On Sun, Jun 14, 2015 at 02:28:31PM -0400, [email protected] wrote:
> In TLS_README it's instructed to use the following command to compute an
> sha-1 public key fingerprint:
>
> $ openssl x509 -in foo.example.com-cert.pem -noout -pubkey |
> openssl pkey -pubin -outform DER |
> openssl dgst -sha1 -c
> (stdin)= 7e:8b:82:2e:c8:9a:bc:f9:ae:1a:de:e6:9a:6c:b3:3b:b3:34:21:7a
>
> that didn't work for me,
Rather unfortunate that you don't explain how or why. Most likely you're
using a version of OpenSSL that is older than 1.0.0, and does not have the
"pkey" command. For RSA keys you can replace "openssl pkey" with "openssl rsa".
This computes a public key fingerprint.
> $ openssl x509 -noout -in foo.example.com-cert.pem -fingerprint
> SHA1 Fingerprint=A2:76:67:9B:B1:B8:4A:2F:DF:10:12:94:67:62:BE:47:6F:08:0F:12
>
> did work.
This computes the certificate fingerprint, not the public key
fingerprint.
> as seen, they both output valid digests, but the values differ.
As expected.
> I'm using postfix 2.11.3 and openssl 1.0.1f on ubuntu 15.04.
> I also experience this with postfix 2.11.0 and openssl 1.0.1f
> on ubuntu 14.04
What are these fingerprints for?
--
Viktor.