmZlNDJBUUdlT2VJVjU5VVhXZ0FtcTNoT3pQalctdXJZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "unLH1xLNKwu-JSwkPjDcnQDMelZCA5Np2xYDU-Fz6eJng5vGv6SF_-3ZfEAeBgqaZFd9WXIpklk9ylK6ikoH51xElKkjZ2iRrjfMNDPo50AMtj-QfVuUF49hCMYicNvgKU8cZWTO8I-vRZZ3-835flgi_ycoTs-UBaoulMiwpTOS5vvFGnwN-vyLrCFDdgky2Z2hPw1YJ3DM8nTdKSeqCaIpGM4AxhsYz-fW53C4LiTzDvpZh_o3KeGvku7ygko_N9wjevNiOqP3nrBs1chj_1NedItMH7iA9I1F4csXey-1vBLA4BOxJ8WO0sqwOuBTjgXiD85OP2KlczSCyIcs1Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-02 16:26:03,335:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-02 16:26:03,335:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 02 Feb 2024 15:25:59 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308800947
Replay-Nonce: 3l89SrA7vq66tg-VOkM6NzevMurvPAMoXjxyXqBMC2G2Mskx6ik
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:25:59Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308800947"
}
2024-02-02 16:26:03,335:DEBUG:acme.client:Storing nonce: 3l89SrA7vq66tg-VOkM6NzevMurvPAMoXjxyXqBMC2G2Mskx6ik
2024-02-02 16:26:03,336:DEBUG:acme.client:JWS payload:
b''
2024-02-02 16:26:03,340:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTd2cTY2dGctVk9rTTZOemV2TXVydlBBTW9Yanh5WHFCTUMyRzJNc2t4NmlrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyODU4NTcifQ",
  "signature": "Rjx_YQvQsmvg6cwfds8BmrohwOMkviLtPTuwXX9hd989jkbjA1FvmAM_tkIiGa-Lvd14QZQjx2D89hp9SlwsbZ9PZASrlFBGcA8o7yvGxAo0OhWZltUec0epCxpDBIVR-k1yXNyV7zuD6rWT4EAWZbAAcWrth8N1rEdHWAL4Ikg-UizqmNQlPxBY_K0UsAOxNT0jN7z1O837pGy3CiQw39YBSC9zI_b17eBcMP8-luHqpNSt8vC_hyH_tEVPDJlNdWYfoVqobf20ruS59yGPQ-pL_jPC-gyMwspbnfMxu5c9li4K6SZMPIH81I1nmwACzLQNPbq6KaLMb6iDVsy5uQ",
  "payload": ""
}
2024-02-02 16:26:03,509:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820285857 HTTP/1.1" 200 805
2024-02-02 16:26:03,510:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:25:59 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7QsztZzqcs-sPJ3SAsw1ElvbStb6pt3iMWD178G7UjDY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:25:59Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/6M2-8w",
      "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/NyT6VQ",
      "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/Wxujog",
      "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I"
    }
  ]
}
2024-02-02 16:26:03,510:DEBUG:acme.client:Storing nonce: 3l89SrA7QsztZzqcs-sPJ3SAsw1ElvbStb6pt3iMWD178G7UjDY
2024-02-02 16:26:03,511:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-02 16:26:03,511:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-02-02 16:26:03,512:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-02 16:26:03,512:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-02 16:26:03,513:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:26:03,513:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-02 16:26:03,513:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-02 16:26:03,513:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-02 16:26:03,514:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:26:03,563:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-02 16:26:03,749:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-02 16:26:03,750:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-02 16:26:03,751:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-02 16:26:03,755:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC.
2024-02-02 16:26:03,755:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-02 16:26:03,756:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-02 16:26:03,760:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x049153F0>
Prep: True
2024-02-02 16:26:03,761:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x049153F0> and installer None
2024-02-02 16:26:03,761:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-02 16:26:03,765:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-02 16:26:03,766:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-02 16:26:03,767:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-02 16:26:04,231:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-02 16:26:04,231:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:00 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "ABDqA8stio0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-02 16:26:04,232:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-02 16:26:08,168:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7316_key-certbot.pem
2024-02-02 16:26:11,732:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7314_csr-certbot.pem
2024-02-02 16:26:11,732:DEBUG:acme.client:Requesting fresh nonce
2024-02-02 16:26:11,733:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-02 16:26:11,890:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-02 16:26:11,891:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:08 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqgtL-UjeoWf2PcxHQjyLklP17VTfNG-P8ceQJUZg2qeo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-02 16:26:11,891:DEBUG:acme.client:Storing nonce: 5IXlosaqgtL-UjeoWf2PcxHQjyLklP17VTfNG-P8ceQJUZg2qeo
2024-02-02 16:26:11,891:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-02 16:26:11,896:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFndEwtVWplb1dmMlBjeEhRanlMa2xQMTdWVGZORy1QOGNlUUpVWmcycWVvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "KwH8hhFWcKfB8kTAdQfvK0EqrUitvIjFRLjjYSizTG2SnATFa4k04z2d4wDZTTENeR9AqeDYyNcgW7tnGFNluq9ZKoYzBIH3wU-P-y03PDovuT7gsAvFeMXgMs0oHpoBdW4erpDiQgyX9Ykd1HsZ4L8sl3LqZdeQ_IiKoxXOgkVaKmfCqT-PEG5rGJwL5dUmI9IQD4IvMYp7iM-HDGarb8uQOk-cuI_zUjUyF-v69mpN1BY76JTWWSIqp4TqVpiVUb2RQAo5xosO6IBxKFR1LuJhdISuutV3u7ScnbkKruxMFRrY8Ib-gA-f8Wd2JEZt_x6Rnfjz5JZkHE0Jf--aFQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-02 16:26:12,195:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-02-02 16:26:12,196:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 02 Feb 2024 15:26:08 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308831767
