# Namespace Entropy Ceremony This is a ceremony for generating and sharding entropy to a set of existing Quorum Keys. ## Requirements {{ #include ../../operator-requirements.md:requirements }} * [SD Card Pack](../procurer/procure-sd-card-pack.md) * [Ceremony SD Card](../operator/ceremony-sd-card-provisioning.md) * [High Visibility Storage](TODO): plastic container or bag that's used to keep items while not in use in a visible location like the middle of a desk. ## Procedure {{ #include template-ceremony-setup.md:content }} 1. Plug the Ceremony SD card into the machine 1. Run the command to generate new entropy and shard it to quorum of public certificates of the input shardfile: * Replace the values: , * `keyfork wizard generate-shard-secret --shard-to shardfile.asc --output shardfile.new.asc --cert-output keyring.new.asc` * TODO - NOT IMPLEMENTED: `--derive-openpgp-cert encryption_cert.new.asc,userid=` 1. Unseal an SD card pack {{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-unsealing}} 1. Place all unsealed SD cards into High Visibility Storage 1. Plug in the Ceremony SD card 1. Back up the `shardfile.asc` * `cp shardfile.asc /media/vaults//` 1. Back up the `keyring.asc` * `cp keyring.asc /media/vaults//` 1. TODO - NOT IMPLEMENTED: * Back up the root OpenPGP certificate * `cp encryption_cert.asc /media/vaults//` 1. Copy the contents of Ceremony SD card to machine * `cp -r /media/vaults /root/` 1. To create additional backups of the updated `vaults` repository, plug in SD cards one at a time and use following steps to back up ceremony artifacts 1. Plug in fresh SD card 1. `cp -r /root/vaults /media/` 1. Unplug the SD card 1. Label the SD card "Ceremony [date]" 1. Place the SD caard in High Visibility Storage 1. Power down the air-gapped machine 1. Transfer the ceremony artifacts to an online machine using one of the SD cards and commit the changes made to the `vaults` repository that's on the Ceremony SD card {{ #include ../../../../component-documents/git-basics.md:content }} 1. Gather all the original items that were in the air-gapped bundle: * Air-gapped computer * AirgapOS SD card {{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing}}