Xtreme Power Conversion Corporation
Web/SNMP Cards
Page 37
UPS Management
The fingerprint may be checked against the information provided by the SNMP/Web adapter to confirm to SSH
server identity. On the console interface inject the ssh-fingerprint command. Below is a sample output of the ssh-
fingerprint command:
GEDE> ssh-fingerprint
1024 6e:07:31:58:16:91:ae:2e:43:6f:03:64:94:57:55:6d ssh_host_rsa_key.pub
1024 06:97:69:97:cd:93:1b:b6:29:ca:34:e5:8c:35:7c:6e ssh_host_dsa_key.pub
1024 d1:9b:50:13:b3:e3:98:8e:8c:76:49:14:be:21:ed:b3 ssh_host_key.pub
The output can be interpreted as follows:
Key
SSH version
Cryptography algorithm
ssh_host_rsa_key.pub
v2
RSA
ssh_host_dsa_key.pub
v2
DSA
ssh_host_key.pub
v1
RSA
It can be seen in the above example that the fingerprint shown by SSH matches the RSA key for SSH v2 on the ssh-
fingerprint output.
The SNMP/Web adapter supports both version 1 and version 2 of the SSH protocol. It is recommended to use SSH
v2 (if possible), as SSH v1 is generally considered obsolete.
On the other hand, SFTP is a file transfer protocol providing secure transfer. It is used in conjunction with the SSH
protocol, as SFTP does not provide security by itself but expects the underlying protocol to provide that. Therefore,
the key fingerprint can be verified exactly in the same way as with SSH. Below is a sample from a popular SFTP
client (sftp):