Replay-Nonce: 3l89SrA7rsDx0KtlFrVgCBCGf7RAQEdHSkArWoFMAtvLRZdyFeQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:08Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308831767"
}
2024-02-02 16:26:12,196:DEBUG:acme.client:Storing nonce: 3l89SrA7rsDx0KtlFrVgCBCGf7RAQEdHSkArWoFMAtvLRZdyFeQ
2024-02-02 16:26:12,196:DEBUG:acme.client:JWS payload:
b''
2024-02-02 16:26:12,202:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdyc0R4MEt0bEZyVmdDQkNHZjdSQVFFZEhTa0FyV29GTUF0dkxSWmR5RmVRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzMjgxMzcifQ",
  "signature": "N1r7ng-pBu55WCvP1MrCIxMUD5vl8XMCFfNoldbcKCJZ_kfvG7PctS_xhnRXHJ859opXr5c1ZlV8NYw47xY45NrGfGkAMLyh3PmPDEM6Z5O-2COq5mMI0jAfAuVy45FhpWbVFWdW2WOIHFmptk_gnFJ7Vf_qifik8iQa6nmKviqYgdivE8Lcfm06svvWFsjVtfw4oKLcfK_CSN9AjDQMcu7hl0MMvjDTU0usjNQ6v1kVfgYPsUneem-8l9zQxb4eP7E5etmVO62IKE9vhGB-QTqw1QmHTiiwWrGhXKNCVdt0C9aWiae3_oXexPiJZhWCR5v5rsgNE2j_Lb_1_5ZKZg",
  "payload": ""
}
2024-02-02 16:26:12,359:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820328137 HTTP/1.1" 200 809
2024-02-02 16:26:12,359:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:08 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqWskqMLMyIt6bY3R-UZ_58POPVZ06iGUE66GgqmbLzGs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:08Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/EQtjAQ",
      "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/KonEuA",
      "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/buqaYg",
      "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM"
    }
  ]
}
2024-02-02 16:26:12,360:DEBUG:acme.client:Storing nonce: 5IXlosaqWskqMLMyIt6bY3R-UZ_58POPVZ06iGUE66GgqmbLzGs
2024-02-02 16:26:12,360:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-02 16:26:12,361:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-02-02 16:26:12,361:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-02 16:26:12,361:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-02 16:26:12,362:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:26:12,363:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-02 16:26:12,363:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-02 16:26:12,364:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-02 16:26:12,366:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:26:12,404:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-02 16:26:12,610:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-02 16:26:12,612:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-02 16:26:12,613:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-02 16:26:12,617:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC.
2024-02-02 16:26:12,617:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-02 16:26:12,618:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-02 16:26:12,622:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04915570>
Prep: True
2024-02-02 16:26:12,622:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04915570> and installer None
2024-02-02 16:26:12,622:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-02 16:26:12,627:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-02 16:26:12,627:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-02 16:26:12,629:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-02 16:26:13,088:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-02 16:26:13,089:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:09 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "jnchAK9We4w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-02 16:26:13,090:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-02 16:26:16,800:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7317_key-certbot.pem
2024-02-02 16:26:20,395:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7315_csr-certbot.pem
2024-02-02 16:26:20,395:DEBUG:acme.client:Requesting fresh nonce
2024-02-02 16:26:20,395:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-02 16:26:20,551:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-02 16:26:20,551:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:16 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7GTeCQCD6gonlRoylsd1NXDkqWTt-XJYM-YilzU9bj4g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-02 16:26:20,551:DEBUG:acme.client:Storing nonce: 3l89SrA7GTeCQCD6gonlRoylsd1NXDkqWTt-XJYM-YilzU9bj4g
2024-02-02 16:26:20,552:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-02 16:26:20,557:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdHVGVDUUNENmdvbmxSb3lsc2QxTlhEa3FXVHQtWEpZTS1ZaWx6VTliajRnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "GtgEWurCHHLgl9vOgifa1aikQj0ihwyGG0p68AACRExxIA6wT_7I8hCdgpaSh3_6YQg5ILiOhVFkc4u3sG8fM2T4SKy7CaCcp5ayC7PMTKVKo4g8Dwkw7Gd9wEaaZQJWZThJb7gWmxF54UjTIR-f0BghFZX0MLVaXr_LwY3wZufsm-skJMGL3jVh9pDkVL112G2Zt_f2qYcdUReOMItldPUmz5qCoCxtyIpdqFwv3k9tCoz7vKaJPhXmnJ1yuYNk4awqxCOIDFxS6nwOU8TMQwSW49YTLCppj_b7lvhOGGqLrmrKdS6dNySKvYk8R8r5xknCQjm8oXhhadc8ihSDdw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-02 16:26:20,913:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-02-02 16:26:20,914:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 02 Feb 2024 15:26:17 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308858697
Replay-Nonce: 3l89SrA7XY_2Jeq4hSPXy_AU_CXkDJPNuaynfqHp2pCcBB_C05A
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:17Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308858697"
}
2024-02-02 16:26:20,914:DEBUG:acme.client:Storing nonce: 3l89SrA7XY_2Jeq4hSPXy_AU_CXkDJPNuaynfqHp2pCcBB_C05A
2024-02-02 16:26:20,915:DEBUG:acme.client:JWS payload:
b''
2024-02-02 16:26:20,922:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdYWV8ySmVxNGhTUFh5X0FVX0NYa0RKUE51YXluZnFIcDJwQ2NCQl9DMDVBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzNjc4NDcifQ",
  "signature": "N7vWTIAHDh1qdguXutXtBWtOhQVhJ3C09qhvzLPcrkbZAw9T6SPaZ2Ex9touI0HxJRSI5RhVVDVHoKeq02FA4sPgxl8AlUwq0Muvx-Li8okOe8DEag8sGG0YGbMcu51VA0JtenTNqja-s-w6A4JRp9169mA--zii77Qb34bESpkv63oEX7l3TLs-lx1ZZm7hLTTgyxtnEOSZokNAXrYukM0hQNw4cU4xyUnLuXzBC6cbe1K-N4s-93yYpOJfpLYTQJWE0d0u3qsV7J0jt1mnDlvm_QY5aLH_hfur6Y8qmrUrR0tLjnTQc3IrVzMQIoGsI88JtQ_3EoWBK7SRidOzZw",
