TICC SSH RSA Fingerprints
When you first connect to an SSH server, your SSH client should (read, "If your SSH client does not, get a new SSH client") ask you to verify the RSA Key Fingerprint of the server. This is a way to verify that the public key that the server is sending you is the public key associated with that server. In other words, the server you are connecting to is the server you think that you are connecting to. Below are the current RSA Key Fingerprints for the TICC servers.
TICC2 (RSA) fe:f6:0f:9e:2a:db:af:a2:08:bf:10:b6:34:4f:b3:53
TICC2 (RSA1) a6:e6:7b:ab:e8:e1:d2:2f:e2:8b:b5:93:53:30:84:90
TICC2 (DSA) 6a:28:bd:17:68:04:c7:94:44:12:f1:ef:38:df:27:80
TICC1 (RSA) e2:27:ca:90:6d:bb:9e:b2:bd:e0:55:a5:a3:1e:a4:98
TICC1 (RSA1) 3a:68:63:0c:40:3a:1f:37:1f:00:24:c7:30:eb:d5:d5
TICC1 (DSA) 1e:27:2d:72:c2:2d:64:aa:7d:0c:ed:30:d9:ac:2b:a3
To get these, run the
ssh-keygen -lf /etc/ssh/ssh_host_rsa_key.pub
Make sure that you only trust the output of this command if you are running it from the server itself, or if you have independently verified that the connection you are using is safe. It always bears repeating, never enter your password unless you know that the connection you are using is secure.
ILOM SHA-1 Certificate Keys