Differences

This shows you the differences between the selected revisions of the page.

2019-06-04 2019-07-24
5.12 Bug 1589 – Use SHA-256 host key fingerprints (martin) typo (martin)
Line 32: Line 32:
  * Host key fingerprint: On the first connect you will be prompted to [[ssh_verifying_the_host_key|verify a server host key]]. While the DigitalOcean documentation suggests you can accept the droplet host key on the first connect without verifying it, to maintain maximum security, you should securely acquire a fingerprint of the host key:   * Host key fingerprint: On the first connect you will be prompted to [[ssh_verifying_the_host_key|verify a server host key]]. While the DigitalOcean documentation suggests you can accept the droplet host key on the first connect without verifying it, to maintain maximum security, you should securely acquire a fingerprint of the host key:
    * [[https://www.digitalocean.com/docs/droplets/how-to/connect-with-console/|Connect to the droplet with the DigitalOcean console]];     * [[https://www.digitalocean.com/docs/droplets/how-to/connect-with-console/|Connect to the droplet with the DigitalOcean console]];
-    * Use the following commands display fingerprints of the host keys: \\ <code>+    * Use the following commands to display fingerprints of the host keys: \\ <code>
root@droplet:~# ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key.pub root@droplet:~# ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key.pub
2048 SHA256:z6YYzqGiAb1FN55jOf/f4fqR1IJvpXlKxaZXRtP2mX8  root@droplet-1 (RSA) 2048 SHA256:z6YYzqGiAb1FN55jOf/f4fqR1IJvpXlKxaZXRtP2mX8  root@droplet-1 (RSA)

Last modified: by martin