| 10 | |
| 11 | Following [https://security.stackexchange.com/questions/20399/how-to-verify-the-ssl-fingerprint-by-command-line-wget-curl the suggestion here] you can get the fingerprints on the the command line remotely: |
| 12 | |
| 13 | {{{ |
| 14 | openssl s_client -connect transitionnetwork.org:443 < /dev/null 2>/dev/null | openssl x509 -fingerprint -noout -in /dev/stdin |
| 15 | SHA1 Fingerprint=44:15:8B:F2:0C:D3:E6:92:9A:41:6E:FC:2A:46:36:89:90:B1:16:70 |
| 16 | }}} |
| 17 | |
| 18 | And on the server: |
| 19 | |
| 20 | {{{ |
| 21 | cd /etc/ssl/transitionnetwork.org |
| 22 | openssl x509 -noout -in transitionnetwork.org.crt -fingerprint |
| 23 | SHA1 Fingerprint=44:15:8B:F2:0C:D3:E6:92:9A:41:6E:FC:2A:46:36:89:90:B1:16:70 |
| 24 | }}} |