From 536eae449315c9b1b086bd8aa1fbf20527dd84e5 Mon Sep 17 00:00:00 2001 From: Anton Livaja Date: Wed, 29 Jan 2025 05:38:31 -0500 Subject: [PATCH 1/4] add instructions for generating encryption keys --- .../fixed-location/operator/namespace-entropy-ceremony.md | 6 +++++- .../fixed-location/operator/quorum-entropy-ceremony.md | 4 +++- .../generated-documents/level-2/operator-requirements.md | 1 - 3 files changed, 8 insertions(+), 3 deletions(-) diff --git a/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/namespace-entropy-ceremony.md b/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/namespace-entropy-ceremony.md index 7782035..13e02da 100644 --- a/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/namespace-entropy-ceremony.md +++ b/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/namespace-entropy-ceremony.md @@ -32,7 +32,9 @@ This is a ceremony for generating and sharding entropy to a set of existing Quor 1. Run the command to generate new entropy and shard it to quorum of public certificates of the input shardfile: - * `keyfork mnemonic generate --size 256 --shard-to ,output=` + * Replace the values: , , , + + * `keyfork mnemonic generate --size 256 --shard-to ,output= --output-cert --user-id ` 1. Unseal an SD card pack @@ -46,6 +48,8 @@ This is a ceremony for generating and sharding entropy to a set of existing Quor 1. `cp /media/` + 1. `cp /media/cert.asc` + 1. Each backup should be placed into High Visibility Storage after it's made + 1. Label the SD card "Shardfile [date] [namespace]" -1. Unplug the SD card and place it in High Visibility Storage - -1. Label the SD card "Shardfile \[date\] \[namespace\]" +1. Upload the newly generated artifacts into the ceremonies repository 1. Gather all the original items that were in the air-gapped bundle: @@ -71,3 +71,4 @@ This is a ceremony for generating and sharding entropy to a set of existing Quor * AirgapOS SD card {{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing}} + diff --git a/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/quorum-entropy-ceremony.md b/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/quorum-entropy-ceremony.md index d8828b0..889c66f 100644 --- a/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/quorum-entropy-ceremony.md +++ b/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/quorum-entropy-ceremony.md @@ -34,7 +34,9 @@ This is a ceremony for generating entropy which is used to derive Quorum PGP key * Replace the following values: , , , - * `keyfork wizard generate-shard-secret --threshold --max --keys-per-shard= --output shardfile.asc --cert-output keyring.asc --output-cert root_pgp_cert.asc --user-id ` + + * `keyfork wizard generate-shard-secret --threshold --max --keys-per-shard= --output shardfile.asc --cert-output keyring.asc --derive-openpgp-cert encryption_cert.asc,userid=` TODO: NOT IMPLEMENTED + 1. Unseal an SD card pack @@ -48,7 +50,7 @@ This is a ceremony for generating entropy which is used to derive Quorum PGP key 1. Back up the root OpenPGP certificate - * `cp root_pgp_cert.asc /media//` + * `cp encryption_cert.asc /media//` 1. Back up the `shardfile.asc` @@ -58,16 +60,12 @@ This is a ceremony for generating entropy which is used to derive Quorum PGP key * `cp keyring.asc /media//` - - 1. Unplug the SD card and place it in High Visibility Storage 1. Label the SD card "Shardfile [date]" +1. Upload the newly generated artifacts into the ceremonies repository + 1. Gather all the original items that were in the air-gapped bundle: * Air-gapped computer