2023-11-21 04:06:53,221:DEBUG:certbot._internal.main:certbot version: 1.6.0
2023-11-21 04:06:53,221:DEBUG:certbot._internal.main:Arguments: []
2023-11-21 04:06:53,222:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2023-11-21 04:06:54,011:DEBUG:certbot._internal.log:Root logging level set at 20
2023-11-21 04:06:54,011:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2023-11-21 04:06:54,045:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x045D5DF0> and installer <certbot._internal.cli.cli_utils._Default object at 0x045D5DF0>
2023-11-21 04:06:54,083:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 04:06:54,297:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 04:06:54,306:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is signed by the certificate's issuer.
2023-11-21 04:06:54,311:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is: OCSPCertStatus.GOOD
2023-11-21 04:06:54,318:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:23 UTC.
2023-11-21 04:06:54,318:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 04:06:54,318:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 04:06:54,323:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04048FF0>
Prep: True
2023-11-21 04:06:54,323:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04048FF0> and installer None
2023-11-21 04:06:54,323:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 04:06:54,329:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 04:06:54,330:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 04:06:54,332:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 04:06:54,879:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 04:06:54,879:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:06:54 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "kWbP1fhySYg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 04:06:54,880:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 04:06:59,130:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6947_key-certbot.pem
2023-11-21 04:07:02,965:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6945_csr-certbot.pem
2023-11-21 04:07:02,966:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 04:07:02,966:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 04:07:03,140:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 04:07:03,141:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:02 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQj97aHBns7OSiwBqzR7f3S82xx8CuDEhWDdGvreou7FXg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 04:07:03,141:DEBUG:acme.client:Storing nonce: SFMYLIQj97aHBns7OSiwBqzR7f3S82xx8CuDEhWDdGvreou7FXg
2023-11-21 04:07:03,141:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 04:07:03,146:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWo5N2FIQm5zN09TaXdCcXpSN2YzUzgyeHg4Q3VERWhXRGRHdnJlb3U3RlhnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "RUBMMHS44bPj0wCg2vncXOywk84KFirkPYTCiWKl1Huj8JlkF5G75MxXfXxSRbx28T5EXIuOe3WnuZiD8S4ND6KprW6m4U6nYgWeE6ACpMqsJBa_dM6fCwTxuPfBIxwGzkf-6_gc9x0u8CIdyUdh3n8wvLfmhZxCzFTMS0URDOgI_ML9pRcI1gSHG1MHXqw5bJDLrIMhPDTev96MIpJiZiwb8-JtjQCHUfZrYJ8wf_5RUWkk_u6ojKN4IoKAGHNKhtg4BBzSMlIlkQ2QfYqgXJ2914eEMRP1Cuo1GQTswQRbKHYf8h2oh5i-XLn6csbqLZvCQJ7sGnQ9hhGIsMyVEw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-21 04:07:03,334:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2023-11-21 04:07:03,335:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 03:07:02 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054336746
Replay-Nonce: SFMYLIQj0HEmE2K_LqdfkiZZxdurygmcmNXKv6EubrS04ktR1iM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-21T03:40:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612303016"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054336746"
}
2023-11-21 04:07:03,335:DEBUG:acme.client:Storing nonce: SFMYLIQj0HEmE2K_LqdfkiZZxdurygmcmNXKv6EubrS04ktR1iM
2023-11-21 04:07:03,335:DEBUG:acme.client:JWS payload:
b''
2023-11-21 04:07:03,341:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612303016:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWowSEVtRTJLX0xxZGZraVpaeGR1cnlnbWNtTlhLdjZFdWJyUzA0a3RSMWlNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzMDMwMTYifQ",
  "signature": "EiOxU--WSQ7BS-0L9L-9dX2MSsHcq3Msw0rS95E2lVQ7x2XBPyFy2prywfGJ67G7Osrhk8WzCsMKrQ7qFbG1DXymhAr9CyAVFHFcx5qJ55cvj4ojZjDiSNETNhh_HClUK5494S4eHog-Qu884VHv0_wIWIixskxWeKUgBlnMGW_rLzoM-xBbWW3I1lBwEdLl_qmm7KpcqV_EAz34Lax1aiVKB_1H4ffB_wm0KCOITC8eYaDBhabLD5yW6LZKGgbNuINB2rh61waFpj-66UmWQv1biwy0gHEvrMyr37TN5Ku4WbnyWXtSc-g0bZ9se3c88dW5suS4keEVaeCeJB-TZQ",
  "payload": ""
}
2023-11-21 04:07:03,519:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612303016 HTTP/1.1" 200 810
2023-11-21 04:07:03,520:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:02 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnjx7zbgwhypMyr0ErtJlWLZfEDIiycxwxzB0n-TmY2tY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-21T03:40:34Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/SE_DLA",
      "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/Wku45g",
      "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/hUBGgQ",
      "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q"
    }
  ]
}
2023-11-21 04:07:03,521:DEBUG:acme.client:Storing nonce: jXyutbsnjx7zbgwhypMyr0ErtJlWLZfEDIiycxwxzB0n-TmY2tY
2023-11-21 04:07:03,522:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 04:07:03,522:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2023-11-21 04:07:03,523:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 04:07:03,524:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 04:07:03,539:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:07:03,539:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 04:07:03,539:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 04:07:03,539:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 04:07:03,545:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:07:03,580:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 04:07:03,980:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 04:07:03,982:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-21 04:07:03,984:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-21 04:07:03,994:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:36 UTC.
2023-11-21 04:07:03,994:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 04:07:03,995:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 04:07:04,001:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03F9A490>
Prep: True
2023-11-21 04:07:04,001:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03F9A490> and installer None
2023-11-21 04:07:04,001:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 04:07:04,005:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 04:07:04,006:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 04:07:04,008:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 04:07:04,554:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 04:07:04,555:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:03 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "PBcJXgSN95c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 04:07:04,556:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 04:07:08,206:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6948_key-certbot.pem
2023-11-21 04:07:11,681:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6946_csr-certbot.pem
2023-11-21 04:07:11,681:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 04:07:11,682:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 04:07:11,863:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 04:07:11,865:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:11 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnvLci8nUrzGWqFS3zRRJ5Sqx1tumNru2rlY8dnib0Dm4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 04:07:11,865:DEBUG:acme.client:Storing nonce: jXyutbsnvLci8nUrzGWqFS3zRRJ5Sqx1tumNru2rlY8dnib0Dm4
2023-11-21 04:07:11,866:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 04:07:11,875:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic252TGNpOG5VcnpHV3FGUzN6UlJKNVNxeDF0dW1OcnUycmxZOGRuaWIwRG00IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "DThFMb5BxwtcCrSNi64oXCQjiFdElJIHXUIQQr2DL5Run5Fi1OkkHzS4_pkGqY1uAhCtqO0a5wyGyByHuN1oes89cT_j04mj3s7s_1yfAjmBUyM8qgxFEtbjNEe-BrWePxjLMzDsvwKuIoqvFPclURc7qQac0lQsHt_ICIf8Z8tw_myR2mH8-g0JsOo6-__CWg2z6TyV4-rqBjxDMdx0CgpCrUT12-CQfX6xzQDejV6rR2luF86eRI83usbXdhMAqdcTIEw3SFxcltWdQNLvXgMddqrlTGPUqfbEKHt56ZRwe0H6chYaMvJ193OW9ALreGU0-YuQ3tKJxuhFvdFBtQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-21 04:07:12,077:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2023-11-21 04:07:12,078:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 03:07:11 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054364216
Replay-Nonce: jXyutbsnoyUinIDpWotUW1LwquQMIOZgNlv5GCp58A2rU2occIs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-21T03:40:44Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612339826"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054364216"
}
2023-11-21 04:07:12,079:DEBUG:acme.client:Storing nonce: jXyutbsnoyUinIDpWotUW1LwquQMIOZgNlv5GCp58A2rU2occIs
2023-11-21 04:07:12,079:DEBUG:acme.client:JWS payload:
b''
2023-11-21 04:07:12,086:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612339826:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25veVVpbklEcFdvdFVXMUx3cXVRTUlPWmdObHY1R0NwNThBMnJVMm9jY0lzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzMzk4MjYifQ",
  "signature": "auK_TNw4D9Zm9pLb-rw1BNpXsMwRqWkjpuXx0R9U3pqsObo2kK_HrFJJsXl5TGqkXEe95bkyZh9m-VJoQKwFhE_w7R3b4my3wh1wNGxqO9B_23tv_ePOfKFuWM-u4rtEOLggJAgZsrjn9q0O5iCxn46ffpwGNBCjIBwEZr6SIByUq6HdeEryIhYcaaH-znfHuXhy2atFtlZU-UzCgyS7Ll5j3Ssdsvh6A9DFT-8Rznj0IvC5OFzXiw8W-0DKAIB5Kw6lmj8AYGO0WcvwNGHykuJ2ckwcgMPjZHvjWukMJNl5cpWqZ49adJWCWAmcDKGRLZEbseZi61D3Q0JI_7RxnA",
  "payload": ""
}
2023-11-21 04:07:12,272:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612339826 HTTP/1.1" 200 804
2023-11-21 04:07:12,273:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:11 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnmf5c5ism1-GCqfn1T2XWfJr8M67HKKV76AOe9ka_Mzw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-21T03:40:44Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/iaWzYw",
      "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/b2lhHw",
      "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/4q2BkQ",
      "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w"
    }
  ]
}
2023-11-21 04:07:12,273:DEBUG:acme.client:Storing nonce: jXyutbsnmf5c5ism1-GCqfn1T2XWfJr8M67HKKV76AOe9ka_Mzw
2023-11-21 04:07:12,274:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 04:07:12,275:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2023-11-21 04:07:12,276:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 04:07:12,276:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 04:07:12,277:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:07:12,277:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 04:07:12,278:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 04:07:12,278:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 04:07:12,279:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:07:12,324:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 04:07:12,765:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 04:07:12,768:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2023-11-21 04:07:12,769:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2023-11-21 04:07:12,775:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:49 UTC.
