Reorder RFCs in Bibtex file
This commit is contained in:
parent
b57fd5eafc
commit
8c1d6c6e98
|
@ -1,39 +1,39 @@
|
||||||
% Encoding: UTF-8
|
% Encoding: UTF-8
|
||||||
|
|
||||||
@techreport{RFC4301,
|
@Book{book:debian,
|
||||||
author = {S. Kent and K. Seo},
|
author = {Raphaël Hertzog and Roland Mas},
|
||||||
title = {Security Architecture for the Internet Protocol},
|
title = {The Debian Administrator’s Handbook},
|
||||||
howpublished = {Internet Requests for Comments},
|
year = {2015},
|
||||||
type = {RFC},
|
isbn = {979-10-91414-04-3},
|
||||||
number = {4301},
|
url = {https://debian-handbook.info/},
|
||||||
year = {2005},
|
urldate = {2018-07-17},
|
||||||
month = {December},
|
|
||||||
issn = {2070-1721},
|
|
||||||
publisher = {Internet Engineering Task Force},
|
|
||||||
institution = {Internet Engineering Task Force},
|
|
||||||
url = {https://tools.ietf.org/html/rfc4301.txt},
|
|
||||||
note = {\url{https://tools.ietf.org/html/rfc4301.txt}},
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Manual{man:openvpn,
|
@Manual{man:openvpn,
|
||||||
author = {James Yonan},
|
author = {James Yonan},
|
||||||
title = {openvpn(8) - System Manager's Manual},
|
title = {openvpn(8) - System Manager's Manual},
|
||||||
year = {2018},
|
year = {2018},
|
||||||
date = {2018-04-24},
|
date = {2018-04-24},
|
||||||
edition = {OpenVPN Version 2.4},
|
edition = {OpenVPN Version 2.4},
|
||||||
note = {\url{{https://manpages.debian.org/stretch/openvpn/openvpn.8.en.html}}},
|
note = {\url{{https://manpages.debian.org/stretch/openvpn/openvpn.8.en.html}}},
|
||||||
url = {https://manpages.debian.org/stretch/openvpn/openvpn.8.en.html},
|
url = {https://manpages.debian.org/stretch/openvpn/openvpn.8.en.html},
|
||||||
urldate = {2018-07-17},
|
urldate = {2018-07-17},
|
||||||
timestamp = {2018-07-17},
|
timestamp = {2018-07-17},
|
||||||
}
|
}
|
||||||
|
|
||||||
@Book{book:debian,
|
@TechReport{RFC4301,
|
||||||
author = {Raphaël Hertzog and Roland Mas},
|
author = {S. Kent and K. Seo},
|
||||||
title = {The Debian Administrator’s Handbook},
|
title = {Security Architecture for the Internet Protocol},
|
||||||
year = {2015},
|
institution = {Internet Engineering Task Force},
|
||||||
isbn = {979-10-91414-04-3},
|
year = {2005},
|
||||||
url = {https://debian-handbook.info/},
|
type = {RFC},
|
||||||
urldate = {2018-07-17},
|
number = {4301},
|
||||||
|
note = {\url{https://tools.ietf.org/html/rfc4301.txt}},
|
||||||
|
month = {December},
|
||||||
|
url = {https://tools.ietf.org/html/rfc4301.txt},
|
||||||
|
howpublished = {Internet Requests for Comments},
|
||||||
|
issn = {2070-1721},
|
||||||
|
publisher = {Internet Engineering Task Force},
|
||||||
}
|
}
|
||||||
|
|
||||||
@TechReport{RFC4302,
|
@TechReport{RFC4302,
|
||||||
|
@ -66,6 +66,21 @@
|
||||||
publisher = {Internet Engineering Task Force},
|
publisher = {Internet Engineering Task Force},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@TechReport{RFC7296,
|
||||||
|
author = {C. Kaufman and P. Hoffman and Y. Nir and P. Eronen and T. Kivinen},
|
||||||
|
title = {Internet Key Exchange Protocol Version 2 (IKEv2)},
|
||||||
|
institution = {Internet Engineering Task Force},
|
||||||
|
year = {2014},
|
||||||
|
type = {RFC},
|
||||||
|
number = {7296},
|
||||||
|
note = {\url{https://tools.ietf.org/html/rfc7296.txt}},
|
||||||
|
month = {October},
|
||||||
|
url = {https://tools.ietf.org/html/rfc7296.txt},
|
||||||
|
howpublished = {Internet Requests for Comments},
|
||||||
|
issn = {2070-1721},
|
||||||
|
publisher = {Internet Engineering Task Force},
|
||||||
|
}
|
||||||
|
|
||||||
@TechReport{RFC7321,
|
@TechReport{RFC7321,
|
||||||
author = {D. McGrew and P. Hoffman},
|
author = {D. McGrew and P. Hoffman},
|
||||||
title = {Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)},
|
title = {Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)},
|
||||||
|
@ -81,16 +96,16 @@
|
||||||
publisher = {Internet Engineering Task Force},
|
publisher = {Internet Engineering Task Force},
|
||||||
}
|
}
|
||||||
|
|
||||||
@TechReport{RFC7296,
|
@TechReport{RFC8200,
|
||||||
author = {C. Kaufman and P. Hoffman and Y. Nir and P. Eronen and T. Kivinen},
|
author = {S. Deering and R. Hinden},
|
||||||
title = {Internet Key Exchange Protocol Version 2 (IKEv2)},
|
title = {Internet Protocol, Version 6 (IPv6) Specification},
|
||||||
institution = {Internet Engineering Task Force},
|
institution = {Internet Engineering Task Force},
|
||||||
year = {2014},
|
year = {2017},
|
||||||
type = {STD},
|
type = {RFC},
|
||||||
number = {79},
|
number = {8200},
|
||||||
note = {\url{https://tools.ietf.org/html/rfc7296.txt}},
|
note = {\url{https://tools.ietf.org/html/rfc8200.txt}},
|
||||||
month = {October},
|
month = {July},
|
||||||
url = {https://tools.ietf.org/html/rfc7296.txt},
|
url = {https://tools.ietf.org/html/rfc8200.txt},
|
||||||
howpublished = {Internet Requests for Comments},
|
howpublished = {Internet Requests for Comments},
|
||||||
issn = {2070-1721},
|
issn = {2070-1721},
|
||||||
publisher = {Internet Engineering Task Force},
|
publisher = {Internet Engineering Task Force},
|
||||||
|
@ -111,4 +126,19 @@
|
||||||
publisher = {Internet Engineering Task Force},
|
publisher = {Internet Engineering Task Force},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@TechReport{RFC8221,
|
||||||
|
author = {P. Wouters and D. Migault and J. Mattsson and Y. Nir and T. Kivinen},
|
||||||
|
title = {Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)},
|
||||||
|
institution = {Internet Engineering Task Force},
|
||||||
|
year = {2017},
|
||||||
|
type = {RFC},
|
||||||
|
number = {8221},
|
||||||
|
note = {\url{https://tools.ietf.org/html/rfc8221.txt}},
|
||||||
|
month = {October},
|
||||||
|
url = {https://tools.ietf.org/html/rfc8221.txt},
|
||||||
|
howpublished = {Internet Requests for Comments},
|
||||||
|
issn = {2070-1721},
|
||||||
|
publisher = {Internet Engineering Task Force},
|
||||||
|
}
|
||||||
|
|
||||||
@Comment{jabref-meta: databaseType:biblatex;}
|
@Comment{jabref-meta: databaseType:biblatex;}
|
||||||
|
|
|
@ -308,7 +308,7 @@ Arbeitsschritte wie das Patchen und Kompilieren des Quellcodes, sowie Tests und
|
||||||
Die Authentizität der Pakete wird anhand von GPG-Signaturen durch den Paketmanager vor der Installation überprüft\cite{book:debian}[Siehe Kapitel 6.5].
|
Die Authentizität der Pakete wird anhand von GPG-Signaturen durch den Paketmanager vor der Installation überprüft\cite{book:debian}[Siehe Kapitel 6.5].
|
||||||
|
|
||||||
Um den Wartungsaufwand des VPN-Servers zu reduzieren, kann die Installation von Updates durch den Debian-Paketmanager automatisiert werden\cite{book:debian}[Siehe Kapitel 6.7 und 6.8].
|
Um den Wartungsaufwand des VPN-Servers zu reduzieren, kann die Installation von Updates durch den Debian-Paketmanager automatisiert werden\cite{book:debian}[Siehe Kapitel 6.7 und 6.8].
|
||||||
Somit muss der Systemadministrator lediglich Upgrades zur nächsthöheren Debian-Version durchführen.
|
Somit muss der Systemadministrator lediglich Upgrades zur nächsthöheren Debian-Version durchführen, da dabei Anpassungen an der Systemkonfiguration notwendig werden.
|
||||||
|
|
||||||
Im Folgenden werden mögliche Software-Kandidaten aus den Debian-Paketquellen vorgestellt.
|
Im Folgenden werden mögliche Software-Kandidaten aus den Debian-Paketquellen vorgestellt.
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue