2023-11-24 02:23:25,065:DEBUG:certbot._internal.main:certbot version: 1.6.0
2023-11-24 02:23:25,065:DEBUG:certbot._internal.main:Arguments: []
2023-11-24 02:23:25,065:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2023-11-24 02:23:25,942:DEBUG:certbot._internal.log:Root logging level set at 20
2023-11-24 02:23:25,942:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2023-11-24 02:23:25,980:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x045BBF10> and installer <certbot._internal.cli.cli_utils._Default object at 0x045BBF10>
2023-11-24 02:23:26,024:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-24 02:23:26,143:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-24 02:23:26,144:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is signed by the certificate's issuer.
2023-11-24 02:23:26,149:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is: OCSPCertStatus.GOOD
2023-11-24 02:23:26,157:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:23 UTC.
2023-11-24 02:23:26,157:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-24 02:23:26,158:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-24 02:23:26,163:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0448F5F0>
Prep: True
2023-11-24 02:23:26,163:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0448F5F0> and installer None
2023-11-24 02:23:26,163:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-24 02:23:26,169:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-24 02:23:26,170:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-24 02:23:26,172:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-24 02:23:26,763:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-24 02:23:26,764:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:23:25 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "QakM8E4hy5c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-24 02:23:26,764:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-24 02:23:31,957:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7025_key-certbot.pem
2023-11-24 02:23:36,656:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7023_csr-certbot.pem
2023-11-24 02:23:36,657:DEBUG:acme.client:Requesting fresh nonce
2023-11-24 02:23:36,657:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-24 02:23:36,834:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-24 02:23:36,835:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:23:35 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsn1szBrsRt2Ma3cCKZ8O5jRMEVVBJWNVBMOsnzvNvxm7w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-24 02:23:36,835:DEBUG:acme.client:Storing nonce: jXyutbsn1szBrsRt2Ma3cCKZ8O5jRMEVVBJWNVBMOsnzvNvxm7w
2023-11-24 02:23:36,836:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-24 02:23:36,841:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic24xc3pCcnNSdDJNYTNjQ0taOE81alJNRVZWQkpXTlZCTU9zbnp2TnZ4bTd3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "ccwYqTIch8fSekTHhK4XPaF9WXYIdv9XDXgK3DaNk97KWVmpzGVpe8vZ92WhFmcZDWpOqAfSm0SErq1vjIsYt0qxmnxVDnVZ-pSJIKAERk9jfTfc9LEi138p0O0j19J4fYTHfS3a3hIYRh5j39gUvHIcirSp8ngvpBnKzb-TMiiMET6Xsn3ovwlQXip0to0JKmXMlJ5m4TzHa4STFdP73eiQULNWuQRlZB74bRZ4pz9v6bjNdHyZIFjy0xiNzH5FeqA2XdOR-zdoCjsX6vLXSJE9eMlvLhr-Z8bc5McKb5THaBMaG2HzaaGn2le9l0YjDS6G8XyAwoRetxH7Dv0uhQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-24 02:23:37,037:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2023-11-24 02:23:37,038:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 24 Nov 2023 01:23:35 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223795980256
Replay-Nonce: jXyutbsnElZ3Hj455AzzlZBjAvUJKkpPL4k8o6ARIoNSGWR8CXo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:00Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223795980256"
}
2023-11-24 02:23:37,038:DEBUG:acme.client:Storing nonce: jXyutbsnElZ3Hj455AzzlZBjAvUJKkpPL4k8o6ARIoNSGWR8CXo
2023-11-24 02:23:37,039:DEBUG:acme.client:JWS payload:
b''
2023-11-24 02:23:37,045:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25FbFozSGo0NTVBenpsWkJqQXZVSktrcFBMNGs4bzZBUklvTlNHV1I4Q1hvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY0OTE0ODYifQ",
  "signature": "MOuKhbVm7AVTyH4NY1KkSsXwB8ufXcTagpi7LUvofzCkNqMkurz2PR5aOPZ7Qx8s58Iwe49JiHNP310rtss53FPFbh4HiK5pftUUNisAqiQCWE0wlfRjH8z5cVcp3xLGQvLHwmWbt2RGyMeJxgIuOcwdL_sJ4jT9D9ku-XGgRargbPUEE16Y8jg2QBZ-A02N2xwN_1azJDEJ9zTpXow2TdgzwhFmSO9-piw6TaV0cVoeUCyljIVXSPuVVPvIUVFXQAa48JAbgein50dbAj-dKwB5dTdwssRFP0XhLImn8uwbEXrz8o-Er6rZd4cSYR0UpVUNwiw19M_kkY6deMKHhQ",
  "payload": ""
}
2023-11-24 02:23:37,241:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066491486 HTTP/1.1" 200 810
2023-11-24 02:23:37,241:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:23:35 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjo5GVP0jcGM_20sl169Z28YC8q9UXc9ETFNcY60FVkcA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:00Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/iZpoTw",
      "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/hLn7qQ",
      "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/g8UZBg",
      "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48"
    }
  ]
}
2023-11-24 02:23:37,241:DEBUG:acme.client:Storing nonce: SFMYLIQjo5GVP0jcGM_20sl169Z28YC8q9UXc9ETFNcY60FVkcA
2023-11-24 02:23:37,242:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-24 02:23:37,242:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2023-11-24 02:23:37,243:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-24 02:23:37,243:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-24 02:23:37,257:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:23:37,258:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-24 02:23:37,258:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-24 02:23:37,258:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-24 02:23:37,264:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:23:37,303:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-24 02:23:37,379:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-24 02:23:37,380:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-24 02:23:37,382:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-24 02:23:37,387:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:36 UTC.
