SSH Host Key Fingerprints

Fingerprints last updated: 2026-05-10

OpenCommit supports multiple SSH host key algorithms. When connecting for the first time, your SSH client will ask you to verify the server’s fingerprint.

Compare it against the values below before accepting.

AlgorithmBitsFingerprint
ED25519 *)256SHA256:4Wrv0Q0gJL4eBXT1HD3tO06OBOpzRfeRK1di5f0eKE8
ECDSA256SHA256:VNxFvF4zfPcWzJD81BK2jwMEDpC+DWv3PmvZ/3VhcA4
RSA4096SHA256:XlsftfyASOW1F9hGwmGcgy8j0skZVs1JZXXmJ+M6Cek

*) recommended algorithm

If the fingerprint does not match, do not accept the connection.
This may indicate a misconfiguration or a man-in-the-middle attack. Please open an issue.

Why verify?#

Verification ensures you are talking directly to the OpenCommit infrastructure and not an impostor. Once accepted, your SSH client will store these keys and alert you if they ever change unexpectedly.

Looking for SSH key setup instructions?
See the Connecting via SSH guide to configure your own keys.