Hello,
When running PVE 9, it generates an rsa key, and automatically add it to the authorized_keys.
Is there a way to prevent it from generating **RSA** keys, and use ed25519 keys ?
1. I don't see any reason to generate a key, and add it to the authorized_keys while not running a cluster
2. For cluster mode, we should be able to use ed25519 instead of RSA.
Deleting the RSA keys, creating manually the ec25519 and adding it to the authorized_keys...
* properly allow a ssh localhost to work
* restarting pveproxy would still regenerate an RSA key and add it to the authorized keys.
When running PVE 9, it generates an rsa key, and automatically add it to the authorized_keys.
Is there a way to prevent it from generating **RSA** keys, and use ed25519 keys ?
1. I don't see any reason to generate a key, and add it to the authorized_keys while not running a cluster
2. For cluster mode, we should be able to use ed25519 instead of RSA.
Deleting the RSA keys, creating manually the ec25519 and adding it to the authorized_keys...
* properly allow a ssh localhost to work
* restarting pveproxy would still regenerate an RSA key and add it to the authorized keys.