cryptographic keys should be regenerated during installation
TurnKey appliances are vulnerable to a cryptographic weakness due to the usage of non-secret private keys.
This allows an attacker to effectively subvert encryption: decrypt traffic, perform man in the middle attacks, etc. Very bad news for a
system that relies on that encryption to survive in a hostile public network.