  "payload": ""
}
2024-02-02 16:26:21,080:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820367847 HTTP/1.1" 200 806
2024-02-02 16:26:21,081:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:17 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7sba086KoDJv3WP2vFRWr9gpKf3RfgEO2RqKycYuKPbw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:17Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/666fkA",
      "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/UVRmBQ",
      "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/SNClog",
      "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM"
    }
  ]
}
2024-02-02 16:26:21,081:DEBUG:acme.client:Storing nonce: 3l89SrA7sba086KoDJv3WP2vFRWr9gpKf3RfgEO2RqKycYuKPbw
2024-02-02 16:26:21,081:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-02 16:26:21,082:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-02-02 16:26:21,082:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-02 16:26:21,083:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-02 16:26:21,083:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:26:21,083:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-02 16:26:21,084:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-02 16:26:21,084:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-02 16:26:21,085:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:26:21,130:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-02-02 16:26:21,130:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-02 16:26:21,130:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-02-02 16:26:21,136:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-02-02 16:26:21,139:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-02-02 16:26:21,139:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-02-02 16:26:21,139:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-02-02 16:26:21,139:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-02-02 16:26:21,141:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-02-02 16:26:21,178:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-02 16:26:21,435:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-02 16:26:21,435:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-02 16:26:21,435:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-02 16:26:21,440:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC.
2024-02-02 16:26:21,440:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-02 16:26:21,441:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-02 16:26:21,445:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05194DB0>
Prep: True
2024-02-02 16:26:21,445:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05194DB0> and installer None
2024-02-02 16:26:21,446:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-02 16:26:21,450:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-02 16:26:21,451:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-02 16:26:21,454:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-02 16:26:21,913:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-02 16:26:21,914:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:18 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "xCwmcqorJg0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-02-02 16:26:21,915:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-02 16:26:25,533:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7318_key-certbot.pem
2024-02-02 16:26:29,105:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7316_csr-certbot.pem
2024-02-02 16:26:29,106:DEBUG:acme.client:Requesting fresh nonce
2024-02-02 16:26:29,106:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-02 16:26:29,286:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-02 16:26:29,286:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:25 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA72GYpCnftEGrf4ea3F3ufjBgp_AoAmgdTRSMOphftLhM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-02 16:26:29,286:DEBUG:acme.client:Storing nonce: 3l89SrA72GYpCnftEGrf4ea3F3ufjBgp_AoAmgdTRSMOphftLhM
2024-02-02 16:26:29,286:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-02 16:26:29,292:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTcyR1lwQ25mdEVHcmY0ZWEzRjN1ZmpCZ3BfQW9BbWdkVFJTTU9waGZ0TGhNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "KndhDtuIn4gnLPbFRaG7PN8VcDNgG0KUM1Wnw-pcJWTzdRM464WX0psDUz9RJavKNkTxtJwvJkD3FSFQFNkGtm8hyzlBTZJKMEO-aoljLuwvaVaoZ5nxpjafbJseYGp7cjzeBjHgCw8VRDRV4DcQ7GHZUvdi-YT0VGf9AyLtAwPtOQuWWTNcnxILQAiIZ7_J9wGtjbRR-gujXH-fzmP6zZP-fXjjllr51kboj3lUuOiGootrDPzYc-qpsVjEZFgoXkFjIwMIgWuB38TZ3etEtMVcqxt8pG5tfWJkIh-wvoJdaTRU_NI7hJsIIYdzMV_JotDYlrvIl-5eMb9JRUoHeQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-02 16:26:29,610:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-02-02 16:26:29,611:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 02 Feb 2024 15:26:26 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308883057
Replay-Nonce: 5IXlosaqK9U5AeQZ8_0PG0FbGIw-fpq-RLNHQMX12V--WSsZWyY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308883057"
}
2024-02-02 16:26:29,611:DEBUG:acme.client:Storing nonce: 5IXlosaqK9U5AeQZ8_0PG0FbGIw-fpq-RLNHQMX12V--WSsZWyY
2024-02-02 16:26:29,611:DEBUG:acme.client:JWS payload:
b''
2024-02-02 16:26:29,617:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFLOVU1QWVRWjhfMFBHMEZiR0l3LWZwcS1STE5IUU1YMTJWLS1XU3NaV3lZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MDQ2NjcifQ",
  "signature": "thsYK2k2p65wyi48ZLd3ksu54YXbJw3p2ZsU_DHWHeHrxV2bJVhpRjmAS6e-9XkK71dOcdGWLwC1JxCYIKQWpBUQ3djocSPAFGUSEPGKn54rhWqEIVYk2aMhW19Bg8BIVdIrhAec-XcohTeyv1kpScYUzKcctFqh1X5QuxwHVmUubz-ms7z4HTHXxX5N6GGnJt1eeD1izZ33EGO6CtRNeamezyZDGeagqcZb8kFP0FBUH-GqGGGrook0L_Grvt6m3Gvim_5roFjoCil2fs5sMTiGt8UBs-ML9qqZ_E4zZ1iz9kEgMsPTfGMgTaVRXExCyo6UaIqXNwJ-tSqktQ_u7g",
  "payload": ""
}