2023-11-21 04:07:12,775:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 04:07:12,775:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 04:07:12,779:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0405E870>
Prep: True
2023-11-21 04:07:12,779:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0405E870> and installer None
2023-11-21 04:07:12,779:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 04:07:12,784:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 04:07:12,785:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 04:07:12,787:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 04:07:13,322:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 04:07:13,324:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:12 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Aw7UTpM55Ug": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 04:07:13,325:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 04:07:17,284:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6949_key-certbot.pem
2023-11-21 04:07:20,789:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6947_csr-certbot.pem
2023-11-21 04:07:20,790:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 04:07:20,790:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 04:07:20,968:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 04:07:20,969:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:20 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjROr87xWL6W5ERpDH4VoMpiiJq9DwE5Kg9-M8oYsByL0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 04:07:20,969:DEBUG:acme.client:Storing nonce: SFMYLIQjROr87xWL6W5ERpDH4VoMpiiJq9DwE5Kg9-M8oYsByL0
2023-11-21 04:07:20,970:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 04:07:20,979:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpST3I4N3hXTDZXNUVScERINFZvTXBpaUpxOUR3RTVLZzktTThvWXNCeUwwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "jU8vtje1Gs_R27l1Mp3H1dJJJyaXSU2tJY6F7bod9NwXVM03PRyw40k5YKNf1D6VCbc855KsW_36uCtjDJOIOZMaq4dtW4SunWyRbEmYa1SERo89_b-MSkJu7mmq9QHBgUr02WSunhhLjIFZPycvy1Qb-NKNbJqIUdJ6mrAk1iKM3YhqJOq2VFareYO1vkTMpq9oUBuYD3BWPG546v6GUT6ufZzCxzXyURRGKzsnoYpQ1vPVEMzdP2plmvzVe8FZb-8Tc0cfFpgN6lHdNLpDkcEe9WqbwAUxKlqmN6IUucO37TKuXD8KHWXLGKDTSxxP6uTQcbWl5tlS_FtRuhoGNg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-21 04:07:21,255:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2023-11-21 04:07:21,256:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 03:07:20 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054392386
Replay-Nonce: SFMYLIQjm_HFylAfOCfWMLLyaYDkv4t4rE_WK_75oacctkUaSBE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-21T03:40:54Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612379486"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054392386"
}
2023-11-21 04:07:21,257:DEBUG:acme.client:Storing nonce: SFMYLIQjm_HFylAfOCfWMLLyaYDkv4t4rE_WK_75oacctkUaSBE
2023-11-21 04:07:21,257:DEBUG:acme.client:JWS payload:
b''
2023-11-21 04:07:21,265:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612379486:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWptX0hGeWxBZk9DZldNTEx5YVlEa3Y0dDRyRV9XS183NW9hY2N0a1VhU0JFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzNzk0ODYifQ",
  "signature": "ZS5WM_Q4aeo946gBE2aRoDrpKmhT2qHLULxiIycojEe27y2bttYU2pHqDwpuo1GpMxzwx0qbOxYqMvfRdNcT-oMJgp8-9tF4oPO1q1bc2--apovhlBxosVrFStuf0jZtlrxMIH1jbREitoedEiAaHVaJMEpII632aNYg-P3fXfcZw2LjEnI3fvbNJJFn0sQvSDKlAkW6dJJ50n3dizBNur54tHtrKPXFijmBE9Zsnvfz2XmIwI5Nbv9N_oesXY9lkjhxIpBDwltEYzKLDNluK9E8ZMhxMWiiegTaFb9JzK1FJfYiMTu-RQghSm6m48F6QQo_GZEDcau2StoK_yw00w",
  "payload": ""
}
2023-11-21 04:07:21,459:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612379486 HTTP/1.1" 200 807
2023-11-21 04:07:21,460:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:20 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjToHqEpi2yNcHdCOZaA5PCQJ8eztfOxbpRe4U6Wnx8oM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-21T03:40:54Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/az4Vdg",
      "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/Zk1DuA",
      "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/MleojA",
      "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc"
    }
  ]
}
2023-11-21 04:07:21,460:DEBUG:acme.client:Storing nonce: SFMYLIQjToHqEpi2yNcHdCOZaA5PCQJ8eztfOxbpRe4U6Wnx8oM
2023-11-21 04:07:21,461:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 04:07:21,461:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2023-11-21 04:07:21,461:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 04:07:21,462:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 04:07:21,462:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:07:21,463:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 04:07:21,463:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 04:07:21,463:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 04:07:21,464:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:07:21,507:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 04:07:21,929:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 04:07:21,930:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-21 04:07:21,931:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-21 04:07:21,936:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:02 UTC.
2023-11-21 04:07:21,936:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 04:07:21,937:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 04:07:21,942:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x045BB7F0>
Prep: True
2023-11-21 04:07:21,943:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x045BB7F0> and installer None
2023-11-21 04:07:21,943:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 04:07:21,958:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 04:07:21,959:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 04:07:21,961:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 04:07:22,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 04:07:22,414:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:21 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "XpfaAprP0AM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 04:07:22,415:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 04:07:26,050:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6950_key-certbot.pem
2023-11-21 04:07:29,519:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6948_csr-certbot.pem
2023-11-21 04:07:29,520:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 04:07:29,520:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 04:07:29,670:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 04:07:29,671:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:28 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8ZSDVJFxSflnHYaoRvECHlmffL53Tt0WBumshnMDtlzw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 04:07:29,671:DEBUG:acme.client:Storing nonce: nbWKegf8ZSDVJFxSflnHYaoRvECHlmffL53Tt0WBumshnMDtlzw
2023-11-21 04:07:29,672:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 04:07:29,679:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhaU0RWSkZ4U2ZsbkhZYW9SdkVDSGxtZmZMNTNUdDBXQnVtc2huTUR0bHp3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "URTezH7gYCXnkA7pphOxjHLZSY1y_EjOilOUSJytL1jZsjdDci9X3__2t-OzeeFjy1XRIG9uR-GZsO_Qru44HvfMRmp0JSzjJ-Itluvu0ZMAmw3a9Gn3UCO9dtoBllxuKc8TQuDqUukY21tVSfi8ygEm7Uy4wkWUKUiVxYLav7TZpyUkgESSlBFYZSS2OExp9IktiK1Vl8OX-WlL-G7Xly4mTSxs4kD1MDk4ne5G_dicviB24aYefXQhEZtPtcR-_kmjLZ-rkRj_pBGT-CsD9ZJbBnHIsYLvlXn6eGJBzaev0Xyiow3o-PAo_VJAa257WfZYLl1ZAsZdxxdpRWkdrQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-21 04:07:29,933:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2023-11-21 04:07:29,934:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 03:07:29 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054424916
Replay-Nonce: v0bMowfiTJcIAaQQvjcerwPGwfy0JueRp1LpP12dV--sfK9ttKE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-21T03:41:04Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612422406"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054424916"
}
2023-11-21 04:07:29,934:DEBUG:acme.client:Storing nonce: v0bMowfiTJcIAaQQvjcerwPGwfy0JueRp1LpP12dV--sfK9ttKE
2023-11-21 04:07:29,934:DEBUG:acme.client:JWS payload:
b''
2023-11-21 04:07:29,940:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612422406:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlUSmNJQWFRUXZqY2Vyd1BHd2Z5MEp1ZVJwMUxwUDEyZFYtLXNmSzl0dEtFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI0MjI0MDYifQ",
  "signature": "Vhlh7ImWg_e5qR67HVhLhOssPlt-0nASIwEFkdOpghqG3WNNtjWvSKyIvRl1dGJDZaDW7gTvNUs1Aa8U3COq0PicIPJ93akr9e0ShkHyFNSmEacj0v8Ct05Z8PQRS3gUmOcNLRKF6435kQtJJgTUoaqVdiYtI2rUgvgbr65nywIsZ6zLIrMAWy4kkmrqG9czB3ERf8Xg0Xvf4Il2DrF3KBI05FtDa7TglhFEsICZfBTJFGvwRg1Dv1Re_7GnOhHkVsZ4xR4VPr_MTWF29YxD-ADMHYQA2GxilSV-3ZSKUYEs-1vHPOwHdyIgGnThT_273PFknOIEAhjqZh5IPD1ExQ",
  "payload": ""
}
2023-11-21 04:07:30,135:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612422406 HTTP/1.1" 200 801
2023-11-21 04:07:30,136:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:29 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfiiH_iDxUVusKcVM8kp6h3l1-KVBi7YQQMoR5Uic2sUm4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-21T03:41:04Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/ky6kcw",
      "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/weBWyw",
      "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/I55gjQ",
      "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg"
    }
  ]
}
2023-11-21 04:07:30,137:DEBUG:acme.client:Storing nonce: v0bMowfiiH_iDxUVusKcVM8kp6h3l1-KVBi7YQQMoR5Uic2sUm4
2023-11-21 04:07:30,138:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 04:07:30,139:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2023-11-21 04:07:30,140:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 04:07:30,140:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 04:07:30,142:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:07:30,142:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 04:07:30,142:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 04:07:30,142:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 04:07:30,143:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:07:30,191:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 04:07:30,490:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 04:07:30,491:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-21 04:07:30,492:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-21 04:07:30,501:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:14 UTC.
2023-11-21 04:07:30,501:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 04:07:30,502:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 04:07:30,506:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x045BB7F0>
Prep: True
2023-11-21 04:07:30,506:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x045BB7F0> and installer None
2023-11-21 04:07:30,506:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 04:07:30,511:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 04:07:30,512:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 04:07:30,514:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 04:07:31,057:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 04:07:31,058:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:30 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "YJNabxFD-pc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 04:07:31,059:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 04:07:34,748:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6951_key-certbot.pem
2023-11-21 04:07:38,206:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6949_csr-certbot.pem
2023-11-21 04:07:38,207:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 04:07:38,207:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 04:07:38,388:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 04:07:38,388:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:37 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnpeSBMf05h3_nL7CrUwPs0l-pQHKEHy2ZgRqwQ2vED24
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 04:07:38,388:DEBUG:acme.client:Storing nonce: jXyutbsnpeSBMf05h3_nL7CrUwPs0l-pQHKEHy2ZgRqwQ2vED24
2023-11-21 04:07:38,389:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 04:07:38,394:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25wZVNCTWYwNWgzX25MN0NyVXdQczBsLXBRSEtFSHkyWmdScXdRMnZFRDI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "KLAA9siTcItrbFyER-BOTFchwm9j1tKyvK2UlFBJvlox0w5J-c8dxVinUG0L9hmIN5n43zaWKHGVmqosklEunOy8Z2qhMXDDL0miPkztUcfUGi3KJCCR_I6mv_bXnBHzHJci2d6XtwQ-6pojnWq-ILufnEgys3xp8o4uJGd2Wqc6Y8KAWVT_YZjSMymA1HMcWteWNDRVvKuXOdj1fAi3kivJpbIniAcvtCUxqxoEYe_qM97wU3xzMk04BgKPYa7PnOqlEF5AvHrglkFH26Hwg5oPRGKFakE6W1e_hPER2XstntsbIgDphNdBIflsL9OXbtbNg8ijO5FEeAagTOGr6w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-21 04:07:38,592:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-21 04:07:38,594:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 03:07:37 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054455886
Replay-Nonce: jXyutbsnOQ6JXPF6nku9ka3ca78eIbOavB79Kzc0CBhPbZVMUYI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-21T03:41:13Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612463596"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054455886"
}
2023-11-21 04:07:38,594:DEBUG:acme.client:Storing nonce: jXyutbsnOQ6JXPF6nku9ka3ca78eIbOavB79Kzc0CBhPbZVMUYI
2023-11-21 04:07:38,595:DEBUG:acme.client:JWS payload:
b''
2023-11-21 04:07:38,604:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612463596:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25PUTZKWFBGNm5rdTlrYTNjYTc4ZUliT2F2Qjc5S3pjMENCaFBiWlZNVVlJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI0NjM1OTYifQ",
  "signature": "EoDfZzSA0kPiIjV-GweUveEYPfnwUk2j9SlsH2hd2AbJ8cyjd397d7pTx9ERC-K0kGY3R3pHlhPD4kkEInGM2cGnKp6Pfy23fUZ5NuX4CMT2sj5nEtaHOFZ_UkDDv_9hU0EBcMwqgsR2ooR9a3uApp95QeO2iQUbK4sRMPC9ymaTBknLlQe7FZFiU4kDmCRaaLVomMy3aY4rAW7LE3k5RSjatbqo8q4zRcsxaFfIAXhE-3mPJjiMyh8vQPXVzFIiPoZQ9ZtcsrK3ImCAeq23V8zTVwFlVYCKbD1Nh8xziC5hwFwkUTPN94zUH7J2K4RINUTt1ovO2bRuArVFYd66LQ",
  "payload": ""
}
2023-11-21 04:07:38,791:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612463596 HTTP/1.1" 200 805
2023-11-21 04:07:38,792:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:37 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQj315qs5WP1u7MESgG3Dh_ZbO_x6Hd6_BEuS-wdKWvQO0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-21T03:41:13Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/6wvlBA",
      "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/WBsXnQ",
      "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/cdtfow",
      "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI"
    }
  ]
}
2023-11-21 04:07:38,792:DEBUG:acme.client:Storing nonce: SFMYLIQj315qs5WP1u7MESgG3Dh_ZbO_x6Hd6_BEuS-wdKWvQO0
2023-11-21 04:07:38,793:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 04:07:38,793:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2023-11-21 04:07:38,794:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 04:07:38,794:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 04:07:38,795:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:07:38,795:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 04:07:38,795:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 04:07:38,796:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 04:07:38,797:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:07:38,839:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 04:07:39,069:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 04:07:39,070:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2023-11-21 04:07:39,071:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2023-11-21 04:07:39,075:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:27 UTC.
