Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Host Key Storage Formats

When the host key is received during the first connection to a remote host (or when the host key has changed) and you choose to save the key, its filename is stored in hashed format, keys_hhh..., where hhh is a hash of the host port and name. The saved file contains a hash of the host's public key. A salt is included in the hash calculations. The value of the salt is stored in the file salt in the same directory as the host keys ($HOME/.ssh2/hostkeys on Unix, %APPDATA%\SSH\HostKeys on Windows). The hashed host key format is a security feature to make address harvesting on the hosts difficult.

In the plain (traditional) format, the name of a host key file includes the hosts's name and port, as in, and the file contains the host's public key in plaintext format.

The storage format can be controlled with the filename-format attribute of the known-hosts element of the ssh-broker-config.xml configuration file. The attribute value must be plain or hash (default). See known-hosts for details.

<known-hosts path="$HOME/.ssh2/hostkeys" filename-format="plain" />

If you are adding the keys manually, the keys should be named with the key_<port>_<host>.pub pattern, where <port> is the port the Secure Shell server is running on and <host> is the hostname you use when connecting to the server (for example,

If both the hashed and plaintext format keys exist, the hashed format takes precedence.

Note that the host identification is different based on the host name and port the client is connecting to. The hostname can occur in 3 different formats: fully qualified domain name (FQDN), short hostname, or IP address. The host key for each name format has to be saved separately, as they are not mutually exchangeable.

The host key is saved under the hostname format used in the login. For example, if you want to use all the hostname formats when connecting to a remote host named alpha, connect to the host first with the following commands and save the host key under all three names:

  • sshg3 user@alpha

    produces the key with the short hostname (in plain format

  • sshg3

    produces the key with FQDN (in plain format

  • sshg3 user@

    produces the key with IP-address (in plain format

Also if you need to connect to the same host but different port, your client needs a separate host key for that purpose; for example and

After the first connection, the locally stored information about the server public key will be used in server authentication.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more