Oh no! Some styles failed to load. 😵 Please try reloading this page
Menu â–¾ â–´

SSH Key Fingerprints

Fingerprint Listing

*.code.sf.net

Protocol Key Length Hash Type Key Fingerprint
ECDSA 256 MD5 09:2f:eb:e5:cf:4b:d3:fd:8d:33:ed:d1:dc:61:98:05
SHA256 FeVkoYYBjuQzb5QVAgm3BkmeN5TTgL2qfmqz9tCPRL4
ED25519 256 MD5 7d:4b:06:16:cb:95:22:b4:9a:30:9b:7a:1f:7b:67:23
SHA256 vDwNztsrZFViJXWpUTSKGo8cF6n79iKAURNiK68n/yE
RSA 2048 MD5 86:7b:1b:12:85:35:8a:b7:98:b6:d2:97:5e:96:58:1d
SHA256 3WhEqJaBPKb69eT5dfgYcPJTgqc9rq1Y9saZlXqkbWg
DSA 1024 MD5 e9:39:c1:2a:89:1c:ae:53:45:c8:e1:33:a6:eb:ac:6e
SHA256 5aylm05+mAAa1CNX1jVvEWihoFE9j+YCkBaKcRLrGTs

*.git.sourceforge.net, *.hg.sourceforge.net, *.bzr.sourceforge.net

Protocol Key Length Hash Type Key Fingerprint
RSA 2048 MD5 86:7b:1b:12:85:35:8a:b7:98:b6:d2:97:5e:96:58:1d
SHA256 3WhEqJaBPKb69eT5dfgYcPJTgqc9rq1Y9saZlXqkbWg
DSA 1024 MD5 e9:39:c1:2a:89:1c:ae:53:45:c8:e1:33:a6:eb:ac:6e
SHA256 5aylm05+mAAa1CNX1jVvEWihoFE9j+YCkBaKcRLrGTs

*.cvs.sourceforge.net

Protocol Key Length Hash Type Key Fingerprint
RSA 2048 MD5 dc:a3:df:84:00:c6:65:b4:93:a6:2e:22:b1:d1:91:b8
SHA256 rie5hEEbpr8MLkfgXqXhLRjf/rxfeXeiEQczjjT0Y3w
DSA 1024 MD5 5a:5d:56:14:e7:61:65:3c:7a:43:4b:6e:81:5f:20:46
SHA256 /QFc1pR6KOnnLQEXDJwDaX3Ha7PjdF6fEjdNi+fIUuQ

web.sourceforge.net, web.sf.net, frs.sourceforge.net, frs.sf.net

Protocol Key Length Hash Type Key Fingerprint
ECDSA 256 MD5 a5:81:9f:63:23:78:fb:8f:c8:47:91:7c:b0:64:99:cc
SHA256 QAAxYkf0iI/tc9oGa0xSsVOAzJBZstcO8HqGKfjpxcY
ED25519 256 MD5 6e:b2:16:7a:ee:b6:c2:23:c5:8f:ff:e7:9d:cd:d4:1a
SHA256 209BDmH3jsRyO9UeGPPgLWPSegKmYCBIya0nR/AWWCY
RSA 2048 MD5 b0:a8:eb:30:ce:1a:0e:6a:4d:7a:6b:3a:0a:c6:27:60
SHA256 xB2rnn0NUjZ/E0IXQp4gyPqc7U7gjcw7G26RhkDyk90
DSA 1024 MD5 3b:02:fe:5f:f1:94:50:ac:ce:15:54:92:46:80:21:36
SHA256 iZb25c+Jez8mpunu51jljWnzxSwY7BSqGhUgIcDpAmQ

shell.sourceforge.net & shell.sf.net

Protocol Key Length Hash Type Key Fingerprint
ECDSA 256 MD5 9a:ed:c9:e7:86:01:aa:90:29:30:21:e4:62:53:fe:ba
SHA256 W5Aer0OjESVt5fbduA9o7/XUeTdmi8arcwhjmVaGbzs
ED25519 256 MD5 20:79:4f:b9:49:90:7d:c8:76:41:4e:77:49:95:07:34
SHA256 7VKRNsG0QegsYCWmIY16Mg9AYCD93LOnsXDHLO8AyJM
RSA 2048 MD5 80:1c:ee:50:14:cd:ef:28:3e:82:c6:ef:44:55:d7:74
SHA256 SMyVjCfKUGCpAbh3S3MlgmmOcGxCD4qv5SL/q48fUEY
DSA 1024 MD5 8d:51:2e:2a:44:45:a2:6a:0a:a0:fa:99:45:5e:45:b3
SHA256 zU5H2zQNYjP4sI5FtPC2f5xuOmrVMxC3pMnCb91KZMk

shell1.sourceforge.net ... shell4.sourceforge.net

Protocol Key Length Hash Type Key Fingerprint
RSA 2048 MD5 45:fe:c0:d5:73:0a:ac:a6:c3:5d:95:2a:cc:b6:71:95
SHA256 4dyFdxT90Hkqwsa6VD7irXXSJ9UL22e7769qVKB2CDQ
DSA 1024 MD5 c5:a3:62:f0:cd:13:69:c6:71:81:1c:ea:08:80:fb:d5
SHA256 TZUoMOTeIKtcuN2pmMidiGQeK4Py6T0M9yJFF4zcCsY

