Hello @schoen and @JuergenAuer,
First I would like to thank your both to follow up with this post. After researching and reading a lot, I decided for a configuration that so far is helping. Not how is supposed to be by any meanings but it is working.
I got an ASUS router and put it behind of the AT&T router on the DMZ passthrough mode. AT&T used to let us assign a fixed IPv6 but somehow they got very anxious to monetize on the IPv6 market and probably decided to restrict that feature for home network connections even thou, there are gazillions of IPV6 addresses avaliable. That was not by any means the philosophy of the IETF.org (Internet Engineer Task Force) that developed the IPv6 protocol so everyone would have unrestricted access to it. I use my home network server for educational purposes. My intention is to give a clean open source access to a "home server configuration" so others can also develop their own server and do their own testing on software and network troubleshooting. Anyway,
-
first, I transferred the AT&T router to a different subnet, (I did not want to disturb my wife from my blow up tests while she is watching her favor program on TV.
) Do not worry, you will be able to contact the router again using that subnet you pick up from the AT&T router DHCP configuration.
1.a To change the AT&T router to a different subnet, Chose Settings > LAN > DHCP > DHCP Network range: 172.16.0.0, save your configuration.
Then re-start the computer and put the address 172.16.0.1 in your browser to contact the AT&T router. ***If you encounter any issues in contacting the AT&T router, just unplug and plug the router again.
-
(Important!) Login into the AT&T router again and go to Settings > System Informations> Event Notifications and check Enable the detection of router behind router conditions. Save!
-
Then connect the LAN port of the AT&T router to the WAN port of your secondary router, in my case the ASUS router. Boot (turn on) your ASUS router.
-
In the AT&T router, Go to Settings > Firewall > Applications Pinholes and DMZ.
Choose your ASUS router there! It is not intuitive and most likely will have a strange number associated with the word that might look like this. "Unknown0849570048g96758". If you cannot find which one in the pool of names there, go back to Settings > LAN > Devices and start to try one by one until you find which one is the ASUS Router. Ok, continuing... after you select or choose your device, click down bellow to put in DMZ plus mode. A.K.A Allow All Aplications (DMZ Plus Mode)
-
Save and Voila, your ASUS Router will pick up the subnet 192.168.1.0 and the ASUS will be assigned to 192.168.1.1 and your static IPv4 from AT&T will be there.
After that I went on configuring IPv6 on the ASUS based on the information broadcasted from the AT&T router. Helpful commands are:
root# ndp -an
root# netstat -nr | grep "default"
root# ifconfig
Since AT&T limited (probably restricted, not sure yet) the assignment of static IPv6, put your Mac OS X network card on "automatic" and you will be assigned a temp IPv6. To this point your temp IPv6 should work and you will probably get a green light on; https://ipv6-test.com/ and https://test-ipv6.com/
It is a limitation because you won't be able to configure DNS BIND properly but I found a way to make it work (indirectly) and that is another story. Anyway, now you can go get your Certificates using Certbot.
By the way, it was my first time using Certbot and it work just fine! First, I installed Certbot using Home Brew. Remember that Home Brew does not work as root but with your admin account.
[youraccount]# brew install Certbot
Certbot will be installed on /usr/local/Cellar/Certbot
After that, you can do this as root, cd to /usr/local/Cellar/Certbot
server:certbot server$ sudo certbot certonly --apache
Obs: I got some errors initially and I had to run this command several times because Certbot was looking for an old Cert Configuration file left in there on /etc/Letsencrypt/renewal by the last authentication method. I checked those files and I had to clean them up and let Certbot build his own configuration. Here is how that file looks like;
This is how the file looks like on /etc/Letsencrypt/renewal/domain.conf
renew_before_expiry = 30 days
cert = /etc/letsencrypt/live/domain.org/cert.pem
privkey = /etc/letsencrypt/live/domain.org/privkey.pem
chain = /etc/letsencrypt/live/domain.org/chain.pem
fullchain = /etc/letsencrypt/live/domain.org/fullchain.pem
version = 0.37.1
archive_dir = /etc/letsencrypt/archive/domain.org
Options and defaults used in the renewal process
[renewalparams]
installer = apache
authenticator = apache
account = 23544b7afdf456vby7890234eff <--bogus code just for display (do not use)
server = https://acme-v02.api.letsencrypt.org/directory
Here is my installation logs;
https://certbot.eff.org/lets-encrypt/osx-apache
First command: [server:local/Cellar/certbot] root# sudo certbot certonly --apache
server:~ server$ cd /usr/local/Cellar/certbot
server:certbot server$ sudo certbot certonly --apache
Password:
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator apache, Installer apache
Enter email address (used for urgent renewal and security notices) (Enter 'c' to
cancel): hostmaster@server.org
Please read the Terms of Service at
https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf. You must
agree in order to register with the ACME server at
https://acme-v02.api.letsencrypt.org/directory
(A)gree/(C)ancel: A
Would you be willing to share your email address with the Electronic Frontier
Foundation, a founding partner of the Let's Encrypt project and the non-profit
organization that develops Certbot? We'd like to send you email about our work
encrypting the web, EFF news, campaigns, and ways to support digital freedom.
