minor fixes
This commit is contained in:
parent
45969bfbf1
commit
eca1e5481d
|
@ -1,4 +1,4 @@
|
||||||
# PGP Key Provisioning
|
# Quorum PGP Key Provisioning
|
||||||
|
|
||||||
## Requirements
|
## Requirements
|
||||||
|
|
||||||
|
@ -16,9 +16,9 @@
|
||||||
|
|
||||||
* For each new key to be provisioned:
|
* For each new key to be provisioned:
|
||||||
|
|
||||||
* 2 new smart cards
|
* 2+ new smart cards
|
||||||
|
|
||||||
* 2 new SD cards
|
* 2+ new SD cards
|
||||||
|
|
||||||
## Procedure
|
## Procedure
|
||||||
|
|
||||||
|
|
|
@ -26,7 +26,7 @@ The proposer must combine these values into a single message, which can be a sim
|
||||||
|
|
||||||
## Procedure
|
## Procedure
|
||||||
|
|
||||||
1. Define a new file `workflow_inputs_<num>.json`, for example `workflow_inputs_1.json`
|
1. Define a new file `workflow_payload_<num>.json`, for example `workflow_payload_1.json`
|
||||||
|
|
||||||
1. Create a new directory in the `ceremonies` repository for the date on which the ceremony for the transaction will take place if it doesn't already exist, for example `2024-01-01/`
|
1. Create a new directory in the `ceremonies` repository for the date on which the ceremony for the transaction will take place if it doesn't already exist, for example `2024-01-01/`
|
||||||
|
|
||||||
|
|
|
@ -8,8 +8,6 @@
|
||||||
|
|
||||||
* Air-gapped computer
|
* Air-gapped computer
|
||||||
|
|
||||||
* Ceremony SD Card
|
|
||||||
|
|
||||||
## Procedure
|
## Procedure
|
||||||
|
|
||||||
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing}}
|
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing}}
|
||||||
|
|
|
@ -33,7 +33,3 @@ Only used in ceremonies for decrypting shardfile material.
|
||||||
* MUST not be transferred in level 4
|
* MUST not be transferred in level 4
|
||||||
|
|
||||||
* MAY be transferred in levels 1-3
|
* MAY be transferred in levels 1-3
|
||||||
|
|
||||||
## Namespace Key
|
|
||||||
|
|
||||||
- [ ] TODO define
|
|
|
@ -14,6 +14,14 @@ Individuals who are selected for the roles:
|
||||||
|
|
||||||
* MUST be reinvestigated once a year to ensure they meet necessary standards to access restricted information
|
* MUST be reinvestigated once a year to ensure they meet necessary standards to access restricted information
|
||||||
|
|
||||||
|
## Provisioner
|
||||||
|
|
||||||
|
Responsible for more technical aspects of preparing equipment for ceremonies such as creating air-gapped machines by removing radio cards, and tamper proofing them along with SD cards which are loaded with AirgapOS etc.
|
||||||
|
|
||||||
|
## Procurer
|
||||||
|
|
||||||
|
Responsible for tasks such as procuring a location, tamper proofing equipment, hardware, and maintaining inventory.
|
||||||
|
|
||||||
## Proposer
|
## Proposer
|
||||||
|
|
||||||
This is an individual who is a business owner or stakeholder, or a financial controller. Their role is to make fiduciary decisions which protect the financial interest of the organization and its clients. Their role is specifically to propose the movement of funds, specifying the amount, origin and destination.
|
This is an individual who is a business owner or stakeholder, or a financial controller. Their role is to make fiduciary decisions which protect the financial interest of the organization and its clients. Their role is specifically to propose the movement of funds, specifying the amount, origin and destination.
|
||||||
|
|
|
@ -26,19 +26,17 @@ of their security properties
|
||||||
* Creating custom purpose specific tooling which eliminates dependencies in
|
* Creating custom purpose specific tooling which eliminates dependencies in
|
||||||
order to reduce supply chain attacks, and adds desirable security properties
|
order to reduce supply chain attacks, and adds desirable security properties
|
||||||
|
|
||||||
* Using a fully bootstrapped and deterministically built compiler for building
|
* Building as much of the software and firmware deterministically as possible - aiming for 100%
|
||||||
all software that's used
|
|
||||||
|
|
||||||
* Building all of the software and firmware deterministically
|
* The [StageX](https://codeberg.org/stagex/stagex) project is the effort towards this end
|
||||||
|
|
||||||
* Using computers which either have a hard switch for disabling networking or
|
* Using computers which either have a hard switch for disabling networking or which had radio networking cards (bluetooth, wifi etc.) removed
|
||||||
which had radio networking cards (bluetooth, wifi etc.) removed
|
|
||||||
|
|
||||||
* Leveraging smart cards (personal HSMs) to protect cryptographic material
|
* Leveraging smart cards (personal HSMs) to protect cryptographic material
|
||||||
|
|
||||||
* Leveraging sharding in order to physically separate cryptographic material
|
* Leveraging cryptographic sharding in order to decentralize risk and physically separate cryptographic material
|
||||||
|
|
||||||
* Leveraging tamper evident controls for components related to the system
|
* Leveraging tamper evident controls for equipment
|
||||||
|
|
||||||
* Leveraging frequency blocking methods such as TEMPEST (Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions) and soundproofing
|
* Leveraging frequency blocking methods such as TEMPEST (Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions) and soundproofing
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue