This way, a certified and uncertified version of the same key will have the same fingerprint, so you can see that they match. If some of the keys loaded into Pageant have certificates attached, then Pageant will default to showing the fingerprint of the underlying key. You can change to the older MD5 format (which looks like aa:bb:cc:…) with the Fingerprint type drop-down, but bear in mind that this format is less secure and should be avoided for comparison purposes where possible. This should be the same fingerprint given by PuTTYgen, and also the same fingerprint shown by remote utilities such as ssh-keygen when applied to your authorized_keys file.īy default this is shown in the SHA-256 format. (For ECDSA NIST keys, this is indicated as p256 or p384 or p521.)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |