summaryrefslogtreecommitdiffstats
path: root/website
diff options
context:
space:
mode:
Diffstat (limited to 'website')
-rw-r--r--website/certs.asc119
-rw-r--r--website/certs.mdwn102
2 files changed, 121 insertions, 100 deletions
diff --git a/website/certs.asc b/website/certs.asc
index 5960bd9..23673a0 100644
--- a/website/certs.asc
+++ b/website/certs.asc
@@ -7,82 +7,91 @@ consider any mismatch as a man-in-the-middle attack, and let us know
immediately! -- admin@fripost.org
+All our X.509 certificates are available in PEM format under
+
+ https://git.fripost.org/fripost-ansible/tree/certs/public ,
+
+Git repository from which this fingerprint list was generated, at commit ID
+03bc468 from Wed, 2 Dec 2015 23:14:30 +0100.
+
+
* IMAP server
- imap.fripost.org:993
- SHA1 8A:81:CF:C3:04:01:BC:C6:58:03:CB:4B:61:F0:C9:0B:09:51:B8:F8
- SHA256 52:BA:FF:9F:7A:6B:7B:50:51:CB:64:BE:46:72:65:8E:D6:FC:3C:CE:5B:6C:9F:9F:E0:58:00:7B:8F:13:6E:D3
+ imap.fripost.org:993 (IMAP over SSL), sieve.fripost.org:4190 (ManageSieve, STARTTLS)
+ X.509 SHA1 8A:81:CF:C3:04:01:BC:C6:58:03:CB:4B:61:F0:C9:0B:09:51:B8:F8
+ X.509 SHA256 52:BA:FF:9F:7A:6B:7B:50:51:CB:64:BE:46:72:65:8E:D6:FC:3C:CE:5B:6C:9F:9F:E0:58:00:7B:8F:13:6E:D3
+ PKey SHA1 2C:E3:FB:47:F3:74:38:11:36:D6:5A:44:FF:D4:F5:45:37:96:9E:61
+ PKey SHA256 C7:F6:2E:72:F6:63:98:C3:A8:CA:5E:2C:FF:EC:1B:57:A4:8B:1E:45:21:94:62:43:4E:FB:23:7A:0A:95:57:6E
* SMTP servers (STARTTLS)
smtp.fripost.org:587 (Mail Submission Agent)
- SHA1 03:87:02:C9:6E:01:D3:AD:BC:EC:77:CC:A5:C5:37:C1:D8:C1:29:BC
- SHA256 6C:89:92:3C:A2:53:E0:14:9E:14:11:17:FF:FA:EB:12:3E:BA:0A:B0:C2:BE:70:18:8C:3D:7A:69:EB:00:5E:BB
+ X.509 SHA1 03:87:02:C9:6E:01:D3:AD:BC:EC:77:CC:A5:C5:37:C1:D8:C1:29:BC
+ X.509 SHA256 6C:89:92:3C:A2:53:E0:14:9E:14:11:17:FF:FA:EB:12:3E:BA:0A:B0:C2:BE:70:18:8C:3D:7A:69:EB:00:5E:BB
+ PKey SHA1 C9:5F:8B:E8:56:3A:3C:B7:2D:0A:D2:B5:0F:59:0D:E1:C1:26:E7:B5
+ PKey SHA256 92:BF:5E:D5:B0:4E:10:19:20:08:C4:70:D6:F3:F7:EC:5F:6E:75:D2:1F:9B:FF:4D:49:BD:B0:8A:68:90:49:BF
mx1.fripost.org:25 (1st Mail eXchange)
- SHA1 A5:9D:30:9A:49:4E:45:02:05:4B:D9:F8:12:8E:EE:F3:A8:CD:5C:4A
- SHA256 85:C9:C3:07:D6:BB:4E:A2:66:DF:DA:3B:B8:A4:D6:B3:71:B0:48:05:DD:A6:87:83:3F:B5:3E:4F:CF:1E:30:5B
+ X.509 SHA1 A5:9D:30:9A:49:4E:45:02:05:4B:D9:F8:12:8E:EE:F3:A8:CD:5C:4A
