We publish SSHFP records for our SSH servers that should automate validating the keys, but if you need or want to check them, the current keys are:
ssh.nyc1.nearlyfreespeech.net
- Ed25519
- SHA256: 4ckOOn5g9ONLZ4M4LJo5VD4KkWaTNTMweFG1uHALdiQ
- SHA1: J94RhbhbcuP3YmsYumIZxR67sW0
- ECDSA
- SHA256: LXAtpKd30Ooiom9Gr3RwN2h5fnSt67G1FpwkaXKUiWI
- SHA1: 7HUsWZuksYyozAWGJULt6MyRrQk
- RSA
- SHA256: Tqgduo3qxVYyjBpTMU1tEyqmXhaob631e9Yb1XWsnIA
- SHA1: RUFuJZmbDKcQ5A6+Hk+mXDkG2c4
ssh-verify.nearlyfreespeech.net (Only used during login recovery!)
- Ed25519
- SHA256: utxOHL0bVomfF5twrPCJGCnkhyeIYGyBk7IycC3f8xU
- SHA1: r7meZXopDo1fOGzp6sh4s3KxRT0
- ECDSA
- SHA256: n+hiltOccg9L3g3z3DCfQy95gZyPJNpG/ppyU+/Dtg8
- SHA1: 9sm339z3vdEFOM+jqAAa/ElYY+Y
- RSA
- SHA256: AcXGgQe1sW9NkzZwzIa+T6A8XwiLTXWj3cLcRZ5K33A
- SHA1: oClq3MNF11ESISPbjPgLnPJEjH0
If your client is giving you key fingerprints in MD5 format, check your settings (e.g., FingerprintHash sha256) or update your ssh client. SSH server keys were last updated on 2025-05-19.