2024-02-02 16:26:29,790:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820404667 HTTP/1.1" 200 811
2024-02-02 16:26:29,790:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:26 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqA-7NNSktb803KTqBPL67JxTlbiRBbcFeSb86PC70p28
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:25Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/g54rZQ",
      "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/4yZXyw",
      "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/bXegoA",
      "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08"
    }
  ]
}
2024-02-02 16:26:29,791:DEBUG:acme.client:Storing nonce: 5IXlosaqA-7NNSktb803KTqBPL67JxTlbiRBbcFeSb86PC70p28
2024-02-02 16:26:29,791:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-02 16:26:29,792:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-02-02 16:26:29,792:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-02 16:26:29,792:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-02 16:26:29,793:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:26:29,793:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-02 16:26:29,794:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-02 16:26:29,794:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-02 16:26:29,795:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:26:29,842:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-02 16:26:30,048:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-02 16:26:30,049:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-02 16:26:30,050:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-02 16:26:30,054:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC.
2024-02-02 16:26:30,054:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-02 16:26:30,055:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-02 16:26:30,059:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05193910>
Prep: True
2024-02-02 16:26:30,059:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05193910> and installer None
2024-02-02 16:26:30,059:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-02 16:26:30,064:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-02 16:26:30,065:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-02 16:26:30,066:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-02 16:26:30,525:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-02 16:26:30,526:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:26 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "qf2phQ2gec4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-02 16:26:30,526:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-02 16:26:34,139:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7319_key-certbot.pem
2024-02-02 16:26:37,717:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7317_csr-certbot.pem
2024-02-02 16:26:37,718:DEBUG:acme.client:Requesting fresh nonce
2024-02-02 16:26:37,718:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-02 16:26:37,871:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-02 16:26:37,871:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:34 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7wOmYGfI8UB6o0-1oscrn6YkhVIAJ-C7SYJsAUMWmibw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-02 16:26:37,871:DEBUG:acme.client:Storing nonce: 3l89SrA7wOmYGfI8UB6o0-1oscrn6YkhVIAJ-C7SYJsAUMWmibw
2024-02-02 16:26:37,872:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-02 16:26:37,879:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTd3T21ZR2ZJOFVCNm8wLTFvc2NybjZZa2hWSUFKLUM3U1lKc0FVTVdtaWJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "JYMsI5o--WSk7gLs4LW3EOQwznFqsHfjdA4gsanYTJxxdlQ2pIdofTreQeLtzv_h2ErherhDAk4MsSFAKcZd6ToDp7fTcVxDkI8_WLJvp8HHKbacZEupPL12n3uGAvIBN0x30aH9rxCO14bS_L2nPJiOurqB6kWQN_LNUc6DOs_F0_41G_K3vm6phLxzvh1-7x5ExM5ewWrOEov85tm3_9rk_G53zPtMEYtkfR5gRwtBV3NvW0oBxuVa6LZDQ_YWJ-ViG3QQRm4QptUPMTIVAEo5KvQsHCV3ut865xljO512BlcyhNSNtE4lnZzlQTqOzYoQPGP94srAXu2bkcNc9A",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-02-02 16:26:38,216:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-02-02 16:26:38,217:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 02 Feb 2024 15:26:34 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308906667
Replay-Nonce: 5IXlosaqhRoA68t7JFkgq_GgievXA0ybHSB8-wtzJ2eFo8HmDdY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308906667"
}
2024-02-02 16:26:38,217:DEBUG:acme.client:Storing nonce: 5IXlosaqhRoA68t7JFkgq_GgievXA0ybHSB8-wtzJ2eFo8HmDdY
2024-02-02 16:26:38,217:DEBUG:acme.client:JWS payload:
b''
2024-02-02 16:26:38,223:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFoUm9BNjh0N0pGa2dxX0dnaWV2WEEweWJIU0I4LXd0ekoyZUZvOEhtRGRZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MzgxMjcifQ",
  "signature": "u6fP2Z73JdON2DwfkikIqwsuWDideKxd2IUtSC36VlANoElE7-M47RZz6ulIFG8boSYa7gwtRQqAKNTZa_H6n2oN8DFtZL-kspD5ZuDVxomXxBK4qlQQxzx9SlJUNhhsEKmcVL6v-3KO2L8QrEfeb28r4I6jZqIWZVRlQbKkxSKRYdKx2vqwv2crA0mQo8KOZkyNJxzxhc3HRGRgnx27XgNOAi1SEaDUperLtQYKyWmJh7Qc0TSq4rw9BPLq8ozxL3suTCqeY6jv_p6vugWrnBTR3Na1GXHIl6V-fCx7Mqd6hWqYuWflMgnR21TRsTMrj0RnKYdW-RRG4qbAAaEjFg",
  "payload": ""
}
2024-02-02 16:26:38,383:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820438127 HTTP/1.1" 200 810
2024-02-02 16:26:38,384:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:34 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaq4eKeE_LaEb4s4315lEJhYYQ-Urk9OQLNJFK1KevIoTI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:34Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/rIGBzA",
      "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/SWtTfQ",
      "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/R74bXA",
      "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs"
    }
  ]
}
2024-02-02 16:26:38,384:DEBUG:acme.client:Storing nonce: 5IXlosaq4eKeE_LaEb4s4315lEJhYYQ-Urk9OQLNJFK1KevIoTI
2024-02-02 16:26:38,384:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-02 16:26:38,384:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-02-02 16:26:38,385:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-02 16:26:38,386:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-02 16:26:38,387:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:26:38,388:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-02 16:26:38,388:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-02 16:26:38,389:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-02 16:26:38,391:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:26:38,428:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-02 16:26:38,689:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-02 16:26:38,690:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2024-02-02 16:26:38,691:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2024-02-02 16:26:38,695:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC.
2024-02-02 16:26:38,695:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-02 16:26:38,696:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-02 16:26:38,700:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0513C2B0>
Prep: True
2024-02-02 16:26:38,700:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0513C2B0> and installer None
2024-02-02 16:26:38,700:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-02 16:26:38,706:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-02 16:26:38,707:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-02 16:26:38,709:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-02 16:26:39,157:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-02 16:26:39,158:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:35 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "zSNVFF7kLwo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-02-02 16:26:39,158:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-02 16:26:43,020:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7320_key-certbot.pem
2024-02-02 16:26:46,607:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7318_csr-certbot.pem
2024-02-02 16:26:46,608:DEBUG:acme.client:Requesting fresh nonce
2024-02-02 16:26:46,608:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-02 16:26:46,758:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-02 16:26:46,759:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:43 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7MgXCr54A5VTiogPiw_xPZALLlMf24L-qOBL1MUv565M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-02 16:26:46,759:DEBUG:acme.client:Storing nonce: 3l89SrA7MgXCr54A5VTiogPiw_xPZALLlMf24L-qOBL1MUv565M
2024-02-02 16:26:46,759:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-02 16:26:46,764:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdNZ1hDcjU0QTVWVGlvZ1Bpd194UFpBTExsTWYyNEwtcU9CTDFNVXY1NjVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ScNDmx-ZkelDzp_4OYeBbT-_Lv6pfP_Vv-GPtmnTbhTd91WxuujWlBuXiYQhzvmuAm7BZx3bmb696HPX-k_xj5087aH1xeWAbNjsm5lG_enK_kGLT8jh7thWklUv9LOdSX_zgln6KX1Vv1IbOvPLv9aXQbD3LlQjBCac0O_w-puP-bN3qn_pzZ8-cbITFb1UDrpDT4pnE0ahkzcsRY8yZuiSh7thUe8U2Orp1WYOK_znaSDCdc1gvCH1ZnGkFESwHHAS4Bkt1B41ZZuzFWsOiOGYaYEnBAp8Kn2u6pBrBtzsgXPhlB-cwEiyzZep1b-xer0aQk8kwQ59vsRlRtro3Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-02-02 16:26:47,071:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-02-02 16:26:47,071:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 02 Feb 2024 15:26:43 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308929257
Replay-Nonce: 3l89SrA7yVv7f4PzQuH4XuuqdMQunmL0jkXe2umkg9Am-Izxwk0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:43Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308929257"
}
2024-02-02 16:26:47,072:DEBUG:acme.client:Storing nonce: 3l89SrA7yVv7f4PzQuH4XuuqdMQunmL0jkXe2umkg9Am-Izxwk0
2024-02-02 16:26:47,072:DEBUG:acme.client:JWS payload:
b''
2024-02-02 16:26:47,077:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTd5VnY3ZjRQelF1SDRYdXVxZE1RdW5tTDBqa1hlMnVta2c5QW0tSXp4d2swIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0NjkxOTcifQ",
  "signature": "cx-iKe4BiAchFYz8IBi5sGlWDY232caDvVVSIpn2HZ47l9Z52GjDM4kzzjr-62tIKUIX0xoGXlvUOdjEGAH8Y-sh-jU4wm9bRpgg6HeGIGHRCq9C0uW2KkGrne8menQ_99ynN27zcdCbbzrdhsR0F03KOzvLWXBiuNiXzmNZgdEC3DIxy3HQsXiD1jCvU0S0f6F_I-zomG0J4YeHZYsLJTvlv5wrjOL79-7TxjhvHGIln2j7V7Kzr2k9sT3IQ0swUCHEZOpM3kGb54445xT_43WTHD2NGLIdf9JbnUQ-RCJNmgtIoHCBswI4oHgjuvqCpr7Stg-TWHpfOjE3kCicKg",
  "payload": ""
}
2024-02-02 16:26:47,250:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820469197 HTTP/1.1" 200 809
2024-02-02 16:26:47,251:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:43 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaqoCnruL_7dzIR2Bnb9Iba5mjxqsBfDXwl4e-3jLe4AQM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:43Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/PqKyzA",
      "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/nQMx2Q",
      "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/ZJc1Yg",
      "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0"
    }
  ]
}
2024-02-02 16:26:47,251:DEBUG:acme.client:Storing nonce: 5IXlosaqoCnruL_7dzIR2Bnb9Iba5mjxqsBfDXwl4e-3jLe4AQM
2024-02-02 16:26:47,252:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-02 16:26:47,252:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-02-02 16:26:47,253:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-02 16:26:47,254:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-02 16:26:47,255:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:26:47,256:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-02 16:26:47,256:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-02 16:26:47,256:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-02 16:26:47,258:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:26:47,315:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-02 16:26:47,487:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-02 16:26:47,489:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer.
2024-02-02 16:26:47,491:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD
2024-02-02 16:26:47,496:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC.
2024-02-02 16:26:47,496:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-02 16:26:47,496:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-02 16:26:47,502:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x051939D0>
Prep: True
2024-02-02 16:26:47,502:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x051939D0> and installer None
2024-02-02 16:26:47,503:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-02 16:26:47,508:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-02 16:26:47,509:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-02 16:26:47,511:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-02 16:26:48,059:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-02 16:26:48,060:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:44 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "1tMo14oVTR0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-02 16:26:48,060:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-02 16:26:52,105:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7321_key-certbot.pem
2024-02-02 16:26:55,674:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7319_csr-certbot.pem
2024-02-02 16:26:55,675:DEBUG:acme.client:Requesting fresh nonce
2024-02-02 16:26:55,675:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-02 16:26:55,856:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-02 16:26:55,856:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:52 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: kRyagOpUxrraDusxj1zQWOW_55dd9Ui4dm9zW9izFtH8YskF3tM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-02 16:26:55,857:DEBUG:acme.client:Storing nonce: kRyagOpUxrraDusxj1zQWOW_55dd9Ui4dm9zW9izFtH8YskF3tM
2024-02-02 16:26:55,857:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-02 16:26:55,862:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFV4cnJhRHVzeGoxelFXT1dfNTVkZDlVaTRkbTl6VzlpekZ0SDhZc2tGM3RNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "mCAmfnFztubb_r8aLD_TU2PF94DcRL6FY1v3ky76XbH8re0C73wV1esN1a75j1POnfzQejHNWnDxhqow5EOZf3jY1JiMG4TF2SzLNVRLC9F1VzcG90Ft5Cm_2DDzlcbZbhw9TelRdmM0YJtWk_OofgLinZ-fUy7XyY9pcDzwy2yU0JE39i5GpnE-V8SnslceQENHZsIv7yYYDo4tx32y-JKiJBEfC1SwPOe-Lkdk4Aq2QIQbr602P0ShQPCKNFvO1cadCja2jV7BHereCNFbDaXIcy2CrsLL79ezyEIOPgp2RYY3yJ5lBGPM9X7kAXIPPKk6UAjJYWY15lCdYwJC0A",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-02 16:26:56,076:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-02 16:26:56,077:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 02 Feb 2024 15:26:52 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308951787
Replay-Nonce: kRyagOpUjuXeL73NJLdTH4qrYB3HnINjj7FeFBjHRvs6YUSDPZM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:26:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308951787"
}
2024-02-02 16:26:56,077:DEBUG:acme.client:Storing nonce: kRyagOpUjuXeL73NJLdTH4qrYB3HnINjj7FeFBjHRvs6YUSDPZM
2024-02-02 16:26:56,077:DEBUG:acme.client:JWS payload:
b''
2024-02-02 16:26:56,082:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVqdVhlTDczTkpMZFRINHFyWUIzSG5JTmpqN0ZlRkJqSFJ2czZZVVNEUFpNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MDE0NTcifQ",
  "signature": "ftAGQEYzs4GFa3Yz8jW8hB_m8SM1UG3x2kbg8P4GHW7YNmv43APaBpSqfFJ7W3vQJAjzv__AqChewqbUi6z7YA3vmSpT734Y4LPyJq5YORhKd4zMKs2F457z5RfFcCAs_4yQjk6-KI44_kcuD5NoYG7yg0ZsRYC_Y9FCP0nO6uyuzhjy7utcPOR0QEGuFUHxOX10XUvVt1uzQrSluwif9lnSVBby7iLGyDcR54jwZZIruSz1aZ11AfcgiLyr4OI1sMhadcGGF5yloNvLtczXjwXumPnqEFdIRANqDI8Iz1o_aZmYYAoIc0zvcO7J4ibSoE9ZLdCM3C1K_7ImpRXfHw",
  "payload": ""
}
2024-02-02 16:26:56,272:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820501457 HTTP/1.1" 200 805
2024-02-02 16:26:56,273:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:52 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2ksh1KUsqxpqFcJ7H3eoc7oM_cYbTv8o2SKqV21R8mGrYlkzjJE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:26:52Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/nfOlPQ",
      "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/ptX2uw",
      "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/u4UgEQ",
      "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw"
    }
  ]
}
2024-02-02 16:26:56,273:DEBUG:acme.client:Storing nonce: 2ksh1KUsqxpqFcJ7H3eoc7oM_cYbTv8o2SKqV21R8mGrYlkzjJE
2024-02-02 16:26:56,273:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-02 16:26:56,274:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-02-02 16:26:56,274:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-02 16:26:56,274:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-02 16:26:56,275:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:26:56,275:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-02 16:26:56,275:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-02 16:26:56,276:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-02 16:26:56,277:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:26:56,313:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-02 16:26:56,512:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-02 16:26:56,514:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-02-02 16:26:56,514:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-02-02 16:26:56,517:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC.
