Skip to content

Instantly share code, notes, and snippets.

View KaptainRainman's full-sized avatar

KaptainRainman

View GitHub Profile
@yidas
yidas / csr.conf.md
Last active September 7, 2025 06:15
Certificate(CSR) configuration file

Openssl commands:

openssl genrsa -out self-ssl.key
openssl req -new -key self-ssl.key -out self-ssl.csr -config csr.conf
openssl x509 -req -days 365 -in self-ssl.csr -signkey self-ssl.key -out self-ssl.crt -extensions req_ext -extfile csr.conf

Sign from Root CA: openssl x509 -req -days 365 -extensions req_ext -extfile csr.conf -CA RootCA.crt -CAkey RootCA.key -in self-ssl.csr -out self-ssl.crt

@brohee
brohee / Updating iLO 3.md
Last active December 1, 2025 23:26
Guide on updating old iLO 3 versions to a more current one

Updating a HP(E) server from iLO 3 version 1.55 to version 1.94

This short document explain how to resolve the issues arising when trying to update an old (Gen7) HP(E) server to the most recent iLO 3 (HPE Integrated Lights-Out) version, which solves a great number of security and usability issues.

Issues

  • Can't connect to iLO with a modern browser, for lack of supported TLS protocol version
    • solved by using FirefoxPortable version 31
    • and in the Firefox31 portable configuration, in the about:config settings, set security.tls.version.min (the minimum acceptable version of the TLS protocol) to 0 in order to be able to negociate down to TLS 1.0 (even if iLO 3 can do 1.1). Keep in mind your browser is now (even more) vulnerable to a host of attacks, do not connect to any potentially hostile host with it.
  • alternatively sabotage your regular Firefox securit