integrate feedback
This commit is contained in:
parent
eca1e5481d
commit
3533f07b89
|
@ -31,9 +31,9 @@ ceremonies/
|
||||||
<date>/
|
<date>/
|
||||||
log.txt
|
log.txt
|
||||||
- [ ] TODO: write a layout for the log
|
- [ ] TODO: write a layout for the log
|
||||||
workflow_payloads/
|
payloads/
|
||||||
workflow_payload_<num>.json
|
payload_<num>.json
|
||||||
workflow_payload_<num>.json.sig
|
payload_<num>.json.sig
|
||||||
blockchain_metadata/
|
blockchain_metadata/
|
||||||
sol_nonce_address.txt
|
sol_nonce_address.txt
|
||||||
policies/
|
policies/
|
||||||
|
|
|
@ -14,9 +14,7 @@ The following steps must all be completed under the continued supervision and wi
|
||||||
|
|
||||||
1. Selecting a Purchase Location
|
1. Selecting a Purchase Location
|
||||||
|
|
||||||
* Select at least 4 stores which carry the type of equipment being purchased, then randomly select one using the roll of a die, or other random method. This is done in order to reduce the likelihood that an insider threat is able to plant a compromised computer in a store ahead of time.
|
* Select at multiple stores which carry the type of equipment being purchased, then randomly select one using the roll of a die, or other random method. This is done in order to reduce the likelihood that an insider threat is able to plant a compromised computer in a store ahead of time.
|
||||||
|
|
||||||
* Each participant should choose 2 of the stores.
|
|
||||||
|
|
||||||
1. Within the store, identify available adequate device
|
1. Within the store, identify available adequate device
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@
|
||||||
|
|
||||||
* [Personal PGP key pair](/key-types.md#personal-pgp-keypair)
|
* [Personal PGP key pair](/key-types.md#personal-pgp-keypair)
|
||||||
|
|
||||||
* Tamper-proofing equipment
|
* [Tamper-proofing equipment](/generated-documents/level-2/fixed-location/procurer/procure-tamper-proofing-equipment.html)
|
||||||
|
|
||||||
// ANCHOR_END: requirements
|
// ANCHOR_END: requirements
|
||||||
/* ANCHOR_END: all */
|
/* ANCHOR_END: all */
|
|
@ -18,9 +18,9 @@
|
||||||
|
|
||||||
1. Navigate to the ceremony repository for the ceremony being executed
|
1. Navigate to the ceremony repository for the ceremony being executed
|
||||||
|
|
||||||
1. Create a directory called `workflow-inputs` on the SD card
|
1. Create a directory called `payloads/` on the SD card
|
||||||
|
|
||||||
1. Copy all transaction workflow payloads from the appropriate dated directory found in `ceremonies/workflow-payloads/<date>` into the `workflow-payloads/` directory on the SD card
|
1. Copy all transaction workflow payloads from the appropriate dated directory found in `ceremonies/payloads/<date>` into the `payloads/` directory on the SD card
|
||||||
|
|
||||||
1. Copy the `shardfile.asc` from the ceremony repository onto the SD card
|
1. Copy the `shardfile.asc` from the ceremony repository onto the SD card
|
||||||
|
|
||||||
|
|
|
@ -4,9 +4,9 @@ The procurer is responsible for:
|
||||||
|
|
||||||
* Procuring equipment
|
* Procuring equipment
|
||||||
|
|
||||||
* Tamper proofing equipment
|
* [Tamper proofing equipment](procure-tamper-proofing-equipment.md)
|
||||||
|
|
||||||
* Hardware (computers, sd cards, sd card adapters, smart cards, cameras etc.)
|
* [Hardware](procure-hardware.md) (computers, sd cards, sd card adapters, smart cards, cameras etc.)
|
||||||
|
|
||||||
* Ensuring equipment is properly tamper proofed
|
* Ensuring equipment is properly tamper proofed
|
||||||
|
|
||||||
|
|
|
@ -18,7 +18,7 @@ The proposer must combine these values into a single message, which can be a sim
|
||||||
|
|
||||||
## Requirements
|
## Requirements
|
||||||
|
|
||||||
* If necessary, provision a PGP key pair to a smart card using the guide in the [Appendix: Generating PGP Keypair & Provisioning Smart Card](#generating-pgp-keypair--provisioning-smart-card)
|
* [Personal PGP Key](../operator/pgp-key-provisioning.md) or [On-Board PGP Key](../../../all-levels/provision-pgp-signing-keys-on-board-smart-card.md)
|
||||||
|
|
||||||
* Ensure that the computer is configured to sign commits with the desired key. Refer to the [Appendix: Git Commit Signing Configuration](#git-commit-signing-configuration)
|
* Ensure that the computer is configured to sign commits with the desired key. Refer to the [Appendix: Git Commit Signing Configuration](#git-commit-signing-configuration)
|
||||||
|
|
||||||
|
@ -26,7 +26,7 @@ The proposer must combine these values into a single message, which can be a sim
|
||||||
|
|
||||||
## Procedure
|
## Procedure
|
||||||
|
|
||||||
1. Define a new file `workflow_payload_<num>.json`, for example `workflow_payload_1.json`
|
1. Define a new file `payload_<num>.json`, for example `payload_1.json`
|
||||||
|
|
||||||
1. Create a new directory in the `ceremonies` repository for the date on which the ceremony for the transaction will take place if it doesn't already exist, for example `2024-01-01/`
|
1. Create a new directory in the `ceremonies` repository for the date on which the ceremony for the transaction will take place if it doesn't already exist, for example `2024-01-01/`
|
||||||
|
|
||||||
|
@ -63,7 +63,3 @@ The proposer must combine these values into a single message, which can be a sim
|
||||||
### Git Commit Signing Configuration
|
### Git Commit Signing Configuration
|
||||||
|
|
||||||
{{ #include ../../../../component-documents/git-commit-signing.md:steps }}
|
{{ #include ../../../../component-documents/git-commit-signing.md:steps }}
|
||||||
|
|
||||||
### Generating PGP Keypair & Provisioning Smart Card
|
|
||||||
|
|
||||||
{{ #include ../../../../component-documents/openpgp-setup.md:steps-keyfork }}
|
|
||||||
|
|
|
@ -14,6 +14,8 @@
|
||||||
|
|
||||||
1. Enter facility with required items and personnel and lock the facility
|
1. Enter facility with required items and personnel and lock the facility
|
||||||
|
|
||||||
|
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-unsealing }}
|
||||||
|
|
||||||
1. Follow a given model manual to remove all radio cards, storage drive, speakers, and microphone
|
1. Follow a given model manual to remove all radio cards, storage drive, speakers, and microphone
|
||||||
|
|
||||||
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing }}
|
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing }}
|
||||||
|
|
Loading…
Reference in New Issue