2023-11-24 02:23:37,387:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-24 02:23:37,388:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-24 02:23:37,393:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0448F690>
Prep: True
2023-11-24 02:23:37,393:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0448F690> and installer None
2023-11-24 02:23:37,393:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-24 02:23:37,399:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-24 02:23:37,400:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-24 02:23:37,401:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-24 02:23:37,851:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-24 02:23:37,852:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:23:36 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "2Nyxa1nMD6U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-24 02:23:37,852:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-24 02:23:42,727:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7026_key-certbot.pem
2023-11-24 02:23:47,030:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7024_csr-certbot.pem
2023-11-24 02:23:47,031:DEBUG:acme.client:Requesting fresh nonce
2023-11-24 02:23:47,031:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-24 02:23:47,180:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-24 02:23:47,181:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:23:45 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfiXhXDdTRejqqJR7yTzF3waD4aA5fVbXdEDBpqLcC4yzo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-24 02:23:47,181:DEBUG:acme.client:Storing nonce: v0bMowfiXhXDdTRejqqJR7yTzF3waD4aA5fVbXdEDBpqLcC4yzo
2023-11-24 02:23:47,181:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-24 02:23:47,187:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlYaFhEZFRSZWpxcUpSN3lUekYzd2FENGFBNWZWYlhkRURCcHFMY0M0eXpvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Kb5AdI085uEl0nVB-x65-aDlBhIFrd5IUex3ZoPtfuOtvjYCgN7lrQE6VCdsDUnXf-IBFAJKKmdJH9E_Nc8eAuQo--KcQo2cVXCjdpi9g8CP4v8K44odkrntwHfSbDiIHNLERDVPaV0vDaQ-XRTAoT_EaQwCNqC_-M4ptK5MRY1NOemsdgOg2UurfIFm9sOGpXZKVMjg2o1icEfGz1LdZ_Lj0jlJiM6d3hZZr1mnHH8n8d4p0itZl-22ZgL9I5TY2neQ64fDTkwOHlXh3kkEU2TT2LXjxBeJo5qWEIhC0TAPiiIJIZ-HRDiM72sBD5WpH207nzVjVVGPSY_ira4Wxg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-24 02:23:47,356:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2023-11-24 02:23:47,356:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 24 Nov 2023 01:23:45 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796010606
Replay-Nonce: v0bMowfigsPFneSaZhlO9po-arMbj71RvgLXsBr0PXCLtPavAGA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:09Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796010606"
}
2023-11-24 02:23:47,357:DEBUG:acme.client:Storing nonce: v0bMowfigsPFneSaZhlO9po-arMbj71RvgLXsBr0PXCLtPavAGA
2023-11-24 02:23:47,357:DEBUG:acme.client:JWS payload:
b''
2023-11-24 02:23:47,363:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zmlnc1BGbmVTYVpobE85cG8tYXJNYmo3MVJ2Z0xYc0JyMFBYQ0x0UGF2QUdBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1MzEyMDYifQ",
  "signature": "d2sQ32aw6q2eCGEnTQmFUaxTTd5d3VGgRiOaR1Pimvhx82K3oBboV27pr3JvtNtyViNkA3_2Fi2-hdTywF1Ra55t3j4gLNPikFJXBDhGzyvjPLMcKLSovCr0AMYtmZM3IMbxDos8K_ab6qR0rL7Np7fzXKp7qA4CN_IofhTLuafOa2OGcJc91ahpnC1aDnobRi21ETZKJBS6gHzUfz4uzc9N68vMUGWx2L51sxohXTEhHsFY2tjl2fb9i8Ge0S6KiKqTrE8dttsZg8SpmNbXW5YwrHRIX-9VQM4gD9pCa4bEW1Lo9y419cWGCW3PwmbIKhzgMbCalsmPirQtE1a3Jw",
  "payload": ""
}
2023-11-24 02:23:47,522:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066531206 HTTP/1.1" 200 804
2023-11-24 02:23:47,523:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:23:46 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfiJOrk1eU45TNquOvoO9cV6zBOXqyPQn01NXgf0RvgMmE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:09Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/HwkKGg",
      "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/RFhChg",
      "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/Q06UlA",
      "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI"
    }
  ]
}
2023-11-24 02:23:47,523:DEBUG:acme.client:Storing nonce: v0bMowfiJOrk1eU45TNquOvoO9cV6zBOXqyPQn01NXgf0RvgMmE
2023-11-24 02:23:47,524:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-24 02:23:47,524:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2023-11-24 02:23:47,525:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-24 02:23:47,525:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-24 02:23:47,526:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:23:47,526:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-24 02:23:47,526:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-24 02:23:47,526:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-24 02:23:47,528:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:23:47,577:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-24 02:23:47,961:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-24 02:23:47,962:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2023-11-24 02:23:47,963:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2023-11-24 02:23:47,968:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:49 UTC.
2023-11-24 02:23:47,968:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-24 02:23:47,968:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-24 02:23:47,973:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x045A4D90>
Prep: True
2023-11-24 02:23:47,973:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x045A4D90> and installer None
2023-11-24 02:23:47,973:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-24 02:23:47,989:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-24 02:23:47,990:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-24 02:23:47,992:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-24 02:23:48,515:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-24 02:23:48,516:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:23:47 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "nMW-Z0cr_RA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-24 02:23:48,517:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-24 02:23:53,065:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7027_key-certbot.pem
2023-11-24 02:23:57,186:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7025_csr-certbot.pem
2023-11-24 02:23:57,187:DEBUG:acme.client:Requesting fresh nonce
2023-11-24 02:23:57,187:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-24 02:23:57,361:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-24 02:23:57,361:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:23:55 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjRIVvfPc1hba9mAVRnAPlVLP13VsF4zVHWdYHOv4H2Ns
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-24 02:23:57,361:DEBUG:acme.client:Storing nonce: SFMYLIQjRIVvfPc1hba9mAVRnAPlVLP13VsF4zVHWdYHOv4H2Ns
2023-11-24 02:23:57,362:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-24 02:23:57,366:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpSSVZ2ZlBjMWhiYTltQVZSbkFQbFZMUDEzVnNGNHpWSFdkWUhPdjRIMk5zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "uI-R4ZjVgd0-9G5GMpAk5sClqHYTKLQBfaR98fc5ha8psAD8e8irv1E6mgp5M84jDY24epGBjUHoldFCdgKtfoJ56v_CaOEOAYsQJypUou9EfQb7uu0qgf4IbY8M7qR-MuI24kH5W8FCftOwRjQkFozWxtHzbXaLeAPu6vcgGE7-rC29XcCjsxxbOzaXLU3CWpue2aW4aDFFMARNH2ztNiVGaNMxNVlYDpGXA8ew73k6hxWKpvtB4pCYK9wXC6YRO6HE3C6rfGnPlJjLgvZ5tQnJ0eEuKiJaHaOyeOvIRo2Jdil--fLvXeiaDTfqIFynodCOZhbITFUOm1nF-hyAcg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-24 02:23:57,559:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2023-11-24 02:23:57,559:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 24 Nov 2023 01:23:56 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796034066
Replay-Nonce: jXyutbsnYSPLIpu3rkcUW1KXvGkQX9LJE3kfHP3j9rnHt4RZzgc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:17Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796034066"
}
2023-11-24 02:23:57,559:DEBUG:acme.client:Storing nonce: jXyutbsnYSPLIpu3rkcUW1KXvGkQX9LJE3kfHP3j9rnHt4RZzgc
2023-11-24 02:23:57,560:DEBUG:acme.client:JWS payload:
b''
2023-11-24 02:23:57,565:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25ZU1BMSXB1M3JrY1VXMUtYdkdrUVg5TEpFM2tmSFAzajlybkh0NFJaemdjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1NjYzNTYifQ",
  "signature": "P8i8sgT4-NzpXBSLTLXBmFnSvck4Rq0OgTGhsuiVfncAwFcNRtOxENEC8WQKBQggIEU6dpzZg8AwbmwsPwTn9t7XU7SfJNf3dNeC-xryRXa3wCOREmmdF5BlKrZVQrxFP4GeW1CiszFEA43r3_hwCML-SThbyMYny9wq8ZZogu3z4nRpDhbTf4d5aTn9ZAlmnnQhzwZ3ADhcvxUqOj3K8ro2j2q1_rS6BdU6qf4DqN-N2ewLbdA6_Z0c-LQhkuxEB3Fl-Rb4zGTVvYjW2WF1zuerI60gbwV34G5FxPCSnPKZm6oxM2EinEPirl1XiFEB7Q9za3Ohw7qSUjKgPX4jhw",
  "payload": ""
}
2023-11-24 02:23:57,746:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066566356 HTTP/1.1" 200 807
2023-11-24 02:23:57,747:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:23:56 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnCZMKfw_SRdNx1fKMdB9ljQVlo1Q4gb_Fvp7biW2EKbo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:17Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/Ahrirw",
      "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/5ji8UA",
      "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/9qmJcg",
      "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0"
    }
  ]
}
2023-11-24 02:23:57,747:DEBUG:acme.client:Storing nonce: jXyutbsnCZMKfw_SRdNx1fKMdB9ljQVlo1Q4gb_Fvp7biW2EKbo
2023-11-24 02:23:57,748:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-24 02:23:57,748:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2023-11-24 02:23:57,749:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-24 02:23:57,749:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-24 02:23:57,750:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:23:57,750:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-24 02:23:57,750:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-24 02:23:57,750:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-24 02:23:57,751:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:23:57,803:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-24 02:23:58,071:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-24 02:23:58,073:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-24 02:23:58,074:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-24 02:23:58,078:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:02 UTC.