+ X.509 SHA256 85:C9:C3:07:D6:BB:4E:A2:66:DF:DA:3B:B8:A4:D6:B3:71:B0:48:05:DD:A6:87:83:3F:B5:3E:4F:CF:1E:30:5B
+ PKey SHA1 CE:37:86:CF:C8:CC:54:FA:46:93:A3:87:41:98:48:38:57:14:57:55
+ PKey SHA256 51:26:BF:58:89:19:90:C1:CD:0B:15:88:22:99:94:66:00:15:D1:37:DA:46:AA:F6:E9:76:27:F9:D2:5A:EF:B4
mx2.fripost.org:25 (2nd Mail eXchange)
- SHA1 67:67:D2:A6:0A:E5:8F:83:A9:85:26:01:71:80:24:C6:0B:DA:30:4F
- SHA256 B1:F4:82:E9:6E:B7:B0:0A:4A:FE:BD:92:6C:8D:EE:F6:6E:8C:1B:33:D3:7A:4B:6E:FB:37:D9:21:62:99:C2:73
+ X.509 SHA1 67:67:D2:A6:0A:E5:8F:83:A9:85:26:01:71:80:24:C6:0B:DA:30:4F
+ X.509 SHA256 B1:F4:82:E9:6E:B7:B0:0A:4A:FE:BD:92:6C:8D:EE:F6:6E:8C:1B:33:D3:7A:4B:6E:FB:37:D9:21:62:99:C2:73
+ PKey SHA1 8B:FA:A2:46:4A:83:2E:B4:3F:D0:F8:95:C9:7F:1A:DD:E9:58:30:53
+ PKey SHA256 8A:58:76:E6:AD:55:4A:44:FB:E8:03:F2:56:1E:98:04:23:32:EA:BD:83:20:AC:D9:6D:3C:74:69:F4:9F:02:A0
* Web servers
- fripost.org:443 (website), mail.fripost.org:443 (webmail), wiki.fripost.org:443 (wiki)
- SHA1 E1:82:59:FD:7F:9A:11:EF:DC:1B:46:3B:AB:9F:F6:BB:A0:E4:D4:59
- SHA256 7D:F2:7C:67:90:91:EB:5E:1E:25:D0:7B:A4:A5:72:9F:EA:20:EC:F0:74:1C:25:66:1D:72:56:A3:3B:53:D9:9A
+ fripost.org:443 (website), wiki.fripost.org:443 (wiki)
+ X.509 SHA1 E1:82:59:FD:7F:9A:11:EF:DC:1B:46:3B:AB:9F:F6:BB:A0:E4:D4:59
+ X.509 SHA256 7D:F2:7C:67:90:91:EB:5E:1E:25:D0:7B:A4:A5:72:9F:EA:20:EC:F0:74:1C:25:66:1D:72:56:A3:3B:53:D9:9A
+ PKey SHA1 5B:D6:82:A7:D2:CB:67:54:54:CD:69:42:AA:E5:89:14:68:87:11:47
+ PKey SHA256 CC:F1:F4:6C:54:29:04:05:5A:96:7E:20:8F:87:53:45:BE:CB:72:8E:40:E0:53:40:32:C0:B2:DC:E0:14:FD:BD
+
+ mail.fripost.org:443 (webmail)
+ X.509 SHA1 E1:82:59:FD:7F:9A:11:EF:DC:1B:46:3B:AB:9F:F6:BB:A0:E4:D4:59
+ X.509 SHA256 7D:F2:7C:67:90:91:EB:5E:1E:25:D0:7B:A4:A5:72:9F:EA:20:EC:F0:74:1C:25:66:1D:72:56:A3:3B:53:D9:9A
+ PKey SHA1 5B:D6:82:A7:D2:CB:67:54:54:CD:69:42:AA:E5:89:14:68:87:11:47
+ PKey SHA256 CC:F1:F4:6C:54:29:04:05:5A:96:7E:20:8F:87:53:45:BE:CB:72:8E:40:E0:53:40:32:C0:B2:DC:E0:14:FD:BD
lists.fripost.org:443 (list manager)
- SHA1 9B:EA:15:0C:B3:17:EC:CB:E5:38:DA:93:5C:1D:52:98:13:E4:8A:BC
- SHA256 04:86:AF:AB:68:35:D2:48:0C:F3:55:54:98:5D:2A:48:69:D7:C5:B2:CC:1C:F7:6F:F8:54:25:CF:E5:91:88:21
+ X.509 SHA1 9B:EA:15:0C:B3:17:EC:CB:E5:38:DA:93:5C:1D:52:98:13:E4:8A:BC
+ X.509 SHA256 04:86:AF:AB:68:35:D2:48:0C:F3:55:54:98:5D:2A:48:69:D7:C5:B2:CC:1C:F7:6F:F8:54:25:CF:E5:91:88:21
+ PKey SHA1 50:D8:27:64:38:DF:33:D4:C0:08:02:F3:B9:B2:D6:7C:01:44:B4:32
+ PKey SHA256 4E:BC:33:F9:8E:79:F8:4C:D7:AE:FA:CD:EB:BD:05:3F:96:7C:83:88:CA:AC:B5:B1:2C:E4:88:12:B2:A6:8D:18
- git.fripost.org:443 (git server), gitweb.fripost.org:443 (gitweb interface)
- SHA1 70:14:8A:A0:29:8E:53:65:8E:23:CF:BA:45:F1:0F:CB:68:81:AC:B6
- SHA256 84:2A:13:7A:B2:20:25:D6:38:8C:EE:8B:BC:A2:60:C5:AC:CD:8A:6B:67:17:B4:78:7F:97:3F:DE:7B:7D:83:B2
+ git.fripost.org:443 (git server and its web interface)
+ X.509 SHA1 70:14:8A:A0:29:8E:53:65:8E:23:CF:BA:45:F1:0F:CB:68:81:AC:B6
+ X.509 SHA256 84:2A:13:7A:B2:20:25:D6:38:8C:EE:8B:BC:A2:60:C5:AC:CD:8A:6B:67:17:B4:78:7F:97:3F:DE:7B:7D:83:B2
+ PKey SHA1 69:92:D4:A3:EF:57:3A:52:38:E5:9B:E1:91:0F:2D:62:FA:8B:E3:6A
+ PKey SHA256 4A:48:DB:F7:68:FA:C8:97:A2:8E:AA:60:F3:00:75:E2:CF:85:A2:3B:CD:DB:66:81:F8:16:46:87:41:7F:CE:E2
* SSH server
- gitolite@git.fripost.org
+ gitolite@git.fripost.org:22
RSA MD5:0b:e5:47:44:71:cb:41:7d:1e:1b:25:bc:28:e8:c3:a2
RSA SHA256:zNZXfa/okPm/tV9dl3gNlizfXAghrMSgrcwICiWx+80
-To get the whole certificate for imap.fripost.org:993, type the following
-command in a shell:
-
- openssl s_client -connect imap.fripost.org:993 </dev/null
-
-(For protocols using the STARTTLS directive such as SMTP, you'll have to call
-s_client with '-starttls smtp'. Another useful option is '-showcerts', which
-prints the whole server certificate chain.)
-
-You'll find the X.509 certificate wrapped between
-
- -----BEGIN CERTIFICATE-----
- [...]
- -----END CERTIFICATE-----
-
-If you store it (including the delimiters) into /path/to/certificate.pem,
-you can then ensure that its fingerprints match the ones above:
-
- openssl x509 -in /path/to/certificate.pem -noout -fingerprint -sha1
- openssl x509 -in /path/to/certificate.pem -noout -fingerprint -sha256
-
-Alternatively, using a pipe:
+If your SSL/TLS-capable client is able to validate the public key
+fingerprint of the remote peer certificate, then you should probably use
+this (the above values prefixed with "PKey") instead of the fingerprint
+of the certificate instead (the above values prefixed with "X.509"),
+since the former typically doesn't change upon certificate renewal.
- openssl s_client -connect imap.fripost.org:993 </dev/null \
- | openssl x509 -noout -fingerprint -sha256
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
-iQIcBAEBCgAGBQJV5HxgAAoJENOaSZw8IaVS+3AP/j2IK9ZBoh2YIqPhykITs15f
-76jM4hcFYTA4Z2p+0g9BQUgay7JvUzyd8ymzwJ23P3RFJzMr2ep5E8/GxSKp4qE3
-tun2YT8iGUCtVC9Rf66LPEW7cLxp6x9hJoBWmsLFvxhnDudCR548BnQGPSAA/eFx
-rMY6tt1D5CH8FTCxjciaNVtYKwYpHam6z2tRC87OOI0G1BfV63FEU9eE3xOsCIAM
-ic10dctwpWw/uDodS4qOLuHyE9RRiuY9TbnFMJi/KIvSGxgcS0IAJpu/Emdk6g79
-X1Ot8JXaxRqv3cbHhqXbUo7UGY/VnVvFxtAda+9TiY2gz8acTfhxMly16owvnE1r
-ad9L44RrWoSa71gP1Qviiid7v3iufHcc77VNs8Lq9RIty0vEzJajfKSMOO1DMeoN
-POCV8y9fC6ATPSoGcibA3VZxSC/R+TjhhLmKozlpz+t2yQAXHwkwZKh0ovlywO/G
-P0WYnrOaw90LCniLa72qfRALDrL1pST1hCaByc4wT4FCuSPtSUYyHGR9xGyVPkLy
-2khAIwpIhNNYpzQs7INKRzBYpvkZtPJAIW6J3IY7xS7rmT71ThvnkaO+y8yAYeOd
-joor4JZnVU6pxFPPKZPhtEgTM3R/wX4EUihtxJtl2MJis8/NkLL6y1tXVpOQrSBs
-30MYWXh3vv7nzriSi5jO
-=sR90
+iQIcBAEBCgAGBQJWYG/jAAoJENOaSZw8IaVSkTsP/ieAh948fsm3/mS0zhxaP8qT
+fHajeYjBDn0+0t/HGfLceqswfQuoy4L2h7mNKJIZBlXjOjWjE6C5OSOPohWVmqQb
+WUuD/KPWtcxtagIYwCDLYyHGUXbiO/WS4VAOH/NIKDBPo5UHBSrdOQcv4WNvS39f
+M/k50q3O5/Hera4hTUI3WLGySkyzA9ZkYpgXI+9jlvWBSkb0qOZT+vlM9MUgeVDe
+nmsiIkCPivjWcLtsJVOFBMiSvT0GfmXWnwh2DJgDGHYLqDqQks9ibHCMTFPVpyyS
+J5F/LQ+Nbqqg6Pw+PAEi+1MiUvBt4oHp8EETSQu4hQzKp9hLMJnB3SMMwG9ahS5N
+AriOQU3HxbAsVGS5JEiUi6u+V+Hm0cfL4Z5S2mrCjJkVB+1IzdAw/pF04Pmejinn
+OI8gghyvu2/xGY93VMIM8BK2tU+BWPCRvpJ866ZzRskDPub2vKx3fWlveZTtKf97
+IHBF8pdpN1+JoIAC1RDDFzmpgdfato0nCIuynD57yD2qqV7uctUCJUp0yxmiUCE+
+BFndUzw2Ch6lgH+r2IYeppLrCRlEK0Mg7/R0Zo/ivuy4HNVyrcuM6Emz+3RbBnPX
+vMlbVT2WY8KENym5OQZdipj5KoOky9PBB+JzXMZEOVfFTA/PYCeVtWXiEyFP85FI
+IMsWchq4/RevrCzOROLP
+=mUOT
-----END PGP SIGNATURE-----
diff --git a/website/certs.mdwn b/website/certs.mdwn
index 70e5a28..797cefc 100644
--- a/website/certs.mdwn
+++ b/website/certs.mdwn
@@ -3,81 +3,93 @@
The following is an up-to date list of SHA-1 and SHA-256 fingerprints of all
X.509 certificates Fripost uses on its publicly available services. Please
consider any mismatch as a man-in-the-middle attack, and let us know
-immediately! -- admin@fripost.org
+immediately! (See also the [[signed version of this page|certs.asc]].)
