docs/trove/src/generated-documents/level-2/fixed-location/operator/decrypt-namespace-secret.md

1.3 KiB

Decrypt Namespace Secret

Requirements

{{ #include ../../operator-requirements.md:requirements }}

Procedure

{{ #include template-ceremony-setup.md:content }}

  1. Retrieve Ceremony SD Card from High Visibility Storage and plug it into the machine

  2. Copy the Ceremony SD Card contents to machine

    • cp -r /media/vaults /root/
  3. Start keyfork using the relevant Shardfile:

    $ keyfork recover shard --daemon /root/vaults/<namespace>/shardfile.asc
    
    • Follow on screen prompts
  4. Derive the OpenPGP root certificate:

    $ keyfork derive openpgp > secret_key.asc
    
  5. Decrypt the secret material:

    • sq decrypt --recipient-file secret_key.asc < encrypted.asc --output decrypted
  6. Proceed to transfer the secret (decrypted) to desired location such as hardware wallet, power washed chromebook (via SD card) etc.

  7. Shut down the air gapped machine

  8. Gather all the original items that were in the air-gapped bundle:

    • Air-gapped computer

    • AirgapOS SD card

{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing}}