openssl Extract key from p12 pkcs

openssl pkcs12 -in yourP12File.pfx -nocerts -out privateKey.pem
openssl pkcs12 -in yourP12File.pfx -nocerts -out privateKey.pem
openssl pkcs12 -in yourP12File.pfx -clcerts -nokeys -out publicCert.pem

openssl – Create self signed certificate

Step 1: Generate a Private Key

openssl genrsa -des3 -out server.key 1024

to generate key without password:

openssl genrsa -out server.key 1024

Step 2: Generate a CSR (Certificate Signing Request)

openssl req -new -key server.key -out server.csr

Step 3: Remove Passphrase from Key

cp server.key
openssl rsa -in -out server.key

Step 4: Generating a Self-Signed Certificate

openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt

Step 5: Installing the Private Key and Certificate

cp server.crt /usr/local/apache/conf/ssl.crt
cp server.key /usr/local/apache/conf/ssl.key

Step 6: Configuring SSL Enabled Virtual Hosts

SSLEngine on
SSLCertificateFile /usr/local/apache/conf/ssl.crt/server.crt
SSLCertificateKeyFile /usr/local/apache/conf/ssl.key/server.key
SetEnvIf User-Agent “.*MSIE.*” nokeepalive ssl-unclean-shutdown
CustomLog logs/ssl_request_log
“%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x “%r” %b”

Step 7: Restart Apache and Test

/etc/init.d/httpd stop
/etc/init.d/httpd stop


service apache2 restart

install ubuntu 14.04 on xenserver 6.2

1 – create template based on Lucid

TEMPLATE_UUID=`xe template-list name-label=”Ubuntu Lucid Lynx 10.04 (64-bit)” params=uuid –minimal`
NEW_TEMPLATE_UUID=`xe vm-clone uuid=$TEMPLATE_UUID new-name-label=”Ubuntu Trusty Tahir 14.04 (64-bit)”`
xe  template-param-set other-config:install-methods=cdrom,http,ftp  other-config:default_template=true other-config:debian-release=trusty uuid=$NEW_TEMPLATE_UUID

2 – Modify /usr/lib/python2.4/site-packages/grub/ on the XenServer machine

Line 428, change:

if arg.strip() == “${saved_entry}”:


if arg.strip() == “${saved_entry}” or arg.strip() == “${next_entry}”: