<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.staffordnet.uk/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://www.staffordnet.uk/feed.php">
        <title>Saucepan - certificates</title>
        <description></description>
        <link>https://www.staffordnet.uk/</link>
        <image rdf:resource="https://www.staffordnet.uk/lib/exe/fetch.php?media=favicon.ico" />
       <dc:date>2026-04-05T18:26:12+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=certificates:certificates_guide&amp;rev=1752174022&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=certificates:cisco_custom_certificate&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=certificates:install_root_ca&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=certificates:lets_encrypt_main&amp;rev=1757754434&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=certificates:lets_encrypt_wildcard&amp;rev=1703192158&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=certificates:ssl_testing&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=certificates:vmware_custom_certificate&amp;rev=1669207782&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://www.staffordnet.uk/lib/exe/fetch.php?media=favicon.ico">
        <title>Saucepan</title>
        <link>https://www.staffordnet.uk/</link>
        <url>https://www.staffordnet.uk/lib/exe/fetch.php?media=favicon.ico</url>
    </image>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=certificates:certificates_guide&amp;rev=1752174022&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-07-10T19:00:22+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>certificates_guide</title>
        <link>https://www.staffordnet.uk/doku.php?id=certificates:certificates_guide&amp;rev=1752174022&amp;do=diff</link>
        <description>SSL

Overview

This page shows how to create, request, install and manage SSL Certificates.

Extra info can also be found on Certificates and Keystores and Converting.

Strip Password from Base64

Strip a password from a Base64 file that has both certificate and key.

openssl rsa -in [file1.key] -out [file2.key]</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=certificates:cisco_custom_certificate&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>cisco_custom_certificate</title>
        <link>https://www.staffordnet.uk/doku.php?id=certificates:cisco_custom_certificate&amp;rev=1669207782&amp;do=diff</link>
        <description>Set Custom SSL Certificate

If you have a Cisco device, you may have issues getting the SSL certificate to work properly on the web GUI.

The solution is here.

Specifically, I generated a certificate/key on a Palo Alto Networks PA-220 firewall because that was where I stored my home root CA. I then exported the certificate and ticked &#039;export private key&#039;. I added a password as PAN-</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=certificates:install_root_ca&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>install_root_ca</title>
        <link>https://www.staffordnet.uk/doku.php?id=certificates:install_root_ca&amp;rev=1669207782&amp;do=diff</link>
        <description>Install Root CA

Linux

To install a root CA certificate as a trusted root CA for Ubuntu systems,

	*  Copy the root CA to /usr/local/share/ca-certificates/
	*  Update the system certificate store with sudo update-ca-certificates

To remove a root CA certificate as a trusted root CA for Ubuntu systems,</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=certificates:lets_encrypt_main&amp;rev=1757754434&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-09-13T09:07:14+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>lets_encrypt_main</title>
        <link>https://www.staffordnet.uk/doku.php?id=certificates:lets_encrypt_main&amp;rev=1757754434&amp;do=diff</link>
        <description>Let&#039;s Encrypt

This guide assumes you have your public DNS hosted with CloudFlare.

On Ubuntu 20.04, install acme.sh

git clone https://github.com/acmesh-official/acme.sh.git

sudo mv acme.sh /var/acme

Append export PATH=$PATH:/var/acme to the end of</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=certificates:lets_encrypt_wildcard&amp;rev=1703192158&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-12-21T20:55:58+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>lets_encrypt_wildcard</title>
        <link>https://www.staffordnet.uk/doku.php?id=certificates:lets_encrypt_wildcard&amp;rev=1703192158&amp;do=diff</link>
        <description>Using Let&#039;s Encrypt for WildCard

This document shows you how to generate a free WildCard certificate using Let&#039;s Encrypt that you can use on a Nginx server and/or a Palo Alto Networks firewall for things like GlobalProtect.

App-ID

Remember, if you have a Palo Alto Networks firewall, the acme.sh script traffic is identified as</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=certificates:ssl_testing&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ssl_testing</title>
        <link>https://www.staffordnet.uk/doku.php?id=certificates:ssl_testing&amp;rev=1669207782&amp;do=diff</link>
        <description>Testing SSL Connections

openssl s_client -connect example.com:443

openssl s_client -connect example.com:443 -servername domain.tld</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=certificates:vmware_custom_certificate&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>vmware_custom_certificate</title>
        <link>https://www.staffordnet.uk/doku.php?id=certificates:vmware_custom_certificate&amp;rev=1669207782&amp;do=diff</link>
        <description>SSL Certificates on VMware

On ESXi 7.0, you can import a custom certificate and key.

	*  Enable SSH
		*  SCP the PEM format certificate certificate.crt to esxiserver:/etc/vmware/ssl/
		*  SCP the PEM format private key private.key to esxiserver:/etc/vmware/ssl/</description>
    </item>
</rdf:RDF>
