feat: clean up Level 1
This commit is contained in:
parent
05af9cb4a8
commit
593002160a
|
@ -24,6 +24,10 @@
|
||||||
|
|
||||||
1. {{ #include finding-device-name.md:content }}
|
1. {{ #include finding-device-name.md:content }}
|
||||||
|
|
||||||
|
1. Hash the .iso file and make note of it (it will be required later)
|
||||||
|
|
||||||
|
* `sha256sum out/airgap.iso`
|
||||||
|
|
||||||
1. Flash `airgap.iso` to an SD Card:
|
1. Flash `airgap.iso` to an SD Card:
|
||||||
|
|
||||||
* `dd if=out/airgap.iso of=/dev/<device_name> bs=4M conv=fsync`
|
* `dd if=out/airgap.iso of=/dev/<device_name> bs=4M conv=fsync`
|
||||||
|
@ -48,6 +52,16 @@
|
||||||
|
|
||||||
* `echo "42" | dd of=/dev/<device_name>`
|
* `echo "42" | dd of=/dev/<device_name>`
|
||||||
|
|
||||||
|
1. Verify the contents on the SD card match the recorded hash
|
||||||
|
|
||||||
|
* Build AirgapOS once more according to the [readme](https://git.distrust.co/public/airgap) in the repository.
|
||||||
|
|
||||||
|
* Ensure it's the same version as in the previous step
|
||||||
|
|
||||||
|
* `head -c $(stat -c '%s' out/airgap.iso) /dev/<device_name> | sha256sum`
|
||||||
|
|
||||||
|
* Additionally, the user can refer to the [StageX](https://codeberg.org/stagex/stagex) hashes of AirgapOS for a given version
|
||||||
|
|
||||||
{{ #include tamper-evidence-methods.md:vsbwf-procedure-sealing }}
|
{{ #include tamper-evidence-methods.md:vsbwf-procedure-sealing }}
|
||||||
// ANCHOR_END: procedure
|
// ANCHOR_END: procedure
|
||||||
/* ANCHOR_END: all */
|
/* ANCHOR_END: all */
|
||||||
|
|
|
@ -19,7 +19,7 @@
|
||||||
$ export KEYFORK_OPENPGP_EXPIRE=2y
|
$ export KEYFORK_OPENPGP_EXPIRE=2y
|
||||||
```
|
```
|
||||||
|
|
||||||
1. Generate a mnemonic, encrypting to a newly-generated key:
|
1. Generate a mnemonic, and shard (encrypt) it to the newly-generated key:
|
||||||
|
|
||||||
Ensure the User ID is your name and your email.
|
Ensure the User ID is your name and your email.
|
||||||
|
|
||||||
|
@ -33,6 +33,17 @@
|
||||||
|
|
||||||
Note: The PIN can't use sequential numbers, characters or repeated patterns.
|
Note: The PIN can't use sequential numbers, characters or repeated patterns.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
Alternatively, if the user wants to see the mnemonic, and encrypt it in a
|
||||||
|
different manner, the `--encrypt-to-self encrypted.asc` portion of the
|
||||||
|
command can be ommited and the command piped into a file by appending
|
||||||
|
`> mnemonic.txt` to the end of the command.
|
||||||
|
|
||||||
|
```
|
||||||
|
$ keyfork mnemonic generate --provision openpgp-card --derive='openpgp --public "Your Name <your@email.co>"' > mnemonic.txt
|
||||||
|
```
|
||||||
|
|
||||||
// ANCHOR_END: steps-keyfork
|
// ANCHOR_END: steps-keyfork
|
||||||
|
|
||||||
## Generating Keys on Smartcard
|
## Generating Keys on Smartcard
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
/* ANCHOR: all */
|
/* ANCHOR: all */
|
||||||
# Vaults Repository
|
# Vaults Repository
|
||||||
|
|
||||||
// ANCHOR: content
|
// ANCHOR: data
|
||||||
This repository holds data pertaining to vaults. The primary data consists of:
|
This repository holds data pertaining to vaults. The primary data consists of:
|
||||||
|
|
||||||
* Operation proposals
|
* Operation proposals
|
||||||
|
@ -19,7 +19,9 @@ This repository holds data pertaining to vaults. The primary data consists of:
|
||||||
* Policies (such as spending rules)
|
* Policies (such as spending rules)
|
||||||
|
|
||||||
* Ceremony logs
|
* Ceremony logs
|
||||||
|
// ANCHOR_END: data
|
||||||
|
|
||||||
|
// ANCHOR: content
|
||||||
## Directives
|
## Directives
|
||||||
|
|
||||||
* MUST be a private repository
|
* MUST be a private repository
|
||||||
|
|
|
@ -1,3 +1,11 @@
|
||||||
# Provision Trove Git Repository
|
# Provision Trove Git Repository
|
||||||
|
|
||||||
|
This repository is meant for storing data pertaining to vaults. The primary data consists of:
|
||||||
|
|
||||||
|
* Shardfiles
|
||||||
|
|
||||||
|
* Blockchain metadata (addresses, nonces etc.)
