summaryrefslogtreecommitdiffstats
path: root/certs.mdwn
blob: f621597712b00d983e83d04b771625cb688f5188 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
# Certificates at Fripost

The following is an up-to date list of SHA-1 and SHA-256 fingerprints of all
X.509 certificates Fripost uses on its publicly available services.  Please
consider any mismatch as a man-in-the-middle attack, and let us know
immediately! -- admin@fripost.org

Also refer to the [[signed version of this page|certs.asc]]

 * IMAP server

    imap.fripost.org:993
    SHA1   8A:81:CF:C3:04:01:BC:C6:58:03:CB:4B:61:F0:C9:0B:09:51:B8:F8
    SHA256 52:BA:FF:9F:7A:6B:7B:50:51:CB:64:BE:46:72:65:8E:D6:FC:3C:CE:5B:6C:9F:9F:E0:58:00:7B:8F:13:6E:D3

 * SMTP servers (STARTTLS)

    smtp.fripost.org:587 (Mail Submission Agent)
    SHA1   03:87:02:C9:6E:01:D3:AD:BC:EC:77:CC:A5:C5:37:C1:D8:C1:29:BC
    SHA256 6C:89:92:3C:A2:53:E0:14:9E:14:11:17:FF:FA:EB:12:3E:BA:0A:B0:C2:BE:70:18:8C:3D:7A:69:EB:00:5E:BB

    mx1.fripost.org:25 (1st Mail eXchange)
    SHA1   A5:9D:30:9A:49:4E:45:02:05:4B:D9:F8:12:8E:EE:F3:A8:CD:5C:4A
    SHA256 85:C9:C3:07:D6:BB:4E:A2:66:DF:DA:3B:B8:A4:D6:B3:71:B0:48:05:DD:A6:87:83:3F:B5:3E:4F:CF:1E:30:5B

    mx2.fripost.org:25 (2nd Mail eXchange)
    SHA1   67:67:D2:A6:0A:E5:8F:83:A9:85:26:01:71:80:24:C6:0B:DA:30:4F
    SHA256 B1:F4:82:E9:6E:B7:B0:0A:4A:FE:BD:92:6C:8D:EE:F6:6E:8C:1B:33:D3:7A:4B:6E:FB:37:D9:21:62:99:C2:73

 * Web servers

    fripost.org:443 (website), mail.fripost.org:443 (webmail), lists.fripost.org:443 (list manager)
    SHA1   E1:82:59:FD:7F:9A:11:EF:DC:1B:46:3B:AB:9F:F6:BB:A0:E4:D4:59
    SHA256 7D:F2:7C:67:90:91:EB:5E:1E:25:D0:7B:A4:A5:72:9F:EA:20:EC:F0:74:1C:25:66:1D:72:56:A3:3B:53:D9:9A

    wiki.fripost.org:443 (wiki)
    SHA1   96:4E:77:71:F3:2B:C7:60:50:58:37:53:C4:B1:F1:50:95:69:FD:C0
    SHA256 D0:02:01:81:03:86:F3:53:8A:BA:DE:7D:07:D5:E0:31:D8:5B:5D:35:72:BC:68:8B:E4:BF:86:33:42:43:21:90

    git.fripost.org:443 (git server and its web interface)
    SHA1   EA:50:38:19:38:6A:49:BF:5D:3C:4D:04:64:6F:0D:D3:AC:20:76:C2
    SHA256 08:D9:18:05:A3:F5:B6:8E:20:81:E1:8A:36:1B:44:AD:4E:36:6D:D1:BA:FC:3D:26:F9:F5:4B:68:A9:0F:F3:21

    antilop.fripost.org:443 (list manager)
    SHA1   6F:1A:3B:0F:2C:5A:BC:33:09:C6:D4:F8:43:2C:07:6E:B0:FD:DB:7B
    SHA256 FA:AC:E2:4C:C7:DD:D8:A6:24:20:0E:48:FC:91:D2:F0:CC:BD:BD:57:B1:F9:67:84:73:96:F1:90:4C:50:C1:F1


To get the whole certificate for imap.fripost.org:993, type the following
command in a shell:

    openssl s_client -connect imap.fripost.org:993 </dev/null

(For protocols using the STARTTLS directive such as SMTP, you'll have to call
s_client with '-starttls smtp'.  Another useful option is '-showcerts', which
prints the whole server certificate chain.)

You'll find the X.509 certificate wrapped between

    -----BEGIN CERTIFICATE-----
    [...]
    -----END CERTIFICATE-----

If you store it (including the delimiters) into /path/to/certificate.pem,
you can then ensure that its fingerprints match the ones above:

    openssl x509 -in /path/to/certificate.pem -noout -fingerprint -sha1
    openssl x509 -in /path/to/certificate.pem -noout -fingerprint -sha256

Alternatively, using a pipe:

    openssl s_client -connect imap.fripost.org:993 </dev/null \
    | openssl x509 -noout -fingerprint -sha256