2018-05-09 13:05:55 +02:00
% Encoding: UTF-8
2018-10-11 12:00:14 +02:00
@InProceedings { wireguard:analysis ,
author = {Benjamin Dowling and Kenneth G. Paterson},
title = {A Cryptographic Analysis of the WireGuard Protocol},
booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
year = {2018},
pages = {3--21},
doi = {10.1007/978-3-319-93387-0\_1},
url = {https://doi.org/10.1007/978-3-319-93387-0\_1},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/bib/conf/acns/DowlingP18},
timestamp = {Wed, 13 Jun 2018 14:00:44 +0200},
}
@InProceedings { wireguard:intro ,
author = {Jason A. Donenfeld},
title = {WireGuard: Next Generation Kernel Network Tunnel},
booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017},
year = {2017},
url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/wireguard-next-generation-kernel-network-tunnel/},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/bib/conf/ndss/Donenfeld17},
timestamp = {Tue, 16 Jan 2018 15:44:17 +0100},
}
2018-08-14 12:17:36 +02:00
@Book { book:debian ,
author = {Raphaël Hertzog and Roland Mas},
title = {The Debian Administrator’ s Handbook},
year = {2015},
isbn = {979-10-91414-04-3},
url = {https://debian-handbook.info/},
urldate = {2018-07-17},
2018-05-09 13:05:55 +02:00
}
2018-07-17 16:55:03 +02:00
@Manual { man:openvpn ,
2018-08-14 12:17:36 +02:00
author = {James Yonan},
title = {openvpn(8) - System Manager's Manual},
year = {2018},
date = {2018-04-24},
edition = {OpenVPN Version 2.4},
note = {\url{{https://manpages.debian.org/stretch/openvpn/openvpn.8.en.html}}},
url = {https://manpages.debian.org/stretch/openvpn/openvpn.8.en.html},
urldate = {2018-07-17},
timestamp = {2018-07-17},
2018-07-17 16:55:03 +02:00
}
2018-08-14 12:17:36 +02:00
@TechReport { RFC4301 ,
author = {S. Kent and K. Seo},
title = {Security Architecture for the Internet Protocol},
institution = {Internet Engineering Task Force},
year = {2005},
type = {RFC},
number = {4301},
note = {\url{https://tools.ietf.org/html/rfc4301.txt}},
month = {December},
url = {https://tools.ietf.org/html/rfc4301.txt},
howpublished = {Internet Requests for Comments},
issn = {2070-1721},
publisher = {Internet Engineering Task Force},
2018-07-17 16:55:03 +02:00
}
2018-08-01 11:21:26 +02:00
@TechReport { RFC4302 ,
author = {S. Kent},
title = {IP Authentication Header},
2018-08-01 11:39:56 +02:00
institution = {Internet Engineering Task Force},
2018-08-01 11:21:26 +02:00
year = {2005},
type = {RFC},
number = {4302},
2018-08-01 11:39:56 +02:00
note = {\url{https://tools.ietf.org/html/rfc4302.txt}},
2018-08-01 11:21:26 +02:00
month = {December},
2018-08-01 11:39:56 +02:00
url = {https://tools.ietf.org/html/rfc4302.txt},
2018-08-01 11:21:26 +02:00
howpublished = {Internet Requests for Comments},
issn = {2070-1721},
2018-08-01 11:39:56 +02:00
publisher = {Internet Engineering Task Force},
2018-08-01 11:21:26 +02:00
}
@TechReport { RFC4303 ,
author = {S. Kent},
title = {IP Encapsulating Security Payload (ESP)},
2018-08-01 11:39:56 +02:00
institution = {Internet Engineering Task Force},
2018-08-01 11:21:26 +02:00
year = {2005},
type = {RFC},
number = {4303},
2018-08-01 11:39:56 +02:00
note = {\url{https://tools.ietf.org/html/rfc4303.txt}},
2018-08-01 11:21:26 +02:00
month = {December},
2018-08-01 11:39:56 +02:00
url = {https://tools.ietf.org/html/rfc4303.txt},
2018-08-01 11:21:26 +02:00
howpublished = {Internet Requests for Comments},
issn = {2070-1721},
2018-08-01 11:39:56 +02:00
publisher = {Internet Engineering Task Force},
2018-08-01 11:21:26 +02:00
}
2018-08-14 12:17:36 +02:00
@TechReport { RFC7296 ,
author = {C. Kaufman and P. Hoffman and Y. Nir and P. Eronen and T. Kivinen},
title = {Internet Key Exchange Protocol Version 2 (IKEv2)},
institution = {Internet Engineering Task Force},
year = {2014},
type = {RFC},
number = {7296},
note = {\url{https://tools.ietf.org/html/rfc7296.txt}},
month = {October},
url = {https://tools.ietf.org/html/rfc7296.txt},
howpublished = {Internet Requests for Comments},
issn = {2070-1721},
publisher = {Internet Engineering Task Force},
}
2018-08-01 11:21:26 +02:00
@TechReport { RFC7321 ,
author = {D. McGrew and P. Hoffman},
title = {Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)},
2018-08-01 11:39:56 +02:00
institution = {Internet Engineering Task Force},
2018-08-01 11:21:26 +02:00
year = {2014},
type = {RFC},
number = {7321},
2018-08-01 11:39:56 +02:00
note = {\url{https://tools.ietf.org/html/rfc7321.txt}},
2018-08-01 11:21:26 +02:00
month = {August},
2018-08-01 11:39:56 +02:00
url = {https://tools.ietf.org/html/rfc7321.txt},
2018-08-01 11:21:26 +02:00
howpublished = {Internet Requests for Comments},
issn = {2070-1721},
2018-08-01 11:39:56 +02:00
publisher = {Internet Engineering Task Force},
2018-08-01 11:21:26 +02:00
}
2018-08-14 12:17:36 +02:00
@TechReport { RFC8200 ,
author = {S. Deering and R. Hinden},
title = {Internet Protocol, Version 6 (IPv6) Specification},
2018-08-01 11:39:56 +02:00
institution = {Internet Engineering Task Force},
2018-08-14 12:17:36 +02:00
year = {2017},
type = {RFC},
number = {8200},
note = {\url{https://tools.ietf.org/html/rfc8200.txt}},
month = {July},
url = {https://tools.ietf.org/html/rfc8200.txt},
2018-08-01 11:21:26 +02:00
howpublished = {Internet Requests for Comments},
issn = {2070-1721},
2018-08-01 11:39:56 +02:00
publisher = {Internet Engineering Task Force},
2018-08-01 11:21:26 +02:00
}
@TechReport { RFC8247 ,
author = {Y. Nir and T. Kivinen and P. Wouters and D. Migault},
title = {Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2)},
2018-08-01 11:39:56 +02:00
institution = {Internet Engineering Task Force},
2018-08-01 11:21:26 +02:00
year = {2017},
type = {RFC},
number = {8247},
2018-08-01 11:39:56 +02:00
note = {\url{https://tools.ietf.org/html/rfc8247.txt}},
2018-08-01 11:21:26 +02:00
month = {September},
2018-08-01 11:39:56 +02:00
url = {https://tools.ietf.org/html/rfc8247.txt},
2018-08-01 11:21:26 +02:00
howpublished = {Internet Requests for Comments},
issn = {2070-1721},
2018-08-01 11:39:56 +02:00
publisher = {Internet Engineering Task Force},
2018-08-01 11:21:26 +02:00
}
2018-08-14 12:17:36 +02:00
@TechReport { RFC8221 ,
author = {P. Wouters and D. Migault and J. Mattsson and Y. Nir and T. Kivinen},
title = {Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)},
institution = {Internet Engineering Task Force},
year = {2017},
type = {RFC},
number = {8221},
note = {\url{https://tools.ietf.org/html/rfc8221.txt}},
month = {October},
url = {https://tools.ietf.org/html/rfc8221.txt},
howpublished = {Internet Requests for Comments},
issn = {2070-1721},
publisher = {Internet Engineering Task Force},
}
2018-09-05 14:06:48 +02:00
@WWW { strongswan:contributions ,
title = {Contributions - strongSwan},
year = {2018},
date = {2018-09-04},
url = {https://wiki.strongswan.org/projects/strongswan/wiki/Contributions},
note = {\url{https://wiki.strongswan.org/projects/strongswan/wiki/Contributions}, zuletzt abgerufen am 04.09.2018},
}
@WWW { openvpn:easyrsa3howto ,
title = {EasyRSA3-OpenVPN-Howto – OpenVPN Community},
year = {2018},
date = {2018-08-31},
url = {https://community.openvpn.net/openvpn/wiki/EasyRSA3-OpenVPN-Howto},
note = {\url{https://community.openvpn.net/openvpn/wiki/EasyRSA3-OpenVPN-Howto}, zuletzt abgerufen am 31.08.2018},
}
@WWW { strongswan:introduction ,
title = {Introduction to strongSwan},
year = {2018},
date = {2018-07-18},
url = {https://wiki.strongswan.org/projects/strongswan/wiki/IntroductionTostrongSwan},
note = {\url{https://wiki.strongswan.org/projects/strongswan/wiki/IntroductionTostrongSwan}, zuletzt abgerufen am 18.07.2018},
}
@WWW { openvpn:securityoverview ,
title = {Security Overview},
year = {2018},
date = {2018-09-05},
url = {https://openvpn.net/index.php/open-source/documentation/security-overview.html},
note = {\url{https://openvpn.net/index.php/open-source/documentation/security-overview.html}, zuletzt abgerufen am 05.09.2018},
}
2018-09-28 09:25:57 +02:00
@WWW { strongswan:onwindows ,
2018-09-05 14:06:48 +02:00
title = {strongSwan on Windows},
year = {2018},
date = {2018-08-07},
url = {https://wiki.strongswan.org/projects/strongswan/wiki/Windows},
note = {\url{https://wiki.strongswan.org/projects/strongswan/wiki/Windows}, zuletzt abgerufen am 07.08.2018},
}
@WWW { openvpn:topology ,
title = {Topology – OpenVPN Community},
year = {2018},
date = {2018-09-05},
url = {https://community.openvpn.net/openvpn/wiki/Topology},
note = {\url{https://community.openvpn.net/openvpn/wiki/Topology}, zuletzt abgerufen am 05.09.2018},
}
2018-09-13 16:35:22 +02:00
@Report { bsi:tr-02102-1 ,
2018-09-12 10:49:32 +02:00
author = {BSI},
title = {BSI Technische Richtlinie TR-02102-1: Kryptographische Verfahren: Empfehlungen und Schlüssellängen},
type = {techreport},
institution = {Bundesamt für Sicherheit in der Informationstechnik},
year = {2018},
date = {29.05.2018},
2018-09-13 16:35:22 +02:00
subtitle = {TR-02102-1},
url = {https://www.bsi.bund.de/DE/Publikationen/TechnischeRichtlinien/tr02102/index_htm.html},
}
@Report { bsi:tr-02102-3 ,
author = {BSI},
title = {BSI Technische Richtlinie TR-02102-3: Kryptographische Verfahren: Empfehlungen und Schlüssellängen Teil 3 – Verwendung von Internet Protocol Security (IPsec) und Internet Key Exchange (IKEv2)},
type = {techreport},
institution = {Bundesamt für Sicherheit in der Informationstechnik},
year = {2018},
subtitle = {TR-02102-3 Teil 3},
2018-09-12 10:49:32 +02:00
url = {https://www.bsi.bund.de/DE/Publikationen/TechnischeRichtlinien/tr02102/index_htm.html},
}
2018-09-21 11:02:18 +02:00
@Report { bsi:tls-checkliste ,
author = {BSI},
title = {TLS nach TR-03116-4 Checkliste für Diensteanbieter},
type = {techreport},
institution = {Bundesamt für Sicherheit in der Informationstechnik},
year = {2018},
date = {23.04.2018},
subtitle = {Checkliste für Diensteanbieter},
url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03116/TLS-Checkliste.html},
}
2018-09-21 12:20:30 +02:00
@TechReport { RFC7525 ,
author = {Y. Sheffer and R. Holz and P. Saint-Andre},
title = {Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)},
institution = {Internet Engineering Task Force},
year = {2015},
type = {BCP},
number = {195},
note = {\url{https://tools.ietf.org/html/rfc7525.txt}},
month = {May},
url = {https://tools.ietf.org/html/rfc7525.txt},
howpublished = {Internet Requests for Comments},
issn = {2070-1721},
publisher = {Internet Engineering Task Force},
}
2018-09-28 09:25:57 +02:00
@WWW { strongswan:onmac ,
2018-09-28 09:22:45 +02:00
title = {strongSwan on Mac OS X},
year = {2018},
date = {2018-08-07},
url = {https://wiki.strongswan.org/projects/strongswan/wiki/MacOSX},
note = {\url{https://wiki.strongswan.org/projects/strongswan/wiki/MacOSX}, zuletzt abgerufen am 27.09.2018},
}
2018-10-08 16:16:46 +02:00
@TechReport { RFC5280 ,
author = {D. Cooper and S. Santesson and S. Farrell and S. Boeyen and R. Housley and W. Polk},
title = {Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile},
institution = {Internet Engineering Task Force},
year = {2008},
type = {RFC},
number = {5280},
note = {\url{https://tools.ietf.org/html/rfc5280.txt}},
month = {May},
url = {https://tools.ietf.org/html/rfc5280.txt},
howpublished = {Internet Requests for Comments},
issn = {2070-1721},
publisher = {Internet Engineering Task Force},
}
2018-10-09 14:16:30 +02:00
@Proceeding { analysis:tcpintcp ,
