2023-11-25 20:39:31,949:DEBUG:certbot._internal.main:certbot version: 1.6.0
2023-11-25 20:39:31,950:DEBUG:certbot._internal.main:Arguments: []
2023-11-25 20:39:31,950:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2023-11-25 20:39:32,770:DEBUG:certbot._internal.log:Root logging level set at 20
2023-11-25 20:39:32,770:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2023-11-25 20:39:32,805:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x045963B0> and installer <certbot._internal.cli.cli_utils._Default object at 0x045963B0>
2023-11-25 20:39:32,843:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-25 20:39:33,262:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-25 20:39:33,278:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is signed by the certificate's issuer.
2023-11-25 20:39:33,282:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is: OCSPCertStatus.GOOD
2023-11-25 20:39:33,290:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:23 UTC.
2023-11-25 20:39:33,290:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-25 20:39:33,290:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-25 20:39:33,295:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03FD1D10>
Prep: True
2023-11-25 20:39:33,295:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03FD1D10> and installer None
2023-11-25 20:39:33,296:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-25 20:39:33,301:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-25 20:39:33,302:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-25 20:39:33,304:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-25 20:39:33,831:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-25 20:39:33,832:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:39:32 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "sBss9Qy0AXY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2023-11-25 20:39:33,833:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-25 20:39:38,240:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7064_key-certbot.pem
2023-11-25 20:39:42,155:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7062_csr-certbot.pem
2023-11-25 20:39:42,155:DEBUG:acme.client:Requesting fresh nonce
2023-11-25 20:39:42,156:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-25 20:39:42,330:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-25 20:39:42,331:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:39:41 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjBWgXxMMhrBiGGlzwT-Gwv4ynBJEim6H0I2JMbMWkFe4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-25 20:39:42,331:DEBUG:acme.client:Storing nonce: SFMYLIQjBWgXxMMhrBiGGlzwT-Gwv4ynBJEim6H0I2JMbMWkFe4
2023-11-25 20:39:42,331:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-25 20:39:42,337:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpCV2dYeE1NaHJCaUdHbHp3VC1Hd3Y0eW5CSkVpbTZIMEkySk1iTVdrRmU0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Dd7KKFWnsB4WN8IN1jPxXWioBJ3BtMjr6gM5oydb6pJjAHPiQQQql7qW4OPx2jWV-xvLrpS-gLf6_zdzVJBmueH5eaJEBU9yNYW23se9H-NZdBs3qL_xvUQnay2PXthADC1yJZ4SPs2LdjlrQ4YH-iV8TmlghsT4waoYiQzvXURgxhYabiTU0_WR1W6_gE1pkYpQHgPSKP4EksSUPVwD27UftzyQ2THvwD6HFPJWTZ2BNfEgwkagYIoRvMe9MjhfM3JjINW-UydC5otsSEVHxYuNp0kNLKyNB3901O0x60yIt7A_zXG2PN2Z5YkTSzXfvdeYnKIE5wOK86MFnnK4dA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-25 20:39:42,531:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2023-11-25 20:39:42,532:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Nov 2023 19:39:41 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223795980256
Replay-Nonce: jXyutbsn5mR3luc5XErnZ46LM26-4qVXV07dqmc2T7g9AA_CdN8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:00Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223795980256"
}
2023-11-25 20:39:42,532:DEBUG:acme.client:Storing nonce: jXyutbsn5mR3luc5XErnZ46LM26-4qVXV07dqmc2T7g9AA_CdN8
2023-11-25 20:39:42,532:DEBUG:acme.client:JWS payload:
b''
2023-11-25 20:39:42,538:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic241bVIzbHVjNVhFcm5aNDZMTTI2LTRxVlhWMDdkcW1jMlQ3ZzlBQV9DZE44IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY0OTE0ODYifQ",
  "signature": "tKSaZ-AMpJuJitEqDSrujSvuyOPAM4g3RyDv_ZxRClEzok9g8n_9nka2Txv-eZGw2ZMBJ6kUZGc4kVF0Bt3NClp1-nxJhGoQZRXXl1ZNwq5DkI8Q06618aAySjWvNflb_a-HzKAGcLvlI4Pz83v74hBvibpGxf1eC1bAO4xzImU78vOXPjGktmFNmhrKN-5rw0tCDX-CTj2q30kEq6ndyuYVzxjUXJvKLdFaVFzFXy0pm-yrWQ1Yd_R1aS5TFstUWumRsWcJBhwQBB9aL4FMMCI6nePy78A1534OjWHbAsbuhAxie5JRqYzuCb6FQYa-Y-xiZ3xd2HTsv6ThH6WcQw",
  "payload": ""
}
2023-11-25 20:39:42,714:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066491486 HTTP/1.1" 200 810
2023-11-25 20:39:42,715:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:39:41 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjHvJILbpelAKbEdEKMz1oOtngeBptc7whhhAEvAkx28s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:00Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/iZpoTw",
      "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/hLn7qQ",
      "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/g8UZBg",
      "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48"
    }
  ]
}
2023-11-25 20:39:42,715:DEBUG:acme.client:Storing nonce: SFMYLIQjHvJILbpelAKbEdEKMz1oOtngeBptc7whhhAEvAkx28s
2023-11-25 20:39:42,715:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-25 20:39:42,716:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2023-11-25 20:39:42,716:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-25 20:39:42,716:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-25 20:39:42,731:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:39:42,731:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-25 20:39:42,731:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-25 20:39:42,732:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-25 20:39:42,737:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:39:42,774:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-25 20:39:43,175:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-25 20:39:43,176:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-25 20:39:43,177:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-25 20:39:43,181:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:36 UTC.
2023-11-25 20:39:43,181:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-25 20:39:43,182:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-25 20:39:43,186:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03FD1D10>
Prep: True
2023-11-25 20:39:43,186:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03FD1D10> and installer None
2023-11-25 20:39:43,186:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-25 20:39:43,191:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-25 20:39:43,192:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-25 20:39:43,194:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-25 20:39:43,644:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-25 20:39:43,645:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:39:42 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "hIZYZAtxBwg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-25 20:39:43,645:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-25 20:39:47,439:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7065_key-certbot.pem
2023-11-25 20:39:51,041:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7063_csr-certbot.pem
2023-11-25 20:39:51,041:DEBUG:acme.client:Requesting fresh nonce
2023-11-25 20:39:51,042:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-25 20:39:51,195:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-25 20:39:51,196:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:39:50 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8PKhOHkQs-qxB_vI1bX_dcZHDFHQyLL_0kzOPCsY8Ugo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-25 20:39:51,196:DEBUG:acme.client:Storing nonce: nbWKegf8PKhOHkQs-qxB_vI1bX_dcZHDFHQyLL_0kzOPCsY8Ugo
2023-11-25 20:39:51,196:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-25 20:39:51,202:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhQS2hPSGtRcy1xeEJfdkkxYlhfZGNaSERGSFF5TExfMGt6T1BDc1k4VWdvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "PuIUxKgmb28CwMFXzLxGHJR2CfKFguRdeLQuE3-t9zka6nrgeJRXWhW4d0oIhoobdLeBkm0dq76fUXm4FG5GY-Lj16gqsP8w4nWNlcr6mEgGNO8osRL80loVqJBjhLZlHCSi66B7oS5qty9KNBhHukdoo_4csi_ARw4Sp5JNXc2TAw68njSTdWZWL_gkZFPnCbr5ulZTMdXsMwRI3HiHJgVxiEwJiBY0q4fJVMBPVCux9Hba6rWs6GUB7rDVL48mbgYl8yt9dqw_-Yw1fYwCxrlHXghb08LU7dlOzQq6bLM5kOmX3EnAfSB8Ae3BNfdZ-TJFNtIhOMxwvMdtMGMI0Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-25 20:39:51,457:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2023-11-25 20:39:51,457:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Nov 2023 19:39:50 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796010606
Replay-Nonce: v0bMowfishBxPWZOSxnS_7jK4cfDHPhErwNgpY9N4EA-eHxHsL8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:09Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796010606"
}
2023-11-25 20:39:51,458:DEBUG:acme.client:Storing nonce: v0bMowfishBxPWZOSxnS_7jK4cfDHPhErwNgpY9N4EA-eHxHsL8
2023-11-25 20:39:51,458:DEBUG:acme.client:JWS payload:
b''
2023-11-25 20:39:51,463:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlzaEJ4UFdaT1N4blNfN2pLNGNmREhQaEVyd05ncFk5TjRFQS1lSHhIc0w4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1MzEyMDYifQ",
  "signature": "aMIDDCo8kbfji_FKZWXAgSq9I44Bp7gSMVba837FGF4ExsNIMcaAHZNMMLSuwOlDOsSaU6_ipc_r7_KRx-OLFcWJs-iEisLsvJr9aLkXIhVapx_TfZyhzKJby8_LTBawhA9gwYHrwLpG077EgFyxXAGsBjLoJKI4yEqefxXQuH5xGJn_FPXK7cXTqBDCXAq0c1UcSrKX-uLu7dTfuJ48UDGkDAG6Os7pMToBcUBa9SF7Pa-blm0EhyjRiaXHyKbLvcJ4eLbCfbVgTH4fNBqsIctw-gXTNgINZaDs7BfSYI_7tYt7sc2S1vS3GgF5cC4Q72_j3tuSD9hOVRuGrv1yZg",
  "payload": ""
}
2023-11-25 20:39:51,615:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066531206 HTTP/1.1" 200 804
2023-11-25 20:39:51,616:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:39:50 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfiy514clp1MWPMAZUJ21CE3d-XPbDSmhNaGIzyJi7bjLE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:09Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/HwkKGg",
      "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/RFhChg",
      "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/Q06UlA",
      "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI"
    }
  ]
}
2023-11-25 20:39:51,616:DEBUG:acme.client:Storing nonce: v0bMowfiy514clp1MWPMAZUJ21CE3d-XPbDSmhNaGIzyJi7bjLE
2023-11-25 20:39:51,617:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-25 20:39:51,617:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2023-11-25 20:39:51,617:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-25 20:39:51,617:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-25 20:39:51,618:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:39:51,618:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-25 20:39:51,618:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-25 20:39:51,619:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-25 20:39:51,620:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:39:51,667:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-25 20:39:52,073:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-25 20:39:52,074:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2023-11-25 20:39:52,075:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2023-11-25 20:39:52,079:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:49 UTC.
2023-11-25 20:39:52,079:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-25 20:39:52,079:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-25 20:39:52,084:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03FFBCB0>
Prep: True
2023-11-25 20:39:52,084:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03FFBCB0> and installer None
2023-11-25 20:39:52,084:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-25 20:39:52,099:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-25 20:39:52,100:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-25 20:39:52,102:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-25 20:39:52,554:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-25 20:39:52,555:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:39:51 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "nbtRv-rCC-s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-25 20:39:52,555:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-25 20:39:56,586:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7066_key-certbot.pem
2023-11-25 20:40:00,203:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7064_csr-certbot.pem
2023-11-25 20:40:00,203:DEBUG:acme.client:Requesting fresh nonce
2023-11-25 20:40:00,204:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-25 20:40:00,355:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-25 20:40:00,355:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:39:59 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfist0MQG0vLyBoVgIOxBeNx3pqN78sMBLnQ3qWYr4c4ZE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-25 20:40:00,355:DEBUG:acme.client:Storing nonce: v0bMowfist0MQG0vLyBoVgIOxBeNx3pqN78sMBLnQ3qWYr4c4ZE
2023-11-25 20:40:00,356:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-25 20:40:00,361:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlzdDBNUUcwdkx5Qm9WZ0lPeEJlTngzcHFONzhzTUJMblEzcVdZcjRjNFpFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Rf0KIeooBX-Z855xxb3eanwUSbWj0Ya8X24fa-Ly9_eEbAtZucWyuFwF2n839r6qzy4PnqomxQH6tEyx-gKucOktWB-T_nlfItCTmXhvbZqZooZr9XmDvCNbqY5c7SGR-RT3WfLHbu4f_Np3KSFYHcbn_jduv6uxmNHFDDF3ay319s1ckCbxbcy2dtrxEH4mcZ04MZGqouqiYFMxLte1aIvyFV2CfqGU4vGLPD_m6qQBQzS09vItCHkyuA9ZbqY0OPa15q1yQBI6xpqUELV4BWEctUm1XNk_ux65WHPVzrrtqlmLSreGHGMIjrW_Qv3mZe39pNVP0wEZ0HWtks-V3A",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-25 20:40:00,533:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2023-11-25 20:40:00,534:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Nov 2023 19:39:59 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796034066
Replay-Nonce: v0bMowfitlMUQkbFkBuHzmab5G1rzfLF4PPTZUrqXBcGUgdc8z0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:17Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796034066"
}
2023-11-25 20:40:00,534:DEBUG:acme.client:Storing nonce: v0bMowfitlMUQkbFkBuHzmab5G1rzfLF4PPTZUrqXBcGUgdc8z0
2023-11-25 20:40:00,535:DEBUG:acme.client:JWS payload:
b''
2023-11-25 20:40:00,539:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zml0bE1VUWtiRmtCdUh6bWFiNUcxcnpmTEY0UFBUWlVycVhCY0dVZ2RjOHowIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1NjYzNTYifQ",
  "signature": "p8f_mRqLVstS8aoakQujScErQ6seVjcQEfOg-p-BYs290aos4MiGimOg_Yx8IFxbhRQnyYLaHXWDivR6CSo5rfY1Mig4SEI6KL1z7mu2KmUBqd1oRoVvXXCt--56AJRDke1-QXAqyfgcY0_HEN_aaLCOlaARanP1mduSWWNIALDZZpeg1P1Ogr53pFbDTL3fmq0xzKVvst8xYqHkv568PCTn8KmBat1zFnfi3YHPhGGGBJsKZka7rto4Yb-apk45_wRT8DL5Fv6N7ipsdUxdFJ8jqPtlRxvv7F2d0MUUDaeyL8c8Xs83AY-KzIESx8KPj01pg-XwNGS7wb05usewfw",
  "payload": ""
}
2023-11-25 20:40:00,706:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066566356 HTTP/1.1" 200 807
2023-11-25 20:40:00,706:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:39:59 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfinzmFj7wESB-TK1hmgSJ3EE3GT6oW1v9cFCR5lbhbOYA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:17Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/Ahrirw",
      "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/5ji8UA",
      "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/9qmJcg",
      "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0"
    }
  ]
}
2023-11-25 20:40:00,706:DEBUG:acme.client:Storing nonce: v0bMowfinzmFj7wESB-TK1hmgSJ3EE3GT6oW1v9cFCR5lbhbOYA
2023-11-25 20:40:00,707:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-25 20:40:00,707:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2023-11-25 20:40:00,708:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-25 20:40:00,708:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-25 20:40:00,708:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:40:00,709:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-25 20:40:00,709:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-25 20:40:00,709:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-25 20:40:00,710:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:40:00,746:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-25 20:40:00,986:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-25 20:40:00,988:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-25 20:40:00,988:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-25 20:40:00,993:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:02 UTC.
2023-11-25 20:40:00,993:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-25 20:40:00,994:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-25 20:40:00,998:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x045762D0>
Prep: True
2023-11-25 20:40:00,999:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x045762D0> and installer None
2023-11-25 20:40:00,999:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-25 20:40:01,004:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-25 20:40:01,005:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-25 20:40:01,006:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-25 20:40:01,555:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-25 20:40:01,555:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:00 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "wxAztCgxoZ0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2023-11-25 20:40:01,556:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-25 20:40:05,822:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7067_key-certbot.pem
2023-11-25 20:40:09,426:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7065_csr-certbot.pem
2023-11-25 20:40:09,427:DEBUG:acme.client:Requesting fresh nonce
2023-11-25 20:40:09,427:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-25 20:40:09,635:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-25 20:40:09,636:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:08 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjIXfRo2JA47-PN6izjA97sGCOdLFVHbWWGKRHzLq442g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-25 20:40:09,636:DEBUG:acme.client:Storing nonce: SFMYLIQjIXfRo2JA47-PN6izjA97sGCOdLFVHbWWGKRHzLq442g
2023-11-25 20:40:09,636:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2023-11-25 20:40:09,642:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpJWGZSbzJKQTQ3LVBONml6akE5N3NHQ09kTEZWSGJXV0dLUkh6THE0NDJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "hsCsQTSKR9xEpt_S22nkbWg1K23NrABAzUN68HbMu3bNeJYe4HeroRDglJD0ASM8nUs5e0OjO2SPjqLBbvB5LeONvzCD1qI-1S8zEVxGjpYwyl1sDEcfru0KuCFIY0wmoojVD-Q4xfJ5QFIWt8M0qolJ-fgmu5Bso-Kxk0_R_dMsnW8WmyGvG5qsSJNQLo4qH3Tjic9zgdXljNvQx-ICm9N1-7zXxQPFxA0SrEniDUPCCXbkJ3Zr1TqknWVe9JbgbxpD_DmVftEc_-KGMlMn6dYn6DnqTlQF0CarYjGS8eiupZpbsBHlllE6bUDJXBRB6f3n0tAR-Mf0NeJskQaPvA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-25 20:40:09,842:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2023-11-25 20:40:09,842:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Nov 2023 19:40:08 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796055606
Replay-Nonce: jXyutbsnmrq9YiCIso344NC5MK6GmPIbiTlrjL_eFaZlCLUQvSg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:26Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796055606"
}
2023-11-25 20:40:09,843:DEBUG:acme.client:Storing nonce: jXyutbsnmrq9YiCIso344NC5MK6GmPIbiTlrjL_eFaZlCLUQvSg
2023-11-25 20:40:09,843:DEBUG:acme.client:JWS payload:
b''
2023-11-25 20:40:09,847:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25tcnE5WWlDSXNvMzQ0TkM1TUs2R21QSWJpVGxyakxfZUZhWmxDTFVRdlNnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1OTg1NzYifQ",
  "signature": "YuSdKXjZ81351gf0R4BHR6T5-uVh4MfW7SsYaJkqi4CSg4IQPSwheuAXE4NlQkqot0COhjD73UTerFJD5LT9NdZe7VH1cKMMDacdntNEopE6KyQnsRFLeG0JAIgYik34n9zgFb0eTCvRAzpI8fcUjBZ6vMyLMpDz_wOvzKf8MIYiTVWOWzO-Kzacyb2ze-bHxkI4U5OqRy73ltYSbK7y2GTnnuFZQXSag4uz3CcGjZClfrGwjLhAweyiSRUUhbDwg1Jp2e1SeZUsLMRuajYb2s3zR0uSpGEnjVDcdtz9rs8vyA36XqJ1E1MBNojait2BB18KXLA-AbJbnOSa5CpTFg",
  "payload": ""
}
2023-11-25 20:40:10,035:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066598576 HTTP/1.1" 200 801
2023-11-25 20:40:10,035:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:08 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnCrbg6yIA68-nIORDv0jACvSWnawcnTPsafCQk-1taMU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:26Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/f3URKA",
      "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/iDceBQ",
      "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/LT38xQ",
      "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs"
    }
  ]
}
2023-11-25 20:40:10,035:DEBUG:acme.client:Storing nonce: jXyutbsnCrbg6yIA68-nIORDv0jACvSWnawcnTPsafCQk-1taMU
2023-11-25 20:40:10,036:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-25 20:40:10,036:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2023-11-25 20:40:10,037:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-25 20:40:10,037:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-25 20:40:10,038:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:40:10,038:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-25 20:40:10,038:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-25 20:40:10,038:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-25 20:40:10,040:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:40:10,076:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-25 20:40:10,476:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-25 20:40:10,477:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-25 20:40:10,478:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-25 20:40:10,482:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:14 UTC.
2023-11-25 20:40:10,482:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-25 20:40:10,483:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-25 20:40:10,487:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04576BD0>
Prep: True
2023-11-25 20:40:10,488:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04576BD0> and installer None
2023-11-25 20:40:10,488:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-25 20:40:10,493:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-25 20:40:10,494:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-25 20:40:10,496:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-25 20:40:10,946:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-25 20:40:10,946:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:09 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "wBxA_a53xag": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2023-11-25 20:40:10,947:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-25 20:40:14,944:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7068_key-certbot.pem
2023-11-25 20:40:18,576:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7066_csr-certbot.pem
2023-11-25 20:40:18,576:DEBUG:acme.client:Requesting fresh nonce
2023-11-25 20:40:18,577:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-25 20:40:18,726:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-25 20:40:18,727:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:17 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8u1rdTKpgjIZ6hDmgl10fGh_x0sImYzgrOXNAUwuf7hk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-25 20:40:18,727:DEBUG:acme.client:Storing nonce: nbWKegf8u1rdTKpgjIZ6hDmgl10fGh_x0sImYzgrOXNAUwuf7hk
2023-11-25 20:40:18,727:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-25 20:40:18,732:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjh1MXJkVEtwZ2pJWjZoRG1nbDEwZkdoX3gwc0ltWXpnck9YTkFVd3VmN2hrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "nerXXZkkMXgYTtL8ql5ABj06Fgyr1KGz36-C_vacsIRfj9Stx_BiLqNtMEUYM5YLTTwjYAnIS1P3QjHBuBiCtHHCk7sR1MDT3qiHLls3XvDyqPkKU2AgBFuObeyljqQawLQe4_wxNddqJDDQQtVNqdMrIjg-dhyuZWcpcGShkquJDPwbfzKwgW2INFvq2AD16As7IXK75jjfTD2Oi9c7wgorck4tr4YAOggry5d8F3Xl-NyDugeXwBUayOd77e3FSSo6c_wES2ujiP_R0FDaK6MyyiUeTuus1l231oVkGMkJEYlSJXo_xgBrCzKgaqDSHDC0sNT-tMtCvfL0enoWHA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-25 20:40:18,903:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-25 20:40:18,903:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Nov 2023 19:40:17 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796073426
Replay-Nonce: nbWKegf8GbTsuB1b2UOyJsT48ZgZxQGgXLB4gf55-ZlZv9XhqXg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796073426"
}
2023-11-25 20:40:18,903:DEBUG:acme.client:Storing nonce: nbWKegf8GbTsuB1b2UOyJsT48ZgZxQGgXLB4gf55-ZlZv9XhqXg
2023-11-25 20:40:18,903:DEBUG:acme.client:JWS payload:
b''
2023-11-25 20:40:18,909:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhHYlRzdUIxYjJVT3lKc1Q0OFpnWnhRR2dYTEI0Z2Y1NS1abFp2OVhocVhnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2MjIxMjYifQ",
  "signature": "HJMXe51hVwx5N_wn1gp0FAgEBwypxXlAn6FgWlRiEBe7W8MeAIYA34cdw4ybHKh-Fshd3HQcHn-gTRL_qU2m0GvRwWfIzaVQKtrt96i3PlT8i8NmEo41Hwj70Icyz7-Wkpi4RhSvBcWQhmn56jn-6tX4PNbZgishW3PKg97Ks2rv6sJO0Hzrlk4QODIsR4xUt_hXy84q-qG7bf8mCuHc4C_u--zOW4p2OHu6jPC6E2F3ECrMi5qJJo0iDsLU2R5v26ITHE34FR_4UvMkrEfcO7rIQzpCGnZEusQVBwPKcnddHNhHyP6Gy4IYB3nE1m0FzSUEwGYetBPYXu6ukSdB1g",
  "payload": ""
}
2023-11-25 20:40:19,077:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066622126 HTTP/1.1" 200 805
2023-11-25 20:40:19,078:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:17 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8v_BAQwwqo8elr7UawFZAEnLYoQc57mmkCAI0gj9DrzM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:34Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/zRCxuQ",
      "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/gv15MQ",
      "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/tryPHA",
      "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI"
    }
  ]
}
2023-11-25 20:40:19,078:DEBUG:acme.client:Storing nonce: nbWKegf8v_BAQwwqo8elr7UawFZAEnLYoQc57mmkCAI0gj9DrzM
2023-11-25 20:40:19,078:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-25 20:40:19,079:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2023-11-25 20:40:19,079:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-25 20:40:19,079:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-25 20:40:19,080:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:40:19,080:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-25 20:40:19,081:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-25 20:40:19,081:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-25 20:40:19,082:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:40:19,117:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-25 20:40:19,325:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-25 20:40:19,326:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2023-11-25 20:40:19,327:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2023-11-25 20:40:19,331:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:27 UTC.
2023-11-25 20:40:19,331:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-25 20:40:19,331:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-25 20:40:19,336:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x045762D0>
Prep: True
2023-11-25 20:40:19,336:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x045762D0> and installer None
2023-11-25 20:40:19,336:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-25 20:40:19,351:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-25 20:40:19,351:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-25 20:40:19,353:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-25 20:40:19,810:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-25 20:40:19,811:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:18 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "b_8ogGj3Nl0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-25 20:40:19,812:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-25 20:40:23,842:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7069_key-certbot.pem
2023-11-25 20:40:27,488:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7067_csr-certbot.pem
2023-11-25 20:40:27,489:DEBUG:acme.client:Requesting fresh nonce
2023-11-25 20:40:27,489:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-25 20:40:27,646:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-25 20:40:27,647:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:26 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfiY61xkhXASkTawSkChNpTO_AL-ULr45Yos27ivtLXH9g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-25 20:40:27,647:DEBUG:acme.client:Storing nonce: v0bMowfiY61xkhXASkTawSkChNpTO_AL-ULr45Yos27ivtLXH9g
2023-11-25 20:40:27,647:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-25 20:40:27,653:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlZNjF4a2hYQVNrVGF3U2tDaE5wVE9fQUwtVUxyNDVZb3MyN2l2dExYSDlnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "SzikaGCPGt5aOW5tIFsrsUEnwIbouu9N6X_ubrvUNeWkIFFQOUX5J80ZWxypXjqDaFnG5BaHekC2V9Uk2ygOdqcTvUTM967Ru0-L0b9yma-uZ0H1_WRjoj-AJuGqKYALM6vmnLO7rAnnOIOBCeMLVvn842-FRPgSPbQ05BlrvRM-5VjHLOMZiUDTRD7qEsJrPS3YjAG8JioVHlUsVRx0qpdZ6eGDJVrzVzb2z0Ny88v5BeX7HGnYwPPmhEq0r83z5F_-P_R--loZNZ2tBlNXEKIRpCgKjaeaeVApkargYCcQLRjT-8OS4oxVJ24gqsB5r0apBjjs8ff7pQz8htdNUQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2023-11-25 20:40:27,827:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2023-11-25 20:40:27,827:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Nov 2023 19:40:26 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796091136
Replay-Nonce: v0bMowfiSQ4PRTQ2nmZWiTSN1o5Yv90v4gDsyuoP1-7KMPM5nRc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:43Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796091136"
}
2023-11-25 20:40:27,828:DEBUG:acme.client:Storing nonce: v0bMowfiSQ4PRTQ2nmZWiTSN1o5Yv90v4gDsyuoP1-7KMPM5nRc
2023-11-25 20:40:27,828:DEBUG:acme.client:JWS payload:
b''
2023-11-25 20:40:27,834:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlTUTRQUlRRMm5tWldpVFNOMW81WXY5MHY0Z0RzeXVvUDEtN0tNUE01blJjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NDY4OTYifQ",
  "signature": "EfJaOLYEHkT07WD2yuM9MbpvbFaSSjo7LBD6aEFZBp9ktGu1PptGLr9ichjob604Mb2pehrkiwJ8VtElmTworeap9TE1tF2CPB62I0e9Sxv1E3-J-aL4_RDDysY4WN_lWLRWKSfBXRdnYKv1-xvgfwMenFUAzeJKtxN1QX8W0xrb0m6mIvuPnNf7JDuSQJv9u4wPxA9TH_ahbZlEMoAlOz99-O9TvMvI9qIZrRsU7L540lI1Lle4pxWwCZKPbIK4rSWQedhKaagzSuA8BeadxQTZidRBdDVeAZGbuBcKezbYvSV0Jeu4a1mKdligQ3flJVic4NboYhKDybi0zfBUMA",
  "payload": ""
}
2023-11-25 20:40:28,004:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066646896 HTTP/1.1" 200 809
2023-11-25 20:40:28,004:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:26 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfigAQ7hAuoXSOUYplSad7HZvUTG3KDbDQpvwjI396HINo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:43Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/juW_-A",
      "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/EWbN0Q",
      "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/0CyP5g",
      "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8"
    }
  ]
}
2023-11-25 20:40:28,004:DEBUG:acme.client:Storing nonce: v0bMowfigAQ7hAuoXSOUYplSad7HZvUTG3KDbDQpvwjI396HINo
2023-11-25 20:40:28,005:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-25 20:40:28,005:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2023-11-25 20:40:28,006:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-25 20:40:28,006:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-25 20:40:28,007:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:40:28,007:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-25 20:40:28,007:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-25 20:40:28,007:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-25 20:40:28,008:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:40:28,044:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-25 20:40:28,318:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-25 20:40:28,319:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-25 20:40:28,320:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-25 20:40:28,325:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:41 UTC.
2023-11-25 20:40:28,325:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-25 20:40:28,325:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-25 20:40:28,330:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04881B50>
Prep: True
2023-11-25 20:40:28,330:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04881B50> and installer None
2023-11-25 20:40:28,330:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-25 20:40:28,335:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-25 20:40:28,336:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-25 20:40:28,338:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-25 20:40:28,877:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-25 20:40:28,877:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:27 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "dQdfAp9gol4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-25 20:40:28,878:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-25 20:40:32,849:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7070_key-certbot.pem
2023-11-25 20:40:36,475:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7068_csr-certbot.pem
2023-11-25 20:40:36,476:DEBUG:acme.client:Requesting fresh nonce
2023-11-25 20:40:36,476:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-25 20:40:36,655:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-25 20:40:36,656:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:35 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjXiQ5_hOD-5iFbJ2eZ3Jyh95jsksiWEVjfaRAzyfcn6M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-25 20:40:36,656:DEBUG:acme.client:Storing nonce: SFMYLIQjXiQ5_hOD-5iFbJ2eZ3Jyh95jsksiWEVjfaRAzyfcn6M
2023-11-25 20:40:36,656:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-25 20:40:36,662:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpYaVE1X2hPRC01aUZiSjJlWjNKeWg5NWpza3NpV0VWamZhUkF6eWZjbjZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "m7A2NjL1Rm5yUxrXfCiPXVTbXW9T8KKS-MEU4BPlvs6Eiv-WQi4Si5sQjVpH8KZwycAgH1DzqavUqxHJw83KhbIE12sYAczuNhAC4A3ReW2CoHJpeJZ8i_Uor8WeW37PycWPFnQvXXl4lHvx-z_ta_nvPRX_oOeDRHUK-xpJ24VJuxtCtNCw-ES8MPb7YvVhdQ1K9oCQ84RAHpN3cchpr2UqkA6XfN429ohUCtu1xH1e9icmGhFJQmiuMZLtFLLdHx7ne27CUbf2gOibJrbz9pR5Gwtkmikgf0MAQqYCxGFbsC0BEwuqgm0dJNslb389xKUR-chYtpwGjQcRXcTzcA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2023-11-25 20:40:36,860:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2023-11-25 20:40:36,861:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Nov 2023 19:40:35 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796108646
Replay-Nonce: jXyutbsn2ao5p96KHrB75-JybmdUv6CVDRGcn_m__Dk3SJKHfEM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796108646"
}
2023-11-25 20:40:36,861:DEBUG:acme.client:Storing nonce: jXyutbsn2ao5p96KHrB75-JybmdUv6CVDRGcn_m__Dk3SJKHfEM
2023-11-25 20:40:36,861:DEBUG:acme.client:JWS payload:
b''
2023-11-25 20:40:36,867:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic24yYW81cDk2S0hyQjc1LUp5Ym1kVXY2Q1ZEUkdjbl9tX19EazNTSktIZkVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NjkyODYifQ",
  "signature": "ckCRc4f1EOTvMsVqi_6EuqyOxJ5uAD5rqqGccbaF6eyyud7XStFmyvrHrmnxd-M8su9OkZ-HbMKw9Vpaziyaosdf8WyDoFZ4LrZbXwLmjrwrJ5eJCCiyVwdhvO9G5tcFHpz-funwHBgtIoUvc2ORk_mfyGupPl6GTMrlB4jcYJyn0CKyJLRTHPgsl4vGXiORP3MmRYBpWylg7yhBp2AWpYUyCXArLVpQa2Uqjm4nsIY2gyx5-JIRTzZ3pZ6TfnmKRaCp_qWBJ3mcrFF8UAuhvQn9jGWOp3udgvx_UEEmROz3XRo7TGd7aMPPDxswBBMoOccsV1aNmKY1p7FaqTyseg",
  "payload": ""
}
2023-11-25 20:40:37,049:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066669286 HTTP/1.1" 200 806
2023-11-25 20:40:37,049:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:35 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnMMrU0xehSksGQ2ImSiQNBqcvcB4oKQeZZo0L4DbQANw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:52Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/DZCB_w",
      "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/3LwN7g",
      "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/N8DWOw",
      "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY"
    }
  ]
}
2023-11-25 20:40:37,050:DEBUG:acme.client:Storing nonce: jXyutbsnMMrU0xehSksGQ2ImSiQNBqcvcB4oKQeZZo0L4DbQANw
2023-11-25 20:40:37,050:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-25 20:40:37,051:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2023-11-25 20:40:37,051:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-25 20:40:37,051:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-25 20:40:37,052:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:40:37,052:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-25 20:40:37,052:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-25 20:40:37,053:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-25 20:40:37,054:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:40:37,099:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2023-11-25 20:40:37,099:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-25 20:40:37,099:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2023-11-25 20:40:37,107:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2023-11-25 20:40:37,109:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2023-11-25 20:40:37,109:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2023-11-25 20:40:37,109:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2023-11-25 20:40:37,110:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2023-11-25 20:40:37,111:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2023-11-25 20:40:37,147:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-25 20:40:37,540:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-25 20:40:37,542:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-25 20:40:37,542:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-25 20:40:37,547:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:56 UTC.
2023-11-25 20:40:37,547:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-25 20:40:37,547:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-25 20:40:37,552:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04596AB0>
Prep: True
2023-11-25 20:40:37,553:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04596AB0> and installer None
2023-11-25 20:40:37,553:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-25 20:40:37,569:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-25 20:40:37,570:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-25 20:40:37,571:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-25 20:40:38,103:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-25 20:40:38,104:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:36 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "4E_WyKkcWnk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-25 20:40:38,105:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-25 20:40:41,805:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7071_key-certbot.pem
2023-11-25 20:40:45,460:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7069_csr-certbot.pem
2023-11-25 20:40:45,461:DEBUG:acme.client:Requesting fresh nonce
2023-11-25 20:40:45,461:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-25 20:40:45,638:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-25 20:40:45,639:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:44 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjjFpnfc4PTymvctASH3XWXZdKvB-3mSg9PV3Fefy1hyU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-25 20:40:45,639:DEBUG:acme.client:Storing nonce: SFMYLIQjjFpnfc4PTymvctASH3XWXZdKvB-3mSg9PV3Fefy1hyU
2023-11-25 20:40:45,639:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-25 20:40:45,645:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpqRnBuZmM0UFR5bXZjdEFTSDNYV1haZEt2Qi0zbVNnOVBWM0ZlZnkxaHlVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ewy7jxNMz-OvIOk3qgVC7gcusoAMBuDeMeBtTua36WqL3KYPBDaTvjT0wO1VCDRHOSAa1luTjmrhBSM88tvJiyuHWEkb_wb19I37QSUA5eZu0SWIL7CptW4cju_slYcE6dfRl8o2Su1iQLOO02ySj3ebj-CGhSbLNzlwVTL5z9WuFIccijfTI4LYlmyFKYYxQBbzi639iQs7UqC6doLnqvGtDbglG5t2skSmRzE4Wr0ms89EQmXVRF2P6qdhPA4RtLnd_e9jt-D_d0Dy5zMXB66c8a71IgsaVEqp_ZWZrVzMndssAlgESg6PxawFMQ1QbV39GhKvZXCAI86wQKNcUQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-25 20:40:45,845:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2023-11-25 20:40:45,845:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Nov 2023 19:40:44 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796125916
Replay-Nonce: SFMYLIQjWynHolx0nie2mKmIwGbARbFOcXTceb0sJdsG9SImnrs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:00Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796125916"
}
2023-11-25 20:40:45,846:DEBUG:acme.client:Storing nonce: SFMYLIQjWynHolx0nie2mKmIwGbARbFOcXTceb0sJdsG9SImnrs
2023-11-25 20:40:45,846:DEBUG:acme.client:JWS payload:
b''
2023-11-25 20:40:45,851:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpXeW5Ib2x4MG5pZTJtS21Jd0diQVJiRk9jWFRjZWIwc0pkc0c5U0ltbnJzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2OTI4NjYifQ",
  "signature": "WUYUXOEP6ABkQuLAqjPMYm6leajUFnmngAleChCzdOTRDKOmwl2DF72sdVvhPGm7cquQfQHXdAVSETRNZs_TfIBNuMZ63fMoQLn7KVkanYBnkZTW_ZvUQ3C4IBffdcEKF0iIFiPmUNMitvW-sEfoviK2qPpyjBnOOcbA1BmAC6su7hhhQBEgxg12camKYFTOFSZbD_qZApcSIikjwtusGqqMzxGT2p4-DLNt4nl72UbONBEklM9SFNymTGuPKVAt_t0lRkDgW91IHfFuqZrzIyrIOj4X8_n7xkBVdRgmzzqEexs-uRwc23EzSrMURh0Hi8iPTRWbZjkCWqwjV1b2tA",
  "payload": ""
}
2023-11-25 20:40:46,033:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066692866 HTTP/1.1" 200 811
2023-11-25 20:40:46,033:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:44 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnTLsEQHVviZxTkCrV8BNFyklpuMa66yacTs5ihTKi4-U
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:00Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/TZHJ0A",
      "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/YBeUJQ",
      "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/i1p7PQ",
      "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0"
    }
  ]
}
2023-11-25 20:40:46,034:DEBUG:acme.client:Storing nonce: jXyutbsnTLsEQHVviZxTkCrV8BNFyklpuMa66yacTs5ihTKi4-U
2023-11-25 20:40:46,034:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-25 20:40:46,035:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2023-11-25 20:40:46,035:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-25 20:40:46,035:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-25 20:40:46,036:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:40:46,036:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-25 20:40:46,036:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-25 20:40:46,037:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-25 20:40:46,038:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:40:46,075:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-25 20:40:46,563:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-25 20:40:46,565:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-25 20:40:46,566:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-25 20:40:46,570:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:09 UTC.
2023-11-25 20:40:46,570:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-25 20:40:46,571:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-25 20:40:46,576:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04895870>
Prep: True
2023-11-25 20:40:46,576:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04895870> and installer None
2023-11-25 20:40:46,576:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-25 20:40:46,581:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-25 20:40:46,582:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-25 20:40:46,584:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-25 20:40:47,038:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-25 20:40:47,038:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:45 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "EqhZHJVDCLI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-25 20:40:47,039:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-25 20:40:51,319:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7072_key-certbot.pem
2023-11-25 20:40:54,916:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7070_csr-certbot.pem
2023-11-25 20:40:54,916:DEBUG:acme.client:Requesting fresh nonce
2023-11-25 20:40:54,916:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-25 20:40:55,066:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-25 20:40:55,066:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:53 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfi0PV81l4vxvfIu7MP2sdrCs6zxdndhFxc_bUJDohQFvw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-25 20:40:55,067:DEBUG:acme.client:Storing nonce: v0bMowfi0PV81l4vxvfIu7MP2sdrCs6zxdndhFxc_bUJDohQFvw
2023-11-25 20:40:55,067:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-25 20:40:55,074:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmkwUFY4MWw0dnh2Zkl1N01QMnNkckNzNnp4ZG5kaEZ4Y19iVUpEb2hRRnZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "VJvXZ3iBJfp3FjBlQ0VEI1ZopY90FL-AuanBQ8C9EM0Ivr_HbJ3Ohlt_WQV78eNwSe97Z24zUCG8y6dKvTte6GLWKk0JtgtbgqlWMHTlPELE1BUlohFpEmMMEb2NVzWzWg6CIkiFiRV3L60PYcIsARB0hN8XNTrgom7uRDtXj5wKCS4JEzNy2TOL_PTIWW79zqAH27h0eh8lPxLF3mMPyZzQI07o_DbDzdwy1GNLGBvoJiYTw8_nf1m7EIRSY45v9UxRoWnVrN_EfLC8GJELj1ka61ztABPIValSH37z8R0W9hMXDy8qBKHmj3UCGV8O8RHbtFlZC8h4jzPQvl0uVg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-25 20:40:55,269:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2023-11-25 20:40:55,270:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Nov 2023 19:40:54 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796165656
Replay-Nonce: nbWKegf8XNw0WzV6ncjc0IAwsepXRmT3xKk3YMANiiIYdjJCxuA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:08Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796165656"
}
2023-11-25 20:40:55,270:DEBUG:acme.client:Storing nonce: nbWKegf8XNw0WzV6ncjc0IAwsepXRmT3xKk3YMANiiIYdjJCxuA
2023-11-25 20:40:55,270:DEBUG:acme.client:JWS payload:
b''
2023-11-25 20:40:55,276:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhYTncwV3pWNm5jamMwSUF3c2VwWFJtVDN4S2szWU1BTmlpSVlkakpDeHVBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3MzgwMTYifQ",
  "signature": "npNTYJimST7xc63uFfHVtCU8Lik_MlOJ5x8p7OiYPm9TD_5yY6SkBxUJFTOxZ0GvL4xbsZ1souuKsSfnHJYf8lUOJZcHokF5KK8OIp3yFjQy-HwfQlN8nnPbvtQi-JNGDXMtA4OjNdwl13a-KUUWfNrwVu3pfW7gPJ07bJYk3KvsBkuO1-hF3MOd1ZzWN6m6-hUp_Peztiqch_AfsX5QTQvSGkxiretTrDKY6kheKX0hZc7AmLdcwKPEKT6SgsVC8UpP8vSJYRugNSik_IXWolSlxYwL0vOZbihEZDnwFUlFTOgtTpIlSBf0IReCUb_VW7-ZPoFbMaENDzUbIrA53g",
  "payload": ""
}
2023-11-25 20:40:55,441:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066738016 HTTP/1.1" 200 810
2023-11-25 20:40:55,442:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:54 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8rHfoOgETjinXpJtm1XovCwR1YyYwTO3pY9lpJZbM6Dw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:08Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/ypE5ag",
      "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/HUvErQ",
      "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/nzokTQ",
      "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM"
    }
  ]
}
2023-11-25 20:40:55,442:DEBUG:acme.client:Storing nonce: nbWKegf8rHfoOgETjinXpJtm1XovCwR1YyYwTO3pY9lpJZbM6Dw
2023-11-25 20:40:55,442:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-25 20:40:55,443:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2023-11-25 20:40:55,443:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-25 20:40:55,444:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-25 20:40:55,445:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:40:55,445:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-25 20:40:55,445:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-25 20:40:55,445:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-25 20:40:55,446:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:40:55,481:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-25 20:40:55,851:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-25 20:40:55,852:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is signed by the certificate's issuer.
2023-11-25 20:40:55,853:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD
2023-11-25 20:40:55,857:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:22 UTC.
2023-11-25 20:40:55,857:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-25 20:40:55,857:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-25 20:40:55,862:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0459A470>
Prep: True
2023-11-25 20:40:55,862:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0459A470> and installer None
2023-11-25 20:40:55,862:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-25 20:40:55,877:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-25 20:40:55,878:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-25 20:40:55,880:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-25 20:40:56,330:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-25 20:40:56,330:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:40:55 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "FDeFqbB9Je0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-25 20:40:56,331:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-25 20:41:00,109:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7073_key-certbot.pem
2023-11-25 20:41:03,763:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7071_csr-certbot.pem
2023-11-25 20:41:03,764:DEBUG:acme.client:Requesting fresh nonce
2023-11-25 20:41:03,764:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-25 20:41:03,914:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-25 20:41:03,914:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:41:02 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfikqh6f6cyzZGkSTZC-NijOyWUGhW-flyD8H85Sg8Tnt8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-25 20:41:03,914:DEBUG:acme.client:Storing nonce: v0bMowfikqh6f6cyzZGkSTZC-NijOyWUGhW-flyD8H85Sg8Tnt8
2023-11-25 20:41:03,915:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-25 20:41:03,920:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlrcWg2ZjZjeXpaR2tTVFpDLU5pak95V1VHaFctZmx5RDhIODVTZzhUbnQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "qzo-6-mKo1IuGEofWCkjbXM07jiakqEVGW_BIS07im83GBTz2j7vcMl88uOtisI04zR_LCj51KJ6ocsyTudtRoiudAtvb8KxNVleyfBAbT39_Yl9HJ0-xgYusSFUFyH2sFbP7xDSML0SZeLFY0_qVVpQQiaNDGNL61py8QHXtDpXwTTKcezdL33xRGMZI3ddNQNrCANLUP2O9JGVBKY0BC0Os60kPahVALBa2ThQQ4vkD_gG_UoNo2JTe6UfuRKMfIrBGISQIHtdRKutQQEHFj3Lg_HaftKglvY-8pVQbvXD7pm06oM8VD24bjzS4lEZqF2Sm7jkH0Cn8vYNU4ldcQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2023-11-25 20:41:04,089:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2023-11-25 20:41:04,089:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Nov 2023 19:41:02 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796190496
Replay-Nonce: v0bMowfiVRgsrMs1CPu-TYJVrB6WJeqN3SbELsOnQZSZuJiz2to
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:17Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796190496"
}
2023-11-25 20:41:04,089:DEBUG:acme.client:Storing nonce: v0bMowfiVRgsrMs1CPu-TYJVrB6WJeqN3SbELsOnQZSZuJiz2to
2023-11-25 20:41:04,090:DEBUG:acme.client:JWS payload:
b''
2023-11-25 20:41:04,095:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlWUmdzck1zMUNQdS1UWUpWckI2V0plcU4zU2JFTHNPblFaU1p1Sml6MnRvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3NzE0MTYifQ",
  "signature": "C9CUgQcSE6h3DZQ6IcFXW7R5njjRFIzdteBMtw7yPH0T4Hs6qQUed9o4Uknn5sJKFE1bCeDlWtgtT8z4hCO4iS1-f6yxedtz41wjHAMx7c9IyUdUvqYkcYqWbUqKVaG4rVEeuMA2CIjXkEouaAVmY_-Ci1iGZA8j44bFMjz1Hqxp4h-Go8rr8q6Kw-MrKYqQOjSRGNcOsnX43UQbxnHSyeoGzvO9RpsSYTK_UkFpdbOtibLu-RP9Hngu6f-4uW-9l_jhAEGUZImsZx6FBCagWyLZLwemvABJkYC78dpuhuFNV91R1B5KiD2WXy4f1JnR0GGqB3AU5umiF8FdGfFNIw",
  "payload": ""
}
2023-11-25 20:41:04,264:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066771416 HTTP/1.1" 200 809
2023-11-25 20:41:04,265:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:41:03 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf83Dg25HjXWNZe_HMcEojcb11-aGWwJpFzRdPUTIWE0O8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:17Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/1qhCuQ",
      "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/isn6Gw",
      "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/lLjJ0A",
      "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4"
    }
  ]
}
2023-11-25 20:41:04,265:DEBUG:acme.client:Storing nonce: nbWKegf83Dg25HjXWNZe_HMcEojcb11-aGWwJpFzRdPUTIWE0O8
2023-11-25 20:41:04,266:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-25 20:41:04,266:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2023-11-25 20:41:04,267:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-25 20:41:04,267:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-25 20:41:04,268:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:41:04,268:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-25 20:41:04,268:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-25 20:41:04,268:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-25 20:41:04,269:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:41:04,319:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-25 20:41:04,706:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-25 20:41:04,708:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is signed by the certificate's issuer.
2023-11-25 20:41:04,708:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD
2023-11-25 20:41:04,712:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:34 UTC.
2023-11-25 20:41:04,713:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-25 20:41:04,713:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-25 20:41:04,717:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0488D230>
Prep: True
2023-11-25 20:41:04,718:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0488D230> and installer None
2023-11-25 20:41:04,718:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-25 20:41:04,732:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-25 20:41:04,733:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-25 20:41:04,735:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-25 20:41:05,271:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-25 20:41:05,271:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:41:04 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "FC5PloeJMGc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-25 20:41:05,272:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-25 20:41:09,174:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7074_key-certbot.pem
2023-11-25 20:41:12,824:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7072_csr-certbot.pem
2023-11-25 20:41:12,825:DEBUG:acme.client:Requesting fresh nonce
2023-11-25 20:41:12,825:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-25 20:41:13,005:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-25 20:41:13,006:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:41:11 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjQHNtMgvPdBAPD1TWkPBAOFFT0MpBRnDrdXpiKKmtKXw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-25 20:41:13,006:DEBUG:acme.client:Storing nonce: SFMYLIQjQHNtMgvPdBAPD1TWkPBAOFFT0MpBRnDrdXpiKKmtKXw
2023-11-25 20:41:13,006:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-25 20:41:13,012:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpRSE50TWd2UGRCQVBEMVRXa1BCQU9GRlQwTXBCUm5EcmRYcGlLS210S1h3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "tQDFN1H3RcNA6tatNfaOOwNVayspPb21RbN-vVTQfebvYd9OHvbmDUZrlSjSqlJU588dVzqnDtEZXRBuRwCJBIsZkIMajkair432Wy9yKXhu2sDhuzbGQYhkE_LKc97hZDbszvxrQgjh7XhalwFX6KhSEojkdV6jfpaBYs5DczTBGzkZTneFcWURexaZ44prx8bxalx2aqPazZeG7_je1zMkKIO9gObLwGzZkSc-iCEsgLzJC8BBnunOVP5fs-3JHtAf4cpjFUnpv3yJor08Nw-sWS00ulYyZTG_n36MUvuBfVgDg0BKk8QLE7YxficNflfW8TMo0FTs296SzmmHng",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-25 20:41:13,215:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-25 20:41:13,215:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Nov 2023 19:41:12 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796210686
Replay-Nonce: jXyutbsnB7El_o5EKODHIuLd3a4d-zwdTx1qqGZMazvdBsobKtU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796210686"
}
2023-11-25 20:41:13,216:DEBUG:acme.client:Storing nonce: jXyutbsnB7El_o5EKODHIuLd3a4d-zwdTx1qqGZMazvdBsobKtU
2023-11-25 20:41:13,216:DEBUG:acme.client:JWS payload:
b''
2023-11-25 20:41:13,221:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25CN0VsX281RUtPREhJdUxkM2E0ZC16d2RUeDFxcUdaTWF6dmRCc29iS3RVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4MDAxNjYifQ",
  "signature": "If5fGrJ1YIKu6wlBs9p9lVUSeSNYn_CpFSlIxhmWA4pQzNzn3FPK4rHO8um1yxvNoaIkMTLZ_QURLF3nczGI8FlYQBDVl1l8bYHYDJq0ni38Lr7hjPb5vgYsFqj6lmurzMiBmjTCIfWf-cAnvzBXR0cseTLMgCi3eTy3C4PQfz2nF1AohGSX7xqlT_louxPU1fhYHXuILLJUdFn4nLGSqzNNHhilPY5Zptjg-PvJoa1EDUZHlTeFwyuYUGEpY88nCoBmstf7WUFJL-OlQo6qfOVwqxSGuYnoiAyDxP1IsS7Yp_kbewqVxItDMgU2KgyJAXsZzivu3zf0WaL96vA1-g",
  "payload": ""
}
2023-11-25 20:41:13,414:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066800166 HTTP/1.1" 200 805
2023-11-25 20:41:13,414:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:41:12 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjmkYj_c3gGD3nZ8UWm8m85Yk78RRTMfGB64izvVWtmeE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:25Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/zXEJ0Q",
      "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/b777tA",
      "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/Gd6Xnw",
      "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8"
    }
  ]
}
2023-11-25 20:41:13,415:DEBUG:acme.client:Storing nonce: SFMYLIQjmkYj_c3gGD3nZ8UWm8m85Yk78RRTMfGB64izvVWtmeE
2023-11-25 20:41:13,415:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-25 20:41:13,416:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2023-11-25 20:41:13,416:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-25 20:41:13,416:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-25 20:41:13,417:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:41:13,417:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-25 20:41:13,417:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-25 20:41:13,418:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-25 20:41:13,419:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:41:13,467:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-25 20:41:13,862:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-25 20:41:13,863:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-25 20:41:13,864:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-25 20:41:13,868:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:48 UTC.
2023-11-25 20:41:13,868:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-25 20:41:13,869:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-25 20:41:13,873:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048959B0>
Prep: True
2023-11-25 20:41:13,873:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048959B0> and installer None
2023-11-25 20:41:13,873:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-25 20:41:13,889:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-25 20:41:13,890:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-25 20:41:13,891:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-25 20:41:14,344:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-25 20:41:14,344:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:41:13 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "g1ffyNbj5AI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-25 20:41:14,345:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-25 20:41:18,068:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7075_key-certbot.pem
2023-11-25 20:41:21,676:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7073_csr-certbot.pem
2023-11-25 20:41:21,676:DEBUG:acme.client:Requesting fresh nonce
2023-11-25 20:41:21,676:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-25 20:41:21,827:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-25 20:41:21,827:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:41:20 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfi6iQiG3CKanhaK_S1Ets03xaLrbZcEzAMlWOObBvV-Sw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-25 20:41:21,827:DEBUG:acme.client:Storing nonce: v0bMowfi6iQiG3CKanhaK_S1Ets03xaLrbZcEzAMlWOObBvV-Sw
2023-11-25 20:41:21,828:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-25 20:41:21,835:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zmk2aVFpRzNDS2FuaGFLX1MxRXRzMDN4YUxyYlpjRXpBTWxXT09iQnZWLVN3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "abdbd2rwslSiKiAna79DxEvjUwEO1VQpdZD-I_sp5tRCQbI9poHnLnTZhDstxTz3Z8EF-J5ifn8exJUAjeD56Pbv0tCZNuVYGwZLPLXxE-fdbbOrSXvjl2liuz3FFsh5NRtcLP3xuwFbfeus8kvi6sSQlYYB_TwmOQ9rEJk3rnsIvA5mwzV3H_lRZRmUyPaVxeEs2QMMHQkjMRalAESw42y_uZee_KP_ONe-SVUnPXgTby7kP0526B-ZO5TLaywp_YZ50CQ8smm_Qr4wUtfGf9X-Es47jtc6WWub9IITFB-68Tm8CHt7i72fz4PqK5pyGD-_n2RspMostPjShRaxVA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-25 20:41:22,012:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-25 20:41:22,013:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Nov 2023 19:41:20 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796230126
Replay-Nonce: v0bMowfieNSSapYn0m5yPXQVtaqN1Zo45rkRHrsh9D7UEl3j-So
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796230126"
}
2023-11-25 20:41:22,013:DEBUG:acme.client:Storing nonce: v0bMowfieNSSapYn0m5yPXQVtaqN1Zo45rkRHrsh9D7UEl3j-So
2023-11-25 20:41:22,013:DEBUG:acme.client:JWS payload:
b''
2023-11-25 20:41:22,019:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmllTlNTYXBZbjBtNXlQWFFWdGFxTjFabzQ1cmtSSHJzaDlEN1VFbDNqLVNvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4Mjg2ODYifQ",
  "signature": "FLR3KP6Q451VFXyjd-36r2KZBVamJZI6wh3YEba6TUgtMYNCemJKEx3Js5vmBkJDUEgL3znelOntgSOqyBrV_xnJcEf7hzXhoxYUFJar0VYNIvJzubSHCbB-z29AJgksrMyJhLcn7KfAtovk4R9Za3xwNGe-XDrLGtmz7F2F2ngADlOcbBYmWxhFznVsGJ7wtCtsoFB15CCROq21LSlZl6YM9sXvQh5UFLB13Na1wziWSmzxIND1xmfA0uDzbYsWZL_-IVv6fek_8asHTZfXLVvYJbL_fzYR_ZAZQyVXF8H_I-6Po5njlrQDbEkLTT4sEMwWfXU7Q0bSjuv3CNuLrg",
  "payload": ""
}
2023-11-25 20:41:22,172:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066828686 HTTP/1.1" 200 805
2023-11-25 20:41:22,172:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:41:21 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8hGNVCfL4EDiNXhz9JKBWC-RPSuBZAGnGyyDUnILkKuE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:34Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/TFIwLw",
      "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/se4r1w",
      "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/Hc2_wQ",
      "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs"
    }
  ]
}
2023-11-25 20:41:22,172:DEBUG:acme.client:Storing nonce: nbWKegf8hGNVCfL4EDiNXhz9JKBWC-RPSuBZAGnGyyDUnILkKuE
2023-11-25 20:41:22,173:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-25 20:41:22,173:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2023-11-25 20:41:22,174:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-25 20:41:22,174:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-25 20:41:22,175:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:41:22,175:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-25 20:41:22,175:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-25 20:41:22,176:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-25 20:41:22,177:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:41:22,224:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-25 20:41:22,502:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-25 20:41:22,504:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2023-11-25 20:41:22,504:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2023-11-25 20:41:22,508:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:31:01 UTC.
2023-11-25 20:41:22,508:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-25 20:41:22,509:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-25 20:41:22,514:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04895DF0>
Prep: True
2023-11-25 20:41:22,514:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04895DF0> and installer None
2023-11-25 20:41:22,514:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-25 20:41:22,530:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-25 20:41:22,531:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-25 20:41:22,533:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-25 20:41:23,005:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-25 20:41:23,006:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:41:21 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "IB0FXPaadxA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-25 20:41:23,007:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-25 20:41:27,175:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7076_key-certbot.pem
2023-11-25 20:41:30,785:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7074_csr-certbot.pem
2023-11-25 20:41:30,786:DEBUG:acme.client:Requesting fresh nonce
2023-11-25 20:41:30,786:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-25 20:41:30,936:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-25 20:41:30,936:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:41:29 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfilcDsKQqKlMQkddhRm8_H87WUO8XUUFuP25ZrrnzztGE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-25 20:41:30,937:DEBUG:acme.client:Storing nonce: v0bMowfilcDsKQqKlMQkddhRm8_H87WUO8XUUFuP25ZrrnzztGE
2023-11-25 20:41:30,937:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-25 20:41:30,942:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlsY0RzS1FxS2xNUWtkZGhSbThfSDg3V1VPOFhVVUZ1UDI1WnJybnp6dEdFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "CD-4i0hZ-Xvx_ICV21jEgfba_kPJ_6EKRPSftR1EkTxiYN9G_4dh9aZNezjO5ZuhejEWAasqfRKYCAGBXh6gmIaxjAkMGD5EKzOUnrznRmmoXcwsFeArBO2R3lul2QZiNqDdKJzSv0av9b05dn-JcP3q9hDqpBwDNKCzf68AlPBocPHzGlqL_O6nEaTcwuuVzffLPceyiLUyYW7Q6z6hBGj-lNknU-4MmihWzEYEXYW7UKHJs46G7GW3xjOeyC_vNgoHFqPENM4eO7XxOZMHrIQxrzhw4B1WIBdx3nFOmdTZsUTDrGmaxFwSslYBGFIQwnCBG09VqO7kG0c9HO3MZQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-25 20:41:31,110:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-25 20:41:31,110:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sat, 25 Nov 2023 19:41:29 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796249816
Replay-Nonce: v0bMowfiKAIVOmS1gEZXQziBARfHQRlFdls4Nqd6M9m3nOAswFc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:42Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796249816"
}
2023-11-25 20:41:31,111:DEBUG:acme.client:Storing nonce: v0bMowfiKAIVOmS1gEZXQziBARfHQRlFdls4Nqd6M9m3nOAswFc
2023-11-25 20:41:31,111:DEBUG:acme.client:JWS payload:
b''
2023-11-25 20:41:31,116:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlLQUlWT21TMWdFWlhRemlCQVJmSFFSbEZkbHM0TnFkNk05bTNuT0Fzd0ZjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4NTg1NzYifQ",
  "signature": "TxPXRybWmjsadv_XoedZc79GNkSnkh3p3r3FL-99h3rdHAUYZkaGzz09Lj2Bys7JogBHIN9NEBUTfaB39WmJ5APCUEnAqJHA16OiqKo9CBdo569LCthlqvX3qUWEHxHXjcwMifHqnBr2-oyymH0zXL63CeJ9I-AFJL_5Koh4HZuUTOTuba-2FZbqwShgwC0l6KwS0RLpK34ocetTXVNVv5roQoEtwRRFLfjFrma2N3DyG0HF1FsikFMNrsRwZMisdrFZU6JpWvsGylFlrMWJLkkxReN6znn-NkiiUmOfhlLoKDlVmjV6i5SKxJKqin9wEPRWvpmbjx1G3-OgSHnwIg",
  "payload": ""
}
2023-11-25 20:41:31,269:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066858576 HTTP/1.1" 200 805
2023-11-25 20:41:31,270:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sat, 25 Nov 2023 19:41:30 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8-IuNSoeUEP46AxFKh6xQqfaqpBU3VW-KKBScShgOF_M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:42Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/p5HniQ",
      "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/JwX8uw",
      "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/_ogaVA",
      "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48"
    }
  ]
}
2023-11-25 20:41:31,270:DEBUG:acme.client:Storing nonce: nbWKegf8-IuNSoeUEP46AxFKh6xQqfaqpBU3VW-KKBScShgOF_M
2023-11-25 20:41:31,271:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-25 20:41:31,271:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2023-11-25 20:41:31,271:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-25 20:41:31,272:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-25 20:41:31,272:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:41:31,273:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-25 20:41:31,273:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-25 20:41:31,273:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-25 20:41:31,274:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-25 20:41:31,275:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2023-11-25 20:41:31,275:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2023-11-25 20:41:31,276:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2023-11-25 20:41:31,277:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)