I have generated my own SSL certificate for a web server on the internet, however this was for three reasons:
- Fun
- Not wanting to buy an SSL certificate
- Trying to get an A rating (excluding trust issues) on SSL Labs SSL Test.
However, now that I've learnt a bit more about SSL (I am by no means an expert, novice at best) I understand that although the server has a certificate this does not circumvent the possibility of man in the middle attacks
I realise I could just create a new self signed certificate, but given that I have access to the server, and based on this question regarding fingerprints, I was wondering if it is possible to verify the certificate and key on the server I have against the fingerprint I receive in my browser?
Basically is it possible for me to view the fingerprint on the server and then compare it to the one received in browser?
CONCLUSION
Based on Maarten Bodewes answer, I ran the following using my .crt
file instead of a .pem
# openssl x509 -in mywebsite.com-selfsigned.crt -outform DER -out ~/mywebsite.com-selsigned.crt
calculated my sha1sum
# sha1sum mywebsite.com-selfsigned.crt
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX mywebsite.com-selfsigned.crt
And then checked my Sha1Fingerprint according to the answer provided by John Wu, and the two fingerprints are exactly the same. Perfect!