2023-11-21 15:23:52,046:DEBUG:certbot._internal.main:certbot version: 1.6.0
2023-11-21 15:23:52,046:DEBUG:certbot._internal.main:Arguments: []
2023-11-21 15:23:52,046:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2023-11-21 15:23:52,793:DEBUG:certbot._internal.log:Root logging level set at 20
2023-11-21 15:23:52,794:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2023-11-21 15:23:52,827:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04424F30> and installer <certbot._internal.cli.cli_utils._Default object at 0x04424F30>
2023-11-21 15:23:52,864:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 15:23:53,306:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 15:23:53,318:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is signed by the certificate's issuer.
2023-11-21 15:23:53,321:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is: OCSPCertStatus.GOOD
2023-11-21 15:23:53,328:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:23 UTC.
2023-11-21 15:23:53,328:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 15:23:53,328:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 15:23:53,333:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03E5F650>
Prep: True
2023-11-21 15:23:53,333:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03E5F650> and installer None
2023-11-21 15:23:53,333:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 15:23:53,339:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 15:23:53,340:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 15:23:53,342:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 15:23:53,800:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 15:23:53,801:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:23:52 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "7xFcb2EyX_E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 15:23:53,802:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 15:23:57,898:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6960_key-certbot.pem
2023-11-21 15:24:01,622:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6958_csr-certbot.pem
2023-11-21 15:24:01,623:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 15:24:01,623:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 15:24:01,769:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 15:24:01,769:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:00 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8LlpROh8GJajD4j8EF1q4dq8tjYUMP6eaJ5zTrXTrRGo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 15:24:01,770:DEBUG:acme.client:Storing nonce: nbWKegf8LlpROh8GJajD4j8EF1q4dq8tjYUMP6eaJ5zTrXTrRGo
2023-11-21 15:24:01,770:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 15:24:01,777:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhMbHBST2g4R0phakQ0ajhFRjFxNGRxOHRqWVVNUDZlYUo1elRyWFRyUkdvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "EKkD6BBCnaSPhLWlzKRT_gATp-WNbLRCOVFy2Nh9lho7G9iDuv8KF8NTL2r3mBS2RRi9g1hH5L-6SZSCwNrwUp2Y5DbQf0-1K9-ARArmGNTOixKMQdMxPh5VXlssL-H8zSy7biycElUWiDtfZUy4HGNoqtt2KOxtfk7zh9ZXX6Fm_c1SE6tELh8NTQLDGLBKXbUnV0elkeDj3tnVUKXJQWKLOGlA1Aw08mptUbgV6m0iupjC9zBojcA2Y88r0Y7-U39UdthmcEBSerFoX2Fxd_Xi8DWuTRvUHl6d2wVJupzCjtKqpWJ25wphIB4K6sVT9tKMbBcQ5FLuT_vJA1IPMA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-21 15:24:02,092:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2023-11-21 15:24:02,093:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 14:24:00 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223795980256
Replay-Nonce: v0bMowfiqy7OFfKZyH6LC1CKsWHZ4dpwaUwJRoC10ypbxcPQkQo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:00Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223795980256"
}
2023-11-21 15:24:02,094:DEBUG:acme.client:Storing nonce: v0bMowfiqy7OFfKZyH6LC1CKsWHZ4dpwaUwJRoC10ypbxcPQkQo
2023-11-21 15:24:02,094:DEBUG:acme.client:JWS payload:
b''
2023-11-21 15:24:02,107:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlxeTdPRmZLWnlINkxDMUNLc1dIWjRkcHdhVXdKUm9DMTB5cGJ4Y1BRa1FvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY0OTE0ODYifQ",
  "signature": "CUTlekwkGTb0Q3bMRUT8PAJquLNg9AzJ5RhtTh6wOE9o1AQ4COoqhHKylB3cNX4Df7aG2yL3NiuJJye4jXcD3EPbdGyAhlH-jQA3P1ts1Y_MZfG_mtSGr9LXQkCur4ZP9WCS6AtCViG8vQiRmNYAtLXbJjvP7MB_7ZWVAWwu5koYh45qhAMGCEsd1lxjYf1elYxssATmwVbEIs2jOugfiLLtHqbQX8n63OMb9mD_ELnx1Ecj1KIYPUD_9KID5SHYKpgUdeSQtHjjuZaopW4BAEYEUdTE40jUg421fHPQKqCVwqHd1eJOjK90Mmvn377m6abFMlRygMV9rQjsz5_uIw",
  "payload": ""
}
2023-11-21 15:24:02,261:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066491486 HTTP/1.1" 200 810
2023-11-21 15:24:02,262:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:01 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf83qth7WVB19R4MHcDluTM1aeSZlp3lYnSmi4yaQA8CWQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:00Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/iZpoTw",
      "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/hLn7qQ",
      "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/g8UZBg",
      "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48"
    }
  ]
}
2023-11-21 15:24:02,263:DEBUG:acme.client:Storing nonce: nbWKegf83qth7WVB19R4MHcDluTM1aeSZlp3lYnSmi4yaQA8CWQ
2023-11-21 15:24:02,264:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 15:24:02,264:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2023-11-21 15:24:02,265:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 15:24:02,266:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 15:24:02,271:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:24:02,271:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 15:24:02,271:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 15:24:02,272:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 15:24:02,277:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:24:02,314:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 15:24:02,677:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 15:24:02,678:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-21 15:24:02,679:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-21 15:24:02,683:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:36 UTC.
