Bugzilla – Bug 1212020
openssh: Stop creating DSA host keys
Last modified: 2023-06-06 07:25:45 UTC
sshd has supported a number of public key algorithms to identify the host. DSA is one of the oldest and due to the key size nowadays considered plainly insecure, to the point that DSA user keys are disabled by default. There should be no need to create them by default as any client of the ssh2 protocol should support at least RSA with reasonable defaults. Note: I'm not asking about removing existing keys, just that they are no longer created.
https://build.opensuse.org/package/view_file/network/openssh/sshd-gen-keys-start?expand=1 > ssh-keygen -A