[Sshmgmt] SSH host key fingerprint - through HTTPS

John Leo <johnleo@checkssh.com> Sun, 14 September 2014 06:12 UTC

Return-Path: <johnleo@checkssh.com>
X-Original-To: sshmgmt@ietfa.amsl.com
Delivered-To: sshmgmt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1722F1A0248; Sat, 13 Sep 2014 23:12:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.8
X-Spam-Level:
X-Spam-Status: No, score=0.8 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 68Ktg-J0Qfyx; Sat, 13 Sep 2014 23:12:33 -0700 (PDT)
Received: from sender1.zohomail.com (sender1.zohomail.com [74.201.84.155]) by ietfa.amsl.com (Postfix) with ESMTP id 4EF351A0243; Sat, 13 Sep 2014 23:12:33 -0700 (PDT)
Received: from [0.0.0.0] (223.255.139.203 [223.255.139.203]) by mx.zohomail.com with SMTPS id 1410675151853974.9787642891206; Sat, 13 Sep 2014 23:12:31 -0700 (PDT)
Message-ID: <541531CD.3000104@checkssh.com>
Date: Sun, 14 Sep 2014 14:12:29 +0800
From: John Leo <johnleo@checkssh.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:31.0) Gecko/20100101 Thunderbird/31.1.1
MIME-Version: 1.0
To: sshmgmt@ietf.org, saag@ietf.org
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-ZohoMailClient: External
X-Zoho-Virus-Status: 2
Archived-At: http://mailarchive.ietf.org/arch/msg/sshmgmt/7V3dOLrTwSy3cBrkU7lPr3s0f-0
Subject: [Sshmgmt] SSH host key fingerprint - through HTTPS
X-BeenThere: sshmgmt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This list will discuss SSH key management practices. The starting point will be to consider what to do with draft-ylonen-sshkeybcp" <sshmgmt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sshmgmt>, <mailto:sshmgmt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sshmgmt/>
List-Post: <mailto:sshmgmt@ietf.org>
List-Help: <mailto:sshmgmt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sshmgmt>, <mailto:sshmgmt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Sep 2014 06:12:35 -0000

This tool displays SSH host key fingerprint - through HTTPS.

SSH is about security; host key matters a lot here; and you can know for sure by using this tool. It means you know precisely how to answer this question:
The authenticity of host 'blah.blah.blah (10.10.10.10)' can't be established.
RSA key fingerprint is a4:d9:a4:d9:a4:d9a4:d9:a4:d9a4:d9a4:d9a4:d9a4:d9a4:d9.
Are you sure you want to continue connecting (yes/no)?

https://checkssh.com/

We hackers don't want to get hacked. :-) SSH rocks - when host key is right. Enjoy!

Best Wishes,