2023-11-21 04:07:39,075:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 04:07:39,076:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 04:07:39,080:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04048CB0>
Prep: True
2023-11-21 04:07:39,080:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04048CB0> and installer None
2023-11-21 04:07:39,080:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 04:07:39,086:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 04:07:39,087:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 04:07:39,089:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 04:07:39,543:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 04:07:39,544:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:38 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "DJ7O7o2uZso": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 04:07:39,545:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 04:07:43,541:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6952_key-certbot.pem
2023-11-21 04:07:47,083:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6950_csr-certbot.pem
2023-11-21 04:07:47,084:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 04:07:47,084:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 04:07:47,235:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 04:07:47,237:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:46 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfiDiMZvPsCOGtd8L2OGmXWHqX19f7hswtCXxZLU44FK3I
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 04:07:47,237:DEBUG:acme.client:Storing nonce: v0bMowfiDiMZvPsCOGtd8L2OGmXWHqX19f7hswtCXxZLU44FK3I
2023-11-21 04:07:47,238:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 04:07:47,246:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlEaU1adlBzQ09HdGQ4TDJPR21YV0hxWDE5Zjdoc3d0Q1h4WkxVNDRGSzNJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Igvcdd1OhN-qJfFnP_V0QlCWFu8O29FVRLmW4_5MPXnMJNz0vo8yj9hGx7RtPmbh-1j52xwo--iUeDSFJ64BaEhazjsVvE-JePHBZMGaL1NrOJW9NBmG205sg6Tez6pqam-ZAX2x2I_kCPoIh2nPWFacWCwz35ot4OVU-yBxh5IFd3iqeU1Jj6rBd3y_-u-myuv-ZpsOGCEwdCtRTK_aQkBj-FcXCBG1ke-nNoQfAfmXHaX4nn3liqwxEO9ixkVfGdIgaSNfA9pZuCFJZRCEdSk2HqD9XPTV-s50Q3QulIK3YpCv_iZxYWAJqNabg1NsIDtGm7WxRjFR1myC7kIrmw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2023-11-21 04:07:47,427:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2023-11-21 04:07:47,428:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 03:07:46 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054483926
Replay-Nonce: nbWKegf8LjZYOj8r0OoLczRPQQ6ZMltYrFznXUzzRIiZh8vCBDo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-21T03:41:23Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612503666"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054483926"
}
2023-11-21 04:07:47,429:DEBUG:acme.client:Storing nonce: nbWKegf8LjZYOj8r0OoLczRPQQ6ZMltYrFznXUzzRIiZh8vCBDo
2023-11-21 04:07:47,430:DEBUG:acme.client:JWS payload:
b''
2023-11-21 04:07:47,440:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612503666:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhMalpZT2o4cjBPb0xjelJQUVE2Wk1sdFlyRnpuWFV6elJJaVpoOHZDQkRvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1MDM2NjYifQ",
  "signature": "o_gpZz55KfKlTrc0BsHJJdPaWVhdEuC825dis7FRZGyY6FgDwhSHQD55Vmv1vXlTcXe7Q82DH9ebcPpvUb1gsKMQhRQXvHZjRYXoqVTWGpDpHFBKLJGal6Q8gqCxS-u6dU5o4uAcbT40e1Ga1NGuvzHIY0uWbal_HlqewSyWUHQrUQW_CkpLUtPFq_dgfcbMXNjc7P6ZZmhElK7hm7DIhSQGZGvGnGDFFiszn3QKoiiFLPx4QoJbn2eZrZegeL9YhzTV8ls2zfV9q9BVS0bh1L0rCjVQMQsykc7YHsI-hceWsJLvjnymD7VRCOrzxlwE-TwYL8qWUJjsD8HTYQjdTQ",
  "payload": ""
}
2023-11-21 04:07:47,599:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612503666 HTTP/1.1" 200 809
2023-11-21 04:07:47,601:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:46 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8FsBUFclsjg4x2kEvxFU0WiO83d70ymbUSQzq4BPPvRo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-21T03:41:23Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/EfdATg",
      "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/HlUCsw",
      "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/hGYrLw",
      "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc"
    }
  ]
}
2023-11-21 04:07:47,601:DEBUG:acme.client:Storing nonce: nbWKegf8FsBUFclsjg4x2kEvxFU0WiO83d70ymbUSQzq4BPPvRo
2023-11-21 04:07:47,603:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 04:07:47,603:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2023-11-21 04:07:47,604:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 04:07:47,604:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 04:07:47,605:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:07:47,605:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 04:07:47,605:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 04:07:47,606:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 04:07:47,608:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:07:47,655:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 04:07:48,114:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 04:07:48,117:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-21 04:07:48,118:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-21 04:07:48,123:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:41 UTC.
2023-11-21 04:07:48,123:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 04:07:48,123:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 04:07:48,128:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x045BB110>
Prep: True
2023-11-21 04:07:48,128:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x045BB110> and installer None
2023-11-21 04:07:48,128:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 04:07:48,134:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 04:07:48,135:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 04:07:48,136:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 04:07:48,669:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 04:07:48,670:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:47 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "z7g6kp_yDCI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2023-11-21 04:07:48,671:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 04:07:52,781:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6953_key-certbot.pem
2023-11-21 04:07:56,235:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6951_csr-certbot.pem
2023-11-21 04:07:56,236:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 04:07:56,236:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 04:07:56,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 04:07:56,414:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:55 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQj3dBrODym6TNSu5LXu3qKpSrwe-Ul4CtmNisr7A9z8fM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 04:07:56,415:DEBUG:acme.client:Storing nonce: SFMYLIQj3dBrODym6TNSu5LXu3qKpSrwe-Ul4CtmNisr7A9z8fM
2023-11-21 04:07:56,415:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 04:07:56,425:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWozZEJyT0R5bTZUTlN1NUxYdTNxS3BTcndlLVVsNEN0bU5pc3I3QTl6OGZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Uog3HlSBHiitlqAL7kUknp7RKP5ulj6J9WAV8k0C1MM3keQ20gqwDlty2o2B56wD0my2_XKyh4mpjBB6qwjKxqP8WKxS4aoInJdjGfsDwIVI--Mz2lhBaOLw7635L2d_ZRqPVzsQhgr_jQZ4RfY8_sZN1m5YNiquPBv1m_U62D9CbJsR23sVqtKqHGvgtOa3J_bW2QQKc-3JVkcWbBZbZpsnNGNL8_bbVMahq0xglE_U73SJyEfBx71YGaid9PyrF5cWORTvRU03CPswkq3HXAuP-pqZuVife9mOOBiVcm8TtFvhUy8_9Pn1CUvv3Smv5njeGhAFh5qxlfSEahrmGA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2023-11-21 04:07:56,616:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2023-11-21 04:07:56,617:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 03:07:55 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054508996
Replay-Nonce: jXyutbsnwzgzlDCFd7DfDbq_cT7ChQg1z-HonvnjTmPTEJrk4qI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-21T03:41:32Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612537686"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054508996"
}
2023-11-21 04:07:56,617:DEBUG:acme.client:Storing nonce: jXyutbsnwzgzlDCFd7DfDbq_cT7ChQg1z-HonvnjTmPTEJrk4qI
2023-11-21 04:07:56,617:DEBUG:acme.client:JWS payload:
b''