2024-02-02 16:26:56,518:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-02 16:26:56,518:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-02 16:26:56,527:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x01068B90>
Prep: True
2024-02-02 16:26:56,527:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x01068B90> and installer None
2024-02-02 16:26:56,527:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-02 16:26:56,531:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-02 16:26:56,532:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-02 16:26:56,534:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-02 16:26:56,980:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-02 16:26:56,981:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:26:53 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "e2YC-1VYRrg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-02 16:26:56,981:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-02 16:27:01,150:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7322_key-certbot.pem
2024-02-02 16:27:04,735:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7320_csr-certbot.pem
2024-02-02 16:27:04,735:DEBUG:acme.client:Requesting fresh nonce
2024-02-02 16:27:04,735:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-02 16:27:04,890:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-02 16:27:04,891:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:27:01 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7LHQRxRMCqtQEnE5rjkuqk9lrc9-uuRttpMol2Vumz2g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-02 16:27:04,891:DEBUG:acme.client:Storing nonce: 3l89SrA7LHQRxRMCqtQEnE5rjkuqk9lrc9-uuRttpMol2Vumz2g
2024-02-02 16:27:04,891:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-02 16:27:04,898:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdMSFFSeFJNQ3F0UUVuRTVyamt1cWs5bHJjOS11dVJ0dHBNb2wyVnVtejJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "w7BZ6GmvvirTejDSQCNu0TY7edM1CokwpsjXdgZhNF1ZoTL7_xZ-jXBv1fjDLWMnsjA5j9UcTZoNLwQQ7Co9MBy4U4Hb45D5xcfQzTiIJPIfjdShhvjiMrOaAoeHCsTnq3XJLewyz1PfQy-FJM5OmnlXUW4k9MI41bTmC6Q5ktltEQO-A_yF1NjMCLoeMq3ScUJdLT9IbfgIcjQiSEX05ZufOyPRp3sLb8Ii-9fEqLEa9-reO4nJaeAQM-yl7zC_lxQPDSVm-VgOkPbL58RtpWNwkhYHx11KdVbJMSNYxVfVLXQ01ZOKsxMgpRtFLBLCt-bJ1hHnrATSRWq0KeYSww",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-02 16:27:05,325:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-02 16:27:05,326:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 02 Feb 2024 15:27:01 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308975127
Replay-Nonce: 5IXlosaqQOCeOXD_HE2Txn2dBjyhtpnb5ipC7wGpZ9Fah0hgbC4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:27:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308975127"
}
2024-02-02 16:27:05,326:DEBUG:acme.client:Storing nonce: 5IXlosaqQOCeOXD_HE2Txn2dBjyhtpnb5ipC7wGpZ9Fah0hgbC4
2024-02-02 16:27:05,326:DEBUG:acme.client:JWS payload:
b''
2024-02-02 16:27:05,332:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFRT0NlT1hEX0hFMlR4bjJkQmp5aHRwbmI1aXBDN3dHcFo5RmFoMGhnYkM0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MzM3MzcifQ",
  "signature": "IbFptt1UEj6JU86GhopwelMxCoblEsP8vszy6d0S5pLQA6AzDdxr7YhtLSxRSXWtb4GP9YOmv7qLZqiZqW7i7U6CHFObYQp7DAk8kqPS4SEggww0yY30Mnxoej5xOuE9XAMbgdq5M48MT6PXWmneF4z8GjER-WSxft40VGbqF9xrlvnq0RJbSYdFKlRict-ml_MonGvq_URSI1VxAPfxNtP3VtwG_Uy0nMg5Qq7gHWAWLAGHpVq0iD2Utaav7vH7DeXou_mJzT44vh6X-iujngt1TuA6dw70QKHcMvXx3bij2G9Iola6I8lobKgJXRf31PmlyziQY5qToVfEzCm5Ww",
  "payload": ""
}
2024-02-02 16:27:05,563:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820533737 HTTP/1.1" 200 805
2024-02-02 16:27:05,563:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:27:01 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7A7f3NlHwgPQy6QSDxn_8yWLeFDhxPF8IwoZJs_jIf_c
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:27:01Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/u7lnsw",
      "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/kawHqw",
      "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/Xsywzg",
      "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs"
    }
  ]
}
2024-02-02 16:27:05,563:DEBUG:acme.client:Storing nonce: 3l89SrA7A7f3NlHwgPQy6QSDxn_8yWLeFDhxPF8IwoZJs_jIf_c
2024-02-02 16:27:05,563:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-02 16:27:05,563:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-02-02 16:27:05,564:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-02 16:27:05,564:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-02 16:27:05,565:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:27:05,565:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-02 16:27:05,565:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-02 16:27:05,565:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-02 16:27:05,566:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:27:05,603:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-02-02 16:27:05,780:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-02-02 16:27:05,781:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer.
2024-02-02 16:27:05,783:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD
2024-02-02 16:27:05,788:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC.
2024-02-02 16:27:05,788:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-02-02 16:27:05,789:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-02-02 16:27:05,793:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x01068A10>
Prep: True
2024-02-02 16:27:05,793:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x01068A10> and installer None
2024-02-02 16:27:05,794:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-02-02 16:27:05,799:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-02-02 16:27:05,801:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-02 16:27:05,805:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-02 16:27:06,258:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-02 16:27:06,258:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:27:02 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "AfWgq2n6n8s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-02 16:27:06,259:INFO:certbot._internal.main:Renewing an existing certificate
2024-02-02 16:27:09,854:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7323_key-certbot.pem
2024-02-02 16:27:13,426:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7321_csr-certbot.pem
2024-02-02 16:27:13,427:DEBUG:acme.client:Requesting fresh nonce
2024-02-02 16:27:13,427:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-02 16:27:13,578:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-02 16:27:13,579:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:27:09 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 5IXlosaq6NG65KnqVqCJGx82mF1UhFaXllD5D45jLOkWNA8XW_Q
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-02 16:27:13,579:DEBUG:acme.client:Storing nonce: 5IXlosaq6NG65KnqVqCJGx82mF1UhFaXllD5D45jLOkWNA8XW_Q
2024-02-02 16:27:13,579:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-02-02 16:27:13,584:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXE2Tkc2NUtucVZxQ0pHeDgybUYxVWhGYVhsbEQ1RDQ1akxPa1dOQThYV19RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "lytMoAC0JedF-lAjGnWfHQVefTQJOQxfLgUCgWUyminSTtL-G6g4P6p1gmsmpmHKh3IuaULnB6qMGdRIh5S0C3GFgzWHhqXjKr7zhWhKN76glZgAC-tAer4Pazp7skFkOjVMyXpF_ScrQyIj5uEOt3XSBVLcghvGD28T28ymOjxI9qmXgyOuUqnSDSuXzXov1SR6RbGM17dzotOITeOyLy5l1XkUYF3_A8A_0MLvPyoxJNTWwS3gkDLwS70wfeNe3F2g9oBji2zsqFmG1YXL2EXv9Fc5690578RvUg7zvE_8pj71Fzmx9H50kec9V7T9IeSW2sGbgRD2YhIVXrJwZQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-02-02 16:27:13,943:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-02-02 16:27:13,943:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 02 Feb 2024 15:27:10 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241309008647
Replay-Nonce: 5IXlosaq3-q43_hcttFFzS1gxjogFTgm8d-J0OS3VbQnRBRLiB4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-09T15:27:10Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241309008647"
}
2024-02-02 16:27:13,943:DEBUG:acme.client:Storing nonce: 5IXlosaq3-q43_hcttFFzS1gxjogFTgm8d-J0OS3VbQnRBRLiB4
2024-02-02 16:27:13,944:DEBUG:acme.client:JWS payload:
b''
2024-02-02 16:27:13,949:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXEzLXE0M19oY3R0RkZ6UzFneGpvZ0ZUZ204ZC1KME9TM1ZiUW5SQlJMaUI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1ODAxNjcifQ",
  "signature": "r5RXxzx_caFEcJF7mIh7llTJp8UCoHHq62VFBJU0VS4gFWxoGIsG1myYbKbTmW_hum-P9j85uJTBhiZkzHgfrwYbOJD2Zhln9XUQ6642doZy89mX77Q5hn4WYkyF84g48-HLuTex7Jmg6SL_CCgJLC2Cq5gv0yvPcVrnMjd3N7niE6b32Ff7wKglhJUnRixEvZcJ_ssTYh9Cj8d5AJx7nRif-zA4W3-KeIW87VcrQHztOCfS5QWhbbKkyOHC7WUBLYviKH7e2X7E8hoQA1NVVYIwm8uwRUGT2ibjaMG_yUT3hO-Ch6a0ORA4vtygSkVr4XnR8rXC1CeBwMLgno2fNg",
  "payload": ""
}
2024-02-02 16:27:14,109:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820580167 HTTP/1.1" 200 805
2024-02-02 16:27:14,110:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 02 Feb 2024 15:27:10 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 3l89SrA7-LwIa1-VfdRvSRXbGoHalG-HXWDzpntSB1fKPWjh9Y4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-02-09T15:27:10Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/yNgMJw",
      "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/JW2Bpw",
      "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/iioLug",
      "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc"
    }
  ]
}
2024-02-02 16:27:14,110:DEBUG:acme.client:Storing nonce: 3l89SrA7-LwIa1-VfdRvSRXbGoHalG-HXWDzpntSB1fKPWjh9Y4
2024-02-02 16:27:14,110:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-02 16:27:14,111:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-02-02 16:27:14,111:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-02-02 16:27:14,111:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-02-02 16:27:14,112:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:27:14,112:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-02 16:27:14,112:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-02 16:27:14,113:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-02-02 16:27:14,114:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-02-02 16:27:14,114:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-02-02 16:27:14,114:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-02-02 16:27:14,115:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-02-02 16:27:14,117:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)