From 807e300d152a239f5065f5617da15c6518f9805b Mon Sep 17 00:00:00 2001 From: Anton Livaja Date: Wed, 29 Jan 2025 05:46:30 -0500 Subject: [PATCH] adjust pgp generate and back up names --- .../operator/namespace-entropy-ceremony.md | 12 +++++++----- .../operator/quorum-entropy-ceremony.md | 12 ++++++++---- 2 files changed, 15 insertions(+), 9 deletions(-) diff --git a/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/namespace-entropy-ceremony.md b/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/namespace-entropy-ceremony.md index 13e02da..d1d99ae 100644 --- a/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/namespace-entropy-ceremony.md +++ b/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/namespace-entropy-ceremony.md @@ -32,9 +32,9 @@ This is a ceremony for generating and sharding entropy to a set of existing Quor 1. Run the command to generate new entropy and shard it to quorum of public certificates of the input shardfile: - * Replace the values: , , , + * Replace the values: , - * `keyfork mnemonic generate --size 256 --shard-to ,output= --output-cert --user-id ` + * `keyfork mnemonic generate --size 256 --shard-to ,output=output_shardfile.asc --output-cert root_pgp_cert.asc --user-id ` 1. Unseal an SD card pack @@ -42,13 +42,15 @@ This is a ceremony for generating and sharding entropy to a set of existing Quor 1. Place all unsealed SD cards into High Visibility Storage -1. Back up the `` to any desired number of SD cards, and label each "Shardfile [unique_name] [date]" +1. Back up the `output_shardfile.asc` to any desired number of SD cards, and label each "Shardfile [unique_name] [date]" 1. `lsblk` to find media name - 1. `cp /media/` + 1. Back up the output shardfile: + * `cp output_shardfile.asc /media//output_shardfile.asc` - 1. `cp /media/cert.asc` + 1. Back up the root PGP certificate: + * `cp root_pgp_cert.asc /media/root_pgp_cert.asc` 1. Each backup should be placed into High Visibility Storage after it's made diff --git a/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/quorum-entropy-ceremony.md b/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/quorum-entropy-ceremony.md index c746de1..9d09950 100644 --- a/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/quorum-entropy-ceremony.md +++ b/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/quorum-entropy-ceremony.md @@ -32,9 +32,9 @@ This is a ceremony for generating entropy which is used to derive Quorum PGP key 1. Run the relevant keyfork wizard to perform the ceremony: - * Replace the following values: , , , , + * Replace the following values: , , , - * `keyfork wizard generate-shard-secret --threshold --max --keys-per-shard= --output shardfile.asc --cert-output keyring.asc --output-cert --user-id ` + * `keyfork wizard generate-shard-secret --threshold --max --keys-per-shard= --output shardfile.asc --cert-output keyring.asc --output-cert root_pgp_cert.asc --user-id ` 1. Unseal an SD card pack @@ -46,13 +46,17 @@ This is a ceremony for generating entropy which is used to derive Quorum PGP key 1. Find media name using `lsblk` + 1. Back up the root OpenPGP certificate + + * `cp root_pgp_cert.asc /media//root_pgp_cert.asc` + 1. Back up the `shardfile.asc` - * `cp shardfile.asc /media/` + * `cp shardfile.asc /media//shardfile.asc` 1. Back up the `keyring.asc` - * `cp keyring.asc /media/` + * `cp keyring.asc /media//keyring.asc`