+-- [[admin@fripost.org|mailto:admin@fripost.org]]
+
+
+All our X.509 certificates are available in PEM format under our
+[[Git repository|https://git.fripost.org/fripost-ansible/tree/certs/public]],
+from which this fingerprint list was [[generated|https://git.fripost.org/fripost-ansible/tree/certs/gencerts.sh]], at
+[[Commit ID 03bc468 from Wed, 2 Dec 2015 23:14:30 +0100|https://git.fripost.org/fripost-ansible/tree/certs/public?id=03bc468e0dab47c9720d3ffa78ab3880d11870b5]].
+
* IMAP server
- imap.fripost.org:993
+ imap.fripost.org:993 (IMAP over SSL), sieve.fripost.org:4190 (ManageSieve, STARTTLS)
- SHA1 8A:81:CF:C3:04:01:BC:C6:58:03:CB:4B:61:F0:C9:0B:09:51:B8:F8
- SHA256 52:BA:FF:9F:7A:6B:7B:50:51:CB:64:BE:46:72:65:8E:D6:FC:3C:CE:5B:6C:9F:9F:E0:58:00:7B:8F:13:6E:D3
+ X.509 SHA1 8A:81:CF:C3:04:01:BC:C6:58:03:CB:4B:61:F0:C9:0B:09:51:B8:F8
+ X.509 SHA256 52:BA:FF:9F:7A:6B:7B:50:51:CB:64:BE:46:72:65:8E:D6:FC:3C:CE:5B:6C:9F:9F:E0:58:00:7B:8F:13:6E:D3
+ PKey SHA1 2C:E3:FB:47:F3:74:38:11:36:D6:5A:44:FF:D4:F5:45:37:96:9E:61
+ PKey SHA256 C7:F6:2E:72:F6:63:98:C3:A8:CA:5E:2C:FF:EC:1B:57:A4:8B:1E:45:21:94:62:43:4E:FB:23:7A:0A:95:57:6E
* SMTP servers (STARTTLS)
smtp.fripost.org:587 (Mail Submission Agent)
- SHA1 03:87:02:C9:6E:01:D3:AD:BC:EC:77:CC:A5:C5:37:C1:D8:C1:29:BC
- SHA256 6C:89:92:3C:A2:53:E0:14:9E:14:11:17:FF:FA:EB:12:3E:BA:0A:B0:C2:BE:70:18:8C:3D:7A:69:EB:00:5E:BB
+ X.509 SHA1 03:87:02:C9:6E:01:D3:AD:BC:EC:77:CC:A5:C5:37:C1:D8:C1:29:BC
+ X.509 SHA256 6C:89:92:3C:A2:53:E0:14:9E:14:11:17:FF:FA:EB:12:3E:BA:0A:B0:C2:BE:70:18:8C:3D:7A:69:EB:00:5E:BB
+ PKey SHA1 C9:5F:8B:E8:56:3A:3C:B7:2D:0A:D2:B5:0F:59:0D:E1:C1:26:E7:B5
+ PKey SHA256 92:BF:5E:D5:B0:4E:10:19:20:08:C4:70:D6:F3:F7:EC:5F:6E:75:D2:1F:9B:FF:4D:49:BD:B0:8A:68:90:49:BF
+
mx1.fripost.org:25 (1st Mail eXchange)
- SHA1 A5:9D:30:9A:49:4E:45:02:05:4B:D9:F8:12:8E:EE:F3:A8:CD:5C:4A
- SHA256 85:C9:C3:07:D6:BB:4E:A2:66:DF:DA:3B:B8:A4:D6:B3:71:B0:48:05:DD:A6:87:83:3F:B5:3E:4F:CF:1E:30:5B
+ X.509 SHA1 A5:9D:30:9A:49:4E:45:02:05:4B:D9:F8:12:8E:EE:F3:A8:CD:5C:4A
+ X.509 SHA256 85:C9:C3:07:D6:BB:4E:A2:66:DF:DA:3B:B8:A4:D6:B3:71:B0:48:05:DD:A6:87:83:3F:B5:3E:4F:CF:1E:30:5B
+ PKey SHA1 CE:37:86:CF:C8:CC:54:FA:46:93:A3:87:41:98:48:38:57:14:57:55
+ PKey SHA256 51:26:BF:58:89:19:90:C1:CD:0B:15:88:22:99:94:66:00:15:D1:37:DA:46:AA:F6:E9:76:27:F9:D2:5A:EF:B4
