Here are the host key fingerprints for our application servers. The asterisk (*) indicates that any server name that has the string on the end applies, so for example both equity1.projectlocker.com, free1.projectlocker.com, and pl1.projectlocker.com are all covered by the same host key fingerprint.
RSA Host Key Fingerprints
- *1.projectlocker.com - 1b:06:eb:c7:3c:e7:ea:48:3f:96:8a:d7:00:e8:8c:ec
- *2.projectlocker.com - cf:68:b3:ae:63:ea:5e:91:f9:05:15:7a:de:5f:3f:44
- *3.projectlocker.com - 1b:06:eb:c7:3c:e7:ea:48:3f:96:8a:d7:00:e8:8c:ec
- *5.projectlocker.com - cf:68:b3:ae:63:ea:5e:91:f9:05:15:7a:de:5f:3f:44
- *6.projectlocker.com - cf:68:b3:ae:63:ea:5e:91:f9:05:15:7a:de:5f:3f:44
- *7.projectlocker.com - 1b:06:eb:c7:3c:e7:ea:48:3f:96:8a:d7:00:e8:8c:ec
- *8.projectlocker.com - cf:68:b3:ae:63:ea:5e:91:f9:05:15:7a:de:5f:3f:44
RSA SHA-256 Host Key Fingerprints
- pl1.projectlocker.com - l+LaAgcl6FuK1jRv2exA8UrXLueI+2O7sITvyrDB+Rc=
- pl2.projectlocker.com - BKoSUOtsYBWZkTXswf7utDE+nMuNAUPzoLBE58r+CoQ=
- pl3.projectlocker.com - l+LaAgcl6FuK1jRv2exA8UrXLueI+2O7sITvyrDB+Rc=
- pl5.projectlocker.com - BKoSUOtsYBWZkTXswf7utDE+nMuNAUPzoLBE58r+CoQ=
- pl6.projectlocker.com - BKoSUOtsYBWZkTXswf7utDE+nMuNAUPzoLBE58r+CoQ=
- pl7.projectlocker.com - l+LaAgcl6FuK1jRv2exA8UrXLueI+2O7sITvyrDB+Rc=
- pl8.projectlocker.com - BKoSUOtsYBWZkTXswf7utDE+nMuNAUPzoLBE58r+CoQ=
ECDSA MD5 Host Key Fingerprints
- *1.projectlocker.com - 12:f2:11:49:81:40:af:f6:b2:89:4d:db:bd:c0:31:ec
- *2.projectlocker.com - 0d:bb:bb:dd:27:61:f1:fb:ce:c3:9b:09:0e:e2:07:a1
- *3.projectlocker.com - 12:f2:11:49:81:40:af:f6:b2:89:4d:db:bd:c0:31:ec
- *5.projectlocker.com - 0d:bb:bb:dd:27:61:f1:fb:ce:c3:9b:09:0e:e2:07:a1
- *6.projectlocker.com - 0d:bb:bb:dd:27:61:f1:fb:ce:c3:9b:09:0e:e2:07:a1
- *7.projectlocker.com - 12:f2:11:49:81:40:af:f6:b2:89:4d:db:bd:c0:31:e
- *8.projectlocker.com - 0d:bb:bb:dd:27:61:f1:fb:ce:c3:9b:09:0e:e2:07:a1
ECDSA SHA-256 Host Key Fingerprints
- *1.projectlocker.com - lcvSdRfw4/kcI1upIH5Gw1IFN23mo2GxFqfzW8Zl73I=
- *2.projectlocker.com - AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBJIg8gbOqqvoUT4d8Emge24wEiJcgOn5BR+sl9zWw46cewG6RKDAEAIZ8pWbpYu5BYEf+qraGTQHEolUYjrYB4M=
- *3.projectlocker.com - lcvSdRfw4/kcI1upIH5Gw1IFN23mo2GxFqfzW8Zl73I=
- *5.projectlocker.com - AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBJIg8gbOqqvoUT4d8Emge24wEiJcgOn5BR+sl9zWw46cewG6RKDAEAIZ8pWbpYu5BYEf+qraGTQHEolUYjrYB4M=
- *6.projectlocker.com - AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBJIg8gbOqqvoUT4d8Emge24wEiJcgOn5BR+sl9zWw46cewG6RKDAEAIZ8pWbpYu5BYEf+qraGTQHEolUYjrYB4M=
- *7.projectlocker.com - lcvSdRfw4/kcI1upIH5Gw1IFN23mo2GxFqfzW8Zl73I=
- *8.projectlocker.com - AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBJIg8gbOqqvoUT4d8Emge24wEiJcgOn5BR+sl9zWw46cewG6RKDAEAIZ8pWbpYu5BYEf+qraGTQHEolUYjrYB4M=
Here is the SSL certificate fingerprint. If you are connecting via HTTPS and are asked to verify a fingerprint, here's the one you can use for all servers.
SSL Certificate Fingerprint
5A:19:03:8B:9F:8D:3C:BF:C8:41:D8:80:30:EF:01:BF:73:28:33:1F
You can obtain the fingerprint for a specific host you've already connected to by running the command against your known_hosts file (usually at ~/.ssh/known_hosts):
ssh-keygen -l -f ~/.ssh/known_hosts -F [host name]
However, SSH will notify you if a fingerprint changes, which should be a rare event and correspond to an announced maintenance window on our blog.