Protocol | Key Length | Hash Type | Key Fingerprint |
---|---|---|---|
ECDSA | 256 | MD5 | 09:2f:eb:e5:cf:4b:d3:fd:8d:33:ed:d1:dc:61:98:05 |
SHA256 | FeVkoYYBjuQzb5QVAgm3BkmeN5TTgL2qfmqz9tCPRL4 |
||
ED25519 | 256 | MD5 | 7d:4b:06:16:cb:95:22:b4:9a:30:9b:7a:1f:7b:67:23 |
SHA256 | vDwNztsrZFViJXWpUTSKGo8cF6n79iKAURNiK68n/yE |
||
RSA | 2048 | MD5 | 86:7b:1b:12:85:35:8a:b7:98:b6:d2:97:5e:96:58:1d |
SHA256 | 3WhEqJaBPKb69eT5dfgYcPJTgqc9rq1Y9saZlXqkbWg |
Protocol | Key Length | Hash Type | Key Fingerprint |
---|---|---|---|
ECDSA | 256 | MD5 | a5:81:9f:63:23:78:fb:8f:c8:47:91:7c:b0:64:99:cc |
SHA256 | QAAxYkf0iI/tc9oGa0xSsVOAzJBZstcO8HqGKfjpxcY |
||
ED25519 | 256 | MD5 | 6e:b2:16:7a:ee:b6:c2:23:c5:8f:ff:e7:9d:cd:d4:1a |
SHA256 | 209BDmH3jsRyO9UeGPPgLWPSegKmYCBIya0nR/AWWCY |
||
RSA | 2048 | MD5 | b0:a8:eb:30:ce:1a:0e:6a:4d:7a:6b:3a:0a:c6:27:60 |
SHA256 | xB2rnn0NUjZ/E0IXQp4gyPqc7U7gjcw7G26RhkDyk90 |
NOTE: For HTTPS access, the fingerprints are not listed. Instead, you should use a web browser to check the server certificate.
SSH (Secure Shell) is used by SourceForge.net to provide secure access to the Git, SVN, Hg and file management. To access these resources, you must be a project developer and have an SSH client.
SSH provides security in several ways:
The SSH host key is typically represented on disk as a long stream of letters and numbers. For ease of comparison, a special checksum, called a fingerprint, is generated from this host key data. This allows you to quickly verify that the host key matches what you are expecting.
When you are prompted to verify the SSH host key fingerprint, you will compare the on-screen fingerprint data with the fingerprint data stored in this document. After verifying that the fingerprint shown on the screen matches the fingerprint in this document, you may approve the fingerprint in your SSH client.
After verification, the host key is then stored on disk by your SSH client for comparison behind the scenes when you connect to this host in the future. If your SSH client detects that this SSH host key changes unexpectedly in the future, it will prevent you from connecting to that host, thus preventing you from accidentally sending your password or private data to some other server.
The exact text of the prompt to confirm fingerprint data will depend on which SSH client is being used, PuTTY or OpenSSH.
The fingerprint displayed by your SSH client should exactly match the fingerprint in this document for the listed host and protocol. If it does not match exactly, you should cease your attempt to connect to the host. Any SSH host key fingerprint problems should be reported to SourceForge.net staff.
Additional information on the importance of proper SSH host key validation may be found in the PuTTY SSH client manual.
After confirmation, SSH host key details are stored on the local disk; the location depends on the SSH client:
Host key fingerprints are host and protocol specific. Regardless of which SSH client you use to access the host, the key fingerprint should always exactly match a fingerprint listed in this document for the host and protocol you are accessing.
If you accidentally confirm bad fingerprint data, immediately disconnect from the host, if still connected. Next, change your SourceForge.net site password and regenerate your SSH keys.
Once you have addressed the issue of credential (password or key) exposure, you should remove the bad host key from wherever your client stores host key data.
SSH host keys (and their fingerprints) are changed very infrequently, on the order of years. You should be suspicious of any messages from your SSH client which say that these keys have changed. Should such a warning message arise, you should immediately contact the SourceForge.net team.
Documentation: File Management
Documentation: Git
Documentation: Mercurial
Documentation: SFTP
Documentation: SSH Keys
Documentation: SSH