2.8 KiB
Approver - Approve Transaction
The approver is responsible for verifying a transaction proposed by a proposer.
Requirements
-
-
The approver should print photographic evidence from digital cameras which is stored in a PGP signed repository. The photographs should be of the top and underside of the vacuum sealed object.
-
The approver should verify the commit signatures of the photographs they are printing against a list of permitted PGP keys found in the "ceremonies" repo
-
-
Ensure that the computer is configured to sign commits with the desired key. Refer to the Appendix: Git Commit Signing Configuration
-
Clone the Ceremonies Repository for your organization to the machine
Procedure
-
Turn on online machine
-
Pull the latest changes from the
ceremonies
repository -
Unseal the SD Card Pack
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-unsealing}}
-
Plug a fresh SD card into the online machine
-
Save the ceremonies repo to the SD card, referred to as the Ceremony SD card
-
Unplug the Ceremony SD card
-
Unseal the tamper proofed bundle
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-unsealing}}
-
Insert the AirgapOS SD card into the airgapped machine and turn it on
-
Once booted, unplug the AirgapOS SD card
-
Plug in the Ceremony SD card
-
Copy the git repo locally from the Ceremony SD card
cp -r /media/external/ceremonies /root/ceremonies; cd /root/ceremonies
-
Verify the detached signature for the payload
-
gpg --verify <filename> <filename>.1.sig
-
The filename will be of format:
keys/ceremonies/<date>/payloads/payload_<number>.json
-
-
Verify the key is authenticated:
-
sq-wot --gpg list "<their@email.co>"
-
Ensure the output of the command includes "fully authenticated"
-
-
Sign the transaction payload:
gpg --detach-sign <filename> > <filename>.2.sig
-
Create a signed git commit:
git commit -S -m "add <name> pgp key"
-
Copy the updated ceremonies repo to the SD card
cp -r . /media/external/ceremonies
-
Unplug the SD card from the air-gapped machine
-
Plug in the SD card into the online machine
-
Push the latest commit to the repository
-
Tamper proof the AirgapOS and Air-gapped laptop
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing}}
Appendix
Git Commit Signing Configuration
{{ #include ../../../../component-documents/git-commit-signing.md:steps }}