Added request for CSRs, Cert revocaton and cert/key management by @yawnbox
[ach-master.git] / TODO.md
diff --git a/TODO.md b/TODO.md
index b12a4f5..2de2340 100644 (file)
--- a/TODO.md
+++ b/TODO.md
@@ -4,10 +4,35 @@ Reported by: @Wims80 http://twitter.com/wims80/status/425770704693239808
 Section Apache 2.1.1 recommends Rewrite instead of Redirect. Should be 301! (We correctly recommend 301 in the nginx section.)
 
 
+2014-02-11 19:41
+OpenVPN cipher string doesn't work with 2.3.2 according to: @bong0.
+Openvpn deprecated cipher string from the pdf. Therefore @bong0 hacked a script converting log messages to a sed expression https://gist.github.com/bong0/8941764 to run over an existing config file.
+output:
+tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-256-CBC-SHA256:TLS-DHE-RSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-128-CBC-SHA256:TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA:TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA:TLS-DHE-RSA-WITH-AES-128-CBC-SHA:TLS-RSA-WITH-CAMELLIA-256-CBC-SHA:TLS-RSA-WITH-AES-256-CBC-SHA:TLS-RSA-WITH-CAMELLIA-128-CBC-SHA:TLS-RSA-WITH-AES-128-CBC-SHA
+http://twitter.com/bong0/status/433306823001526272
+http://twitter.com/bong0/status/433307537375387648
+http://nopaste.info/d194fdaa78.html
+guid string produces deprecated warning, no errors.
+user's OpenVPN linked against OpenSSL 1.0.0. on Wheezy backport.
+http://packages.debian.org/wheezy-backports/openvpn
+
+
+2014-02-27 22:59
+I think we should add the supported SSL / TLS versions from Microsoft IIS.
+http://twitter.com/gegch/status/439156512599322625
+
+2014-05-23 23:14
+@BetterCrypto @MacLemon speaking of feedback, generating CSRs, revocation certs, and managing them would be a welcome addition
+http://twitter.com/yawnbox/status/469948745589612544
+
+
+
 BIG TOPICS
 ==========
 
 
+* Blackhat presentation on RSA problems!! -> ECC + ECDSA instead (recommendation of P.Zimmermann @STRINT workshop 2014)
+
 * be consistent: 2048 RSA < 128 bit symmetric cipher strength. We should aim at 128+ bits symmetric strength. --> fix RSA 2048 in the document. Upgrade to 3072
 
 * clean up 9.5 "chossing your own cipher"
@@ -44,6 +69,11 @@ Website
 People with outdated browsers (winXP) etc can't see our webpage. --> make a landing page explaining 
 how to updated the browser :)
 
+Improve the wording on the cert.at Mailing list website so people don't get confused and know that they ended up on the correct site and list.
+
+LANGUAGES
+=========
+* translate to french and other european languages
 
 Formatting
 ==========
@@ -110,7 +140,7 @@ Contents
 * Webservers:
   Header Strict-Transport-Security "... includeSubDomains": we need to meed to mention that this can be a big pitfall.
   Also do some more research on this!
-  For example: http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec#section-6.1
+  For example: https://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec#section-6.1
   fix lighttpd HTTP redirection and env vars
   lighthttpd: ssl.ec-curve = "secp384"
     ssl.dh-file = "/etc/lighttpd/dhparams-group16.pem"