| | 10 | |
| | 11 | Following [https://security.stackexchange.com/questions/20399/how-to-verify-the-ssl-fingerprint-by-command-line-wget-curl the suggestion here] you can get the fingerprints on the the command line remotely: |
| | 12 | |
| | 13 | {{{ |
| | 14 | openssl s_client -connect transitionnetwork.org:443 < /dev/null 2>/dev/null | openssl x509 -fingerprint -noout -in /dev/stdin |
| | 15 | SHA1 Fingerprint=44:15:8B:F2:0C:D3:E6:92:9A:41:6E:FC:2A:46:36:89:90:B1:16:70 |
| | 16 | }}} |
| | 17 | |
| | 18 | And on the server: |
| | 19 | |
| | 20 | {{{ |
| | 21 | cd /etc/ssl/transitionnetwork.org |
| | 22 | openssl x509 -noout -in transitionnetwork.org.crt -fingerprint |
| | 23 | SHA1 Fingerprint=44:15:8B:F2:0C:D3:E6:92:9A:41:6E:FC:2A:46:36:89:90:B1:16:70 |
| | 24 | }}} |