+
mx2.fripost.org:25 (2nd Mail eXchange)
- SHA1 67:67:D2:A6:0A:E5:8F:83:A9:85:26:01:71:80:24:C6:0B:DA:30:4F
- SHA256 B1:F4:82:E9:6E:B7:B0:0A:4A:FE:BD:92:6C:8D:EE:F6:6E:8C:1B:33:D3:7A:4B:6E:FB:37:D9:21:62:99:C2:73
+ X.509 SHA1 67:67:D2:A6:0A:E5:8F:83:A9:85:26:01:71:80:24:C6:0B:DA:30:4F
+ X.509 SHA256 B1:F4:82:E9:6E:B7:B0:0A:4A:FE:BD:92:6C:8D:EE:F6:6E:8C:1B:33:D3:7A:4B:6E:FB:37:D9:21:62:99:C2:73
+ PKey SHA1 8B:FA:A2:46:4A:83:2E:B4:3F:D0:F8:95:C9:7F:1A:DD:E9:58:30:53
+ PKey SHA256 8A:58:76:E6:AD:55:4A:44:FB:E8:03:F2:56:1E:98:04:23:32:EA:BD:83:20:AC:D9:6D:3C:74:69:F4:9F:02:A0
* Web servers
- fripost.org:443 (website), mail.fripost.org:443 (webmail), wiki.fripost.org:443 (wiki)
+ fripost.org:443 (website), wiki.fripost.org:443 (wiki)
- SHA1 E1:82:59:FD:7F:9A:11:EF:DC:1B:46:3B:AB:9F:F6:BB:A0:E4:D4:59
- SHA256 7D:F2:7C:67:90:91:EB:5E:1E:25:D0:7B:A4:A5:72:9F:EA:20:EC:F0:74:1C:25:66:1D:72:56:A3:3B:53:D9:9A
+ X.509 SHA1 E1:82:59:FD:7F:9A:11:EF:DC:1B:46:3B:AB:9F:F6:BB:A0:E4:D4:59
+ X.509 SHA256 7D:F2:7C:67:90:91:EB:5E:1E:25:D0:7B:A4:A5:72:9F:EA:20:EC:F0:74:1C:25:66:1D:72:56:A3:3B:53:D9:9A
+ PKey SHA1 5B:D6:82:A7:D2:CB:67:54:54:CD:69:42:AA:E5:89:14:68:87:11:47
+ PKey SHA256 CC:F1:F4:6C:54:29:04:05:5A:96:7E:20:8F:87:53:45:BE:CB:72:8E:40:E0:53:40:32:C0:B2:DC:E0:14:FD:BD
- lists.fripost.org:443 (list manager)
-
- SHA1 9B:EA:15:0C:B3:17:EC:CB:E5:38:DA:93:5C:1D:52:98:13:E4:8A:BC
- SHA256 04:86:AF:AB:68:35:D2:48:0C:F3:55:54:98:5D:2A:48:69:D7:C5:B2:CC:1C:F7:6F:F8:54:25:CF:E5:91:88:21
- git.fripost.org:443 (git server), gitweb.fripost.org:443 (gitweb interface)
+ mail.fripost.org:443 (webmail)
- SHA1 70:14:8A:A0:29:8E:53:65:8E:23:CF:BA:45:F1:0F:CB:68:81:AC:B6
- SHA256 84:2A:13:7A:B2:20:25:D6:38:8C:EE:8B:BC:A2:60:C5:AC:CD:8A:6B:67:17:B4:78:7F:97:3F:DE:7B:7D:83:B2
-
- * SSH server
+ X.509 SHA1 E1:82:59:FD:7F:9A:11:EF:DC:1B:46:3B:AB:9F:F6:BB:A0:E4:D4:59
+ X.509 SHA256 7D:F2:7C:67:90:91:EB:5E:1E:25:D0:7B:A4:A5:72:9F:EA:20:EC:F0:74:1C:25:66:1D:72:56:A3:3B:53:D9:9A
+ PKey SHA1 5B:D6:82:A7:D2:CB:67:54:54:CD:69:42:AA:E5:89:14:68:87:11:47
+ PKey SHA256 CC:F1:F4:6C:54:29:04:05:5A:96:7E:20:8F:87:53:45:BE:CB:72:8E:40:E0:53:40:32:C0:B2:DC:E0:14:FD:BD
- gitolite@git.fripost.org
- RSA MD5:0b:e5:47:44:71:cb:41:7d:1e:1b:25:bc:28:e8:c3:a2
- RSA SHA256:zNZXfa/okPm/tV9dl3gNlizfXAghrMSgrcwICiWx+80
