[hiprg] book on HIP/SMA published

Andrei Gurtov <gurtov@hiit.fi> Fri, 05 February 2010 06:53 UTC

Return-Path: <gurtov@hiit.fi>
X-Original-To: hiprg@core3.amsl.com
Delivered-To: hiprg@core3.amsl.com
Received: from localhost (localhost []) by core3.amsl.com (Postfix) with ESMTP id C73F63A6DB0 for <hiprg@core3.amsl.com>; Thu, 4 Feb 2010 22:53:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([]) by localhost (core3.amsl.com []) (amavisd-new, port 10024) with ESMTP id jRS2-Uz-xesd for <hiprg@core3.amsl.com>; Thu, 4 Feb 2010 22:53:42 -0800 (PST)
Received: from argo.otaverkko.fi (argo.otaverkko.fi []) by core3.amsl.com (Postfix) with ESMTP id B14953A6CD2 for <hiprg@irtf.org>; Thu, 4 Feb 2010 22:53:42 -0800 (PST)
Received: from [] (dsl-hkibrasgw3-ffd8c300-15.dhcp.inet.fi []) by argo.otaverkko.fi (Postfix) with ESMTP id 4943425ED21 for <hiprg@irtf.org>; Fri, 5 Feb 2010 08:54:31 +0200 (EET)
Message-ID: <4B6BC0A5.5070403@hiit.fi>
Date: Fri, 05 Feb 2010 08:54:29 +0200
From: Andrei Gurtov <gurtov@hiit.fi>
User-Agent: Thunderbird (Windows/20090605)
MIME-Version: 1.0
To: "hiprg@irtf.org" <hiprg@irtf.org>
X-Enigmail-Version: 0.96.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Subject: [hiprg] book on HIP/SMA published
X-BeenThere: hiprg@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "Host Identity Protocol \(HIP\) Research Group" <hiprg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/listinfo/hiprg>, <mailto:hiprg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/hiprg>
List-Post: <mailto:hiprg@irtf.org>
List-Help: <mailto:hiprg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/hiprg>, <mailto:hiprg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Feb 2010 06:53:43 -0000

Hash: SHA1


Recently another HIP book "Beyond HIP: The End to Hacking As We Know It"
by Richard H. Paine
has been published.

I've got a copy and highly recommend the book to everybody who is
interested how the HIP can be used in real-life to secure the factory
networking as well as air-to-ground link of airplanes. This book does
not describe the HIP details themselves but focuses on attack scenarios,
integrated SMA architecture, and deployment stories. Therefore it's a
nice complement to my book "Host Identity Protocol (HIP): Towards the
Secure Mobile Internet Book"

If your are interesting to test yourself the Tofino product called
Endbox that can securely connect legacy devices through a HIP tunnel,
those are available from ByresSecurity from Canada.

Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/