2023-11-21 15:24:02,683:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 15:24:02,683:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 15:24:02,689:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03E5F550>
Prep: True
2023-11-21 15:24:02,689:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03E5F550> and installer None
2023-11-21 15:24:02,690:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 15:24:02,694:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 15:24:02,695:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 15:24:02,697:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 15:24:03,138:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 15:24:03,139:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:01 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "d1F7LUGjzMA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 15:24:03,140:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 15:24:06,571:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6961_key-certbot.pem
2023-11-21 15:24:09,935:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6959_csr-certbot.pem
2023-11-21 15:24:09,936:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 15:24:09,936:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 15:24:10,083:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 15:24:10,084:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:08 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfiX0uG2iuaPW-g1Lfmumm4PJohHS3Uml8jzkNEZ7VUAEk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 15:24:10,084:DEBUG:acme.client:Storing nonce: v0bMowfiX0uG2iuaPW-g1Lfmumm4PJohHS3Uml8jzkNEZ7VUAEk
2023-11-21 15:24:10,085:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 15:24:10,090:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlYMHVHMml1YVBXLWcxTGZtdW1tNFBKb2hIUzNVbWw4anprTkVaN1ZVQUVrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "GYCpZd2AFZFLi3Goy7dwUn0mC7B-r1bni8PqbaSzb7gU8Ky_-qxgvaWakSE2kLzTdO2_p8eKRF3RcfmuQ1gGeqnjkTLkSkbCmNQ1mWU_92x2bxY7-aWoGlWLgSsA0tpyYo3W2b6ASvC_GaxWz095JxhfxCUVaD9tzeTg3lpBaRWsnCzcqRXgBteu_3DTyDG5c0PLcHbucxMFoOkOl7xvEA4tPOQfACswMjEZvTr55cuPsWYWGYFMZLmRmUTG98OgoMWrrngAPMBYN755H3gpoVkikYyTH9YUGNcctEOgILk1X-6k2Y8CxL5vtOEejnKCN81nNeTUasyNVqLHQjIMgw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-21 15:24:10,407:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2023-11-21 15:24:10,408:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 14:24:09 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796010606
Replay-Nonce: nbWKegf8OMs9iUIToNINcMBZhIeXbYa7VaT5frZ7nzOX0E_f9vE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:09Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796010606"
}
2023-11-21 15:24:10,409:DEBUG:acme.client:Storing nonce: nbWKegf8OMs9iUIToNINcMBZhIeXbYa7VaT5frZ7nzOX0E_f9vE
2023-11-21 15:24:10,409:DEBUG:acme.client:JWS payload:
b''
2023-11-21 15:24:10,419:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhPTXM5aVVJVG9OSU5jTUJaaEllWGJZYTdWYVQ1ZnJaN256T1gwRV9mOXZFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1MzEyMDYifQ",
  "signature": "l8RgEznw84VEhLCseEu6msDs6WYhL20KJqezr62Mn7xekUf2Gvu8xLL0XCKxt-_2Gp_lhiOI1SiukaNVxMRcCKkkPDt3m7Q2EGVrAhXnFrcqOX5H74SQyGQGkQlyDSzst1Nu9jeB6l7CUP7JHMCF-3B_CWX_4LMKb2bRE5JfIUVBrXqqZcFmKZWxn00iBoZyUVQmdhGGatXTtoXEijUZSyQuR5EstTyCpMgfzW2muUeltYOCgLKvfRG0_fWD-CwS7BKzeUPf672C0_EFrGLk5QS7e4-pkILiSl8leAINTCtoEs0Uw9_RNralbhA6fWYH7raU9QYn-9Ld-t5k86ePCA",
  "payload": ""
}
2023-11-21 15:24:10,576:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066531206 HTTP/1.1" 200 804
2023-11-21 15:24:10,577:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:09 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfibB8noAl4UUMWpmlavktkctoDb7kWtVj820th__rahTA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:09Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/HwkKGg",
      "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/RFhChg",
      "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/Q06UlA",
      "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI"
    }
  ]
}
2023-11-21 15:24:10,577:DEBUG:acme.client:Storing nonce: v0bMowfibB8noAl4UUMWpmlavktkctoDb7kWtVj820th__rahTA
2023-11-21 15:24:10,577:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 15:24:10,578:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2023-11-21 15:24:10,578:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 15:24:10,578:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 15:24:10,579:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:24:10,580:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 15:24:10,580:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 15:24:10,580:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 15:24:10,581:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:24:10,619:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 15:24:10,991:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 15:24:10,994:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2023-11-21 15:24:10,995:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2023-11-21 15:24:11,002:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:49 UTC.
2023-11-21 15:24:11,002:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 15:24:11,003:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 15:24:11,007:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03EA5B70>
Prep: True
2023-11-21 15:24:11,007:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03EA5B70> and installer None
2023-11-21 15:24:11,007:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 15:24:11,011:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 15:24:11,012:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 15:24:11,014:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 15:24:11,465:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 15:24:11,466:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:10 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "YrLpoH9KCwU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 15:24:11,466:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 15:24:14,892:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6962_key-certbot.pem
2023-11-21 15:24:18,268:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6960_csr-certbot.pem
2023-11-21 15:24:18,268:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 15:24:18,268:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 15:24:18,419:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 15:24:18,419:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:17 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf89j-UYxj9cZJ-m7Kup16tzkfiiY_fVaDcNOb9l_nV_vs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 15:24:18,420:DEBUG:acme.client:Storing nonce: nbWKegf89j-UYxj9cZJ-m7Kup16tzkfiiY_fVaDcNOb9l_nV_vs
2023-11-21 15:24:18,420:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 15:24:18,424:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjg5ai1VWXhqOWNaSi1tN0t1cDE2dHprZmlpWV9mVmFEY05PYjlsX25WX3ZzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "lJCnCIZlRL5tu71Qroz6E8GrEQPYvwuW8wZyRlz0GzDepIVGR6IQSawPoYkg85wOVxjQqxRw3qSOE4u8vSUdzjICPXvI57FxWE2LeVFLFQst9DkwlbRlcKS51pKIos6a-siqc2cZ_rBgAj5QiFS4ln-pZTPIGzagalJnwDHcn52GUFPbaBkSQesJaL8sW0uIKrtRVxGWWWspNsl2dKj9pow3SQvfM8S2HO2G43kEiMk2JFvax50pqNnXwSM5VANq3lyoo0jW9Itrd9BtTvV_pfN28Fmt9EVjHthi7av_KG0HkVj79cmREOA3N2Gfj2RCsYgTrp-HMbMFxrFug-C0zw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-21 15:24:18,757:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2023-11-21 15:24:18,758:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 14:24:17 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796034066
Replay-Nonce: v0bMowfibF9LG_lPbC_bFlVtzz7ldXeQArxGrAX2B6N5RtMzC5A
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:17Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796034066"
}
2023-11-21 15:24:18,758:DEBUG:acme.client:Storing nonce: v0bMowfibF9LG_lPbC_bFlVtzz7ldXeQArxGrAX2B6N5RtMzC5A
2023-11-21 15:24:18,758:DEBUG:acme.client:JWS payload:
b''
2023-11-21 15:24:18,765:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmliRjlMR19sUGJDX2JGbFZ0eno3bGRYZVFBcnhHckFYMkI2TjVSdE16QzVBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1NjYzNTYifQ",
  "signature": "yAxzbuYXq_rGEqDDMZ2H-RStJKdSSBjg6J6s0JauOrSkfy03Sa-MWdhuBXr1Y3G8wbJ4UnDCKOPFVwEkh2lYESrc-6do3IBP7hKdFo3vtG0pnwBuolwnCfPCaY68cOIhks-sKzdMWQm7cgNPpR1EmcxbYRfuwPhIzJ8bEpGz93wFmucDXQlj-vQZiSQD002tWQQth3mQtRauBxTk49Y0ZMozgtbMPDwDsbRKA9wyajiiwdZIvDzZIWadFMcjtBnOXgrI82-OaQEBUwi-C-wO64dVNrWGB4VW_5hkp7N4dbGGgk9frZdRUk6XLqkEI4cvg2u9m163YcWw41c67p0LEQ",
  "payload": ""
}
2023-11-21 15:24:18,922:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066566356 HTTP/1.1" 200 807
2023-11-21 15:24:18,922:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:17 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8qgI--r1PSmsUEyZ98Uf6DJJF0cnsm_fdTqbClSxTp0s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:17Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/Ahrirw",
      "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/5ji8UA",
      "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/9qmJcg",
      "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0"
    }
  ]
}
2023-11-21 15:24:18,923:DEBUG:acme.client:Storing nonce: nbWKegf8qgI--r1PSmsUEyZ98Uf6DJJF0cnsm_fdTqbClSxTp0s
2023-11-21 15:24:18,923:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 15:24:18,924:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2023-11-21 15:24:18,924:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 15:24:18,924:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 15:24:18,925:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:24:18,925:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 15:24:18,926:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 15:24:18,926:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 15:24:18,927:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:24:18,974:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 15:24:19,192:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 15:24:19,193:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-21 15:24:19,194:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-21 15:24:19,198:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:02 UTC.
2023-11-21 15:24:19,198:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 15:24:19,199:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 15:24:19,208:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03EA5B70>
Prep: True
2023-11-21 15:24:19,209:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03EA5B70> and installer None
2023-11-21 15:24:19,209:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 15:24:19,213:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 15:24:19,214:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 15:24:19,216:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 15:24:19,749:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 15:24:19,749:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:18 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "E_A9EhgQkoA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 15:24:19,750:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 15:24:23,747:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6963_key-certbot.pem
2023-11-21 15:24:27,124:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6961_csr-certbot.pem
2023-11-21 15:24:27,125:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 15:24:27,125:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 15:24:27,305:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 15:24:27,307:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:26 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjgrHuP6CEQH2qWaS4TTtiG3auxpMfb8Sxp8Ac0qOt1zg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 15:24:27,307:DEBUG:acme.client:Storing nonce: SFMYLIQjgrHuP6CEQH2qWaS4TTtiG3auxpMfb8Sxp8Ac0qOt1zg
2023-11-21 15:24:27,307:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 15:24:27,313:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpnckh1UDZDRVFIMnFXYVM0VFR0aUczYXV4cE1mYjhTeHA4QWMwcU90MXpnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "GjuK91M6fcaZEYnweJIHqbpUvspoGyQ_winG_qIOy1nI-M-WKVyvOrj1wM99WkLE6Yy7vOHqsXxJHfNZumY4SFZtCbHVO_QMbPOqGKn9iMFg6Kjb5ARMaF2RxWstMCGAk6nHM_xQnEdwR6Wbbxp5U7ScApr1OwSMLroQ2HgvgYGl1b19gqG1AQ70ts_vvx4YxigSNfHUveRhflOWH8uSwnRiqZNJVYFKVcz2XiwTIW7xvAjGOiCTsT51TXLeyscH18ku8qmOF-D3wf6xA5-J07ok5rquo3kCfFoKMrEsqcvhHr6MN6EUIjimxMXu2IdC4CRcpXW3RxINFk5SLFNInw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-21 15:24:27,569:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2023-11-21 15:24:27,570:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 14:24:26 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796055606
Replay-Nonce: jXyutbsn10W6eXILRbNnusnA1_7-c1rXhXyDh89r0z_qnPRMZM8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:26Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796055606"
}
2023-11-21 15:24:27,570:DEBUG:acme.client:Storing nonce: jXyutbsn10W6eXILRbNnusnA1_7-c1rXhXyDh89r0z_qnPRMZM8
2023-11-21 15:24:27,570:DEBUG:acme.client:JWS payload:
b''
2023-11-21 15:24:27,576:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic24xMFc2ZVhJTFJiTm51c25BMV83LWMxclhoWHlEaDg5cjB6X3FuUFJNWk04IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1OTg1NzYifQ",
  "signature": "eQJmhngTR_3J67-fkefIwt07trDOGYwoLmKA4aKu21o3StG91HUf_esYigmkh1DXEfFjov0Y6-OfgDDXTloOlwKQ0MBp78MRulbcEyy6kK3MGY6Evcr-x0Ij5NWIO5ObDxcM2u0Hy253JqQTK6aG3giLnWh34QDm8eltw5qBsn38DlWEexBJ8xcrW8qVZ3qxfutjgRSDoQQIqdAiPEwlxbNpIGbAbBlCSqyxoE1GExnBg-Dj8I2-9N5ljXNEKTVjhaWWzh_SoPY7VnhpVlZlyFJPzkKOsRFocNo8OxRvt43kpkrbap2ujIOqf50K82GQc58tYhoABLy3ScSGBXZI1Q",
  "payload": ""
}
2023-11-21 15:24:27,756:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066598576 HTTP/1.1" 200 801
2023-11-21 15:24:27,758:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:26 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQj7xPm_kRGZNFj1K0MwjUTeYGIJkwOGeQCGxX7BNZbno8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:26Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/f3URKA",
      "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/iDceBQ",
      "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/LT38xQ",
      "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs"
    }
  ]
}
2023-11-21 15:24:27,758:DEBUG:acme.client:Storing nonce: SFMYLIQj7xPm_kRGZNFj1K0MwjUTeYGIJkwOGeQCGxX7BNZbno8
2023-11-21 15:24:27,759:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 15:24:27,760:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2023-11-21 15:24:27,761:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 15:24:27,761:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 15:24:27,763:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:24:27,763:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 15:24:27,763:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 15:24:27,764:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 15:24:27,767:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:24:27,813:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 15:24:28,014:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 15:24:28,016:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-21 15:24:28,018:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-21 15:24:28,023:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:14 UTC.
2023-11-21 15:24:28,023:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 15:24:28,023:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 15:24:28,028:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0440C4F0>
Prep: True
2023-11-21 15:24:28,028:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0440C4F0> and installer None
2023-11-21 15:24:28,028:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 15:24:28,033:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 15:24:28,034:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 15:24:28,036:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 15:24:28,489:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 15:24:28,490:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:27 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "MUMI668JpxY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 15:24:28,490:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 15:24:32,238:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6964_key-certbot.pem
2023-11-21 15:24:35,629:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6962_csr-certbot.pem
2023-11-21 15:24:35,629:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 15:24:35,629:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 15:24:35,779:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 15:24:35,779:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:34 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfij8AKkty8dgGJg9Wii2Kj_P35xQAwm4dFbDAlZ8jG82Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 15:24:35,780:DEBUG:acme.client:Storing nonce: v0bMowfij8AKkty8dgGJg9Wii2Kj_P35xQAwm4dFbDAlZ8jG82Y
2023-11-21 15:24:35,780:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 15:24:35,785:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlqOEFLa3R5OGRnR0pnOVdpaTJLal9QMzV4UUF3bTRkRmJEQWxaOGpHODJZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "TveOflqgpeC1o563y4RufkOwzbbayKndQqLc0v8KbsvULtZRFY7VWI_zcuiaBYM2hOMBInuZEg4yqpO2BgOcWR8jI-VQTktfXOcn-nX3miDmbwEWFZfRxuHi49vs59IA1GWjycdRyPpYijgRKgEjvIj2ITsKKvqzEHTzjOcSxGHEoTe7nyIVyRscm8YbB1BIFdL3SzpyIc7MP-VeuGhXeOAlI3xA-EFnr2DvjfVvbgVW9JPvHQXKC_NG3cU2nKnTIitKnK9dAIC-WURLFkfMU7D8Rnl-rdGiNQ5B4KOh1_9kTN7PXehR-7WQj_dfuFrHZrPoP0VUOj5GQ0fErk_v2Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-21 15:24:36,119:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-21 15:24:36,120:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 14:24:34 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796073426
Replay-Nonce: v0bMowfiCJSF0rEVvhDTal9WWuX1mOWYga6-xkABd5FGYlSfWdo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796073426"
}
2023-11-21 15:24:36,121:DEBUG:acme.client:Storing nonce: v0bMowfiCJSF0rEVvhDTal9WWuX1mOWYga6-xkABd5FGYlSfWdo
2023-11-21 15:24:36,121:DEBUG:acme.client:JWS payload:
b''
2023-11-21 15:24:36,130:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlDSlNGMHJFVnZoRFRhbDlXV3VYMW1PV1lnYTYteGtBQmQ1RkdZbFNmV2RvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2MjIxMjYifQ",
  "signature": "EkC923EwM15ILdz3f0y_X-pvjGhD7o_jfT3PmBRakQQ3Tz8utMbBMVDR1n19RvY9RBmhb4umIIVn9DoqcD6Wuuos6T1FVbns1YfIVeSx63hDLRRImjG6_0DL8dWlN0kr8V9TzOlqciJWTuiaUWBonsvJ2AGU78Fb8U76Voz7utZWlL3fq5GzmsdS3kFqDPNIYMX9uplhmesTU9qocW3Zer20_-cfMb8i41cXhbRNyrdD9bk0KzHI3fHzJAeASM4FCmyfklwdguC95fi7RNpuRC4520Km4_hFAJbVpt6o1dvEcjlB0GcmC7CL7dv9b-ixJRkCVAAqhOkdL98_Zt6aiQ",
  "payload": ""
}
2023-11-21 15:24:36,283:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066622126 HTTP/1.1" 200 805
2023-11-21 15:24:36,283:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:35 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfinLv3OQ44AhLHNaZXeo4SHW0zPG3_Wj_fyBes4Fisv-w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:34Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/zRCxuQ",
      "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/gv15MQ",
      "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/tryPHA",
      "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI"
    }
  ]
}
2023-11-21 15:24:36,284:DEBUG:acme.client:Storing nonce: v0bMowfinLv3OQ44AhLHNaZXeo4SHW0zPG3_Wj_fyBes4Fisv-w
2023-11-21 15:24:36,284:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 15:24:36,285:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2023-11-21 15:24:36,285:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 15:24:36,285:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 15:24:36,286:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:24:36,286:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 15:24:36,286:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 15:24:36,287:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 15:24:36,288:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:24:36,335:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 15:24:36,552:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 15:24:36,553:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2023-11-21 15:24:36,554:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2023-11-21 15:24:36,559:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:27 UTC.
2023-11-21 15:24:36,559:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 15:24:36,559:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 15:24:36,565:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03DEA450>
Prep: True
2023-11-21 15:24:36,565:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03DEA450> and installer None
2023-11-21 15:24:36,565:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 15:24:36,570:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 15:24:36,570:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 15:24:36,572:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 15:24:37,104:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 15:24:37,105:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:35 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "OU5txLQ6PgI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 15:24:37,106:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 15:24:41,105:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6965_key-certbot.pem
2023-11-21 15:24:44,469:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6963_csr-certbot.pem
2023-11-21 15:24:44,470:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 15:24:44,470:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 15:24:44,647:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 15:24:44,647:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:43 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjZzo7q9nozX8fapbD89Wg-aeFbADwQ0kbTfmVKINwpd0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 15:24:44,648:DEBUG:acme.client:Storing nonce: SFMYLIQjZzo7q9nozX8fapbD89Wg-aeFbADwQ0kbTfmVKINwpd0
2023-11-21 15:24:44,648:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 15:24:44,653:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpaem83cTlub3pYOGZhcGJEODlXZy1hZUZiQUR3UTBrYlRmbVZLSU53cGQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "g8-_SKn7tokYAAn1R9Y9mc-EFQuVcGi5-Bzv_bKiG2-qiqY-j1bW12mORT8xRtD14FHT51t6z5pH_wjxJFg1Csyc8cnuy8H41ZV1VQqqdsMwzBd1v3AhPeMK8as3pVaGfIPMKBC5obwI82fpZfuapotiFZfgDnlDObBMa83n04jrXdXIB2BxH8rhfecTH0g_llhB7-WUe4NGC7SN878PoldEGYiV6RQeJB4OhtAzvZ1KnyZi-4VjOXRNLoHTtyjwZE-eeEv4vwZEukJaNkKTTrA1vyqfk_OOOq7FnmTc2JMmiF-6tLUKyI1NWdfvCZuD2MVQabXOIsvDpKRkLDU5fA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2023-11-21 15:24:44,863:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2023-11-21 15:24:44,865:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 14:24:43 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796091136
Replay-Nonce: jXyutbsn68Tm4j5d0xzelWw0m9_gmXxwiuIEah-E3mGfhdFeFBs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:43Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796091136"
}
2023-11-21 15:24:44,865:DEBUG:acme.client:Storing nonce: jXyutbsn68Tm4j5d0xzelWw0m9_gmXxwiuIEah-E3mGfhdFeFBs
2023-11-21 15:24:44,866:DEBUG:acme.client:JWS payload:
b''
2023-11-21 15:24:44,875:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic242OFRtNGo1ZDB4emVsV3cwbTlfZ21YeHdpdUlFYWgtRTNtR2ZoZEZlRkJzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NDY4OTYifQ",
  "signature": "OTeqVXb7d1ox6ohgMlfqzldpXBkkAMEX6lxBqvX-dsHVSmeTrhFGOWXDA5VmfEzyqUZkt-Y_huaKw0LJGEXpJYiZOOOA3v-CBKkuKScz865tG86YN_G2FbvvGMACf4xch4TspEdr344NfbqxtgJmjCFB_f4tUU1OPHS80AYB52o_tE7XG3WJSLpINCz0KqVwDwYLmtiKK25bXMPPDV_cQJo6WVlsS4Lrui37M8JhYob2HkjHgtB6uyqVQE3s8koc0erFGsXXbTIYXkoE1P0NkPp452WH2Dux23_JDglciqniZz0z5Bp1ipXrcriHbA10u42QviFxk8us_3UVjwwaew",
  "payload": ""
}
2023-11-21 15:24:45,067:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066646896 HTTP/1.1" 200 809
2023-11-21 15:24:45,067:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:43 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnMabrESDVQka9ZTNUcRK_IJ_3Ki1uBKOuhD2HBNkKTGk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:43Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/juW_-A",
      "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/EWbN0Q",
      "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/0CyP5g",
      "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8"
    }
  ]
}
2023-11-21 15:24:45,067:DEBUG:acme.client:Storing nonce: jXyutbsnMabrESDVQka9ZTNUcRK_IJ_3Ki1uBKOuhD2HBNkKTGk
2023-11-21 15:24:45,068:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 15:24:45,068:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2023-11-21 15:24:45,069:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 15:24:45,069:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 15:24:45,070:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:24:45,071:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 15:24:45,071:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 15:24:45,072:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 15:24:45,073:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:24:45,120:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 15:24:45,500:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 15:24:45,502:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-21 15:24:45,503:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-21 15:24:45,507:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:41 UTC.
2023-11-21 15:24:45,508:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 15:24:45,508:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 15:24:45,517:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x042FD290>
Prep: True
2023-11-21 15:24:45,518:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x042FD290> and installer None
2023-11-21 15:24:45,518:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 15:24:45,522:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 15:24:45,523:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 15:24:45,525:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 15:24:46,002:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 15:24:46,004:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:44 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "rV4X8CLHWzg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 15:24:46,005:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 15:24:49,725:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6966_key-certbot.pem
2023-11-21 15:24:53,095:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6964_csr-certbot.pem
2023-11-21 15:24:53,095:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 15:24:53,095:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 15:24:53,248:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 15:24:53,249:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:52 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8TCsLNSEPgo3AIIQ8xpDD-QhVXMURNNMlYAe-bpNGB1A
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 15:24:53,249:DEBUG:acme.client:Storing nonce: nbWKegf8TCsLNSEPgo3AIIQ8xpDD-QhVXMURNNMlYAe-bpNGB1A
2023-11-21 15:24:53,249:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 15:24:53,255:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhUQ3NMTlNFUGdvM0FJSVE4eHBERC1RaFZYTVVSTk5NbFlBZS1icE5HQjFBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ZCcHDuF2-R6WgCy3UxSYcBWNFGhalC9Q3F6h9HiDTHo9mJEcR_1amvwt5RyZmbxO-cwnnvzZFXpBzUAqXUjoEMPaZipdMmFcesjneWewt165HKQWbMBmsjry1kVgywnywaiABCcQCKSrHL5LiFT-NX2za1lvXyVywbEvW7TtH1O5fHAfRzpJHbgVaUBK6lfnzanmdO0stuJCVBdjVhOzCQHsbqDdh4PDXVa2bGc3mDvBQJWeDeQNF9HsMIAdQwffQQkqKlvGGXMD3GeAOGxu5YLyxnrMQ_VFxYUU6avmOm4M1H6TvRN7tTfxDtyU5EhUhOFi2D6jGPyUT9suF8_9Uw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2023-11-21 15:24:53,578:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2023-11-21 15:24:53,580:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 14:24:52 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796108646
Replay-Nonce: nbWKegf8kcGVfIGOpgDorbTK8BV25oCYgL_8bIp08NWu8wXF2fw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796108646"
}
2023-11-21 15:24:53,580:DEBUG:acme.client:Storing nonce: nbWKegf8kcGVfIGOpgDorbTK8BV25oCYgL_8bIp08NWu8wXF2fw
2023-11-21 15:24:53,581:DEBUG:acme.client:JWS payload:
b''
2023-11-21 15:24:53,590:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhrY0dWZklHT3BnRG9yYlRLOEJWMjVvQ1lnTF84YklwMDhOV3U4d1hGMmZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NjkyODYifQ",
  "signature": "fS8M6K-7UBbvcw7qKWi9OBEnSfTcHxBVzomOg1wcXvqDlzWlJQvFgUGsms51AuOD5ZFyhd_uA4bGjqpjTWx3qFchJJK0ABzbWhO3SXdu4UcUMnKSLr-qzaGEB-4oZr_d_AI2d38g1zS6w21Ny4ODpTekXzzadnaysouSd7UV_LvHurCBzuo5uJpK0SUWmlPp_3h5aLHbzBEeBvifLtWs1wiFdQqb9YS9HvDjnZrqpF7s7kwkosJBRs2M3yW2I88Qdj7-pYOtuvM3ZvjISMTAnuUKKRPasBN3DWAPldvz8vbadS38DHzTa97D88rAugzacmtcPImQ_0n4hEcHlNFOkg",
  "payload": ""
}
2023-11-21 15:24:53,748:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066669286 HTTP/1.1" 200 806
2023-11-21 15:24:53,748:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:52 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8BpD36PvKHf3Fs_B0YLroHF5jkk-QJCuHjaQmO_gG3So
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:52Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/DZCB_w",
      "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/3LwN7g",
      "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/N8DWOw",
      "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY"
    }
  ]
}
2023-11-21 15:24:53,749:DEBUG:acme.client:Storing nonce: nbWKegf8BpD36PvKHf3Fs_B0YLroHF5jkk-QJCuHjaQmO_gG3So
2023-11-21 15:24:53,749:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 15:24:53,750:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2023-11-21 15:24:53,750:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 15:24:53,750:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 15:24:53,751:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:24:53,751:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 15:24:53,751:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 15:24:53,752:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 15:24:53,753:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:24:53,798:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2023-11-21 15:24:53,798:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 15:24:53,798:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2023-11-21 15:24:53,807:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2023-11-21 15:24:53,809:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2023-11-21 15:24:53,809:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2023-11-21 15:24:53,809:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2023-11-21 15:24:53,810:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2023-11-21 15:24:53,811:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2023-11-21 15:24:53,846:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 15:24:53,938:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 15:24:53,941:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-21 15:24:53,943:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-21 15:24:53,949:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:56 UTC.
2023-11-21 15:24:53,950:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 15:24:53,950:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 15:24:53,955:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04436130>
Prep: True
2023-11-21 15:24:53,955:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04436130> and installer None
2023-11-21 15:24:53,955:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 15:24:53,960:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 15:24:53,960:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 15:24:53,962:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 15:24:54,405:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 15:24:54,406:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:24:53 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "oQWZMywfDls": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 15:24:54,407:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 15:24:57,942:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6967_key-certbot.pem
2023-11-21 15:25:01,331:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6965_csr-certbot.pem
2023-11-21 15:25:01,332:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 15:25:01,332:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 15:25:01,478:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 15:25:01,479:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:00 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8m-PNm2P4wUHWwE10e53_Ek9s6sL6NS61S6mf6rv5joI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 15:25:01,479:DEBUG:acme.client:Storing nonce: nbWKegf8m-PNm2P4wUHWwE10e53_Ek9s6sL6NS61S6mf6rv5joI
2023-11-21 15:25:01,479:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 15:25:01,488:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhtLVBObTJQNHdVSFd3RTEwZTUzX0VrOXM2c0w2TlM2MVM2bWY2cnY1am9JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "u20zyvYY5CFm9l-kscAfzCKuxbbNZWfL3kcYEpsBq_xSQfASAS47Kxg2bC7fb4zLwx1jnw4Gp3JVFcm3P4EQuD54suKsVpJfwi3E2L33v88hdQ5h8DSHB1qiTcFtxtfwrLQo8E0-8LalBhx5ASaOJGC6Qo-izcDp9TSq3EbOMtJ1l2Q-XUVtyLaBEzwCvZI5qI1yknjwZkXcSxBJeW3PETiG_8rXsj-LcrnppoZhd-YMvpzYVJ_iGuWLmP_7x3xrFOwOjDMRH7-fTKiayf7aFhyeGPZBRUbyPXoXxxoFeti6yXGrmvdbDs0fjwZICJJcb6f4wVRYFn1n9_i6Kd-qkA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-21 15:25:01,811:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2023-11-21 15:25:01,811:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 14:25:00 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796125916
Replay-Nonce: nbWKegf8VmeWXuCdmettK95oAlryt0SFpPtE7lutrh4Oz-Hat2M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:00Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796125916"
}
2023-11-21 15:25:01,811:DEBUG:acme.client:Storing nonce: nbWKegf8VmeWXuCdmettK95oAlryt0SFpPtE7lutrh4Oz-Hat2M
2023-11-21 15:25:01,812:DEBUG:acme.client:JWS payload:
b''
2023-11-21 15:25:01,817:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhWbWVXWHVDZG1ldHRLOTVvQWxyeXQwU0ZwUHRFN2x1dHJoNE96LUhhdDJNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2OTI4NjYifQ",
  "signature": "psSCdN6atsVt10ByvY2LLEWx7T91iIgGzarAh8VqZbpGiXSq5ONa06Ew_br9MIyQEPVgsb8-uJ2K_pkm7CedT8J2NtqNyC4_Go2P-iVxZmfG2rRyGI6QmdANSqEvtdZNXDA5BlWgc7MGTfOp55kLearU7c8wDYrxOB6n7klyIrooYo8BEQEg2YL8JzaIhk6J0McVr6gWD4q5-c_X1zXM6XjtIVl7oGzmCgPnsYZiHshVNxwP2VTQxOzvyTlURRcdPj68KNSk6VIwnB6EaiiBVTnnOXQIJjzhbh-M-IflytR0ay_sbZUz2uAbIBuSnmnELpQMxwVV2TIOe6IxCH8nYQ",
  "payload": ""
}
2023-11-21 15:25:01,977:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066692866 HTTP/1.1" 200 811
2023-11-21 15:25:01,977:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:00 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8oXhUMbJT8hEl9pbuhK4pqM8So1aA6DwHjk15TeDF5Rg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:00Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/TZHJ0A",
      "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/YBeUJQ",
      "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/i1p7PQ",
      "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0"
    }
  ]
}
2023-11-21 15:25:01,978:DEBUG:acme.client:Storing nonce: nbWKegf8oXhUMbJT8hEl9pbuhK4pqM8So1aA6DwHjk15TeDF5Rg
2023-11-21 15:25:01,978:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 15:25:01,979:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2023-11-21 15:25:01,979:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 15:25:01,979:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 15:25:01,980:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:25:01,980:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 15:25:01,980:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 15:25:01,981:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 15:25:01,982:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:25:02,030:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 15:25:02,276:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 15:25:02,277:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-21 15:25:02,278:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-21 15:25:02,282:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:09 UTC.
2023-11-21 15:25:02,282:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 15:25:02,282:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 15:25:02,287:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04734A90>
Prep: True
2023-11-21 15:25:02,287:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04734A90> and installer None
2023-11-21 15:25:02,287:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 15:25:02,292:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 15:25:02,293:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 15:25:02,295:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 15:25:02,838:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 15:25:02,839:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:01 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "J-izO-V9w_8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 15:25:02,840:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 15:25:06,300:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6968_key-certbot.pem
2023-11-21 15:25:09,669:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6966_csr-certbot.pem
2023-11-21 15:25:09,670:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 15:25:09,670:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 15:25:09,879:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 15:25:09,880:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:08 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQj8Lt570wFqZNAquRGnl00H3kugyQ7iLJOgiVrLT1bRl0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 15:25:09,880:DEBUG:acme.client:Storing nonce: SFMYLIQj8Lt570wFqZNAquRGnl00H3kugyQ7iLJOgiVrLT1bRl0
2023-11-21 15:25:09,880:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 15:25:09,887:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWo4THQ1NzB3RnFaTkFxdVJHbmwwMEgza3VneVE3aUxKT2dpVnJMVDFiUmwwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "MQ1-gG5RYdYcxzO_PE244aFMABxP6Qn9LJ1tAJ_04DvCfkLJ_rfUN7TW2tT6LOtoET2YgG3tAGCJPvbM9c_gDmmVLjhmuDu9Nw-FxVLFaKffhtYcpWLp52F-o7rubNSy9F4OVcZjMAIuzDK64j5Ma9P-2ZQPb5EwBtOm2p9egYXBy3Wz5OBywdHKaERIXA3pYjtrxsvFele2VYghKreIYBCTVmrP2PK4aFlrEZ7JYKtz_zPwXtq_aB6k8cyxGgM2NzugPKHCR57SKNhOI__m61wvPuFWmz5eOQzzOwKGe5SKQYsfYT1d9FsBTlx5BU7MJH8gH1pjstpIQKdvqS7YVg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-21 15:25:10,125:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2023-11-21 15:25:10,126:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 14:25:08 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796165656
Replay-Nonce: SFMYLIQjn7r2Y0GhPcGjVRcYDs67PvsZowUDoTcUfkI1cLCrqck
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:08Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796165656"
}
2023-11-21 15:25:10,127:DEBUG:acme.client:Storing nonce: SFMYLIQjn7r2Y0GhPcGjVRcYDs67PvsZowUDoTcUfkI1cLCrqck
2023-11-21 15:25:10,127:DEBUG:acme.client:JWS payload:
b''
2023-11-21 15:25:10,135:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpuN3IyWTBHaFBjR2pWUmNZRHM2N1B2c1pvd1VEb1RjVWZrSTFjTENycWNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3MzgwMTYifQ",
  "signature": "AOLTCyK41w5HiGUG6x8hzz77u1ZlQVeZAnOG_CB9EdGMnAiD9rnmURVW9pAbbOHfm1ckN_LXfa1jTEWPunH3Fai0azDpGa8S6SXqRijhWe9rGgnCR0hFjn2svD7ktuPIU5za2nAqf7HpuAEy6j0kr4v4IugzV76x29rxoYzy_gCu8gMWmAe5TcKp1k6JUBD46cqnw-6yTyPMyPmBuYQSBdRtp0QKGicx1xfKwfFx-GXJqzVjSgGkYXitajtuLTzGWyjl7TpITQaSIBSO1DbfwN7iv2731368MBo5PMUIBDHelR5Gahjw-GdHvk3u6s5CyYKAb8lXycCpe6quFwQjPg",
  "payload": ""
}
2023-11-21 15:25:10,319:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066738016 HTTP/1.1" 200 810
2023-11-21 15:25:10,320:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:09 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnSMc2Rm1QyWJtx_Ps6uePnIvDPBvUkbFYg45CN5NY-N8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:08Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/ypE5ag",
      "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/HUvErQ",
      "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/nzokTQ",
      "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM"
    }
  ]
}
2023-11-21 15:25:10,320:DEBUG:acme.client:Storing nonce: jXyutbsnSMc2Rm1QyWJtx_Ps6uePnIvDPBvUkbFYg45CN5NY-N8
2023-11-21 15:25:10,321:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 15:25:10,321:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2023-11-21 15:25:10,322:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 15:25:10,322:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 15:25:10,323:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:25:10,323:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 15:25:10,323:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 15:25:10,324:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 15:25:10,325:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:25:10,371:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 15:25:10,740:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 15:25:10,741:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is signed by the certificate's issuer.
2023-11-21 15:25:10,743:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD
2023-11-21 15:25:10,749:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:22 UTC.
2023-11-21 15:25:10,749:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 15:25:10,749:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 15:25:10,754:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x044240D0>
Prep: True
2023-11-21 15:25:10,754:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x044240D0> and installer None
2023-11-21 15:25:10,754:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 15:25:10,758:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 15:25:10,759:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 15:25:10,761:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 15:25:11,200:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 15:25:11,201:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:09 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "xfRAtoiFf5g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2023-11-21 15:25:11,201:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 15:25:14,884:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6969_key-certbot.pem
2023-11-21 15:25:18,247:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6967_csr-certbot.pem
2023-11-21 15:25:18,247:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 15:25:18,247:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 15:25:18,393:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 15:25:18,394:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:17 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfio0abkoO8VrGx6xZwGSP6XzV8MSCV8Bjl5r7xG4ngh4s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 15:25:18,395:DEBUG:acme.client:Storing nonce: v0bMowfio0abkoO8VrGx6xZwGSP6XzV8MSCV8Bjl5r7xG4ngh4s
2023-11-21 15:25:18,395:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 15:25:18,401:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlvMGFia29POFZyR3g2eFp3R1NQNlh6VjhNU0NWOEJqbDVyN3hHNG5naDRzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "BhIWFUy_-AmHE_O52rEFu8sTGsJX0aSv6myZg_Tt75etpwEdwYw2ski2oDtuQS97NLVvA3CPxwsUXMUqEihlJ-X5dq4mPmPXG_F4qXPRbOgRYtLOxDF5IGNzCJhF_6H_g7JxAAqJvMzNbI8waA_njgzJOvoJSookwkqza_yDLLQAn1UcxuF-G6nZUId6SirGP6af64Mo6H3ISKepUFJ6Fxar0UXzrpXxdNlBG09AK3UOCVZpKyNgQEydfzliIYZJe3QY4YYZABZBCqYgyDGrV4dEpn4yg3gXiDH3wgMDZZzotqGxk71kPonPU1szTkgzyP2OCkdUzkDhE-txZLHp6g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2023-11-21 15:25:18,712:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2023-11-21 15:25:18,713:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 14:25:17 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796190496
Replay-Nonce: nbWKegf8rAbQpbEra5uM-5BEvTk86CLe3nWvgrfKjg1TGVZd6Rc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:17Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796190496"
}
2023-11-21 15:25:18,713:DEBUG:acme.client:Storing nonce: nbWKegf8rAbQpbEra5uM-5BEvTk86CLe3nWvgrfKjg1TGVZd6Rc
2023-11-21 15:25:18,713:DEBUG:acme.client:JWS payload:
b''
2023-11-21 15:25:18,719:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhyQWJRcGJFcmE1dU0tNUJFdlRrODZDTGUzbld2Z3JmS2pnMVRHVlpkNlJjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3NzE0MTYifQ",
  "signature": "szXkAVhFXHbY8LTsQL4K2jqjT8MFYKq2TIPZu7vGLmqw0WOmPTul_pOWTJzf0j0m-INMcYRrD6x7PcjYN5d0onvyIuXa6p4AHn7ckhkRuZtRiAiAbpI8uI77bZH6JyZln-DGlVv8ChnSi4dGh4X6PRMs_YrCIRo6JiRa3sRqvuNMFAm2K0zFA4wLCrBmHgTgpkE1_Oj1fy-jEemmJHOxW4vmNGDg7ivTkcblBQJsvVaCktTiCFdmHfBHDhWwySz175cSevZecuZYYZudSFbOWRiM_AjVZbPd3-ukqGMZy0IsuNfauQMpwOtod_cDwl2Uhs1kP036MQJ2A_7jLqkv-Q",
  "payload": ""
}
2023-11-21 15:25:18,869:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066771416 HTTP/1.1" 200 809
2023-11-21 15:25:18,870:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:17 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfi9E43DYI-R1aVRKBhtqxgx3Ok6Mt2ihbXkm-aQP-86J0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:17Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/1qhCuQ",
      "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/isn6Gw",
      "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/lLjJ0A",
      "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4"
    }
  ]
}
2023-11-21 15:25:18,870:DEBUG:acme.client:Storing nonce: v0bMowfi9E43DYI-R1aVRKBhtqxgx3Ok6Mt2ihbXkm-aQP-86J0
2023-11-21 15:25:18,871:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 15:25:18,872:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2023-11-21 15:25:18,872:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 15:25:18,872:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 15:25:18,873:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:25:18,873:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 15:25:18,873:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 15:25:18,874:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 15:25:18,875:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:25:18,925:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 15:25:19,307:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 15:25:19,310:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is signed by the certificate's issuer.
2023-11-21 15:25:19,311:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD
2023-11-21 15:25:19,315:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:34 UTC.
2023-11-21 15:25:19,316:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 15:25:19,316:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 15:25:19,320:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03EA74B0>
Prep: True
2023-11-21 15:25:19,321:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03EA74B0> and installer None
2023-11-21 15:25:19,321:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 15:25:19,325:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 15:25:19,326:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 15:25:19,328:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 15:25:19,770:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 15:25:19,772:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:18 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "jGfcdyKuWc4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 15:25:19,773:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 15:25:23,290:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6970_key-certbot.pem
2023-11-21 15:25:26,662:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6968_csr-certbot.pem
2023-11-21 15:25:26,663:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 15:25:26,663:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 15:25:26,810:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 15:25:26,811:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:25 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8y2JH3VsGgVIn-QT87KVCiVAdddWlI6XY1WKy5dgwMvA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 15:25:26,811:DEBUG:acme.client:Storing nonce: nbWKegf8y2JH3VsGgVIn-QT87KVCiVAdddWlI6XY1WKy5dgwMvA
2023-11-21 15:25:26,811:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 15:25:26,816:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjh5MkpIM1ZzR2dWSW4tUVQ4N0tWQ2lWQWRkZFdsSTZYWTFXS3k1ZGd3TXZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Eegje2JU0ZjQRzaNu1l0eft1_leOpNH_hQAb8uITx2vvnOuyGcMU4sV02_BP-cMhBgRylpdAlm8ccSsTX0-gZbTLRdE4TA0u42kn0Di75PrZ6b4YgOExr7_3gN4slPusQBwlNoF2nWnwhvpIwvcjMNnQg7RE2Zi1Rfl8UVHJ8UN1tLQdfm5WZAfGF4MHd-qT0l8-zfFONmhwFbk1YNEd8CcnFbgUkOPdeF1aNY18xFDQPYxAmUYvCcx6KzuikvwUUc_53_eLF2ThrXnqj_wp4cy88BDJO9KPQtPm9QFZqQxp_DpMvd60hmyMXT4TxzrYLqo_5UmOZ02_CsFsZhTfkw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-21 15:25:27,141:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-21 15:25:27,142:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 14:25:25 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796210686
Replay-Nonce: nbWKegf8FUMlKF-SJr00B6bGF-b20v697plI349oKq88wnT9KP4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796210686"
}
2023-11-21 15:25:27,143:DEBUG:acme.client:Storing nonce: nbWKegf8FUMlKF-SJr00B6bGF-b20v697plI349oKq88wnT9KP4
2023-11-21 15:25:27,144:DEBUG:acme.client:JWS payload:
b''
2023-11-21 15:25:27,157:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhGVU1sS0YtU0pyMDBCNmJHRi1iMjB2Njk3cGxJMzQ5b0txODh3blQ5S1A0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4MDAxNjYifQ",
  "signature": "XP11F6KcW035kxN2mFpsuDPvIMVXRdtAfOV_pWVac6tiv1tRj6IZusg_CVC7ickaiCfZSWqDTSqhGtyIOvK6oIuZv4H6iNRQJuaP6PcJDLPcpd0vTXM04-IJ81GfNZxLsxFNST-vSjJz8skFT9nqmBPbmH6toQyCcBl9iCjRc7UI2g8fQeT107L-KQg_zXhNaWl3kbb0bGUn5sxf26Gb372-53L2pJriUk33G5Ven4HHOPL-rxk5QasyXr2b3uvWJ2jed3NWI8xO0-F9ZweDJG7vLyl8anRXWwaoxmJJB_TyRkqFgupkFsppjwjq8B1Fu67nGi863lzOdLv3nsbbCA",
  "payload": ""
}
2023-11-21 15:25:27,311:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066800166 HTTP/1.1" 200 805
2023-11-21 15:25:27,311:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:26 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8jgUTgBmxW0FVi7RMqLWhDIzYvwWEHyYzrU6QraRkW-Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:25Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/zXEJ0Q",
      "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/b777tA",
      "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/Gd6Xnw",
      "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8"
    }
  ]
}
2023-11-21 15:25:27,312:DEBUG:acme.client:Storing nonce: nbWKegf8jgUTgBmxW0FVi7RMqLWhDIzYvwWEHyYzrU6QraRkW-Y
2023-11-21 15:25:27,312:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 15:25:27,313:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2023-11-21 15:25:27,313:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 15:25:27,313:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 15:25:27,314:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:25:27,314:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 15:25:27,314:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 15:25:27,315:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 15:25:27,316:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:25:27,364:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 15:25:27,591:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 15:25:27,593:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-21 15:25:27,595:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-21 15:25:27,604:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:48 UTC.
2023-11-21 15:25:27,604:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 15:25:27,605:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 15:25:27,610:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x00710D30>
Prep: True
2023-11-21 15:25:27,611:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x00710D30> and installer None
2023-11-21 15:25:27,611:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 15:25:27,615:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 15:25:27,616:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 15:25:27,618:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 15:25:28,145:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 15:25:28,146:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:26 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "bYSlmUS0-GY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 15:25:28,147:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 15:25:31,531:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6971_key-certbot.pem
2023-11-21 15:25:34,941:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6969_csr-certbot.pem
2023-11-21 15:25:34,942:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 15:25:34,942:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 15:25:35,122:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 15:25:35,123:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:33 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnfghIgudmYwwNUfWThQrApddTWl-KahOgRiy8BkhO5W0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 15:25:35,124:DEBUG:acme.client:Storing nonce: jXyutbsnfghIgudmYwwNUfWThQrApddTWl-KahOgRiy8BkhO5W0
2023-11-21 15:25:35,124:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 15:25:35,138:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25mZ2hJZ3VkbVl3d05VZldUaFFyQXBkZFRXbC1LYWhPZ1JpeThCa2hPNVcwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "s_m7tTOiCNa8JkmT9d_NqfPeGiDntdgCQJ3wpzbF6kwqn1SshOC4ILZE95Ukq0GHp3SRVRcVx_ZdnmKWF2zMjuUaUlzxhBfw3lcovAENdGbBbeHRvyHI_Nss-jlSqpxWjVJZ_KofWlvu13qiQaSMfW3eK4wwCO3Bxj-zzmYlsdsrpfGF-j8BTWG9eFIVsnjqZ6HkLgUlmq5lXnij20BDtNB9jJ7L-mynoMNrtX1VBG93VV2Eq71CKjTaWVVePhKBXLBNdxuFs1ToBDdCmhZwDbhFAlC1RYLVtq_r-0HD-fdLQSHDaDT5wPNiuSUD-bqiWWbIg8K9p_TTwIQPTrC-rg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-21 15:25:35,354:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-21 15:25:35,355:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 14:25:34 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796230126
Replay-Nonce: jXyutbsnyiLDarNHtr-yTAjZhRpGPHZtnCtRFVfb_p5kmWXl3hE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796230126"
}
2023-11-21 15:25:35,355:DEBUG:acme.client:Storing nonce: jXyutbsnyiLDarNHtr-yTAjZhRpGPHZtnCtRFVfb_p5kmWXl3hE
2023-11-21 15:25:35,355:DEBUG:acme.client:JWS payload:
b''
2023-11-21 15:25:35,362:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic255aUxEYXJOSHRyLXlUQWpaaFJwR1BIWnRuQ3RSRlZmYl9wNWttV1hsM2hFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4Mjg2ODYifQ",
  "signature": "uFqppYB7Rsq9wS3Lm7b6SbdY3NfUw6fImzxBoIdt5Yp2A5Tk0tCva8-Wj8_t0TZ60x7db_61z3NXFVmkEdAEvkcv7zehg6vFR6aYiBepbhwNxyNlYqvAr-VSIIaOqL70PMn7Z9iewh5Dt1eBjkScvRotrKBOcTs6IxqJonUwilzVgcl-SFbunSN2jBlWfdXZwF3Wlj5DbTsYkl24S_h1UkqhTKlk4WW9HspKjN2EJHjAZcwlH1V3TXWqGBKN8hLmNM-KesDdjXuK4jWqG3wf70HKPkKEO6l8MFR7JyHM5SJkv8M4L-Bruyj_MevtfrF-vhHY66WxhEerouyvLel_NA",
  "payload": ""
}
2023-11-21 15:25:35,548:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066828686 HTTP/1.1" 200 805
2023-11-21 15:25:35,549:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:34 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjQOu3_KsWlQZpnYnd09xP6TU7gkVeHcDxluvXV14hyk0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:34Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/TFIwLw",
      "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/se4r1w",
      "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/Hc2_wQ",
      "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs"
    }
  ]
}
2023-11-21 15:25:35,549:DEBUG:acme.client:Storing nonce: SFMYLIQjQOu3_KsWlQZpnYnd09xP6TU7gkVeHcDxluvXV14hyk0
2023-11-21 15:25:35,549:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 15:25:35,550:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2023-11-21 15:25:35,550:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 15:25:35,550:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 15:25:35,550:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:25:35,551:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 15:25:35,551:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 15:25:35,551:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 15:25:35,553:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:25:35,589:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 15:25:35,948:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 15:25:35,951:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2023-11-21 15:25:35,952:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2023-11-21 15:25:35,961:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:31:01 UTC.
2023-11-21 15:25:35,962:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 15:25:35,962:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 15:25:35,967:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03E70FD0>
Prep: True
2023-11-21 15:25:35,967:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03E70FD0> and installer None
2023-11-21 15:25:35,967:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 15:25:35,972:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 15:25:35,973:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 15:25:35,975:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 15:25:36,511:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 15:25:36,512:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:35 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "5gz43R1I_6M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 15:25:36,513:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 15:25:40,002:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6972_key-certbot.pem
2023-11-21 15:25:43,377:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6970_csr-certbot.pem
2023-11-21 15:25:43,378:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 15:25:43,378:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 15:25:43,555:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 15:25:43,556:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:42 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnrQSctU1vel2GcO2JIB0st-j8b58imkwBs8Agc2G-3YI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 15:25:43,556:DEBUG:acme.client:Storing nonce: jXyutbsnrQSctU1vel2GcO2JIB0st-j8b58imkwBs8Agc2G-3YI
2023-11-21 15:25:43,556:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 15:25:43,561:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25yUVNjdFUxdmVsMkdjTzJKSUIwc3QtajhiNThpbWt3QnM4QWdjMkctM1lJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "rfKBVQ6zqDkM2KYhd4RxNl15OqboTXQFI2BoACz8WXqbCvHt1gOY_LsZxMSYVmPAJhYwWIw3VVCQ77i_yDhzJSNLguL5ftPJddH50hylUmAaIshMboBCN4oB1yQMVB4r-5YpRzfz48TuF1bk2y1xDuPAeYhNX79ifQ-4z1H5V5qg2yTqcL7RdASlwDQ16rx4BkE7pi8_b-uihHPUbTQ86Th1FyYpZrCThYo0GK6_KXOczM6KTJYPx9yP8ZzEFGRWM1J3TnFO2IlKsPND308CGi0jK-zXxKsoZHX3YBJcEoAwqKWIF0dsgkdABhS8uQa9WSzuSMh_1Ko6WL8Ny2Kg8A",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-21 15:25:43,779:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-21 15:25:43,780:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 14:25:42 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796249816
Replay-Nonce: jXyutbsnUFgVVkv7s_kA95TTtPTs79nAm8S6H-H5-qrC04CJZu0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:42Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796249816"
}
2023-11-21 15:25:43,780:DEBUG:acme.client:Storing nonce: jXyutbsnUFgVVkv7s_kA95TTtPTs79nAm8S6H-H5-qrC04CJZu0
2023-11-21 15:25:43,780:DEBUG:acme.client:JWS payload:
b''
2023-11-21 15:25:43,786:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25VRmdWVmt2N3Nfa0E5NVRUdFBUczc5bkFtOFM2SC1INS1xckMwNENKWnUwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4NTg1NzYifQ",
  "signature": "X31AboRKufIwDHpHcqf55yiGAxykML3QeUPbfj4YOZGBoa2g-Ze4qF3ghvqO7CVx5Jt2laEPlMj5NhkSwmcuCgXun0hAXi2e7GO8BiUIcmvBPPPTMmHuEeMjMvd4nLvv-PmfSvXSZVebFyW0NdObHN6yGf0kp0cByNUvf_269Vpm5b5YRSCE20NjveShgQwl7u8eiIHL2GAO4a_U-2kr23KpDDnGX7dyI4iAQwewJdeg1r1P745SbjaNDDGy9NipHM4SoGIdvhzuzaoN5HR_vtlHva7RQGRe3KZ-jx7dqqVNotcHp43ULma-UdxhR1tsZhkkw-U2aWhGSxF-gRxnRg",
  "payload": ""
}
2023-11-21 15:25:43,977:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066858576 HTTP/1.1" 200 805
2023-11-21 15:25:43,978:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 14:25:42 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjBD2N6YtB_Pbf7JchFURtS3PTGtcWTa5KNUXnbaASzwI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:42Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/p5HniQ",
      "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/JwX8uw",
      "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/_ogaVA",
      "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48"
    }
  ]
}
2023-11-21 15:25:43,978:DEBUG:acme.client:Storing nonce: SFMYLIQjBD2N6YtB_Pbf7JchFURtS3PTGtcWTa5KNUXnbaASzwI
2023-11-21 15:25:43,978:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 15:25:43,979:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2023-11-21 15:25:43,980:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 15:25:43,980:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 15:25:43,982:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:25:43,982:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 15:25:43,982:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 15:25:43,983:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 15:25:43,985:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 15:25:43,986:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2023-11-21 15:25:43,986:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2023-11-21 15:25:43,988:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2023-11-21 15:25:43,989:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)