From e0881f42e90d994ec034d096b15ac179f388dc24 Mon Sep 17 00:00:00 2001 From: ID Bot Date: Mon, 8 Jul 2024 08:15:54 +0000 Subject: [PATCH] Script updating gh-pages from b04f760. [ci skip] --- Final_Tweaks/draft-dekater-scion-pki.html | 6 +++--- Final_Tweaks/draft-dekater-scion-pki.txt | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/Final_Tweaks/draft-dekater-scion-pki.html b/Final_Tweaks/draft-dekater-scion-pki.html index 1d5862b..25d9924 100644 --- a/Final_Tweaks/draft-dekater-scion-pki.html +++ b/Final_Tweaks/draft-dekater-scion-pki.html @@ -3693,13 +3693,13 @@

Device to exchange data. This device can either be provided by the ceremony administrator, or, if preferable, by any of the voting representatives.

  • -

    Ceremony administrator's device: The ceremony administrator SHOULD bring a machine that is capable of creating and verifying a TRC. Furthermore, it needs to be able to compute the SHA-512 digest (hash value) of files.

    +

    Ceremony administrator's device: The ceremony administrator should bring a machine that is capable of creating and verifying a TRC. Furthermore, it needs to be able to compute the SHA-512 digest (hash value) of files.

  • -

    Voting representative's device: The voting representative SHOULD bring a machine that is capable of signing and verifying TRCs. Thus, the machine needs to have access to all the voting private keys. Furthermore, it needs to be able to compute the SHA-512 digest (hash value) of the files. The exact binaries that are required are described in a separate document.

    +

    Voting representative's device: The voting representative should bring a machine that is capable of signing and verifying TRCs. Thus, the machine needs to have access to all the voting private keys. Furthermore, it needs to be able to compute the SHA-512 digest (hash value) of the files. The exact binaries that are required are described in a separate document.

  • -

    It is very important that all devices, especially the data exchange device, are not compromised. Therefore, the ceremony SHOULD ideally include a procedure to verify that the devices are secure.

    +

    It is very important that all devices, especially the data exchange device, are not compromised. Therefore, the ceremony should ideally include a procedure to verify that the devices are secure.

    diff --git a/Final_Tweaks/draft-dekater-scion-pki.txt b/Final_Tweaks/draft-dekater-scion-pki.txt index 62afadf..35c2756 100644 --- a/Final_Tweaks/draft-dekater-scion-pki.txt +++ b/Final_Tweaks/draft-dekater-scion-pki.txt @@ -2748,12 +2748,12 @@ Ceremony Preparations the ceremony administrator, or, if preferable, by any of the voting representatives. - * Ceremony administrator's device: The ceremony administrator SHOULD + * Ceremony administrator's device: The ceremony administrator should bring a machine that is capable of creating and verifying a TRC. Furthermore, it needs to be able to compute the SHA-512 digest (hash value) of files. - * Voting representative's device: The voting representative SHOULD + * Voting representative's device: The voting representative should bring a machine that is capable of signing and verifying TRCs. Thus, the machine needs to have access to all the voting private keys. Furthermore, it needs to be able to compute the SHA-512 @@ -2761,7 +2761,7 @@ Ceremony Preparations required are described in a separate document. It is very important that all devices, especially the data exchange - device, are not compromised. Therefore, the ceremony SHOULD ideally + device, are not compromised. Therefore, the ceremony should ideally include a procedure to verify that the devices are secure. Preparation Steps