Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

M. Milinovic, SRCE (passphrase person #2)

Procedure

  1. S. Winter arrives at GEANT Offices with a Raspberry Pi 3. The Pi has the most recent version of Raspian OS preinstalled, with OpenSSL and the hwrng kernel driver, but no custom software.
  2. The VC begins.
  3. All participants to the ceremony agree on a value "n" for the length of the passphrases. Values smaller than 10 are unacceptable.
  4. The CA generation scripts which are available online at GitHub get downloaded to a USB stick on a computer in GEANT offices.
  5. The Pri gets powered up and connected to a monitor and keyboard available at GEANT offices.
  6. The USB stick gets attached to the Pi, and mounted.
  7. The scripts get copied to local USB storage.
  8. S. Winter executes the script "CA.bootstrapNewRootCA", answering the interactive questions by the script.
  9. When the script asks for the certificate private key's passphrase, S. Winter makes up a n character password and writes it down on a piece of paper, large enough so that it can be seen when held into the camera of the VC later.
  10. When the CA is generated, S. Winter executes the second script, "CA.generateNewIntermediateCA".
  11. When the script asks for the certificate private key's passphrase, S. Winter makes up a different n character password and writes it down on a second piece of paper.
  12. S. Winter executes the scripts which generate the CRL and OCSP statements, for both the RSA and ECDSA variants.
  13. S. Winter holds up the passphrase to the root CAs into the camera.
  14. M. Milinovic makes a copy of the root CA passphrase and stores it safely for everafter.
  15. S. Winter makes a copy of the root CA passphrase and stores it onto an existing VeraCrypt volume on his own laptop.
  16. S. Winter makes a copy of the intermediate CA passphrase and stores it onto an existing VeraCrypt volume on his own laptop.
  17. S. Winter copies all the public information regarding the CAs onto the USB stick:
    -root CA ECDSA+RSA certificate;
    -intermediate CA ECDSA+RSA certificate;
    -root CA CRL ECDSA+RSA;

...

  1. - root CA OCSP statement for the intermediate CA certificates ECDSA+RSA.
  2. S. Winter copies the following SECRET information to the same USB stick:
    -intermediate CA private key, RSA variant only.
  3. The USB stick gets unmounted.
  4. The Pi is shut down.
  5. The Pi is placed in its physical lockup (safe). The access to that safe is managed internally in GEANT according to local procedures.
  6. S. Winter copies the information on the USB stick to the relevant locations on the VMs.
  7. The ceremony ends.

Client and Server Root CA Procedures

...