2023-11-24 02:23:58,078:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-24 02:23:58,079:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-24 02:23:58,085:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04039CB0>
Prep: True
2023-11-24 02:23:58,085:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04039CB0> and installer None
2023-11-24 02:23:58,085:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-24 02:23:58,101:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-24 02:23:58,102:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-24 02:23:58,104:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-24 02:23:58,542:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-24 02:23:58,542:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:23:57 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "3IMnZ1grTEo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-24 02:23:58,543:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-24 02:24:03,314:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7028_key-certbot.pem
2023-11-24 02:24:07,536:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7026_csr-certbot.pem
2023-11-24 02:24:07,536:DEBUG:acme.client:Requesting fresh nonce
2023-11-24 02:24:07,536:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-24 02:24:07,683:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-24 02:24:07,684:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:06 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8TwDukjQ5GtO6x-VlppzNrkjioJszLo-Ci5whGA5b1f8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-24 02:24:07,684:DEBUG:acme.client:Storing nonce: nbWKegf8TwDukjQ5GtO6x-VlppzNrkjioJszLo-Ci5whGA5b1f8
2023-11-24 02:24:07,684:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2023-11-24 02:24:07,691:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhUd0R1a2pRNUd0TzZ4LVZscHB6TnJramlvSnN6TG8tQ2k1d2hHQTViMWY4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "vpYwjq0nE6O_iSCxj_Nk4r2NPyZvEMfrLYtJ1IS_5hEcHuOWpn1YhgGPWLVeuJA8xdkABmsnVkdUVeBK4pTsA_-fpy_L3sjd-_TsstCOV2Fvca7gE0w6s46_DO6gRswYkip6CRVfHraqcesbQltPuFQ_meJcUvCJIhoMu-gmPHPuFZJ-7Js5DTc59lpWXwJ3ElHSwIhrtZOT-5elIad74BA884zC9tCM7FjH7IL6jj_MGXJxkNojY6CpY3PSIduqq7tMGiVdS0L9HLe2X-bwoJf2P1GkULdfUTMuvxhfbc5AgNP8pY9iG4GtEKHetPzZ1w5tfQYr5wClLqAWDIOaoQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-24 02:24:07,875:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2023-11-24 02:24:07,876:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 24 Nov 2023 01:24:06 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796055606
Replay-Nonce: nbWKegf8aQ0HXuIiLp6BSRGDE6ZrLGI5C822kB_luZ-Vytvf8c0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:26Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796055606"
}
2023-11-24 02:24:07,876:DEBUG:acme.client:Storing nonce: nbWKegf8aQ0HXuIiLp6BSRGDE6ZrLGI5C822kB_luZ-Vytvf8c0
2023-11-24 02:24:07,876:DEBUG:acme.client:JWS payload:
b''
2023-11-24 02:24:07,882:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhhUTBIWHVJaUxwNkJTUkdERTZackxHSTVDODIya0JfbHVaLVZ5dHZmOGMwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1OTg1NzYifQ",
  "signature": "HUES_WW7piEX6-_iMH6h7FlKCRZqY0qWKZjsMNr_B_Oav5ji5U96H5M_xO4RBRvuNsTxdbWGEcEynSNtqoNMG09WVyDa2SgT6Aqk_oBx2tjHvWTMnImfngMzucUy1h6VYvAASCu1zLaJz1RSeVXImF8AMqltPGoCGQzzP3UWpM1mIsxWE-eBQJMMQSDBfOf9PH97DzoGBE5B-L3yNp6iX7mBznd7od1W5oDxHD_dYk9UfUMKTJyupbJLhKs8dcXbfW9CuCN0kWkfWoOyV1lfC20gjC6uFCb1IwpuPPf4iX0mvRYrpNbmOv8ZDIONw3L79l7N2LGWJLcBkSCpVlJDug",
  "payload": ""
}
2023-11-24 02:24:08,035:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066598576 HTTP/1.1" 200 801
2023-11-24 02:24:08,035:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:06 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf82fZthP1UjkpyN3EWFbkaSnU2gQOmLiz-YwcgUP9d9so
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:26Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/f3URKA",
      "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/iDceBQ",
      "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/LT38xQ",
      "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs"
    }
  ]
}
2023-11-24 02:24:08,036:DEBUG:acme.client:Storing nonce: nbWKegf82fZthP1UjkpyN3EWFbkaSnU2gQOmLiz-YwcgUP9d9so
2023-11-24 02:24:08,036:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-24 02:24:08,037:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2023-11-24 02:24:08,037:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-24 02:24:08,037:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-24 02:24:08,038:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:24:08,038:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-24 02:24:08,038:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-24 02:24:08,038:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-24 02:24:08,039:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:24:08,090:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-24 02:24:08,114:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-24 02:24:08,115:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-24 02:24:08,117:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-24 02:24:08,122:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:14 UTC.
2023-11-24 02:24:08,122:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-24 02:24:08,123:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-24 02:24:08,126:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03AB4C10>
Prep: True
2023-11-24 02:24:08,127:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03AB4C10> and installer None
2023-11-24 02:24:08,127:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-24 02:24:08,132:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-24 02:24:08,133:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-24 02:24:08,135:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-24 02:24:08,572:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-24 02:24:08,573:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:07 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "nzdqm2tT8oU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-24 02:24:08,574:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-24 02:24:12,784:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7029_key-certbot.pem
2023-11-24 02:24:17,004:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7027_csr-certbot.pem
2023-11-24 02:24:17,004:DEBUG:acme.client:Requesting fresh nonce
2023-11-24 02:24:17,005:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-24 02:24:17,151:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-24 02:24:17,151:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:15 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfiqcL6u7d8exjXZPEkoWIDBbuclBBXU6xDMWQ2ssnFFx0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-24 02:24:17,151:DEBUG:acme.client:Storing nonce: v0bMowfiqcL6u7d8exjXZPEkoWIDBbuclBBXU6xDMWQ2ssnFFx0
2023-11-24 02:24:17,152:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-24 02:24:17,158:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlxY0w2dTdkOGV4alhaUEVrb1dJREJidWNsQkJYVTZ4RE1XUTJzc25GRngwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "W2KmOK3GJYvvPgLzIRWbSDhgIlhdYakrxss5UD0QD3SNNK7ViPStenmmgz1OZ4F31b5kdOfx_3ZUSD-R1PAAV1HOlH6xxzB7xj5Tn31er_w0s0oqUKVNo1hd1MHuv4maIsr1ECALBI2FoQz4XghtzDUWS1FodtJJ_WUEZew_7kPqIa8lGxyIJDAk7aDZzAQbd601nH4IBwzOn2vP2jfHz413t33sO5XCbpbJxFUQt3lrJk_X-uq6QDKi-18F0MmnVQalTfLfAfbKGNCu1QCs8VsI8ngN95RgNiqaWdQfFlTMZJ_4MSD44WleXDoKgAhXNRnKc2FA8VsTF-LGrBmPHg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-24 02:24:17,317:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-24 02:24:17,318:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 24 Nov 2023 01:24:15 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796073426
Replay-Nonce: nbWKegf8zuloFV49Hyna5pmMP29B0EBpZu_Uq65DRuzDsdX8tY8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796073426"
}
2023-11-24 02:24:17,318:DEBUG:acme.client:Storing nonce: nbWKegf8zuloFV49Hyna5pmMP29B0EBpZu_Uq65DRuzDsdX8tY8
2023-11-24 02:24:17,318:DEBUG:acme.client:JWS payload:
b''
2023-11-24 02:24:17,324:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjh6dWxvRlY0OUh5bmE1cG1NUDI5QjBFQnBadV9VcTY1RFJ1ekRzZFg4dFk4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2MjIxMjYifQ",
  "signature": "L0gRmjipvhmoMYO052o0aPmZoekR4SkvhNBafzKOwHAjgE_X9ODPDjNbZhppkp6puj5hvpta5AiHYKL1fR4pD-6qM4w7_UFAfZYlVGSyYO9j8AqweebHiibW27J4JbHcBL_qlRC7Sc3p46m3i9kwu4PM2ADo1CjsUJTP7rgudb2TjJl2myhT7suqWgOJbhxKaTvQNrYe4r9OA3egkF8v4G9RhaO0XDMEVw6IJZE5n8o3c0O55v7wXHMdDMebF-PeJLwev32pAvyWM144UrcFtdGhBhMl4Dp8o-QXIdj0e4qwYfYOecAT4kXcmZcHVvpN3mqCPI-1nfmofqPYblXcPA",
  "payload": ""
}
2023-11-24 02:24:17,475:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066622126 HTTP/1.1" 200 805
2023-11-24 02:24:17,476:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:16 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfiqOwgVJOZbYxWt5mcH4e8ZocOyTBoALVrZMmGY3Yh2s0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:34Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/zRCxuQ",
      "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/gv15MQ",
      "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/tryPHA",
      "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI"
    }
  ]
}
2023-11-24 02:24:17,476:DEBUG:acme.client:Storing nonce: v0bMowfiqOwgVJOZbYxWt5mcH4e8ZocOyTBoALVrZMmGY3Yh2s0
2023-11-24 02:24:17,477:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-24 02:24:17,477:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2023-11-24 02:24:17,478:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-24 02:24:17,478:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-24 02:24:17,479:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:24:17,479:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-24 02:24:17,479:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-24 02:24:17,480:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-24 02:24:17,481:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:24:17,532:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-24 02:24:17,543:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-24 02:24:17,544:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2023-11-24 02:24:17,545:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2023-11-24 02:24:17,550:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:27 UTC.
2023-11-24 02:24:17,550:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-24 02:24:17,550:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-24 02:24:17,556:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0459D290>
Prep: True
2023-11-24 02:24:17,556:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0459D290> and installer None
2023-11-24 02:24:17,556:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-24 02:24:17,561:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-24 02:24:17,562:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-24 02:24:17,564:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-24 02:24:18,126:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-24 02:24:18,127:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:16 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "dBiL5-upDVM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-24 02:24:18,127:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-24 02:24:22,648:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7030_key-certbot.pem
2023-11-24 02:24:26,911:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7028_csr-certbot.pem
2023-11-24 02:24:26,912:DEBUG:acme.client:Requesting fresh nonce
2023-11-24 02:24:26,912:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-24 02:24:27,093:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-24 02:24:27,094:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:25 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsng3C0VxUZH0FmnkrDRrsWUBbqaIt83BP-9GzZGQdKif8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-24 02:24:27,094:DEBUG:acme.client:Storing nonce: jXyutbsng3C0VxUZH0FmnkrDRrsWUBbqaIt83BP-9GzZGQdKif8
2023-11-24 02:24:27,094:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-24 02:24:27,100:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25nM0MwVnhVWkgwRm1ua3JEUnJzV1VCYnFhSXQ4M0JQLTlHelpHUWRLaWY4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "RXXnJGp-kGrCcIaFXz346_goQSVm3KiGtpAn2LC5s4fXVUEyaa0jVOnGUQa47aqdyykwp55WundUZlkGUumhYxUj2x_XD4wbPyqoaE_G7LALxF5pm7hYZJz1-uC3ZVBnwbIBFmHth-RhwWK4GVMGBLEmA5laKhS84x2gUBEY6MhSBTBLkjO95V8kGEV46kh8J4aTwkA2vY38F-e_v-ROfjocjT9Ky3XSdEYTVyJERHk_8V3ydA6lEQ2ZvcUOMmypGBO5YnRQp4vbaKMSNH0MZj5TnRFvLExl1npiaNDeqw7IGo7sgb1OJ3KWtgHGp_NkP8eoq_0w3PX0I6vam8dIDg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2023-11-24 02:24:27,302:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2023-11-24 02:24:27,303:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 24 Nov 2023 01:24:25 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796091136
Replay-Nonce: SFMYLIQj8PB7bAbX0t396O3kh-w5uOaCjlyHd1NkdLvjbMM_ppY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:43Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796091136"
}
2023-11-24 02:24:27,303:DEBUG:acme.client:Storing nonce: SFMYLIQj8PB7bAbX0t396O3kh-w5uOaCjlyHd1NkdLvjbMM_ppY
2023-11-24 02:24:27,303:DEBUG:acme.client:JWS payload:
b''
2023-11-24 02:24:27,309:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWo4UEI3YkFiWDB0Mzk2TzNraC13NXVPYUNqbHlIZDFOa2RMdmpiTU1fcHBZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NDY4OTYifQ",
  "signature": "E0ve7o3YLSRPEtzYMnB1Eq8zfdAxDO_jmsMAp8Jbi7Ee1H5N5BOLnvjr65Z4jQMN0jUbkKwbE5kiAjqG59CcQxVninmAyyccjvC9KS4OCmT71wsjIEwhIsIkgmWsOAg1Bb50qeFl6SyYCMdlIL79OzZu4Ej9TeZ8PayNWd7tLT95hrQIuKQwdVZYveYcwRrWlVObJQ-vL4L6YwCeyjPkmxOQMt8U0sbwEx3inmztI13YS9_tLfigwhQmc09Ta_wBpeRoBpK6YeAZvrWJORhs6vCTzZ64qxmOG8jc45gyrAFI2kj-zmgzJpn9sqrk7Guo2eJJXuLsDp9vmKKpwdBiBA",
  "payload": ""
}
2023-11-24 02:24:27,495:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066646896 HTTP/1.1" 200 809
2023-11-24 02:24:27,495:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:26 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsn3MEzB5BDY8fcUHYRSFieQITGagQ7hek0dKGpWNHFfOM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:43Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/juW_-A",
      "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/EWbN0Q",
      "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/0CyP5g",
      "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8"
    }
  ]
}
2023-11-24 02:24:27,495:DEBUG:acme.client:Storing nonce: jXyutbsn3MEzB5BDY8fcUHYRSFieQITGagQ7hek0dKGpWNHFfOM
2023-11-24 02:24:27,495:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-24 02:24:27,496:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2023-11-24 02:24:27,496:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-24 02:24:27,497:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-24 02:24:27,497:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:24:27,498:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-24 02:24:27,498:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-24 02:24:27,498:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-24 02:24:27,500:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:24:27,549:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-24 02:24:27,640:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-24 02:24:27,642:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-24 02:24:27,642:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-24 02:24:27,647:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:41 UTC.
