Skip to content

Commit

Permalink
Script updating gh-pages from b04f760. [ci skip]
Browse files Browse the repository at this point in the history
  • Loading branch information
ID Bot committed Jul 8, 2024
1 parent d0a32dd commit e0881f4
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 6 deletions.
6 changes: 3 additions & 3 deletions Final_Tweaks/draft-dekater-scion-pki.html
Original file line number Diff line number Diff line change
Expand Up @@ -3693,13 +3693,13 @@ <h4 id="name-devices">
<p id="appendix-B.2.2-2.1.1">Device to exchange data. This device can either be provided by the ceremony administrator, or, if preferable, by any of the voting representatives.<a href="#appendix-B.2.2-2.1.1" class="pilcrow"></a></p>
</li>
<li class="normal" id="appendix-B.2.2-2.2">
<p id="appendix-B.2.2-2.2.1">Ceremony administrator's device: The ceremony administrator <span class="bcp14">SHOULD</span> bring a machine that is capable of creating and verifying a TRC. Furthermore, it needs to be able to compute the SHA-512 digest (hash value) of files.<a href="#appendix-B.2.2-2.2.1" class="pilcrow"></a></p>
<p id="appendix-B.2.2-2.2.1">Ceremony administrator's device: The ceremony administrator should bring a machine that is capable of creating and verifying a TRC. Furthermore, it needs to be able to compute the SHA-512 digest (hash value) of files.<a href="#appendix-B.2.2-2.2.1" class="pilcrow"></a></p>
</li>
<li class="normal" id="appendix-B.2.2-2.3">
<p id="appendix-B.2.2-2.3.1">Voting representative's device: The voting representative <span class="bcp14">SHOULD</span> bring a machine that is capable of signing and verifying TRCs. Thus, the machine needs to have access to all the voting private keys. Furthermore, it needs to be able to compute the SHA-512 digest (hash value) of the files. The exact binaries that are required are described in a separate document.<a href="#appendix-B.2.2-2.3.1" class="pilcrow"></a></p>
<p id="appendix-B.2.2-2.3.1">Voting representative's device: The voting representative should bring a machine that is capable of signing and verifying TRCs. Thus, the machine needs to have access to all the voting private keys. Furthermore, it needs to be able to compute the SHA-512 digest (hash value) of the files. The exact binaries that are required are described in a separate document.<a href="#appendix-B.2.2-2.3.1" class="pilcrow"></a></p>
</li>
</ul>
<p id="appendix-B.2.2-3">It is very important that all devices, especially the data exchange device, are not compromised. Therefore, the ceremony <span class="bcp14">SHOULD</span> ideally include a procedure to verify that the devices are secure.<a href="#appendix-B.2.2-3" class="pilcrow"></a></p>
<p id="appendix-B.2.2-3">It is very important that all devices, especially the data exchange device, are not compromised. Therefore, the ceremony should ideally include a procedure to verify that the devices are secure.<a href="#appendix-B.2.2-3" class="pilcrow"></a></p>
</section>
</div>
<div id="preparation-steps">
Expand Down
6 changes: 3 additions & 3 deletions Final_Tweaks/draft-dekater-scion-pki.txt
Original file line number Diff line number Diff line change
Expand Up @@ -2748,20 +2748,20 @@ Ceremony Preparations
the ceremony administrator, or, if preferable, by any of the
voting representatives.

* Ceremony administrator's device: The ceremony administrator SHOULD
* Ceremony administrator's device: The ceremony administrator should
bring a machine that is capable of creating and verifying a TRC.
Furthermore, it needs to be able to compute the SHA-512 digest
(hash value) of files.

* Voting representative's device: The voting representative SHOULD
* Voting representative's device: The voting representative should
bring a machine that is capable of signing and verifying TRCs.
Thus, the machine needs to have access to all the voting private
keys. Furthermore, it needs to be able to compute the SHA-512
digest (hash value) of the files. The exact binaries that are
required are described in a separate document.

It is very important that all devices, especially the data exchange
device, are not compromised. Therefore, the ceremony SHOULD ideally
device, are not compromised. Therefore, the ceremony should ideally
include a procedure to verify that the devices are secure.

Preparation Steps
Expand Down

0 comments on commit e0881f4

Please sign in to comment.