Skip to content

Review content of asciidoc migration #387

@sebix

Description

@sebix

Trying to compare the documents content-wise to ensure nothing got "lost in translation".

I. Introduction #260?

II: Best Practice

  • 6. Webservers
    • 6.1. Apache
    • 6.2. lighttpd
    • 6.3. nginx
    • 6.4. Cherokee
    • 6.5. MS IIS
  • 7. SSH
  • 8. Mailservers migrate chapter mailservers to asciidoc #174?
    • 8.1. TLS usage in mail server protocols
    • 8.2. Recommended configuration
    • 8.3. Dovecot
    • 8.4. cyrus-imapd
    • 8.5. Postfix
    • 8.6. Exim
    • 8.7. Cisco ESA/IronPort
  • 9. Virtual Private Networks fix references to screenshots in vpn.adoc #375?
    • 9.1. IPsec
    • 9.2. Check Point Next Generation Firewall
    • 9.3. TLS Based Applications
    • 9.4. PPTP
    • 9.5. Cisco ASA
    • 9.6. Openswan
    • 9.7. tinc
  • 10. PGP/GPG - Pretty Good Privacy
    • 10.1. Hashing
    • 10.2. Key Generation
    • 10.3. ECC - Elliptic Curve Cryptography
  • 11. IPMI, ILO and other lights out management solutions
  • 12. Instant Messaging Systems
    • 12.1. General server configuration recommendations
    • 12.2. ejabberd
    • 12.3. Chat privacy - Off-the-Record Messaging (OTR)
    • 12.4. Charybdis
    • 12.5. SILC
  • 13. Databases
    • 13.1. Oracle
    • 13.2. MySQL
    • 13.3. DB2
    • 13.4. PostgreSQL
  • 14. Proxy Solutions
    • 14.1. Bluecoat / Symantec
    • 14.2. HAProxy
    • 14.3. Pound
    • 14.4. stunnel
  • 15. Kerberos
    • 15.1. Overview
    • 15.2. Implementations

III: Theory #271?

  • 16. Overview
  • 17. Cipher suites
    • 17.1. Architectural overview
    • 17.2. Forward Secrecy
    • 17.3. Recommended cipher suites
  • 18. Recommended cipher suites
    • 18.1. Configuration A: Strong ciphers, fewer clients
    • 18.2. Configuration B: Weaker ciphers but better compatibility
    • 18.3. Compatibility
  • 19. Random Number Generators
    • 19.1. When Random Number Generators Fail
  • 20. Keylengths
    • 20.1. Summary
    • 20.2. Special remark on 3DES:
  • 21. A note on Elliptic Curve Cryptography
  • 22. A note on SHA-1
  • 23. A note on Diffie Hellman Key Exchanges
  • 24. Public Key Infrastructures
    • 24.1. Certificate Authorities
    • 24.2. Hardening PKI
    • 24.3. Certification Authorization Records
  • 25. TLS and its support mechanisms
    • 25.1. HTTP Strict Transport Security (HSTS)
    • 25.2. HTTP Public Key Pinning (HPKP)

IV: Appendix

  • 26. Tools
    • 26.1. SSL & TLS
    • 26.2. Browser Checks
    • 26.3. Command Line Tools
    • 26.4. Key length
    • 26.5. Random Number Generators
    • 26.6. Guides
  • 27. Links
  • 28. Suggested Reading
  • 29. Cipher Suite Name Cross-Reference
  • 30. Further Research
    • 30.1. Software not covered by this guide
  • Bibliography
  • Index

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions