Fingerprints last updated: 2026-05-10
OpenCommit supports multiple SSH host key algorithms. When connecting for the first time, your SSH client will ask you to verify the server’s fingerprint.
Compare it against the values below before accepting.
| Algorithm | Bits | Fingerprint |
|---|---|---|
| ED25519 *) | 256 | SHA256:4Wrv0Q0gJL4eBXT1HD3tO06OBOpzRfeRK1di5f0eKE8 |
| ECDSA | 256 | SHA256:VNxFvF4zfPcWzJD81BK2jwMEDpC+DWv3PmvZ/3VhcA4 |
| RSA | 4096 | SHA256:XlsftfyASOW1F9hGwmGcgy8j0skZVs1JZXXmJ+M6Cek |
*) recommended algorithm
If the fingerprint does not match, do not accept the connection.
This may indicate a misconfiguration or a man-in-the-middle attack. Please open an issue.
Why verify?#
Verification ensures you are talking directly to the OpenCommit infrastructure and not an impostor. Once accepted, your SSH client will store these keys and alert you if they ever change unexpectedly.
Looking for SSH key setup instructions?
See the Connecting via SSH guide to configure your own keys.