Replies: 2 comments 6 replies
-
Hi @danb35, One workflow for this would be to use ACME plus an X5C provisioner. If you don't want to use ACME, you could alternatively inject a short-lived X509 identity cert into the VM when it's created (which serves as a kind of identity document), and then use X5C to get your SSH host certificate. For this approach you'd want to make sure the X5C provisioner only issues SSH host certificates with the same subjects as are shown in the X5C cert. A third, and perhaps the simplest, option would be to generate and inject a CA token into the VM on launch, and use the CA token to get an SSH host certificate (via Does this help? Carl BTW does Proxmox have any built-in features that's equivalent to an IID? It could be an interesting future integration, if so! |
Beta Was this translation helpful? Give feedback.
-
Another related discussion (though using vSphere rather than Proxmox) is at #446 . |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I have a Proxmox cluster at home, with a number of templates to make it easy to spin up a VM in moments in a standard configuration. But one thing those templates don't do is obtain a SSH host cert, so that when I ssh to the new VM, I get the dreaded key mismatch error. Consequently, my
known_hosts
file, which had shrunk significantly once I started using SSH host certificates, is growing again.So the question is how to set up these templates in such a way that they obtain a SSH host cert (ideally for both the hostname and IP address) on first boot. I saw the piece on IIDs (https://smallstep.com/blog/embarrassingly-easy-certificates-on-aws-azure-gcp/), but I don't see any indication that Proxmox VE has anything comparable. What would be a good way to go about this?
Beta Was this translation helpful? Give feedback.
All reactions