TICC SSH RSA Fingerprints

(Difference between revisions)
Jump to: navigation, search
(Created page with "When you first connect to an SSH server, your SSH client should (read, "If your SSH client does not, get a new SSH client") ask you to verify the RSA Key Fingerprint of the serve...")
 
Line 9: Line 9:
 
OldTicc
 
OldTicc
 
7f:af:fd:bd:4a:75:d4:0d:40:f5:8d:80:f6:c9:aa:b6
 
7f:af:fd:bd:4a:75:d4:0d:40:f5:8d:80:f6:c9:aa:b6
 +
 +
To get these, run the
 +
<syntaxhighlight lang="text">ssh-keygen -lf <'''Public''' key file></syntaxhighlight>

Revision as of 18:09, 11 October 2011

When you first connect to an SSH server, your SSH client should (read, "If your SSH client does not, get a new SSH client") ask you to verify the RSA Key Fingerprint of the server. This is a way to verify that the public key that the server is sending you is the public key associated with that server. In other words, the server you are connecting to is the server you think that you are connecting to. Below are the current RSA Key Fingerprints for the TICC servers.

TICC 1 7b:4b:c6:02:d3:58:e7:0f:af:d4:87:67:a1:8a:f4:39

TICC 2 e0:c8:47:c7:d0:dd:ae:2a:c8:a3:8c:6e:1b:28:ae:56

OldTicc 7f:af:fd:bd:4a:75:d4:0d:40:f5:8d:80:f6:c9:aa:b6

To get these, run the

ssh-keygen -lf <'''Public''' key file>
Personal tools
Namespaces
Variants
Actions
Navigation
Toolbox