We publish SSHFP records for our SSH servers that should automate validating the keys, but if you need or want to check them, the current keys are:
ssh.nyc1.nearlyfreespeech.net
- Ed25519 (256 bit)
- SHA256: etjM+pc9ujAYv0M7gTAiLUHdZe0nAxlEQ2PRIdEjvRE
- SHA1: XO+J7hJ4V4e+zVpBz+0wu4LHPFg
- ECDSA (256 bit)
- SHA256: xrzTydrj/Zy5Q4fMdP9wuG0r6yNsiZMpUAVSk4RVdvw
- SHA1: BUCA+eGPJg9732Po81bw9qWoAbc
- RSA (4096 bit)
- SHA256: 0dJWfqf2P7gyPJbrNEpffWJPggXvSiKZUjmWvFFMXV0
- SHA1: HqJG7/hWJWcOMpMMDz1TiW69hEk
ssh-verify.nearlyfreespeech.net (Only used during login recovery!)
- Ed25519 (256 bit)
- SHA256: oV0EgXiRE5Mk6w0EHqRMY+klKNDwM3JDlpef8M9MYJQ
- SHA1: 7Y3AVCKi1CgBgINuGO5ie5JWOnE
- ECDSA (256 bit)
- SHA256: pY8uya1HVFk4toRu607j1lTgLpC6MtCQHhZ0Y5bA6m4
- SHA1: gFiW3jvBH/ZWV2j0YYCKukKS6o0
- RSA (4096 bit)
- SHA256: bpFOSA2/LFoFfHyCnHwFQJScXEcxjlSDApcP16k8WdY
- SHA1: DMXdWlnQgsgX9I4F1zc6OindAho
If your client is giving you key fingerprints in MD5 format, check your settings (e.g., FingerprintHash sha256) or update your ssh client.