248 lines
9.5 KiB
BibTeX
248 lines
9.5 KiB
BibTeX
% Encoding: UTF-8
|
||
|
||
@Book{book:debian,
|
||
author = {Raphaël Hertzog and Roland Mas},
|
||
title = {The Debian Administrator’s Handbook},
|
||
year = {2015},
|
||
isbn = {979-10-91414-04-3},
|
||
url = {https://debian-handbook.info/},
|
||
urldate = {2018-07-17},
|
||
}
|
||
|
||
@Manual{man:openvpn,
|
||
author = {James Yonan},
|
||
title = {openvpn(8) - System Manager's Manual},
|
||
year = {2018},
|
||
date = {2018-04-24},
|
||
edition = {OpenVPN Version 2.4},
|
||
note = {\url{{https://manpages.debian.org/stretch/openvpn/openvpn.8.en.html}}},
|
||
url = {https://manpages.debian.org/stretch/openvpn/openvpn.8.en.html},
|
||
urldate = {2018-07-17},
|
||
timestamp = {2018-07-17},
|
||
}
|
||
|
||
@TechReport{RFC4301,
|
||
author = {S. Kent and K. Seo},
|
||
title = {Security Architecture for the Internet Protocol},
|
||
institution = {Internet Engineering Task Force},
|
||
year = {2005},
|
||
type = {RFC},
|
||
number = {4301},
|
||
note = {\url{https://tools.ietf.org/html/rfc4301.txt}},
|
||
month = {December},
|
||
url = {https://tools.ietf.org/html/rfc4301.txt},
|
||
howpublished = {Internet Requests for Comments},
|
||
issn = {2070-1721},
|
||
publisher = {Internet Engineering Task Force},
|
||
}
|
||
|
||
@TechReport{RFC4302,
|
||
author = {S. Kent},
|
||
title = {IP Authentication Header},
|
||
institution = {Internet Engineering Task Force},
|
||
year = {2005},
|
||
type = {RFC},
|
||
number = {4302},
|
||
note = {\url{https://tools.ietf.org/html/rfc4302.txt}},
|
||
month = {December},
|
||
url = {https://tools.ietf.org/html/rfc4302.txt},
|
||
howpublished = {Internet Requests for Comments},
|
||
issn = {2070-1721},
|
||
publisher = {Internet Engineering Task Force},
|
||
}
|
||
|
||
@TechReport{RFC4303,
|
||
author = {S. Kent},
|
||
title = {IP Encapsulating Security Payload (ESP)},
|
||
institution = {Internet Engineering Task Force},
|
||
year = {2005},
|
||
type = {RFC},
|
||
number = {4303},
|
||
note = {\url{https://tools.ietf.org/html/rfc4303.txt}},
|
||
month = {December},
|
||
url = {https://tools.ietf.org/html/rfc4303.txt},
|
||
howpublished = {Internet Requests for Comments},
|
||
issn = {2070-1721},
|
||
publisher = {Internet Engineering Task Force},
|
||
}
|
||
|
||
@TechReport{RFC7296,
|
||
author = {C. Kaufman and P. Hoffman and Y. Nir and P. Eronen and T. Kivinen},
|
||
title = {Internet Key Exchange Protocol Version 2 (IKEv2)},
|
||
institution = {Internet Engineering Task Force},
|
||
year = {2014},
|
||
type = {RFC},
|
||
number = {7296},
|
||
note = {\url{https://tools.ietf.org/html/rfc7296.txt}},
|
||
month = {October},
|
||
url = {https://tools.ietf.org/html/rfc7296.txt},
|
||
howpublished = {Internet Requests for Comments},
|
||
issn = {2070-1721},
|
||
publisher = {Internet Engineering Task Force},
|
||
}
|
||
|
||
@TechReport{RFC7321,
|
||
author = {D. McGrew and P. Hoffman},
|
||
title = {Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)},
|
||
institution = {Internet Engineering Task Force},
|
||
year = {2014},
|
||
type = {RFC},
|
||
number = {7321},
|
||
note = {\url{https://tools.ietf.org/html/rfc7321.txt}},
|
||
month = {August},
|
||
url = {https://tools.ietf.org/html/rfc7321.txt},
|
||
howpublished = {Internet Requests for Comments},
|
||
issn = {2070-1721},
|
||
publisher = {Internet Engineering Task Force},
|
||
}
|
||
|
||
@TechReport{RFC8200,
|
||
author = {S. Deering and R. Hinden},
|
||
title = {Internet Protocol, Version 6 (IPv6) Specification},
|
||
institution = {Internet Engineering Task Force},
|
||
year = {2017},
|
||
type = {RFC},
|
||
number = {8200},
|
||
note = {\url{https://tools.ietf.org/html/rfc8200.txt}},
|
||
month = {July},
|
||
url = {https://tools.ietf.org/html/rfc8200.txt},
|
||
howpublished = {Internet Requests for Comments},
|
||
issn = {2070-1721},
|
||
publisher = {Internet Engineering Task Force},
|
||
}
|
||
|
||
@TechReport{RFC8247,
|
||
author = {Y. Nir and T. Kivinen and P. Wouters and D. Migault},
|
||
title = {Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2)},
|
||
institution = {Internet Engineering Task Force},
|
||
year = {2017},
|
||
type = {RFC},
|
||
number = {8247},
|
||
note = {\url{https://tools.ietf.org/html/rfc8247.txt}},
|
||
month = {September},
|
||
url = {https://tools.ietf.org/html/rfc8247.txt},
|
||
howpublished = {Internet Requests for Comments},
|
||
issn = {2070-1721},
|
||
publisher = {Internet Engineering Task Force},
|
||
}
|
||
|
||
@TechReport{RFC8221,
|
||
author = {P. Wouters and D. Migault and J. Mattsson and Y. Nir and T. Kivinen},
|
||
title = {Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)},
|
||
institution = {Internet Engineering Task Force},
|
||
year = {2017},
|
||
type = {RFC},
|
||
number = {8221},
|
||
note = {\url{https://tools.ietf.org/html/rfc8221.txt}},
|
||
month = {October},
|
||
url = {https://tools.ietf.org/html/rfc8221.txt},
|
||
howpublished = {Internet Requests for Comments},
|
||
issn = {2070-1721},
|
||
publisher = {Internet Engineering Task Force},
|
||
}
|
||
|
||
@WWW{strongswan:contributions,
|
||
title = {Contributions - strongSwan},
|
||
year = {2018},
|
||
date = {2018-09-04},
|
||
url = {https://wiki.strongswan.org/projects/strongswan/wiki/Contributions},
|
||
note = {\url{https://wiki.strongswan.org/projects/strongswan/wiki/Contributions}, zuletzt abgerufen am 04.09.2018},
|
||
}
|
||
|
||
@WWW{openvpn:easyrsa3howto,
|
||
title = {EasyRSA3-OpenVPN-Howto – OpenVPN Community},
|
||
year = {2018},
|
||
date = {2018-08-31},
|
||
url = {https://community.openvpn.net/openvpn/wiki/EasyRSA3-OpenVPN-Howto},
|
||
note = {\url{https://community.openvpn.net/openvpn/wiki/EasyRSA3-OpenVPN-Howto}, zuletzt abgerufen am 31.08.2018},
|
||
}
|
||
|
||
@WWW{strongswan:introduction,
|
||
title = {Introduction to strongSwan},
|
||
year = {2018},
|
||
date = {2018-07-18},
|
||
url = {https://wiki.strongswan.org/projects/strongswan/wiki/IntroductionTostrongSwan},
|
||
note = {\url{https://wiki.strongswan.org/projects/strongswan/wiki/IntroductionTostrongSwan}, zuletzt abgerufen am 18.07.2018},
|
||
}
|
||
|
||
@WWW{openvpn:securityoverview,
|
||
title = {Security Overview},
|
||
year = {2018},
|
||
date = {2018-09-05},
|
||
url = {https://openvpn.net/index.php/open-source/documentation/security-overview.html},
