Webseiten-Werkzeuge


Sites

The x.509 certificates are signed by Let's Encrypt (see end of this page).









HTTPS www.xapek.org xapek.org

$ openssl s_client -connect xapek.org:443 </dev/null 2>/dev/null | openssl x509 -fingerprint -noout  
SHA1 Fingerprint=45:60:14:30:D6:70:A3:B6:EC:A1:57:15:E8:6D:69:43:2D:A1:66:13 latest
SHA1 Fingerprint=7C:E0:DB:C6:CD:8E:DE:84:FB:1B:0B:74:0D:40:DD:B7:02:33:AD:3A Let's Encrypt
SHA1 Fingerprint=8F:70:89:EB:2E:D4:E2:4C:D9:E3:2E:C8:28:07:9F:B0:2B:C5:0C:4A CAcert (until 2015-11-02)

XMPP xapek.org

$ openssl s_client -starttls xmpp -connect xapek.org:5222 </dev/null 2>/dev/null | openssl x509 -fingerprint -noout
SHA1 Fingerprint=7C:E0:DB:C6:CD:8E:DE:84:FB:1B:0B:74:0D:40:DD:B7:02:33:AD:3A latest
SHA1 Fingerprint=7C:E0:DB:C6:CD:8E:DE:84:FB:1B:0B:74:0D:40:DD:B7:02:33:AD:3A Let's Encrypt
SHA1 Fingerprint=B3:BB:E4:2B:8F:F8:12:74:BA:02:3F:BC:0D:8F:A0:FC:58:CB:CA:AD CAcert (until 2015-11-02)
SHA1 Fingerprint=0E:00:DD:1A:9A:F5:11:1B:2A:A6:A4:1D:87:B0:E1:A8:75:25:91:CC CAcert (until 2015-07-19)

HTTPS www.localnet.cc

$ openssl s_client -connect localnet.cc:443 </dev/null 2>/dev/null | openssl x509 -fingerprint -noout  
SHA1 Fingerprint=E4:1B:AA:63:3C:A2:21:4A:A3:E8:E2:21:FA:58:2E:7E:6C:99:C7:C1 latest
SHA1 Fingerprint=8A:E8:99:7C:D7:4F:1F:A7:FA:70:1B:06:F7:86:3D:AA:E7:E2:77:1F Let's Encrypt
SHA1 Fingerprint=8D:C8:01:8D:40:D6:AA:A7:47:BA:79:B8:8A:A7:BF:87:89:CD:B1:C9 CAcert (until 2015-11-03)
SHA1 Fingerprint=8E:70:5C:8C:19:3E:11:EA:6C:B4:4B:E9:46:23:01:A1:9F:28:B2:59 CAcert (until 2015-07-19)

SSH [mondo.]xapek.org

$ ssh-keygen -F xapek.org -l
# Host xapek.org found: line 610 type RSA
2048 a7:82:ad:ff:e5:77:72:76:7a:c3:21:e2:c9:6b:66:e9 |1|DdRJDaRbLLscmdhQP/6J/1VmzjM=|a6KddpduOscslcGCswHMviV0zcA= (RSA)

SSH arbre.xapek.org (GIT)

$ ssh-keygen -F arbre.xapek.org -l
# Host arbre.xapek.org found: line 974 type ECDSA
256 6b:bd:fe:d8:3b:7f:ca:15:85:3b:73:92:27:13:48:1d |1|REAgOeMUuyzCBaK89CIlYA5nxDg=|qsFPoZJzM2xHYbe4Q/CMrYM7tt0= (ECDSA)

SSH xapek.org:2222

$ ssh-keygen -F "[xapek.org]:2222" -l
# Host [xapek.org]:2222 found: line 872 type ECDSA
256 ad:b0:10:c9:58:68:bb:51:f9:45:1f:84:20:3a:70:91 |1|Nhh1G8hgSJQd+LwFgRJMOmrN4Fc=|46Ub0TuiC5Ft7wmpfyYMFBWMmHE= (ECDSA)

SSH goldfisch.2.localnet.cc

$ ssh-keygen -l -f /etc/ssh/ssh_host_ecdsa_key.pub
256 75:d6:2d:ab:42:c0:65:64:04:db:00:6d:de:be:ce:9f /etc/ssh/ssh_host_ecdsa_key.pub (ECDSA)

SSH www.localnet.cc / localnet.cc

$ ssh-keygen -l -f /etc/ssh/ssh_host_ecdsa_key.pub
256 SHA256:gjkGrrkcO9JGYG2rKvbPY/QOIj1sUUjOKsC40YIodgA root@x4 (ECDSA)
$ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key.pub 
2048 SHA256:tWfaZTA0AXTdw3YSbAMc623lZ6ZfltDRqbLac7e6RoI root@x4 (RSA)

Signatures

Let's Encrypt

CAcert

The CAcert root certificate is not included in most browser/operating system keychains. You can choose to:

or trust them individually, you are invited to check the fingerprints printed below. If in doubt it might be a good idea to also check with the google cached version of this page. Just search the current URL in google.

certs.txt · Zuletzt geändert: 2017/02/28 22:51 von yvesf