2023-11-24 02:24:27,648:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-24 02:24:27,648:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-24 02:24:27,654:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03FA15F0>
Prep: True
2023-11-24 02:24:27,654:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03FA15F0> and installer None
2023-11-24 02:24:27,654:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-24 02:24:27,660:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-24 02:24:27,661:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-24 02:24:27,664:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-24 02:24:28,111:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-24 02:24:28,111:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:26 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "A7EuSp2P3Ms": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-24 02:24:28,112:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-24 02:24:32,328:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7031_key-certbot.pem
2023-11-24 02:24:36,543:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7029_csr-certbot.pem
2023-11-24 02:24:36,544:DEBUG:acme.client:Requesting fresh nonce
2023-11-24 02:24:36,544:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-24 02:24:36,696:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-24 02:24:36,696:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:35 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8yuRxV46eUDhapjJyzFhM_VpE5ElLRCkoPhijjHIC5dY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-24 02:24:36,696:DEBUG:acme.client:Storing nonce: nbWKegf8yuRxV46eUDhapjJyzFhM_VpE5ElLRCkoPhijjHIC5dY
2023-11-24 02:24:36,697:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-24 02:24:36,702:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjh5dVJ4VjQ2ZVVEaGFwakp5ekZoTV9WcEU1RWxMUkNrb1BoaWpqSElDNWRZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "OBs9k9Wpvkn0qWbXjnh2xTy2TqN5FQVvOHKetkpvigOz4EOPRhI7UXlvezvFjVWFybeL9Qttn8v0Qp8z8t27NVU0AOGoqJgpZGMBn6E_iotAtGGU_g_mJg0M5j5Oxvex9X52RIxHlQcC0T1TWgxWQRpKzSH39wmpNYBEOvwKj0wBYPfEULWTl0GJ5A4FwUooRzTlC1uhI85K1HiEeig3RfcGn5zNj4E-VgYS4A3eDjWlHxyFo-nVuZv1JuOBCFc0GBqj0HTWU4F910Luq-YFI2it0IR-CsdPFgo8qLqXdx6q6Bq6Tl7rlsQwMCyeJ9ckaOyCmPtvB3myknXDk22vVA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2023-11-24 02:24:36,874:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2023-11-24 02:24:36,875:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 24 Nov 2023 01:24:35 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796108646
Replay-Nonce: nbWKegf8XrA-QrHvc99txbTMMAYC70o3fFOPxxWJ3gk9KBN9Rr0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:24:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796108646"
}
2023-11-24 02:24:36,876:DEBUG:acme.client:Storing nonce: nbWKegf8XrA-QrHvc99txbTMMAYC70o3fFOPxxWJ3gk9KBN9Rr0
2023-11-24 02:24:36,876:DEBUG:acme.client:JWS payload:
b''
2023-11-24 02:24:36,883:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhYckEtUXJIdmM5OXR4YlRNTUFZQzcwbzNmRk9QeHhXSjNnazlLQk45UnIwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NjkyODYifQ",
  "signature": "yf35oT5-Jwriy9TuXU1No2X6blG-o_dhczl6gzpdOsBQpza_-9E-vinjzD9i9aIIu7M8w59P3WsztQ9Zl5juya_OV4UDdZwURkHveunuj11DODGRrGCI2gg1TyixdN0OVVOz_olDh0bRmesqEiUCVMOk9lk5K1go_PFkrWv6DLZ8Nqmf3fX6Ot2fH1p7h2cOZlptXQ3bCcLh1LHCo9hYCFrBDFvltkJrA_mArBkEz59g7Vy6Z9mIRH0ewDU3yxPmjv8PLmrnpEhi8ttBAP8T0W9wAeC0_Ke5zajDV4Ej6KfNlApqoEDh0yT5ulAIbEbMt0jnCSE6VInPGJMflASPEw",
  "payload": ""
}
2023-11-24 02:24:37,041:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066669286 HTTP/1.1" 200 806
2023-11-24 02:24:37,041:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:35 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfilnsfbaw_Jer3nJE2B2z2gajjg863QxxEwK8xc-kAOes
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:24:52Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/DZCB_w",
      "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/3LwN7g",
      "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/N8DWOw",
      "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY"
    }
  ]
}
2023-11-24 02:24:37,042:DEBUG:acme.client:Storing nonce: v0bMowfilnsfbaw_Jer3nJE2B2z2gajjg863QxxEwK8xc-kAOes
2023-11-24 02:24:37,042:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-24 02:24:37,042:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2023-11-24 02:24:37,043:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-24 02:24:37,044:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-24 02:24:37,045:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:24:37,045:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-24 02:24:37,045:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-24 02:24:37,046:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-24 02:24:37,047:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:24:37,091:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2023-11-24 02:24:37,092:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-24 02:24:37,092:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2023-11-24 02:24:37,100:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2023-11-24 02:24:37,103:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2023-11-24 02:24:37,103:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2023-11-24 02:24:37,103:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2023-11-24 02:24:37,104:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2023-11-24 02:24:37,106:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2023-11-24 02:24:37,144:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-24 02:24:37,192:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-24 02:24:37,194:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-24 02:24:37,194:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-24 02:24:37,199:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:56 UTC.
2023-11-24 02:24:37,199:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-24 02:24:37,199:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-24 02:24:37,204:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x045BF530>
Prep: True
2023-11-24 02:24:37,204:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x045BF530> and installer None
2023-11-24 02:24:37,204:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-24 02:24:37,209:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-24 02:24:37,210:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-24 02:24:37,212:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-24 02:24:37,686:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-24 02:24:37,687:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:36 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "452ENCVAN74": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-24 02:24:37,687:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-24 02:24:42,200:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7032_key-certbot.pem
2023-11-24 02:24:46,706:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7030_csr-certbot.pem
2023-11-24 02:24:46,707:DEBUG:acme.client:Requesting fresh nonce
2023-11-24 02:24:46,707:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-24 02:24:46,868:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-24 02:24:46,868:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:45 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfii6DYziLIF91sLrhwH-AbKsSOcbtWJ-S0WvPaxKhpdaE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-24 02:24:46,869:DEBUG:acme.client:Storing nonce: v0bMowfii6DYziLIF91sLrhwH-AbKsSOcbtWJ-S0WvPaxKhpdaE
2023-11-24 02:24:46,869:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-24 02:24:46,875:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlpNkRZemlMSUY5MXNMcmh3SC1BYktzU09jYnRXSi1TMFd2UGF4S2hwZGFFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "Q4KUMDS4xPsPH9lRm4tezJ0QyJSbr3K5xp_65UXlOWttHudA-ZjQY4PYWg90Hs53CJNJjmhKkRZs-rWQTSFpjLlj8NmzItV2Us7Bn4YDg5jwhli85TOJgBUjklpj9ZJHFKgyLZCoPbAzFi_IgJ9onw1TBej2QzrkcRHwwQU5UKAHLbt3YPzCRQ42irW80ZfZ415Fe88v9a9X1lnzaJSzOydXVzBIevAI6LUJMi3qIy0zP3I9akRCYdUfbAjqzAUGJRj1bc0HGnI7fBXwHO-0N9IOe59yQjI9bzuVXSlSi709zvI1vfr8ndT8bhTFY4VV6FP7YjMH8j6mMQniWJIftg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-24 02:24:47,074:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2023-11-24 02:24:47,074:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 24 Nov 2023 01:24:45 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796125916
Replay-Nonce: nbWKegf8RnSTm74QYzK4raj3VWcfaWoY_pEcdUMP9na7of0CSeE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:00Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796125916"
}
2023-11-24 02:24:47,074:DEBUG:acme.client:Storing nonce: nbWKegf8RnSTm74QYzK4raj3VWcfaWoY_pEcdUMP9na7of0CSeE
2023-11-24 02:24:47,075:DEBUG:acme.client:JWS payload:
b''
2023-11-24 02:24:47,083:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhSblNUbTc0UVl6SzRyYWozVldjZmFXb1lfcEVjZFVNUDluYTdvZjBDU2VFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2OTI4NjYifQ",
  "signature": "ILDhhYNjcvaOMFDtVWJ78_u_BATAumv7u7Hr0WQj9vgAxdOZk4tq0NpSOFZtBMiFD2BtOgKn6XKiorpuDBaB8w9nmO2OKSt5hYj-Wn_L05X-W8goH2vwnnoU_rFqcSbDhIqsYzppL4ya3x9dLMYM8VW9VgBWvwKIkBD_2wLWeStcZEGbd0SSmY6Z23DOyNi2u-ZJJAF4EWW9U50LamzZSjNieLp0E4bESOsNLwV0WngbAV312FGOwQaSgsJSkZDlEtcrLPQbAEhIuJ-NhGRh2TOPmmWwfvfIxewUeSZdIDGu5G76fiWJqCSYjbX9az8hGKCg0CvHqxFiO22NUh0ILw",
  "payload": ""
}
2023-11-24 02:24:47,242:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066692866 HTTP/1.1" 200 811
2023-11-24 02:24:47,243:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:45 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfidXkfzLk-55sl3L88IR2jlZh__Lxit4lLi_0t1r9z52M
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:00Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/TZHJ0A",
      "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/YBeUJQ",
      "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/i1p7PQ",
      "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0"
    }
  ]
}
2023-11-24 02:24:47,244:DEBUG:acme.client:Storing nonce: v0bMowfidXkfzLk-55sl3L88IR2jlZh__Lxit4lLi_0t1r9z52M
2023-11-24 02:24:47,245:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-24 02:24:47,245:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2023-11-24 02:24:47,246:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-24 02:24:47,246:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-24 02:24:47,247:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:24:47,247:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-24 02:24:47,247:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-24 02:24:47,248:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-24 02:24:47,249:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:24:47,299:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-24 02:24:47,350:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-24 02:24:47,351:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-24 02:24:47,352:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-24 02:24:47,357:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:09 UTC.