author = {Osamu Honda and Hiroyuki Ohsaki and Makoto Imase and Mika Ishizuka and Junichi Murayama},
title = {Understanding TCP over TCP: effects of TCP tunneling on end-to-end throughput and latency},
year = {2005},
doi = {10.1117/12.630496},
url = {https://doi.org/10.1117/12.630496},
journal = {Proc.SPIE},
pages = {6011 - 6011 - 9},
volume = {6011},
}
2018-10-10 16:26:06 +02:00
@TechReport { RFC5246 ,
author = {T. Dierks and E. Rescorla},
title = {The Transport Layer Security (TLS) Protocol Version 1.2},
institution = {Internet Engineering Task Force},
year = {2008},
type = {RFC},
number = {5246},
note = {\url{https://tools.ietf.org/html/rfc5246.txt}},
month = {August},
url = {https://tools.ietf.org/html/rfc5246.txt},
howpublished = {Internet Requests for Comments},
issn = {2070-1721},
publisher = {Internet Engineering Task Force},
}
2018-10-12 15:27:39 +02:00
@TechReport { RFC7539 ,
author = {Y. Nir and A. Langley},
title = {ChaCha20 and Poly1305 for IETF Protocols},
institution = {Internet Engineering Task Force},
year = {2015},
type = {RFC},
number = {7539},
note = {\url{https://tools.ietf.org/html/rfc7539.txt}},
month = {May},
url = {https://tools.ietf.org/html/rfc7539.txt},
howpublished = {Internet Requests for Comments},
issn = {2070-1721},
publisher = {Internet Engineering Task Force},
}
@InProceedings { blake2s:definition ,
author = {Aumasson, Jean-Philippe and Neves, Samuel and Wilcox-O'Hearn, Zooko and Winnerlein, Christian},
title = {BLAKE2: Simpler, Smaller, Fast as MD5},
booktitle = {Applied Cryptography and Network Security},
year = {2013},
editor = {Jacobson, Michael and Locasto, Michael and Mohassel, Payman and Safavi-Naini, Reihaneh},
publisher = {Springer Berlin Heidelberg},
isbn = {978-3-642-38980-1},
pages = {119--135},
abstract = {We present the hash function BLAKE2, an improved version of the SHA-3 finalist BLAKE optimized for speed in software. Target applications include cloud storage, intrusion detection, or version control systems. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms, and BLAKE2s for smaller architectures. On 64-bit platforms, BLAKE2 is often faster than MD5, yet provides security similar to that of SHA-3: up to 256-bit collision resistance, immunity to length extension, indifferentiability from a random oracle, etc. We specify parallel versions BLAKE2bp and BLAKE2sp that are up to 4 and 8 times faster, by taking advantage of SIMD and/or multiple cores. BLAKE2 reduces the RAM requirements of BLAKE down to 168 bytes, making it smaller than any of the five SHA-3 finalists, and 32{\%} smaller than BLAKE. Finally, BLAKE2 provides a comprehensive support for tree-hashing as well as keyed hashing (be it in sequential or tree mode).},
address = {Berlin, Heidelberg},
}
2018-11-02 11:00:53 +01:00
@Report { enisa:algorithms ,
author = {ENISA},
title = {Algorithms, key size and parameters report – 2014},
institution = {European Union Agency for Network and Information Security},
year = {2014},
2018-11-02 11:20:40 +01:00
date = {2014-11-21},
2018-11-02 11:22:42 +01:00
note = {\url{https://www.enisa.europa.eu/publications/algorithms-key-size-and-parameters-report-2014}},
2018-11-02 11:00:53 +01:00
doi = {10.2824/36822},
url = {https://www.enisa.europa.eu/publications/algorithms-key-size-and-parameters-report-2014},
}
2018-11-02 11:20:40 +01:00
@Report { ecrypt-csa:algorithms ,
author = {ECRYPT-CSA},
title = {Algorithms, Key Size and Protocols Report (2018)},
year = {2018},
date = {2018-02-28},
2018-11-02 11:22:42 +01:00
note = {\url{http://www.ecrypt.eu.org/csa/publications.html}},
2018-11-02 11:20:40 +01:00
url = {http://www.ecrypt.eu.org/csa/documents/D5.4-FinalAlgKeySizeProt.pdf},
}
2018-05-09 13:05:55 +02:00
@Comment {jabref-meta: databaseType:biblatex;}