(Y)es/(N)o: Y
Which names would you like to activate HTTPS for?
1: domain.com
2: www.domain.com
3: domain.com
4: www.domain.com
5: serverdomain.org
6: www.serverdomain.org
Select the appropriate numbers separated by commas and/or spaces, or leave input
blank to select all options shown (Enter 'c' to cancel): 1 2 3 4 5 6
You have an existing certificate that contains a portion of the domains you
requested (ref: /etc/letsencrypt/renewal/domain.com.conf)
It contains these names: domain.com, www.domain.com
You requested these names for the new certificate: domain.com, www.domain.com,
domain.com, www.domain.com, server.org, www.server.org.
Do you want to expand and replace this existing certificate with the new
certificate?
(E)xpand/(C)ancel: E
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for domain.com
http-01 challenge for domain.com
http-01 challenge for server.org
http-01 challenge for www.domain.com
http-01 challenge for www.domain.com
http-01 challenge for www.server.org
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
-
Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/domain.com/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/domain.com/privkey.pem
Your cert will expire on 2019-11-27. To obtain a new or tweaked
version of this certificate in the future, simply run certbot
again. To non-interactively renew all of your certificates, run
"certbot renew"
-
Your account credentials have been saved in your Certbot
configuration directory at /etc/letsencrypt. You should make a
secure backup of this folder now. This configuration directory will
also contain certificates and private keys obtained by Certbot so
making regular backups of this folder is ideal.
-
If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: Donate - Let's Encrypt
Donating to EFF: Support EFF's Work on Let's Encrypt | Electronic Frontier Foundation
[server:local/Cellar/certbot] root# sudo certbot certonly --apache
Which names would you like to activate HTTPS for?
1: domain.com
2: www.domain.com
3: domain.com
4: www.domain.com
5: server.org
6: www.server.org
Select the appropriate numbers separated by commas and/or spaces, or leave input
blank to select all options shown (Enter 'c' to cancel): 5 6
Cert is due for renewal, auto-renewing...
Renewing an existing certificate
IMPORTANT NOTES:
-
Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/server.org/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/server.org/privkey.pem
Your cert will expire on 2019-11-27. To obtain a new or tweaked
version of this certificate in the future, simply run certbot
again. To non-interactively renew all of your certificates, run
"certbot renew"
-
If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: Donate - Let's Encrypt
Donating to EFF: Support EFF's Work on Let's Encrypt | Electronic Frontier Foundation
[server:local/Cellar/certbot] root# sudo certbot certonly --apache
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator apache, Installer apache
Which names would you like to activate HTTPS for?
1: domain.com
2: www.domain.com
3: domain.com
4: www.domain.com
5: server.org
6: www.server.org
Select the appropriate numbers separated by commas and/or spaces, or leave input
blank to select all options shown (Enter 'c' to cancel): 1 2
Cert is due for renewal, auto-renewing...
Renewing an existing certificate
IMPORTANT NOTES:
-
Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/domain.com/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/domain.com/privkey.pem
Your cert will expire on 2019-11-27. To obtain a new or tweaked
version of this certificate in the future, simply run certbot
again. To non-interactively renew all of your certificates, run
"certbot renew"
-
If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: Donate - Let's Encrypt
Donating to EFF: Support EFF's Work on Let's Encrypt | Electronic Frontier Foundation
[server:local/Cellar/certbot] root# cd
end |
**
Next command: sudo certbot renew
**