We publish SSHFP records for our SSH servers that should automate validating the keys, but if you need or want to check them, the current keys are:
ssh.nyc1.nearlyfreespeech.net
- Ed25519 (256 bit)
- SHA256: etjM+pc9ujAYv0M7gTAiLUHdZe0nAxlEQ2PRIdEjvRE
- SHA1: XO+J7hJ4V4e+zVpBz+0wu4LHPFg
- ECDSA (256 bit)
- SHA256: xrzTydrj/Zy5Q4fMdP9wuG0r6yNsiZMpUAVSk4RVdvw
- SHA1: BUCA+eGPJg9732Po81bw9qWoAbc
- RSA (4096 bit)
- SHA256: 0dJWfqf2P7gyPJbrNEpffWJPggXvSiKZUjmWvFFMXV0
- SHA1: HqJG7/hWJWcOMpMMDz1TiW69hEk
ssh.phx.nearlyfreespeech.net (Currently inactive)
- Ed25519 (256 bit)
- SHA256: 52JfRUFuT6UWh9jfWYnLensuRn9no6ucwM3ekbjyPFc
- SHA1: +jDA6wignc8EqEBfkN2a8JYn7aA
- ECDSA (256 bit)
- SHA256: a+Ny0PLkKhm80+5kqzqfVXIlbkQpn/CpMMrzurd8sDI
- SHA1: HdoGYbf3aAKAwcFDmxNGkiX5Edk
- RSA (4096 bit)
- SHA256: 7WCr3k7tjnbA2OhynZ0k7SP6r1bUdeoP8VPdFRURaSg
- SHA1: f+FVYHE2wjq3i5Y+wU4lFrtGuxM
If your client is giving you key fingerprints in MD5 format, check your settings (e.g., FingerprintHash sha256) or update your ssh client.