-
-
-To get the whole certificate for imap.fripost.org:993, type the following
-command in a shell:
+ lists.fripost.org:443 (list manager)
- openssl s_client -connect imap.fripost.org:993 </dev/null
+ X.509 SHA1 9B:EA:15:0C:B3:17:EC:CB:E5:38:DA:93:5C:1D:52:98:13:E4:8A:BC
+ X.509 SHA256 04:86:AF:AB:68:35:D2:48:0C:F3:55:54:98:5D:2A:48:69:D7:C5:B2:CC:1C:F7:6F:F8:54:25:CF:E5:91:88:21
+ PKey SHA1 50:D8:27:64:38:DF:33:D4:C0:08:02:F3:B9:B2:D6:7C:01:44:B4:32
+ PKey SHA256 4E:BC:33:F9:8E:79:F8:4C:D7:AE:FA:CD:EB:BD:05:3F:96:7C:83:88:CA:AC:B5:B1:2C:E4:88:12:B2:A6:8D:18
-(For protocols using the STARTTLS directive such as SMTP, you'll have to call
-s_client with '-starttls smtp'. Another useful option is '-showcerts', which
-prints the whole server certificate chain.)
-You'll find the X.509 certificate wrapped between
+ git.fripost.org:443 (git server and its web interface)
- -----BEGIN CERTIFICATE-----
- [...]
- -----END CERTIFICATE-----
+ X.509 SHA1 70:14:8A:A0:29:8E:53:65:8E:23:CF:BA:45:F1:0F:CB:68:81:AC:B6
+ X.509 SHA256 84:2A:13:7A:B2:20:25:D6:38:8C:EE:8B:BC:A2:60:C5:AC:CD:8A:6B:67:17:B4:78:7F:97:3F:DE:7B:7D:83:B2
+ PKey SHA1 69:92:D4:A3:EF:57:3A:52:38:E5:9B:E1:91:0F:2D:62:FA:8B:E3:6A
+ PKey SHA256 4A:48:DB:F7:68:FA:C8:97:A2:8E:AA:60:F3:00:75:E2:CF:85:A2:3B:CD:DB:66:81:F8:16:46:87:41:7F:CE:E2
-If you store it (including the delimiters) into /path/to/certificate.pem,
-you can then ensure that its fingerprints match the ones above:
+ * SSH server
- openssl x509 -in /path/to/certificate.pem -noout -fingerprint -sha1
- openssl x509 -in /path/to/certificate.pem -noout -fingerprint -sha256
+ gitolite@git.fripost.org:22
-Alternatively, using a pipe:
+ RSA MD5:0b:e5:47:44:71:cb:41:7d:1e:1b:25:bc:28:e8:c3:a2
+ RSA SHA256:zNZXfa/okPm/tV9dl3gNlizfXAghrMSgrcwICiWx+80
- openssl s_client -connect imap.fripost.org:993 </dev/null \
- | openssl x509 -noout -fingerprint -sha256
-Also refer to the [[signed version of this page|certs.asc]]
+If your SSL/TLS-capable client is able to validate the public key
+fingerprint of the remote peer certificate, then you should probably use
+this (the above values prefixed with "PKey") instead of the fingerprint
+of the certificate instead (the above values prefixed with "X.509"),
+since the former typically doesn't change upon certificate renewal.