|
||||||
|
|
||||||
|
* Ceremony logs
|
||||||
|
|
||||||
{{ #include ../../component-documents/vaults-repository.md:content }}
|
{{ #include ../../component-documents/vaults-repository.md:content }}
|
||||||
|
|
|
@ -24,5 +24,12 @@ This step does two things:
|
||||||
|
|
||||||
{{ #include ../../component-documents/openpgp-setup.md:steps-keyfork}}
|
{{ #include ../../component-documents/openpgp-setup.md:steps-keyfork}}
|
||||||
|
|
||||||
|
1. Plug in fresh SD card and save data you wish to store (encrypted.asc,
|
||||||
|
<key_id>.asc, mnenmonic.txt.asc, mnemonic.txt etc.)
|
||||||
|
|
||||||
|
* WARNING: If you store your mnemonic in plaintext, if someone gains access
|
||||||
|
to it, your Trove system will be fully compromised.
|
||||||
|
|
||||||
1. Power down AirgapOS Laptop
|
1. Power down AirgapOS Laptop
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -4,28 +4,9 @@ If performing multiple provisioning steps, you may skip the tamper proofing step
|
||||||
as long as you retain continued supervision of the hardware.
|
as long as you retain continued supervision of the hardware.
|
||||||
|
|
||||||
1. If tamper proofed, unseal tamper proofed equipment
|
1. If tamper proofed, unseal tamper proofed equipment
|
||||||
|
{{ #include ../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-unsealing }}
|
||||||
<details>
|
|
||||||
<summary>Vacuum sealing based tamper proofing</summary>
|
|
||||||
{{ #include ../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-unsealing }}
|
|
||||||
</details>
|
|
||||||
|
|
||||||
<details>
|
|
||||||
<summary>Safe based tamper proofing</summary>
|
|
||||||
{{ #include ../../component-documents/tamper-evidence-methods.md:safe-unsealing }}
|
|
||||||
</details>
|
|
||||||
|
|
||||||
1. Remove all radio cards, storage drive, speakers, and microphone using standard industry laptop repair tactics
|
1. Remove all radio cards, storage drive, speakers, and microphone using standard industry laptop repair tactics
|
||||||
|
|
||||||
1. Re-apply tamper proofing
|
1. Re-apply tamper proofing
|
||||||
|
{{ #include ../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing }}
|
||||||
<details>
|
|
||||||
<summary>Vacuum sealing based tamper proofing</summary>
|
|
||||||
{{ #include ../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing }}
|
|
||||||
</details>
|
|
||||||
|
|
||||||
<details>
|
|
||||||
<summary>Safe based tamper proofing</summary>
|
|
||||||
{{ #include ../../component-documents/tamper-evidence-methods.md:safe-sealing }}
|
|
||||||
</details>
|
|
||||||
|
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
# Provision Trove Git Repository
|
# Provision Trove Git Repository
|
||||||
|
|
||||||
|
{{ #include ../../../../component-documents/vaults-repository.md:data }}
|
||||||
{{ #include ../../../../component-documents/vaults-repository.md:content }}
|
{{ #include ../../../../component-documents/vaults-repository.md:content }}
|
||||||
|
|
|
@ -1,3 +0,0 @@
|
||||||
# Provision Ceremony Repository
|
|
||||||
|
|
||||||
{{ #include ../../../../component-documents/vaults-repository.md:content }}
|
|
|
@ -65,7 +65,8 @@ To achieve the best level of randomness and difficulty of reproducing the arrang
|
||||||
|
|
||||||
### Safes
|
### Safes
|
||||||
// ANCHOR:safes
|
// ANCHOR:safes
|
||||||
Select an appropriate safe, ideally with a high TL rating.
|
Select an appropriate safe, ideally with a high TL rating and a highest tamper
|
||||||
|
evident lock your budget supports (e.g FF-L-2740b).
|
||||||
|
|
||||||
| Rating | Time (Minutes) | Tested Against | Tested Sides |
|
| Rating | Time (Minutes) | Tested Against | Tested Sides |
|
||||||
|---------------|----------------|---------------------|--------------|
|
|---------------|----------------|---------------------|--------------|
|
||||||
|
|
Loading…
Reference in New Issue