2.0 KiB
Namespace Entropy Ceremony
This is a ceremony for generating and sharding entropy to a set of existing Quorum Keys.
Requirements
{{ #include ../../operator-requirements.md:requirements }}
-
Minimum of 2 fresh SD cards
-
High Visibility Storage: plastic container or bag that's used to keep items while not in use in a visible location like the middle of a desk.
Procedure
-
Enter the designated location with the 2 operators and all required equipment
-
Lock access to the location - there should be no inflow or outflow of people during the ceremony
-
Retrieve Air-Gapped Bundle from locked storage
Unsealing Tamper Proofing
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-unsealing}}
- Place all materials except for the laptop into High Visibility Storage
Generating Entropy
-
Retrieve AirgapOS SD card from High Visibility Storage and plug it into air-gapped laptop
-
Turn on the machine
-
Once booted, remove the AirgapOS SD card and place it into High Visibility Storage
-
Plug in the Ceremony SD card
-
Run
ceremony.sh
from the SD card -
Button mash to ensure adequate entropy on the OS
-
Back up the
shardfile
to any desired number of SD cards, and label each "Shardfile [date]" -
Optionally write an
autorun.sh
file to the Shardfile SD card containing the following command:keyfork recover shard --daemon
-
If an OpenPGP certificate was derived, store the public key on a SD card, separate from the shardfiles
Finalizing Ceremony
-
Gather all the original items that were in the air-gapped bundle:
-
Air-gapped computer
-
AirgapOS SD card
-
Shardfile SD card
-
Ceremony SD card
-
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing}}