NOTE: For https access, the fingerprints are not listed. Instead you should use a web browser to check the server certificate.

SSH Security

SSH (Secure SHell) is used by SourceForge.net to provide secure access to the classic CVS, [Git] servers, and shell servers. In order to access these resources, you must be a project developer and have an SSH client.

SSH provides security in several ways:

  • All data sent between the client (your workstation) and the server is encrypted. This prevents someone from eavesdropping on the network and stealing your password, or secretly tampering with the data sent between you and the server.
  • A special handshake is done when your client connects to the server. Your client is responsible for providing your account username and some form of authentication data matching what the server has on file for your account. This authentication data typically takes the form of either a password or data produced using a shared SSH keys.
  • Shared SSH keys are comprised of a SSH private key stored on your workstation which matches a SSH public key stored on the server. SourceForge.net hosts accept SSH key authentication, preventing password exposure.
  • As part of the connect handshake, your client also verifies a key, called the SSH host key, provided by the host you are accessing. Your SSH client checks to see whether you have successfully connected to this host in the past. If this is the first time you are connecting to this host, you will be asked to confirm that the SSH host key matches what you think it should be.
  • By personally verifying this SSH host key data, you prevent someone from running a server that claims to be a !ourceForge.net server (such as by taking over your DNS server and directing you to their own machine). You also ensure that you have not miskeyed the hostname, accidentally connecting to a server operated by someone other than SourceForge.net.

SSH Host Key Verification

The SSH host key is typically represented on disk as a long stream of letters and numbers. For ease of comparison, a special checksum, called a fingerprint, is generated from this host key data. This allows you to quickly verify that the host key matches what you are expecting.

When you are prompted to verify the SSH host key fingerprint, you will compare the on-screen fingerprint data with the fingerprint data stored in this document. After verifying that the fingerprint shown on screen matches the fingerprint in this document, you may approve the fingerprint in your SSH client.

After verification, the host key is then stored on disk by your SSH client for comparison behind-the-scenes when you connect to this host in the future. If your SSH client detects that this SSH host key changes unexpectedly in the future, it will prevent you from connecting to that host, thus preventing you from accidentally sending your password or private data to some other server.

The exact text of the prompt to confirm fingerprint data will depend on which SSH client is being used, PuTTY or OpenSSH.

The fingerprint displayed by your SSH client should exactly match the fingerprint in this document for the listed host and protocol. If it does not match exactly, you should cease your attempt to connect to the host. For the CVS hosts, you will have to compare the fingerprint of the hostnames that have matching IP addresses, as it would be impractical to list all of the hostnames here. Any SSH host key fingerprint problems should be reported to SourceForge.net staff.

Additional information on the importance of proper SSH host key validation may be found in the PuTTY SSH client manual.

Host Key Storage

After confirmation, SSH host key details are stored on the local disk; location depends on the SSH client:

  • OpenSSH: Host key details are stored in the known_hosts and known_hosts2 files in the .ssh directory for your user.
  • PuTTY: Host key details are stored in the Windows Registry.

Fingerprint Variations

Host key fingerprints are host and protocol specific. Regardless of which SSH client you use to access the host, the key fingerprint should always exactly match a fingerprint listed in this document for the host and protocol you are accessing.

Confirming Bad Key Data

If you accidentally confirm bad fingerprint data, immediately disconnect from the host, if still connected. Next, change your SourceForge.net site password and regenerate your SSH keys.

Once you have addressed the issue of credential (password or key) exposure, you should remove the bad host key from wherever your client stores host key data.

Host Key Change Frequency

SSH host keys (and their fingerprints) are changed very infrequently, on the order of years. You should be suspicious of any messages from your SSH client which say that these keys have changed. Should such a warning message arise, you should immediately contact the SourceForge.net team.

When host keys change, you will see a warning.


Related

Documentation: CVS
Documentation: File Management
Documentation: Git
Documentation: Mercurial
Documentation: SFTP
Documentation: SSH

Get latest updates about Open Source Projects, Conferences and News.

Sign Up No, Thank you