2023-11-21 04:07:56,623:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612537686:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic253emd6bERDRmQ3RGZEYnFfY1Q3Q2hRZzF6LUhvbnZualRtUFRFSnJrNHFJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1Mzc2ODYifQ",
  "signature": "YPsI0Im9P7GjiQPKulNTPYUbu8DiK-yEKv9gyz91RaWw-0Hk0kqAslLnfvdgKf9pH6Ya-rGPfvbUwVelOh8pgyTzDiJKNmTWFuCpBM0ZSoUBHQTHYYm6z_K0pEHSHL47aqQBEHBq9AoWSyCwTmHCi1Ps6fZ2qdLP0lmZS9Zt4NNpnPoOETwRlJ4IPufKBRn9yYfr1_Top8JWr0j6K5pQG48xupjxxpgFrxrfn8-WSyVERhac-rEknytasVBTIMk9bwo_27Jw3frpGrK1GdDGwXjwUJdUZz999Cp_5oqs2PgVT5IHh-ZLLBm32OXSUCcx70px8S-fGnJYxP315zyYSQ",
  "payload": ""
}
2023-11-21 04:07:56,806:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612537686 HTTP/1.1" 200 806
2023-11-21 04:07:56,807:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:55 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQj3AbJ5oUz1P7BE7pmbRyyRTQkZKfmBzwHtdMFvnuXvBg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-21T03:41:32Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/EQ01mA",
      "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/E16lcw",
      "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/vtzF_w",
      "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY"
    }
  ]
}
2023-11-21 04:07:56,807:DEBUG:acme.client:Storing nonce: SFMYLIQj3AbJ5oUz1P7BE7pmbRyyRTQkZKfmBzwHtdMFvnuXvBg
2023-11-21 04:07:56,808:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 04:07:56,808:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2023-11-21 04:07:56,809:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 04:07:56,809:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 04:07:56,810:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:07:56,810:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 04:07:56,810:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 04:07:56,811:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 04:07:56,812:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:07:56,857:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2023-11-21 04:07:56,857:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 04:07:56,857:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2023-11-21 04:07:56,865:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2023-11-21 04:07:56,868:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2023-11-21 04:07:56,868:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2023-11-21 04:07:56,868:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2023-11-21 04:07:56,869:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2023-11-21 04:07:56,871:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2023-11-21 04:07:56,907:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 04:07:57,137:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 04:07:57,139:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-21 04:07:57,139:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-21 04:07:57,144:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:56 UTC.
2023-11-21 04:07:57,144:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 04:07:57,144:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 04:07:57,149:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048D9FB0>
Prep: True
2023-11-21 04:07:57,149:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048D9FB0> and installer None
2023-11-21 04:07:57,149:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 04:07:57,153:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 04:07:57,153:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 04:07:57,155:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 04:07:57,608:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 04:07:57,609:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:07:56 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "gc137dfPT-A": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 04:07:57,610:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 04:08:01,231:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6954_key-certbot.pem
2023-11-21 04:08:04,589:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6952_csr-certbot.pem
2023-11-21 04:08:04,589:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 04:08:04,589:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 04:08:04,740:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 04:08:04,741:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:03 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf86W6ROBQdM9v4trvFvGfOLQYDkueLbQemFVGwRX2WhJc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 04:08:04,742:DEBUG:acme.client:Storing nonce: nbWKegf86W6ROBQdM9v4trvFvGfOLQYDkueLbQemFVGwRX2WhJc
2023-11-21 04:08:04,742:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 04:08:04,750:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjg2VzZST0JRZE05djR0cnZGdkdmT0xRWURrdWVMYlFlbUZWR3dSWDJXaEpjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "nh5Trq1oHnUPtb9n5OpkIsMygP32J8F5MtMMmybHKBtc7KGF8yLPgG2BzWHQ8dx9kF6jIXJbgVeRewtYsKXZkcbn8T4UFaAW3LzasibKTHtD8sJHV3rK54iaYWgz99Da5C40spdIOtQSHjz8PuegdZEE49N3NhZ4-ShfYcIlcJmwmTJdRf4oNi3-q4KqVkCGXViwEViuLwYOPZKMq4B3jP8SIB5DWDI8OoN5wHCCNOirwHQ62esMxcscscSErOCv54juM6wxOMVg0ec7Ace2Gz0GZ61J-xlEgDA1HzKezuaZsj3YI4yMJuBEPP26I_p6ZZ-YIv33D7ns9q66goZldQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-21 04:08:04,962:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2023-11-21 04:08:04,963:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 03:08:04 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054534246
Replay-Nonce: v0bMowfixbrUwq9Ep8rwGnJgBF_WR2ADEbuPNIdsvhPsfqyFTI4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-21T03:41:42Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612574526"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054534246"
}
2023-11-21 04:08:04,964:DEBUG:acme.client:Storing nonce: v0bMowfixbrUwq9Ep8rwGnJgBF_WR2ADEbuPNIdsvhPsfqyFTI4
2023-11-21 04:08:04,964:DEBUG:acme.client:JWS payload:
b''
2023-11-21 04:08:04,974:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612574526:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zml4YnJVd3E5RXA4cndHbkpnQkZfV1IyQURFYnVQTklkc3ZoUHNmcXlGVEk0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1NzQ1MjYifQ",
  "signature": "JcfxtoZtlaJpmRs0Qq9lQLK2XjGGeXrtOKwseTUAHDdQuVW1p3XsI05IgeSSidVqVCew28DV7FmNE3oEuDOdRTEWJ-uELawxEYFvh1Ur9VPrKXkjhxJnfnHvs0P0YoyW68fo0lzHNlFzftlwrnZIrSdcaPLer1tqMzsVFKEDzXutJEy0HmKTzKLhqE9rO3-ufA3UNkC9qS08ys3B_W4pzfhYMuDU6qdCw_yX8-InFPg6FNt9cQfm3eC20wu4IUqT5ZUIyPoBLhK9QxxHlgg0aFtATia763rZ_vaa_iIS07UkQrC3w9-nmGN-mH3vBxHkysS9tP-YkH7Smms5TQHq5A",
  "payload": ""
}
2023-11-21 04:08:05,153:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612574526 HTTP/1.1" 200 811
2023-11-21 04:08:05,154:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:04 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8a_JmuO3xFpOgjFuous_oRteuC4vlNdTsXLC38Ye6fhE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-21T03:41:42Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/5letZQ",
      "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/8PjU2A",
      "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/O6CYAw",
      "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc"
    }
  ]
}
2023-11-21 04:08:05,154:DEBUG:acme.client:Storing nonce: nbWKegf8a_JmuO3xFpOgjFuous_oRteuC4vlNdTsXLC38Ye6fhE
2023-11-21 04:08:05,155:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 04:08:05,155:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2023-11-21 04:08:05,155:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 04:08:05,156:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 04:08:05,157:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:08:05,157:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 04:08:05,157:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 04:08:05,157:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 04:08:05,159:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:08:05,206:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 04:08:05,653:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 04:08:05,654:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-21 04:08:05,655:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-21 04:08:05,659:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:09 UTC.
2023-11-21 04:08:05,659:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 04:08:05,660:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 04:08:05,664:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048E26B0>
Prep: True
2023-11-21 04:08:05,665:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048E26B0> and installer None
2023-11-21 04:08:05,665:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 04:08:05,669:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 04:08:05,670:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 04:08:05,672:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 04:08:06,204:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 04:08:06,205:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:05 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "_XFsEQ2ssBc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 04:08:06,205:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 04:08:10,139:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6955_key-certbot.pem
2023-11-21 04:08:13,507:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6953_csr-certbot.pem
2023-11-21 04:08:13,507:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 04:08:13,508:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 04:08:13,685:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 04:08:13,686:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:12 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnkTMu9D2p3ezItv9ZUwBKcSGDzfQDcgLXWg4TqxetCx4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 04:08:13,686:DEBUG:acme.client:Storing nonce: jXyutbsnkTMu9D2p3ezItv9ZUwBKcSGDzfQDcgLXWg4TqxetCx4
2023-11-21 04:08:13,687:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 04:08:13,703:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25rVE11OUQycDNlekl0djlaVXdCS2NTR0R6ZlFEY2dMWFdnNFRxeGV0Q3g0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "AsZFS8c0-fmNsBkzfW2AY97JiLAtakrPdwyBRSTUcDk3DZSAfZfbUCtyt2M_yI5OHBLipTAZ1YPYkrSfuirxzlKy-ns0ikugQ_T59uxl6CfImX40LKtq1cO9OFRXa4W2gjb9fYPCjPYQQVaKAU1eMHwkW1NI08HJxhI4HA_-VFpxfN9ywsXrXPBiCrBPwcZuXuQjIdu-w4hT0dDo2Qn6tYO4YBYBTeHqCnhM842E8E-V1eaVoHk7Ac-cvd8yXggO4lj_QF-tRsR1JgYiy9Swoagi8ejx6JvevshKq-lnCo3bzobbDZXei3fWvL35GrzgNEy_-BHuiNFKqJaCZuU2QA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-21 04:08:13,913:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2023-11-21 04:08:13,913:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 03:08:13 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054557496
Replay-Nonce: SFMYLIQjRZqE-iY00SEd838N8MfLG2pQB4TqpJX1LvgGuUzn9dM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-21T03:41:51Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612606006"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054557496"
}
2023-11-21 04:08:13,913:DEBUG:acme.client:Storing nonce: SFMYLIQjRZqE-iY00SEd838N8MfLG2pQB4TqpJX1LvgGuUzn9dM
2023-11-21 04:08:13,913:DEBUG:acme.client:JWS payload:
b''
2023-11-21 04:08:13,921:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612606006:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpSWnFFLWlZMDBTRWQ4MzhOOE1mTEcycFFCNFRxcEpYMUx2Z0d1VXpuOWRNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2MDYwMDYifQ",
  "signature": "TCDCf1ez6LDMULK6_v2odmcDHSFlFr-CiPPYUhCBc1StSxOYGaEVstCG12L0A-Xabmkp4OFuttvY5dnL_H3JP1NJWHTUsl8TZ9GJkY8SgIGsrHrfokc7WbxOEI3W-HJj5RKpfjWC27WAxqrO0iU_lPJg1HESEQiVKpewMKx-sPDSqwWyx6aQaZjoCicfuKEVBoadFdLgzSkBCluoQ3zUoKBoOVOysDcTl4sRmxq5IX_P4ZFXD1FUPsOY7a78OZop3lkesw2MBKF3b2FOzC48c72o-04CKuc2veIRscdatjx1ZG_H4HSaz9eoaEM6dKAMEWwRsjkJkLaW73HJAsFDHg",
  "payload": ""
}
2023-11-21 04:08:14,106:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612606006 HTTP/1.1" 200 810
2023-11-21 04:08:14,107:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:13 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnv7kGQZG_lwVxKdQaEb7Y28LXkQA3GfCfZg4F5VqnUs0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-21T03:41:51Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/8R9vlA",
      "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/fgtMqQ",
      "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/kOODDA",
      "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4"
    }
  ]
}
2023-11-21 04:08:14,108:DEBUG:acme.client:Storing nonce: jXyutbsnv7kGQZG_lwVxKdQaEb7Y28LXkQA3GfCfZg4F5VqnUs0
2023-11-21 04:08:14,108:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 04:08:14,109:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2023-11-21 04:08:14,109:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 04:08:14,109:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 04:08:14,110:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:08:14,110:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 04:08:14,110:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 04:08:14,111:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 04:08:14,112:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:08:14,147:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 04:08:14,380:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 04:08:14,383:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is signed by the certificate's issuer.
2023-11-21 04:08:14,384:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD
2023-11-21 04:08:14,392:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:22 UTC.
2023-11-21 04:08:14,392:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 04:08:14,393:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 04:08:14,397:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048CF530>
Prep: True
2023-11-21 04:08:14,397:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048CF530> and installer None
2023-11-21 04:08:14,398:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 04:08:14,407:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 04:08:14,408:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 04:08:14,410:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 04:08:14,943:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 04:08:14,944:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:14 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "6z2dzUeAO7g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 04:08:14,945:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 04:08:18,567:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6956_key-certbot.pem
2023-11-21 04:08:22,004:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6954_csr-certbot.pem
2023-11-21 04:08:22,004:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 04:08:22,004:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 04:08:22,006:DEBUG:urllib3.connectionpool:Resetting dropped connection: acme-v02.api.letsencrypt.org
2023-11-21 04:08:22,623:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 04:08:22,624:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:21 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8yaYxTbcT-NdU1Y7s5aVJPxvcDUG1eXJlz72PhYsIgjg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 04:08:22,624:DEBUG:acme.client:Storing nonce: nbWKegf8yaYxTbcT-NdU1Y7s5aVJPxvcDUG1eXJlz72PhYsIgjg
2023-11-21 04:08:22,625:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 04:08:22,630:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjh5YVl4VGJjVC1OZFUxWTdzNWFWSlB4dmNEVUcxZVhKbHo3MlBoWXNJZ2pnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "g1CbPj56-B1ng9d4-3Ny0WDQQrBJmIj_rmWVHBNV_1JCX41rJAswiiFQ-MOXPmEg_A_r5ZdvXCqDqTkB1eTqe_IJZvXL0LwR1s5_gMRgc0ORsy3XGMI0ZMNg5ttVmxS-0whj0aUZW7vgxaaBHDcMv0BFGhGSEWmckKQKwnYgOcicS_hf8jvgKCthyJbID9IGqy8m6jIDYvtSOdQLJQWqytUyLnjD5ehJgp75eengeqOIoZSfVGqr77uSjrb6Tcq0kUTvEY4K7e6PAo2uAfaPcW6tqhRPzdmVEF3AiSQKOBMdQ__CP09SZkoD0HIzuiSiWdn0t2oh1XhgRu3v0tbFaA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2023-11-21 04:08:22,850:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2023-11-21 04:08:22,851:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 03:08:22 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054581526
Replay-Nonce: nbWKegf87PUzZ6Mcg01TpI0gAqijZe0NNwdgSDfP3ksLyprUCaY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-21T03:42:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612638726"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054581526"
}
2023-11-21 04:08:22,852:DEBUG:acme.client:Storing nonce: nbWKegf87PUzZ6Mcg01TpI0gAqijZe0NNwdgSDfP3ksLyprUCaY
2023-11-21 04:08:22,852:DEBUG:acme.client:JWS payload:
b''
2023-11-21 04:08:22,866:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612638726:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjg3UFV6WjZNY2cwMVRwSTBnQXFpalplME5Od2RnU0RmUDNrc0x5cHJVQ2FZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2Mzg3MjYifQ",
  "signature": "Vog2yF-jUDUtRZJYBfhUNw_3Rc6az5mgN4N5HZ7yaDsJljYBCM9ARUWoiaeMN7b-0oV_K4zfAqyaiJWHFfqn4zJtg5dHx4FHuwTveIgSPbbTsQD2tGPGSchTbhJ6xPWhLodSE5s5gDYLpzsg8nVkMSbEUDuTYSthWgaE5QfENRb5IP5vX84EtqQ-gceQa5V3tGh80ufpTkPwfsdrAQ8Eg40s3D9SZXtzHLzzUoAimwXlMw2kut-l-qRFk9oEYDyivUnrtTIqaYS1SqC_y0okJ3NVt-MEDi39NgHNzExpwY5a35uQdNbdTgNRRL6e6Wu4e0vvjK_fLqknek5wrLfQMw",
  "payload": ""
}
2023-11-21 04:08:23,053:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612638726 HTTP/1.1" 200 809
2023-11-21 04:08:23,055:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:22 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfiRq_0nAtugq5T0p_5jUdJKcaYp9SzLBz-QEqSb0HSG7s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-21T03:42:01Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/NNBnvg",
      "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/Mo2Oxw",
      "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/wNN3rQ",
      "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y"
    }
  ]
}
2023-11-21 04:08:23,055:DEBUG:acme.client:Storing nonce: v0bMowfiRq_0nAtugq5T0p_5jUdJKcaYp9SzLBz-QEqSb0HSG7s
2023-11-21 04:08:23,057:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 04:08:23,057:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2023-11-21 04:08:23,058:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 04:08:23,058:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 04:08:23,059:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:08:23,059:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 04:08:23,059:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 04:08:23,060:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 04:08:23,062:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:08:23,113:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 04:08:23,508:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 04:08:23,511:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is signed by the certificate's issuer.
2023-11-21 04:08:23,512:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD
2023-11-21 04:08:23,516:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:34 UTC.
2023-11-21 04:08:23,516:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 04:08:23,516:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 04:08:23,521:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x045DA6B0>
Prep: True
2023-11-21 04:08:23,521:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x045DA6B0> and installer None
2023-11-21 04:08:23,521:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 04:08:23,537:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 04:08:23,537:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 04:08:23,539:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 04:08:23,982:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 04:08:23,982:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:23 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "8AJRmbZwM9E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 04:08:23,983:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 04:08:27,954:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6957_key-certbot.pem
2023-11-21 04:08:31,340:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6955_csr-certbot.pem
2023-11-21 04:08:31,341:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 04:08:31,341:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 04:08:31,486:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 04:08:31,487:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:30 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfi0x_08MIRFP8ATjd_SG3Tl4PVqMofuT5n2EonF_4KOdk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 04:08:31,487:DEBUG:acme.client:Storing nonce: v0bMowfi0x_08MIRFP8ATjd_SG3Tl4PVqMofuT5n2EonF_4KOdk
2023-11-21 04:08:31,488:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 04:08:31,494:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmkweF8wOE1JUkZQOEFUamRfU0czVGw0UFZxTW9mdVQ1bjJFb25GXzRLT2RrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "RHVmvIb_WwVyg5BcJry16DPNNPd-BS7qxiYRfkvdgeHgAP9eFqgcy-gg2gWr43I5vVjoTME32q8EXWgch_0I4zParW8OsQJXg0jm-N65thqL4I0GlfqjiITUO1pXrEmDaObwNwt3sRy9YwUq6tz_YXhAl7iEkiRsnaGskrrmIXtJH8pgqrVB2xPoacKihGXr9VzFDwQTDwOWEeO_ZuJ2Nqf3Q36DMqi78tTRct6sMFF-z5CdgbOw2bqGTPy-ytCC7tWPH2UKSsVtD5NrOxjYDcGj5Ka9lmVAJzeNFmqy3lPE5a7xVhWhlVz4FQ6C75aoTd_tFPKzM3FeKVVw-lUOSw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-21 04:08:31,762:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-21 04:08:31,763:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 03:08:30 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054620886
Replay-Nonce: nbWKegf8_HIx45Pm0lj_nlhFN6X2GdfZc0TQzzcjIluhEv6qT9c
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-21T03:42:10Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612689796"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054620886"
}
2023-11-21 04:08:31,763:DEBUG:acme.client:Storing nonce: nbWKegf8_HIx45Pm0lj_nlhFN6X2GdfZc0TQzzcjIluhEv6qT9c
2023-11-21 04:08:31,764:DEBUG:acme.client:JWS payload:
b''
2023-11-21 04:08:31,777:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612689796:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhfSEl4NDVQbTBsal9ubGhGTjZYMkdkZlpjMFRRenpjaklsdWhFdjZxVDljIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2ODk3OTYifQ",
  "signature": "OsKdjTPu4zhu36FZdx3fEMw2eyPWOdsZGahM55tj6g8f6dkkaI6xADxu_0nghNvkKW8iI_3s5UryAcDFX_OOp16kDH4ukX0QmDpxIeIvMztBICCSRxV7JCe-wcsUsiOjvjhwRe-HhUqHvM_m_kX2zraW_9HGna597GYT1RftIr3a0VjMnoP6LqHwEr5Kag8eXqSnqUAWcYYPVPlpP1L845QrbA6cGWvKdXtK36idwG3hqIGedDL-bRbnM_B2vPyrWlqO239xMGPnSeVdnCBBPsqrdsgBP1TGsRMhNxX-GZ6GNhZOyWnM_J8Oy3yk1MPg_oWq0FUZ5TqnLAHGsNebVw",
  "payload": ""
}
2023-11-21 04:08:31,971:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612689796 HTTP/1.1" 200 805
2023-11-21 04:08:31,973:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:31 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8HQcj8JCqibxkSSSxL4gk4tjY7XpDoKvdOUHDw_i5Pq4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-21T03:42:10Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/q81CXQ",
      "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/RA9KcA",
      "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/phjqOQ",
      "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA"
    }
  ]
}
2023-11-21 04:08:31,973:DEBUG:acme.client:Storing nonce: nbWKegf8HQcj8JCqibxkSSSxL4gk4tjY7XpDoKvdOUHDw_i5Pq4
2023-11-21 04:08:31,973:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 04:08:31,974:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2023-11-21 04:08:31,975:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 04:08:31,975:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 04:08:31,976:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:08:31,976:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 04:08:31,976:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 04:08:31,977:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 04:08:31,979:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:08:32,030:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 04:08:32,243:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 04:08:32,245:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-21 04:08:32,247:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-21 04:08:32,257:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:48 UTC.
