SSH - print locally used keys fingerprints (keys fingerprints for client computer)

8 points
Created by:

In this short article, we would like to show you, how to verify used locally SSH keys using ssh-keygen under Bash.

Note: the below examples use as default SHA-256 algorithm, to change it add -E md5 or -E sha1 parameter.

Squick solution (run one of the bellows commands):

ssh-keygen.exe -l -f ~/.ssh/known_hosts

# or one of the:

ssh-keygen.exe -l -f /home/my_user_directory/.ssh/known_hosts
ssh-keygen.exe -l -f /c/Users/my_user_directory/.ssh/known_hosts

Example output:

256 SHA256:XGGm1rGsHPem57Qp4t7vkcw6JOJrOaiCfdLBaMASGey (ED25519)
256 SHA256:rk8GxMsKnFLTXd1VW57up4wQqqn5qbfDaIeO27ks3jv (ED25519)
2048 SHA256:sihm43JhFtQ+p1XTUpsQfzt2v2ViJcEwGZpDf8Pslb5 (RSA)
256 SHA256:nwbsQERIVVgN3p2Rp+KF+SxLnECe+3bcDCsQvLwf/Ih (ECDSA)


See also

  1. SSH - verify used local and server key fingerprints (Windows - Linux connection verification)

  2. Bash - print fingerprints for SSHD keys (md5, sha-1, sha-A256 fingerprints)

Donate to Dirask
Our content is created by volunteers - like Wikipedia. If you think, the things we do are good, donate us. Thanks!
Join to our subscribers to be up to date with content, news and offers.
Native Advertising
Get your tech brand or product in front of software developers.
For more information Contact us
Dirask - we help you to
solve coding problems.
Ask question.

❤️💻 🙂