This is presumably - you may wish to confirm - you attempting access SSH of one node via GUI access to another.
Your ssh configs get corrupted by running
pvecm updatecerts
, which is undocumented (in general docs) but since filed as a bug:
https://bugzilla.proxmox.com/show_bug.cgi?id=4886
If you also ran
ssh-keygen -f
as advised that is another bug which makes it even worse (for the node which you run it on):
https://bugzilla.proxmox.com/show_bug.cgi?id=4252
From the reactions of staff, you may notice the plan is to move over everything possible to SSL (although NoVNC access accross will be interesting). It affects mostly migrations and replications and anything SSH-related which is as of now also undocumented.
If you don't have own SSH keys there you need in the nodes, you may as well follow advice from:
https://forum.proxmox.com/threads/pvecm-updatecert-f-not-working.135812/page-2#post-604699
If you do have own keys you'd best back them up and append them to the
/etc/pve/priv/known_hosts
(from any single node, it's a shared location). If you end up having even duplicates (old and new alike) it is actually not a problem, SSH would accept any matching found key from any file it goes through, this is often resulting in going on
tangents looking for duplicates, which are not a problem, problem is the
pvecm updacerts
corrupting (removing) your fresh keys, but retaining the old ones. If it had correctly removed all the keys for the node, it would simply ask you if you want to accept the new one.
If you want to push this further, you are advised to propose a patch yourself, but
SSH certificates are deemed too risky for upgrades across PVE versions to be taken in, so it won't be accepted. You may wish to just DIY, e.g. see [1] below and you will never have to worry about the broken implementation again, just add it manually once to any joining node at the time of joining. Note you are best to use a modern
Ed25519 keys, which may also avoid
pvecm updatecerts
corrupting your files as it ignores anything but RSA (or rather includes non-RSA ones as-is). If you have many existing keys, you may wish to have a look at [2], note unlike the author there I would refrain from commenting on 2048bit RSA keys (that PVE uses) being too weak, as you are not supposed to have PVE exposed to any public access anyhow.
If any of this resolved your issues, you may want to mark this thread as
solved for others to find looking to fix the same. You may not get much support from staff, as the code is very old and they are aspiring to move on rather than dig back in. The person who had replied to you is the CTO (I did not know before either), so no one would hijack it further.
[1] If you’re not using SSH certificates you’re doing SSH wrong
https://smallstep.com/blog/use-ssh-certificates/
[2] Upgrade Your SSH Key to Ed25519
https://medium.com/risan/upgrade-your-ssh-key-to-ed25519-c6e8d60d3c54