|
||
note = {\url{https://openvpn.net/index.php/open-source/documentation/security-overview.html}, zuletzt abgerufen am 05.09.2018},
|
||
}
|
||
|
||
@WWW{strongswan:strongswanonwindows,
|
||
title = {strongSwan on Windows},
|
||
year = {2018},
|
||
date = {2018-08-07},
|
||
url = {https://wiki.strongswan.org/projects/strongswan/wiki/Windows},
|
||
note = {\url{https://wiki.strongswan.org/projects/strongswan/wiki/Windows}, zuletzt abgerufen am 07.08.2018},
|
||
}
|
||
|
||
@WWW{openvpn:topology,
|
||
title = {Topology – OpenVPN Community},
|
||
year = {2018},
|
||
date = {2018-09-05},
|
||
url = {https://community.openvpn.net/openvpn/wiki/Topology},
|
||
note = {\url{https://community.openvpn.net/openvpn/wiki/Topology}, zuletzt abgerufen am 05.09.2018},
|
||
}
|
||
|
||
@Report{bsi:tr-02102-1,
|
||
author = {BSI},
|
||
title = {BSI Technische Richtlinie TR-02102-1: Kryptographische Verfahren: Empfehlungen und Schlüssellängen},
|
||
type = {techreport},
|
||
institution = {Bundesamt für Sicherheit in der Informationstechnik},
|
||
year = {2018},
|
||
date = {29.05.2018},
|
||
subtitle = {TR-02102-1},
|
||
url = {https://www.bsi.bund.de/DE/Publikationen/TechnischeRichtlinien/tr02102/index_htm.html},
|
||
}
|
||
|
||
@Report{bsi:tr-02102-3,
|
||
author = {BSI},
|
||
title = {BSI Technische Richtlinie TR-02102-3: Kryptographische Verfahren: Empfehlungen und Schlüssellängen Teil 3 – Verwendung von Internet Protocol Security (IPsec) und Internet Key Exchange (IKEv2)},
|
||
type = {techreport},
|
||
institution = {Bundesamt für Sicherheit in der Informationstechnik},
|
||
year = {2018},
|
||
subtitle = {TR-02102-3 Teil 3},
|
||
url = {https://www.bsi.bund.de/DE/Publikationen/TechnischeRichtlinien/tr02102/index_htm.html},
|
||
}
|
||
|
||
@Report{bsi:tls-checkliste,
|
||
author = {BSI},
|
||
title = {TLS nach TR-03116-4 Checkliste für Diensteanbieter},
|
||
type = {techreport},
|
||
institution = {Bundesamt für Sicherheit in der Informationstechnik},
|
||
year = {2018},
|
||
date = {23.04.2018},
|
||
subtitle = {Checkliste für Diensteanbieter},
|
||
url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03116/TLS-Checkliste.html},
|
||
}
|
||
|
||
@TechReport{RFC7525,
|
||
author = {Y. Sheffer and R. Holz and P. Saint-Andre},
|
||
title = {Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)},
|
||
institution = {Internet Engineering Task Force},
|
||
year = {2015},
|
||
type = {BCP},
|
||
number = {195},
|
||
note = {\url{https://tools.ietf.org/html/rfc7525.txt}},
|
||
month = {May},
|
||
url = {https://tools.ietf.org/html/rfc7525.txt},
|
||
howpublished = {Internet Requests for Comments},
|
||
issn = {2070-1721},
|
||
publisher = {Internet Engineering Task Force},
|
||
}
|
||
|
||
@WWW{strongswan:strongswanonmac,
|
||
title = {strongSwan on Mac OS X},
|
||
year = {2018},
|
||
date = {2018-08-07},
|
||
url = {https://wiki.strongswan.org/projects/strongswan/wiki/MacOSX},
|
||
note = {\url{https://wiki.strongswan.org/projects/strongswan/wiki/MacOSX}, zuletzt abgerufen am 27.09.2018},
|
||
}
|
||
|
||
@Comment{jabref-meta: databaseType:biblatex;}
|