2023-11-21 04:08:32,257:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 04:08:32,257:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 04:08:32,262:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0039B790>
Prep: True
2023-11-21 04:08:32,262:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0039B790> and installer None
2023-11-21 04:08:32,263:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 04:08:32,267:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 04:08:32,268:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 04:08:32,270:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 04:08:32,726:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 04:08:32,728:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:31 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "9WsHLhocHT4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 04:08:32,729:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 04:08:36,238:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6958_key-certbot.pem
2023-11-21 04:08:39,605:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6956_csr-certbot.pem
2023-11-21 04:08:39,606:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 04:08:39,606:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 04:08:39,758:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 04:08:39,760:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:38 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8K9mzaJNA3_pd3BBgKF9pdyaHS24u0_e4YIgLUsxVwmE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 04:08:39,760:DEBUG:acme.client:Storing nonce: nbWKegf8K9mzaJNA3_pd3BBgKF9pdyaHS24u0_e4YIgLUsxVwmE
2023-11-21 04:08:39,761:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 04:08:39,774:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhLOW16YUpOQTNfcGQzQkJnS0Y5cGR5YUhTMjR1MF9lNFlJZ0xVc3hWd21FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ZfCpz2iTXzUR6X9wqrCja9GPEn7aogtKvz6GeTgPJtbiQJEL2G89IpcrHd55k4dweM3tXUe4GO2O0BZVG02S6IYw03e8D2UW7m5PyPpD-tAD_5rHtzO_Au-jiAs1H-juMJGCLEF2KtqFQ-1U7UL56XfMhK3r-MiUJ5YIsBBPknVVqD9LtrkmqPQ8LGaBbkMjm6eBXFXC8_83r8yjcpJOtudBVsx-jRL6cI2SPrqCdd5-lkxcrnhNb0sNhh97E1rKmssDKYsbogZot4GcrdxGcC5Ytt8Ldy8iY9UtCIO8WnYviDIyNFA1QPdEQJEAoCPExWTGIh75jtbzBhizrdcoiw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-21 04:08:39,967:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-21 04:08:39,968:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 03:08:39 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054650586
Replay-Nonce: v0bMowfi9-NJQAqNpsQ6ig3eNPusoTXKKDhbHGkmAAzSgpV1hpo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-21T03:42:20Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612731716"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054650586"
}
2023-11-21 04:08:39,969:DEBUG:acme.client:Storing nonce: v0bMowfi9-NJQAqNpsQ6ig3eNPusoTXKKDhbHGkmAAzSgpV1hpo
2023-11-21 04:08:39,969:DEBUG:acme.client:JWS payload:
b''
2023-11-21 04:08:39,982:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612731716:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zmk5LU5KUUFxTnBzUTZpZzNlTlB1c29UWEtLRGhiSEdrbUFBelNncFYxaHBvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI3MzE3MTYifQ",
  "signature": "huLwVrNkgGKdvG7AMIRai1_CSq_t-phWFsHJVpZ9_cC5r8zPqyNazVFW39ncQR8TDlB5uHgHuzeyjLagzMJAxI5NzLkVW1fy3_Rp_8X3M6w6zg8KQv0qzxedg3SJ-x5USe9a1O5I9w1EkGVJl8UXNtmtH3JL4RIQu35x2gaoi71RH53BuP3nvK8GVAYszlkFUdtTmJwGoF-t_ZUWTSs5z-04E7CvTZK2bqP4poLk4f7yAnxexoqyd5T38PV62fRZ9lF-Iic-EtIZT2aC8h0do9e6zR2xmK4xEZk-ldAeD5LpW_ITAbTqfpiLW-z65rT_eKgmJR_2Ldr455hkyqy6UA",
  "payload": ""
}
2023-11-21 04:08:40,139:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612731716 HTTP/1.1" 200 805
2023-11-21 04:08:40,140:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:39 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8HFmUyLesWb6FjjxdvggRpf3mmJ_mF77mCIlt3bGhAug
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-21T03:42:20Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/vs9hIA",
      "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/C3Z5fA",
      "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/Qu4skQ",
      "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw"
    }
  ]
}
2023-11-21 04:08:40,141:DEBUG:acme.client:Storing nonce: nbWKegf8HFmUyLesWb6FjjxdvggRpf3mmJ_mF77mCIlt3bGhAug
2023-11-21 04:08:40,142:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 04:08:40,143:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2023-11-21 04:08:40,143:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 04:08:40,143:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 04:08:40,144:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:08:40,144:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 04:08:40,144:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 04:08:40,145:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 04:08:40,146:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:08:40,195:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-21 04:08:40,629:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-21 04:08:40,631:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2023-11-21 04:08:40,633:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2023-11-21 04:08:40,641:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:31:01 UTC.
2023-11-21 04:08:40,641:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-21 04:08:40,642:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-21 04:08:40,646:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x045E0510>
Prep: True
2023-11-21 04:08:40,646:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x045E0510> and installer None
2023-11-21 04:08:40,647:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-21 04:08:40,651:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-21 04:08:40,652:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-21 04:08:40,654:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-21 04:08:41,185:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-21 04:08:41,186:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:40 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "lnkvJf91dO0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-21 04:08:41,187:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-21 04:08:45,212:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6959_key-certbot.pem
2023-11-21 04:08:48,636:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6957_csr-certbot.pem
2023-11-21 04:08:48,636:DEBUG:acme.client:Requesting fresh nonce
2023-11-21 04:08:48,636:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-21 04:08:48,814:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-21 04:08:48,815:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:48 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnIbeukQxJ41pz3RmfSbQuhP0Z2V_2B7Y4Jt3Zt4CVXo4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-21 04:08:48,815:DEBUG:acme.client:Storing nonce: jXyutbsnIbeukQxJ41pz3RmfSbQuhP0Z2V_2B7Y4Jt3Zt4CVXo4
2023-11-21 04:08:48,815:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-21 04:08:48,822:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25JYmV1a1F4SjQxcHozUm1mU2JRdWhQMFoyVl8yQjdZNEp0M1p0NENWWG80IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "gShuqcz_gT0PjbkizoT0SLuOmXOccOPtSYnGa6FvEKNb8Zs2eXJWKm6BetGO53az-OGDUMwK02Jm9bl22fhzpLRko0OsrtmpsdfHksOC60tSAuN2IeF7aHqbIrqHwrd3WeLTLa9Siksnm-2p7hRVwDxosSk1kZVUAHtwTk0Xg_p38d8F1npFlMOJ3ds0Y0KYse97XzRq196n1jaW6tjCkQFN1VTLmCmo1IGQWErzMprPvNL63nauG8IkTSvGruf_Q6nB6J-OGI6DL7UNemE1ugh10Qd7ej-KJPsY-d3CmYFU0F5En1422cYe8mpmHjGMC_pzeVPYUFDT4rFvgF-Z3Q",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-21 04:08:49,027:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-21 04:08:49,028:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 21 Nov 2023 03:08:48 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054677986
Replay-Nonce: jXyutbsnVy1CvdN_DMtWnqGgZTAjRg_HlN7HRWvBbYDliFmbZyg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-21T03:42:29Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612771016"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054677986"
}
2023-11-21 04:08:49,028:DEBUG:acme.client:Storing nonce: jXyutbsnVy1CvdN_DMtWnqGgZTAjRg_HlN7HRWvBbYDliFmbZyg
2023-11-21 04:08:49,029:DEBUG:acme.client:JWS payload:
b''
2023-11-21 04:08:49,034:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612771016:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25WeTFDdmROX0RNdFducUdnWlRBalJnX0hsTjdIUld2QmJZRGxpRm1iWnlnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI3NzEwMTYifQ",
  "signature": "pGD-DKfzql0YM8Gd3qS-edtXqw9_Gpex48nTXU_IchwxuXAoCY12OeZWHH4obIzUbSKTAncWu7WC_tf_MKxUSI0OzT2NToBvnPjEea5UvAK6aO-_lDTPFLx5w50ii8BVzHYvqAU2TzmhfQLM2ijZfSt3iPdphpL_b0s1JzUZR7i_ykmhEujXw4eVHBYlp0C6ADAMJ7jTTQjOuSJ6lqpI4GUrasZD6PmR3Mq4Guq6170Cun3if8nBaNmoiPVbm8gh4qebqzf6kGjzPD3ZVUOwiLIMHv_6FPHvCoiNt2tO_yjJ7BFsoky5yj0yY0wZznnE-tFQ_vRJyQbdo4ZSDsdM9w",
  "payload": ""
}
2023-11-21 04:08:49,216:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612771016 HTTP/1.1" 200 805
2023-11-21 04:08:49,217:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 21 Nov 2023 03:08:48 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjy-szLxWx-nJEH-M6-OUcRchQwrigkuJCDbnAHrX6FGU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-21T03:42:29Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/NXssXA",
      "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/srEC8w",
      "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/pqGTdw",
      "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8"
    }
  ]
}
2023-11-21 04:08:49,218:DEBUG:acme.client:Storing nonce: SFMYLIQjy-szLxWx-nJEH-M6-OUcRchQwrigkuJCDbnAHrX6FGU
2023-11-21 04:08:49,219:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-21 04:08:49,219:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2023-11-21 04:08:49,220:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-21 04:08:49,221:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-21 04:08:49,222:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:08:49,222:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-21 04:08:49,222:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-21 04:08:49,223:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-21 04:08:49,225:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-21 04:08:49,225:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2023-11-21 04:08:49,226:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2023-11-21 04:08:49,227:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2023-11-21 04:08:49,229:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)