Added request for CSRs, Cert revocaton and cert/key management by @yawnbox
[ach-master.git] / TODO.md
diff --git a/TODO.md b/TODO.md
index 7f012b2..2de2340 100644 (file)
--- a/TODO.md
+++ b/TODO.md
@@ -6,7 +6,9 @@ Section Apache 2.1.1 recommends Rewrite instead of Redirect. Should be 301! (We
 
 2014-02-11 19:41
 OpenVPN cipher string doesn't work with 2.3.2 according to: @bong0.
-tlc-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-256-CBC-SHA256:TLS-DHE-RSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-128-CBC-SHA256:TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA:TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA:TLS-DHE-RSA-WITH-AES-128-CBC-SHA:TLS-RSA-WITH-CAMELLIA-256-CBC-SHA:TLS-RSA-WITH-AES-256-CBC-SHA:TLS-RSA-WITH-CAMELLIA-128-CBC-SHA:TLS-RSA-WITH-AES-128-CBC-SHA
+Openvpn deprecated cipher string from the pdf. Therefore @bong0 hacked a script converting log messages to a sed expression https://gist.github.com/bong0/8941764 to run over an existing config file.
+output:
+tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-256-CBC-SHA256:TLS-DHE-RSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-128-CBC-SHA256:TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA:TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA:TLS-DHE-RSA-WITH-AES-128-CBC-SHA:TLS-RSA-WITH-CAMELLIA-256-CBC-SHA:TLS-RSA-WITH-AES-256-CBC-SHA:TLS-RSA-WITH-CAMELLIA-128-CBC-SHA:TLS-RSA-WITH-AES-128-CBC-SHA
 http://twitter.com/bong0/status/433306823001526272
 http://twitter.com/bong0/status/433307537375387648
 http://nopaste.info/d194fdaa78.html
@@ -15,10 +17,22 @@ user's OpenVPN linked against OpenSSL 1.0.0. on Wheezy backport.
 http://packages.debian.org/wheezy-backports/openvpn
 
 
+2014-02-27 22:59
+I think we should add the supported SSL / TLS versions from Microsoft IIS.
+http://twitter.com/gegch/status/439156512599322625
+
+2014-05-23 23:14
+@BetterCrypto @MacLemon speaking of feedback, generating CSRs, revocation certs, and managing them would be a welcome addition
+http://twitter.com/yawnbox/status/469948745589612544
+
+
+
 BIG TOPICS
 ==========
 
 
+* Blackhat presentation on RSA problems!! -> ECC + ECDSA instead (recommendation of P.Zimmermann @STRINT workshop 2014)
+
 * be consistent: 2048 RSA < 128 bit symmetric cipher strength. We should aim at 128+ bits symmetric strength. --> fix RSA 2048 in the document. Upgrade to 3072
 
 * clean up 9.5 "chossing your own cipher"