Tag Archives: NSA

Passwords revisited

After having generated pre-shared secret keys for IPsec VPNs, as recommended by the NSA, I wondered how “secure” the keys themselves actually were. The NSA specifically mentions the use of “large, high entropy, pre-shared keys”. Quite some time ago I … Continue reading

Posted in Crypto, IT Security | Tagged , , , | Comments Off on Passwords revisited

Javascript IPsec configuration generator for site-2-site VPN gateways

Today, access to the internet is practically everywhere. Private communication across it is often taken for granted. There is an entire industry around secure┬ácommunication and a lot of the equipment used for securing network boundaries, VPNs specifically, relies on the … Continue reading

Posted in Crypto, IT Security, Linux | Tagged , , , , , , , , , , , , , | Comments Off on Javascript IPsec configuration generator for site-2-site VPN gateways