From 099408321ceda65787797a64dbd0a57b559b069f Mon Sep 17 00:00:00 2001 From: cm Date: Thu, 21 Nov 2013 12:23:36 +0100 Subject: [PATCH] fix crossreferences --- src/cipher_suites.tex | 2 +- src/disclaimer.tex | 1 + 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/src/cipher_suites.tex b/src/cipher_suites.tex index f17284a..e16e125 100644 --- a/src/cipher_suites.tex +++ b/src/cipher_suites.tex @@ -31,7 +31,7 @@ a set of cipher suites which we will recommend throught this document. \textbf{Caution: these settings can only represent a subjective choice of the authors at the time of this writing. It might be a wise choice to select your own cipher suites based on the instructions in section -\ref{section:ChosingYourOwnCipherSuites}}. +\ref{section:ChoosingYourOwnCipherSuites}}. \subsubsection{Configuration A: strong ciphers, fewer clients} diff --git a/src/disclaimer.tex b/src/disclaimer.tex index ba4e427..578be76 100644 --- a/src/disclaimer.tex +++ b/src/disclaimer.tex @@ -1,4 +1,5 @@ \section{Disclaimer} +\label{section:disclaimer} This guide specifically does not address physical security issues, protecting software and hardware against exploits, basic IT security housekeeping tasks, anti-tempest\footnote{\url{https://en.wikipedia.org/wiki/Tempest\_(codename)}} attack techniques, protecting against side-channel attacks or other similar attacks which are usually employed to circumvent strong encryption. The authors can not overstate the importance of these other techniques. This guide can only describe what the authors currently \emph{believe} to be the best settings based on their personal experience. This guide was cross checked by multiple people. For a complete list, see the section ``reviewers''. Even though, multiple specialists reviewed the guide, the authors can give \emph{no guarantee} whatsover that they made the right recommendations. Keep in mind that tomorrow there might be new attacks on some ciphers and many of the recommendations in this guide might turn out to be wrong. -- 2.20.1