Languages
[Edit]
EN

SSH - print locally used keys fingerprints (keys fingerprints for client computer)

8 points
Created by:
Efe-V
259

In this short article, we would like to show you, how to verify used locally SSH keys using ssh-keygen under Bash.

Note: the below examples use as default SHA-256 algorithm, to change it add -E md5 or -E sha1 parameter.

Squick solution (run one of the bellows commands):

ssh-keygen.exe -l -f ~/.ssh/known_hosts

# or one of the:

ssh-keygen.exe -l -f /home/my_user_directory/.ssh/known_hosts
ssh-keygen.exe -l -f /c/Users/my_user_directory/.ssh/known_hosts

Example output:

256 SHA256:XGGm1rGsHPem57Qp4t7vkcw6JOJrOaiCfdLBaMASGey github.com (ED25519)
256 SHA256:rk8GxMsKnFLTXd1VW57up4wQqqn5qbfDaIeO27ks3jv 192.168.1.70 (ED25519)
2048 SHA256:sihm43JhFtQ+p1XTUpsQfzt2v2ViJcEwGZpDf8Pslb5 192.168.1.70 (RSA)
256 SHA256:nwbsQERIVVgN3p2Rp+KF+SxLnECe+3bcDCsQvLwf/Ih 192.168.1.70 (ECDSA)

 

See also

  1. SSH - verify used local and server key fingerprints (Windows - Linux connection verification)

  2. Bash - print fingerprints for SSHD keys (md5, sha-1, sha-A256 fingerprints)

Native Advertising
🚀
Get your tech brand or product in front of software developers.
For more information Contact us
Dirask - we help you to
solve coding problems.
Ask question.

❤️💻 🙂

Join