2023-11-24 02:24:47,357:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-24 02:24:47,357:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-24 02:24:47,362:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048BFA70>
Prep: True
2023-11-24 02:24:47,362:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048BFA70> and installer None
2023-11-24 02:24:47,362:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-24 02:24:47,368:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-24 02:24:47,369:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-24 02:24:47,370:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-24 02:24:47,826:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-24 02:24:47,827:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:46 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "_lmVKBS9JZA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-24 02:24:47,827:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-24 02:24:52,283:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7033_key-certbot.pem
2023-11-24 02:24:56,687:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7031_csr-certbot.pem
2023-11-24 02:24:56,687:DEBUG:acme.client:Requesting fresh nonce
2023-11-24 02:24:56,687:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-24 02:24:56,848:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-24 02:24:56,849:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:55 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8UJcNZBVpOaX-Mypgc5iHG4u4kxUgMYuAc4kGIRgfuQI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-24 02:24:56,849:DEBUG:acme.client:Storing nonce: nbWKegf8UJcNZBVpOaX-Mypgc5iHG4u4kxUgMYuAc4kGIRgfuQI
2023-11-24 02:24:56,849:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-24 02:24:56,857:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhVSmNOWkJWcE9hWC1NeXBnYzVpSEc0dTRreFVnTVl1QWM0a0dJUmdmdVFJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "olA9_pLX3hDX6iIg4-w8h3Licg8EIsaRQonEYICC7qG3hSdPUMwwatBRl5_nPMUO9YcAhPDWtCQyoVJRDbG2oa9TYtjq_ioz00BT5N_X9mn30Y19DhjdevGATohiDooXER9WSjf2rhhlWzjF500NG7vCz5GasYathsA6hXVKvdO-5zBmT0gJ6VWhSE5loYZYYfxASCNfrPPeqdRRm75OVrF2z6S-NJJT_avjrz_hlzGshQlZ4pu66489Lw5rRL0va-Uf1MW2WIFhkJ9oahrOzcSSmkXK3i_9K8jytd3pMnzYsbYZo36y0nZq5yNDNErSFW1qPVoYZKniUrHBZDIong",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2023-11-24 02:24:57,032:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2023-11-24 02:24:57,033:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 24 Nov 2023 01:24:55 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796165656
Replay-Nonce: v0bMowfi-q360y6_NJIPuS1616xUYfRWT0AzQP-R1YQLNpwBr6c
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:08Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796165656"
}
2023-11-24 02:24:57,033:DEBUG:acme.client:Storing nonce: v0bMowfi-q360y6_NJIPuS1616xUYfRWT0AzQP-R1YQLNpwBr6c
2023-11-24 02:24:57,034:DEBUG:acme.client:JWS payload:
b''
2023-11-24 02:24:57,040:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmktcTM2MHk2X05KSVB1UzE2MTZ4VVlmUldUMEF6UVAtUjFZUUxOcHdCcjZjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3MzgwMTYifQ",
  "signature": "KBzU-qOePeYawoa4cHSVcZGbeql-lNrPT_gultZYNeuqJh0x2UVmh9LFtM-z3pgeF1eYoPvfml7Qvz9blSGMzOqUgkTzzYj-w5meB4taQVDS4xNBJadBTy6K82Ypy_mnrmtiF9gEWuBpvTMIh3XBP5OpokvhABM32pLSLV1rcdEJR6W1pLNOt8cyevfiiw6qWChk3oBHh_eLoarSzLpagrq8FMxz2K9yKxeSddBwJhqMTL9G10eWMIyymyybapvHPbLR-IK90JxiPx6epVsnksP1yX4eHJqyS0b56KxU7WVx6fvMbPrT94wGmpLv18sAfqoyB_KxK8vP-RUSWE8h1Q",
  "payload": ""
}
2023-11-24 02:24:57,193:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066738016 HTTP/1.1" 200 810
2023-11-24 02:24:57,194:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:55 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8zWph32Uj9errKjedtMlsYR30ebfZdDRAGsL2kPc1OLk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:08Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/ypE5ag",
      "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/HUvErQ",
      "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/nzokTQ",
      "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM"
    }
  ]
}
2023-11-24 02:24:57,194:DEBUG:acme.client:Storing nonce: nbWKegf8zWph32Uj9errKjedtMlsYR30ebfZdDRAGsL2kPc1OLk
2023-11-24 02:24:57,195:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-24 02:24:57,195:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2023-11-24 02:24:57,196:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-24 02:24:57,197:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-24 02:24:57,198:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:24:57,198:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-24 02:24:57,198:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-24 02:24:57,199:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-24 02:24:57,200:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:24:57,242:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-24 02:24:57,267:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-24 02:24:57,269:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is signed by the certificate's issuer.
2023-11-24 02:24:57,269:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD
2023-11-24 02:24:57,274:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:22 UTC.
2023-11-24 02:24:57,274:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-24 02:24:57,275:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-24 02:24:57,280:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x045BFAF0>
Prep: True
2023-11-24 02:24:57,281:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x045BFAF0> and installer None
2023-11-24 02:24:57,281:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-24 02:24:57,288:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-24 02:24:57,289:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-24 02:24:57,291:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-24 02:24:57,830:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-24 02:24:57,830:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:24:56 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "cy42RC6f344": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-24 02:24:57,831:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-24 02:25:02,557:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7034_key-certbot.pem
2023-11-24 02:25:06,859:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7032_csr-certbot.pem
2023-11-24 02:25:06,860:DEBUG:acme.client:Requesting fresh nonce
2023-11-24 02:25:06,860:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-24 02:25:07,037:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-24 02:25:07,037:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:25:05 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: SFMYLIQjZoVSApz7UMvzWeqqvZAGON8srFwDq1avvxNFyerXGHg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-24 02:25:07,037:DEBUG:acme.client:Storing nonce: SFMYLIQjZoVSApz7UMvzWeqqvZAGON8srFwDq1avvxNFyerXGHg
2023-11-24 02:25:07,038:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-24 02:25:07,044:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpab1ZTQXB6N1VNdnpXZXFxdlpBR09OOHNyRndEcTFhdnZ4TkZ5ZXJYR0hnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "sA2lpbm2Vf0GtjPcHhLF0BJh3PqGMaMu_9AwnK_4-zw4foI7LcgpcCgBmhNW6H4GHsxSkTUyxXdQ3MtjMQmr_QflJtdZxdTtt43CBEXM7mlpGnAMEb7isOCZoJWyfCaJu0vqyeWM0RyHqYZTPiun71Mc--HKaWPtfH2kmgnlNPH94sLL8O1EM6rdRqutmBWq6N37XlO4LcvBZwEVmglIA3mobmO2bBFaLhWuumY6yDbQ9Nisf9AhsAdNJHlDHmcHH21dmuFavPBVaiv4ygKriVxkDN4kuiT6SoCiJmX16V2HPkzw6cOlqT0nbPJDzM6l5E15BtNW4C5B-mWnREubxg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2023-11-24 02:25:07,236:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2023-11-24 02:25:07,237:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 24 Nov 2023 01:25:05 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796190496
Replay-Nonce: SFMYLIQjDryfvg1eLADbGwaEpYOgsn1RKXKhgf-fjJMNcNmrIWs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:17Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796190496"
}
2023-11-24 02:25:07,237:DEBUG:acme.client:Storing nonce: SFMYLIQjDryfvg1eLADbGwaEpYOgsn1RKXKhgf-fjJMNcNmrIWs
2023-11-24 02:25:07,237:DEBUG:acme.client:JWS payload:
b''
2023-11-24 02:25:07,243:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpEcnlmdmcxZUxBRGJHd2FFcFlPZ3NuMVJLWEtoZ2YtZmpKTU5jTm1ySVdzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3NzE0MTYifQ",
  "signature": "VY4nzmurh5x1d9WZzZPOpdfY-lo8TYS15x0SdUW9wvuMaxMGMyZAvGjjF4hNlZfWALNeQB6sYF9o-m17_7CopChNTopztnoJm8eBJHvONkVfLdytjZ-tKIBxsaz92wLLTLYU5WaNsHAD98lDC8pAShFqzSR3G21QJmZCXJQHMQf8ka4i16Uhz5GeNqRIqOYNGcz7PFvPl9umZ4ERdLi36qS490UBeHRLCbfxpDc-jJBfSfIGyTU2i0Qnp1gTH67F1IMRq92EKWoaQznGQBLk4XRIfFcU9Qefg4z0U_s-3BUIrwgkz5DwaZdgyE3lD9F_RLWgsLjrG1DEGffSVixlKg",
  "payload": ""
}
2023-11-24 02:25:07,425:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066771416 HTTP/1.1" 200 809
2023-11-24 02:25:07,426:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:25:06 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsndm5RalelJB2shhmIz4-J6DR6zoi8keRMl1jzjUD1qHw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:17Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/1qhCuQ",
      "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/isn6Gw",
      "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/lLjJ0A",
      "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4"
    }
  ]
}
2023-11-24 02:25:07,427:DEBUG:acme.client:Storing nonce: jXyutbsndm5RalelJB2shhmIz4-J6DR6zoi8keRMl1jzjUD1qHw
2023-11-24 02:25:07,427:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-24 02:25:07,427:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2023-11-24 02:25:07,428:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-24 02:25:07,428:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-24 02:25:07,429:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:25:07,429:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-24 02:25:07,429:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-24 02:25:07,430:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-24 02:25:07,431:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:25:07,473:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-24 02:25:07,523:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-24 02:25:07,525:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is signed by the certificate's issuer.
2023-11-24 02:25:07,525:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD
2023-11-24 02:25:07,530:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:34 UTC.
2023-11-24 02:25:07,530:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-24 02:25:07,531:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-24 02:25:07,535:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x045BF3D0>
Prep: True
2023-11-24 02:25:07,536:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x045BF3D0> and installer None
2023-11-24 02:25:07,536:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-24 02:25:07,541:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-24 02:25:07,542:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-24 02:25:07,544:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-24 02:25:07,992:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-24 02:25:07,993:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:25:06 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "k_xA7WcdOP4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-24 02:25:07,993:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-24 02:25:12,273:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7035_key-certbot.pem
2023-11-24 02:25:16,297:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7033_csr-certbot.pem
2023-11-24 02:25:16,297:DEBUG:acme.client:Requesting fresh nonce
2023-11-24 02:25:16,298:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-24 02:25:16,448:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-24 02:25:16,449:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:25:15 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8xc-KEf-kPSUZtKepaf0fHc0IWSKUmZHoXbqWi1yhsiE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-24 02:25:16,449:DEBUG:acme.client:Storing nonce: nbWKegf8xc-KEf-kPSUZtKepaf0fHc0IWSKUmZHoXbqWi1yhsiE
2023-11-24 02:25:16,449:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-24 02:25:16,454:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjh4Yy1LRWYta1BTVVp0S2VwYWYwZkhjMElXU0tVbVpIb1hicVdpMXloc2lFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "NzsY3YEwYZOYAVEhXhNcndLDhbYtqrm0V9dt6EmWVx-TM5BPJUM_YT8Pb6I8aap1tJwT_DTdZcOZXgFSSICsoekz5S5psDLCdLlWnjEFSc5D9IyhTLiG6eaaMYzSnKg1FDqI0CTWvLJ5EOeOCml2HkVbSIQT8d5lh5IA4icR2AmcX0Q004rS1fW0nazY5x0vdgDX7IMu04npO9Fz5cOeNM8evUqMIrAT3wdfV3clf0YmWX6rg681hOgnCljUBn1dlmuVQMF_gixQr5iIC97epXibFy1GsMyGUrrN10wqK8MJJUE6qQ56_fIaQQsceGBU-1tBf8r-c5UdRkfvA8bXYQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-24 02:25:16,628:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-24 02:25:16,629:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 24 Nov 2023 01:25:15 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796210686
Replay-Nonce: nbWKegf8Ii8nvwmmdWU22joJnMMvWuIyHU1J1bMuGxd2Kj6wh4c
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796210686"
}
2023-11-24 02:25:16,629:DEBUG:acme.client:Storing nonce: nbWKegf8Ii8nvwmmdWU22joJnMMvWuIyHU1J1bMuGxd2Kj6wh4c
2023-11-24 02:25:16,630:DEBUG:acme.client:JWS payload:
b''
2023-11-24 02:25:16,635:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhJaThudndtbWRXVTIyam9Kbk1Ndld1SXlIVTFKMWJNdUd4ZDJLajZ3aDRjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4MDAxNjYifQ",
  "signature": "wRYOLF-R6XAMpXscDoWfbbVZ6OcbtX42-YwlG_608V119tPljBTRV3mYTAi-yinEvjkdqwtD3icAQX3fzSaFBLJAa1fFDZF4y-_u2UY6f-efpMm1LS3TMsGP67-zzIm8MzIoZJ5OtyNc3rIJJKYFCA0oRmGPwcfBO5lEleyMsr-qdCST2ttXf0Z5itKlfYAKZuCcFjVdAVdUhk-sLKchA2Z0cDn1EgsZBdRGJENQzEmZQEIqYXfSsfCm3URo_sJ5oFektlqUwglaCHpI1dD_oaMkelQHxJ7tV12UQ5jST54--DhsRkKkvQrsEUpwIlu2ouDz7j-avLuQ4WIM0YluBQ",
  "payload": ""
}
2023-11-24 02:25:16,802:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066800166 HTTP/1.1" 200 805
2023-11-24 02:25:16,803:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:25:15 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8X-SqGdN-tLrsK2Ivre2LL6H6_H4BrTH1Ppy0FDjtPv8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:25Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/zXEJ0Q",
      "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/b777tA",
      "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/Gd6Xnw",
      "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8"
    }
  ]
}
2023-11-24 02:25:16,803:DEBUG:acme.client:Storing nonce: nbWKegf8X-SqGdN-tLrsK2Ivre2LL6H6_H4BrTH1Ppy0FDjtPv8
2023-11-24 02:25:16,804:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-24 02:25:16,804:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2023-11-24 02:25:16,805:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-24 02:25:16,805:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-24 02:25:16,806:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:25:16,806:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-24 02:25:16,806:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-24 02:25:16,806:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-24 02:25:16,808:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:25:16,857:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-24 02:25:16,949:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-24 02:25:16,950:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2023-11-24 02:25:16,951:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2023-11-24 02:25:16,955:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:48 UTC.
2023-11-24 02:25:16,956:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-24 02:25:16,956:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-24 02:25:16,961:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x048B0370>
Prep: True
2023-11-24 02:25:16,961:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x048B0370> and installer None
2023-11-24 02:25:16,961:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-24 02:25:16,966:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-24 02:25:16,967:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-24 02:25:16,969:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-24 02:25:17,499:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-24 02:25:17,500:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:25:16 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "Zy-D_MGqJ1E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-24 02:25:17,500:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-24 02:25:21,882:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7036_key-certbot.pem
2023-11-24 02:25:25,760:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7034_csr-certbot.pem
2023-11-24 02:25:25,760:DEBUG:acme.client:Requesting fresh nonce
2023-11-24 02:25:25,760:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-24 02:25:25,937:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-24 02:25:25,938:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:25:24 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnW_Ktm07txlV9cvdQLaFReXZeB-6c81rh6zCNMjkh52Q
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-24 02:25:25,938:DEBUG:acme.client:Storing nonce: jXyutbsnW_Ktm07txlV9cvdQLaFReXZeB-6c81rh6zCNMjkh52Q
2023-11-24 02:25:25,938:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-24 02:25:25,946:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25XX0t0bTA3dHhsVjljdmRRTGFGUmVYWmVCLTZjODFyaDZ6Q05NamtoNTJRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "kzLyriG8L-YFAzO2TwhkP2eKpq0WswTh8FFVnp7skrlQ0NLtWVvquL7VfJh6vP7LCzCHdVHdnZkLv3ozPTkniZE0V2VKDLc8K6h9E_g4EH_4ZDIvLblwJQ3nHnWhjrDLNEnZRdP2itIiwtExXJRQVjujnl3i63ohyBWQTSPL08_Z2eFW24aCd6SfUNQYw51eCay-2IQUfzO__w5Cyglqi97_ZLMIULbq3QOcl8bOl7nXG2RvOOp231lvaBZvHKA6EOO6OHA6pOcBkPAIES_USAVcDCgw7J2GjcHw-vllaVjfBzCxhX6V9NtzFOoaLnQ1R8TKkJq5FmJZjrGFWWn1iA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-24 02:25:26,157:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-24 02:25:26,158:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 24 Nov 2023 01:25:24 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796230126
Replay-Nonce: SFMYLIQjelNypE_sEIl1ykrqhbIbl_O49Eid6FvzG-vAa66OVbg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:34Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796230126"
}
2023-11-24 02:25:26,158:DEBUG:acme.client:Storing nonce: SFMYLIQjelNypE_sEIl1ykrqhbIbl_O49Eid6FvzG-vAa66OVbg
2023-11-24 02:25:26,158:DEBUG:acme.client:JWS payload:
b''
2023-11-24 02:25:26,167:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWplbE55cEVfc0VJbDF5a3JxaGJJYmxfTzQ5RWlkNkZ2ekctdkFhNjZPVmJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4Mjg2ODYifQ",
  "signature": "uUU-uvWYhMSWdjTGMXDEWfR1PfwjtSHerZ_i6JDSqz6x_1bY32jPJ0nFHm1qIsCQ7KsCaT5fnJE0Yy0mLVpyvPURRIK_vEIn2oKRp0AhOTum61OTq04TizSrJQ8WN0GvKeLoNXvU9XwRdgIR2ME-ZWGUzK4P0HCAHh22uMTavVCyqJnoaetrYW0QHb24oDjAFEiqSc6-dPRoS0247MRPDPjv6DF6sYQ6OaJHazVSWXLvSzoKd5cJRjuhfPoPnf5jBDNkc1MVDctg2k_UG4Ns12cuMayumsn3p_AvN2pL1kS2owmMAXq_4QtVuHfhoRSnU0FOflOnDaJmUwWLCF0OjQ",
  "payload": ""
}
2023-11-24 02:25:26,394:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066828686 HTTP/1.1" 200 805
2023-11-24 02:25:26,395:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:25:24 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jXyutbsnP74SgC4pzBfyitkk335gNbZnfqDJzS4Pjgo713A3MHc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:34Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/TFIwLw",
      "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/se4r1w",
      "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/Hc2_wQ",
      "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs"
    }
  ]
}
2023-11-24 02:25:26,395:DEBUG:acme.client:Storing nonce: jXyutbsnP74SgC4pzBfyitkk335gNbZnfqDJzS4Pjgo713A3MHc
2023-11-24 02:25:26,395:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-24 02:25:26,396:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2023-11-24 02:25:26,396:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-24 02:25:26,397:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-24 02:25:26,397:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:25:26,398:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-24 02:25:26,398:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-24 02:25:26,398:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-24 02:25:26,399:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:25:26,442:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-11-24 02:25:26,454:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-11-24 02:25:26,455:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2023-11-24 02:25:26,456:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2023-11-24 02:25:26,460:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:31:01 UTC.
2023-11-24 02:25:26,461:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2023-11-24 02:25:26,461:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-11-24 02:25:26,466:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0459DAB0>
Prep: True
2023-11-24 02:25:26,466:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0459DAB0> and installer None
2023-11-24 02:25:26,467:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-11-24 02:25:26,471:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2023-11-24 02:25:26,472:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-11-24 02:25:26,473:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-11-24 02:25:26,921:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-11-24 02:25:26,921:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:25:25 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "PV7VBIsF7oY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-11-24 02:25:26,922:INFO:certbot._internal.main:Renewing an existing certificate
2023-11-24 02:25:30,911:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7037_key-certbot.pem
2023-11-24 02:25:34,786:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7035_csr-certbot.pem
2023-11-24 02:25:34,787:DEBUG:acme.client:Requesting fresh nonce
2023-11-24 02:25:34,787:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-11-24 02:25:34,939:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-11-24 02:25:34,940:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:25:33 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: v0bMowfizy09Tn0Azz4Sv1tFPX16WTbTofnT0v4la8tMDUZxScs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-11-24 02:25:34,940:DEBUG:acme.client:Storing nonce: v0bMowfizy09Tn0Azz4Sv1tFPX16WTbTofnT0v4la8tMDUZxScs
2023-11-24 02:25:34,940:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2023-11-24 02:25:34,945:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zml6eTA5VG4wQXp6NFN2MXRGUFgxNldUYlRvZm5UMHY0bGE4dE1EVVp4U2NzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "bbxO1oMV9QEcH0D56QwaqdzbUA8Jk07oBlATJYB-0OBsRZKv7EkzaHbVV7t1Zw2LgxzcoADYaFnkjBxJmUzykuZE0VNw41aIkY8nZrA9opaWZUqXAHki3C3s7zu__yCxpvJ4JecOlbelfAkJjcOSr_DB7XpApG1zvFesHxx0S1G0K_ce4BVxXSleb3EfLTWl2cHvdh1ciwqtlmIjgTfYdSFq6WJu0bWWYJqbNDwRQFfCTvU5UsgUxeIuTgBQuL9IdMbeo6c4TgrA7xugGi6ee_Oq8ShbQ9DXBXr3KAQriPI2jnnZIjuJUaf-Dk5ByaAYgtEvZFj3891iClCfB1c6Qw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2023-11-24 02:25:35,118:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2023-11-24 02:25:35,119:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 24 Nov 2023 01:25:33 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796249816
Replay-Nonce: v0bMowfiiLWhmloxOkHZMok7TNs0YeL2yndp9Aw-9WvRM4gcjMQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-11-28T14:25:42Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796249816"
}
2023-11-24 02:25:35,119:DEBUG:acme.client:Storing nonce: v0bMowfiiLWhmloxOkHZMok7TNs0YeL2yndp9Aw-9WvRM4gcjMQ
2023-11-24 02:25:35,119:DEBUG:acme.client:JWS payload:
b''
2023-11-24 02:25:35,125:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlpTFdobWxveE9rSFpNb2s3VE5zMFllTDJ5bmRwOUF3LTlXdlJNNGdjak1RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4NTg1NzYifQ",
  "signature": "aFa7-01hpKQ3ifOTedRTt_30a3OUDnBqD7lzZjd9NFMQpRnm_yFwFcHljBksfZuBK2CeEBGiTfskjHXeQPfg5XIFJBcT3bY9YwSOW9BNSxwVKsm-C9QnbVZnM7AE2rqyaWO8Rd67Y1v0DKme4v5GYNqlmaUhmIPKQN33yF2jp06RQaQqtcfee3HgWoqixOFShPJsRYwWE-3Q9OxO4rUHz8fOWH676KB0Bl7KQpfNyuzhNoBqhDnZCmzrIqY-kbWNJfCJg138aWJCxq21BNaphDP8zI2nCrZwHTglzAc9gGAh4tHyI99zSyzVDxLthYmV6AnbfKOt0kBXs1zoup8tyw",
  "payload": ""
}
2023-11-24 02:25:35,291:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066858576 HTTP/1.1" 200 805
2023-11-24 02:25:35,292:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 24 Nov 2023 01:25:33 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: nbWKegf8LGzu96dPb8sGXO0YZFzLKZmMyths18EpuocTPWRtLBQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2023-11-28T14:25:42Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/p5HniQ",
      "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/JwX8uw",
      "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/_ogaVA",
      "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48"
    }
  ]
}
2023-11-24 02:25:35,292:DEBUG:acme.client:Storing nonce: nbWKegf8LGzu96dPb8sGXO0YZFzLKZmMyths18EpuocTPWRtLBQ
2023-11-24 02:25:35,293:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-11-24 02:25:35,293:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2023-11-24 02:25:35,293:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-11-24 02:25:35,294:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-11-24 02:25:35,294:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:25:35,295:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-11-24 02:25:35,295:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-11-24 02:25:35,295:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2023-11-24 02:25:35,296:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2023-11-24 02:25:35,296:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2023-11-24 02:25:35,297:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2023-11-24 02:25:35,298:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2023-11-24 02:25:35,299:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)