-
Notifications
You must be signed in to change notification settings - Fork 98
Open
Milestone
Description
Trying to compare the documents content-wise to ensure nothing got "lost in translation".
- Title: Preface/Title: Missing Logo and organizations #386
- Preface
- Acknowledgements -> one reviewer missing, a867573
- Abstract
I. Introduction #260?
- 1. Audience
- 2. Related publications
- 3. How to read this guide: Introduction/How to read this guide: Flowchart missing #388
- 4. Disclaimer
- several citations broken, see Disclaimer: Several broken citations #389, Migrate and fix citations in section disclaimer in preface/introduction.adoc #262?
- missing "Security is a process.", de0bd25
- 4.1. Scope
- wrong list elements, de0bd25
- 5. Methods
- Link to acknowledgements broken, de0bd25
II: Best Practice
- 6. Webservers
- 6.1. Apache
- 6.2. lighttpd
- 6.3. nginx
- 6.4. Cherokee
- 6.5. MS IIS
- 7. SSH
- 7.1. OpenSSH - [ ]
- 7.2. Cisco ASA
- 7.3. Cisco IOS SSH: dead link to Cisco IOS SSH documentation #169
- 8. Mailservers migrate chapter mailservers to asciidoc #174?
- 8.1. TLS usage in mail server protocols
- 8.2. Recommended configuration
- 8.3. Dovecot
- 8.4. cyrus-imapd
- 8.5. Postfix
- 8.6. Exim
- 8.7. Cisco ESA/IronPort
- 9. Virtual Private Networks fix references to screenshots in vpn.adoc #375?
- 9.1. IPsec
- 9.2. Check Point Next Generation Firewall
- 9.3. TLS Based Applications
- Wrong heading, should be "OpenVPN"
- OpenVPN server/client config empty #392
- 9.4. PPTP
- 9.5. Cisco ASA
- 9.6. Openswan
- 9.7. tinc
- 10. PGP/GPG - Pretty Good Privacy
- 10.1. Hashing
- 10.2. Key Generation
- 10.3. ECC - Elliptic Curve Cryptography
- 11. IPMI, ILO and other lights out management solutions
- 12. Instant Messaging Systems
- 12.1. General server configuration recommendations
- 12.2. ejabberd
- 12.3. Chat privacy - Off-the-Record Messaging (OTR)
- 12.4. Charybdis
- 12.5. SILC
- 13. Databases
- 13.1. Oracle
- 13.2. MySQL
- 13.3. DB2
- 13.4. PostgreSQL
- 14. Proxy Solutions
- 14.1. Bluecoat / Symantec
- 14.2. HAProxy
- 14.3. Pound
- 14.4. stunnel
- 15. Kerberos
- 15.1. Overview
- 15.2. Implementations
III: Theory #271?
- 16. Overview
- 17. Cipher suites
- 17.1. Architectural overview
- 17.2. Forward Secrecy
- 17.3. Recommended cipher suites
- 18. Recommended cipher suites
- 18.1. Configuration A: Strong ciphers, fewer clients
- 18.2. Configuration B: Weaker ciphers but better compatibility
- 18.3. Compatibility
- 19. Random Number Generators
- 19.1. When Random Number Generators Fail
- 20. Keylengths
- 20.1. Summary
- 20.2. Special remark on 3DES:
- 21. A note on Elliptic Curve Cryptography
- 22. A note on SHA-1
- 23. A note on Diffie Hellman Key Exchanges
- 24. Public Key Infrastructures
- 24.1. Certificate Authorities
- 24.2. Hardening PKI
- 24.3. Certification Authorization Records
- 25. TLS and its support mechanisms
- 25.1. HTTP Strict Transport Security (HSTS)
- 25.2. HTTP Public Key Pinning (HPKP)
IV: Appendix
- 26. Tools
- 26.1. SSL & TLS
- 26.2. Browser Checks
- 26.3. Command Line Tools
- 26.4. Key length
- 26.5. Random Number Generators
- 26.6. Guides
- 27. Links
- 28. Suggested Reading
- 29. Cipher Suite Name Cross-Reference
- 30. Further Research
- 30.1. Software not covered by this guide
- Bibliography
- Index
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels