[go: up one dir, main page]

Menu

SSH Key Fingerprints

Fingerprint Listing

*.code.sf.net (and legacy git/hg/svn.sourceforge.net hosts)

Protocol Key Length Hash Type Key Fingerprint
ECDSA 256 MD5 09:2f:eb:e5:cf:4b:d3:fd:8d:33:ed:d1:dc:61:98:05
SHA256 FeVkoYYBjuQzb5QVAgm3BkmeN5TTgL2qfmqz9tCPRL4
ED25519 256 MD5 7d:4b:06:16:cb:95:22:b4:9a:30:9b:7a:1f:7b:67:23
SHA256 vDwNztsrZFViJXWpUTSKGo8cF6n79iKAURNiK68n/yE
RSA 2048 MD5 86:7b:1b:12:85:35:8a:b7:98:b6:d2:97:5e:96:58:1d
SHA256 3WhEqJaBPKb69eT5dfgYcPJTgqc9rq1Y9saZlXqkbWg

web.sourceforge.net, web.sf.net, frs.sourceforge.net, frs.sf.net

Protocol Key Length Hash Type Key Fingerprint
ECDSA 256 MD5 a5:81:9f:63:23:78:fb:8f:c8:47:91:7c:b0:64:99:cc
SHA256 QAAxYkf0iI/tc9oGa0xSsVOAzJBZstcO8HqGKfjpxcY
ED25519 256 MD5 6e:b2:16:7a:ee:b6:c2:23:c5:8f:ff:e7:9d:cd:d4:1a
SHA256 209BDmH3jsRyO9UeGPPgLWPSegKmYCBIya0nR/AWWCY
RSA 2048 MD5 b0:a8:eb:30:ce:1a:0e:6a:4d:7a:6b:3a:0a:c6:27:60
SHA256 xB2rnn0NUjZ/E0IXQp4gyPqc7U7gjcw7G26RhkDyk90

NOTE: For HTTPS access, the fingerprints are not listed. Instead, you should use a web browser to check the server certificate.

SSH Security

SSH (Secure Shell) is used by SourceForge.net to provide secure access to the Git, SVN, Hg and file management. To access these resources, you must be a project developer and have an SSH client.

SSH provides security in several ways:

  • All data sent between the client (your workstation) and the server is encrypted. This prevents someone from eavesdropping on the network and stealing your password, or secretly tampering with the data sent between you and the server.
  • A special handshake is done when your client connects to the server. Your client is responsible for providing your account username and some form of authentication data matching what the server has on file for your account. This authentication data typically takes the form of either a password or data produced using a shared SSH key.
  • Shared SSH keys are comprised of an SSH private key stored on your workstation which matches an SSH public key stored on the server. SourceForge.net hosts accept SSH key authentication, preventing password exposure.
  • As part of the connect handshake, your client also verifies a key, called the SSH host key, provided by the host you are accessing. Your SSH client checks to see whether you have successfully connected to this host in the past. If this is the first time you are connecting to this host, you will be asked to confirm that the SSH host key matches what you think it should be.
  • By personally verifying this SSH host key data, you prevent someone from running a server that claims to be a SourceForge.net server (such as by taking over your DNS server and directing you to their own machine). You also ensure that you have not miskeyed the hostname, accidentally connecting to a server operated by someone other than SourceForge.net.

SSH Host Key Verification

The SSH host key is typically represented on disk as a long stream of letters and numbers. For ease of comparison, a special checksum, called a fingerprint, is generated from this host key data. This allows you to quickly verify that the host key matches what you are expecting.

When you are prompted to verify the SSH host key fingerprint, you will compare the on-screen fingerprint data with the fingerprint data stored in this document. After verifying that the fingerprint shown on the screen matches the fingerprint in this document, you may approve the fingerprint in your SSH client.

After verification, the host key is then stored on disk by your SSH client for comparison behind the scenes when you connect to this host in the future. If your SSH client detects that this SSH host key changes unexpectedly in the future, it will prevent you from connecting to that host, thus preventing you from accidentally sending your password or private data to some other server.

The exact text of the prompt to confirm fingerprint data will depend on which SSH client is being used, PuTTY or OpenSSH.

The fingerprint displayed by your SSH client should exactly match the fingerprint in this document for the listed host and protocol. If it does not match exactly, you should cease your attempt to connect to the host. Any SSH host key fingerprint problems should be reported to SourceForge.net staff.

Additional information on the importance of proper SSH host key validation may be found in the PuTTY SSH client manual.

Host Key Storage

After confirmation, SSH host key details are stored on the local disk; the location depends on the SSH client:

  • OpenSSH: Host key details are stored in the known_hosts and known_hosts2 files in the .ssh directory for your user.
  • PuTTY: Host key details are stored in the Windows Registry.

Fingerprint Variations

Host key fingerprints are host and protocol specific. Regardless of which SSH client you use to access the host, the key fingerprint should always exactly match a fingerprint listed in this document for the host and protocol you are accessing.

Confirming Bad Key Data

If you accidentally confirm bad fingerprint data, immediately disconnect from the host, if still connected. Next, change your SourceForge.net site password and regenerate your SSH keys.

Once you have addressed the issue of credential (password or key) exposure, you should remove the bad host key from wherever your client stores host key data.

Host Key Change Frequency

SSH host keys (and their fingerprints) are changed very infrequently, on the order of years. You should be suspicious of any messages from your SSH client which say that these keys have changed. Should such a warning message arise, you should immediately contact the SourceForge.net team.


Related

Documentation: File Management
Documentation: Git
Documentation: Mercurial
Documentation: SFTP
Documentation: SSH Keys
Documentation: SSH