Register  |  Organizers  | 
 Invitation  | 
 At a
Glance  |  Training  |  Tech Sessions  |  WIPs
 BOFs  |  Workshops  |  Exhibition  |  Sponsors  |  Social
Activities  |  Hotel/Travel  |  Students
 Questions?  |  Help Promote!  |  Call for Papers  |  Past Proceedings      
 Technical Sessions: Wednesday, November 17 | Thursday, November 18 | Friday,  November
19 | All in one file   
 
   |   
 | 
 Friday, November 19, 2004  |  
 | 
 9:00 a.m.10:30 a.m.  | 
 Friday  |   
 
 
REFEREED PAPERS Marquis III
Security   Session Chair: David Hoffman, Stanford
University
 Making a Game of Network
Security  Marc Dougherty, Northeastern University  
Securing the PlanetLab Distributed Testbed: How
to Manage Security in an Environment with No Firewalls, with All Users
Having Root, and No Direct Physical Control of Any System 
 Paul Brett, Mic Bowman, Jeff Sedayao, Robert Adams, Rob
Knauerhause, and Aaron Klingaman, Intel Corporation
  Secure Automation: Achieving Least
Privilege with SSH, Sudo, and Suid  Robert A. Napier,
Cisco Systems    | 
 
NETWORK/SECURITY/
PROFESSIONAL TRACK
 Marquis II
Session Chair: Lee Damon,
University of Washington
  System Administration and Sex Therapy: The Gentle Art of
Debugging  Speaker: David Blank-Edelman, Northeastern
University 
  Listen in MP3 format 
View Presentation Slides (PDF)
 
Already debugged three things today and it's not even breakfast? You
must be a sysadmin. Our life is chock full of debugging
"opportunities." Not only do we have to fix problems in complex
systems, we often find ourselves debugging the interactions
between  complex systems designed by other people.   To understand
this process better and to get better at it, we're going to turn to an
unlikely source of information: sex therapists, counselors, and
educators. With their help, we'll explore why improving the
interactions between complex systems when they go awry is so hard and
what techniques and craft can be used to make the process easier. Come
to this talk not for its mature subject matter, but for the chance to
learn to be a better sysadmin through better debugging.
  | 
 
GURU SESSIONS
 Marquis IV
RAID/HA/SAN (with a Heavy Dose of Veritas)
 
Doug Hughes, Global Crossing; Darren Dunham, TAOS
  Doug Hughes and Darren Dunham have 13+ years of Veritas between
them. They have years of experience working on Volume Manager, Veritas
File System, Database Edition, Volume Replicator, Cluster Server, and
NetBackup. Whether you have a SAN or direct-attach storage, a database
or a fileystem, a single system or a cluster, or a perplexing backup or
disaster recovery issue, this session will cover it all. Generic
questions about technology components (RAID, SAN, HA, backup, disaster
recovery) are welcome.
  | 
 
 
  |   
 | 
 10:30
a.m.11:00 a.m.   Break  |  
 
  |   
 | 
 11:00
a.m.12:30 p.m.  | 
 Friday  |  
 
 
REFEREED PAPERS Marquis III
Theory   Session Chair: John Sechrest, Public
Electronic Access to Knowledge
 Experience in Implementing an HTTP
Service Closure  Steven Schwartzberg, BBN
Technologies; Alva Couch, Tufts University   Meta Change Queue: Tracking Changes to People,
Places, and Things  Jon Finke, Rensselaer Polytechnic
Institute 
 Solaris Zones: Operating System Support for
Consolidating Commercial Workloads  Daniel Price and Andrew
Tucker, Sun Microsystems, Inc.
   | 
 
INVITED TALKS
 Marquis I
Session Chair: Adam Moskowitz, Menlo Computing
  The Administrator, Then and Now
  Speaker:  Peter H. Salus, UNIX Historian  50 years
ago, enormous, isolated machines were tended by priests in white coats
called operators.  40 years ago, people carried large boxes of cards
and presented them to operators, who (if one was lucky) returned work
product 24 hours later.   By 30 years ago, many "terminals" were
connected to more central "mainframes"; 20 years ago, "workstations"
and "personal computers" had come into being.   As storage and
connectivity waxed, the role of the operator transformed into that of
the system administrator.  This talk will trace that transformation.
  | 
 
 NETWORK/SECURITY/
PROFESSIONAL TRACK
 Marquis II
Session Chair: Rudi Van
Drunen, Leiden Pathology and Cytology Labs, Leiden, The
Netherlands
  Used Disk Drives   Speaker: Simson Garfinkel, MIT
Computer Science and Artificial Intelligence Laboratory
 
View Presentation Slides (PDF)
 
Between
1998 and 2002, Simson Garfinkel purchased 200 used hard drives on eBay.
Analyzing these hard drives with a simple UNIX-based system, he found a
treasure trove of personal and business confidential
informationinformation he never should have seen.   In this
talk, Garfinkel will discuss the information he found and why it was
findable. He'll give a brief survey of how filesystems lay information
on the hard drive, how and when that information is overwritten, and
what tools you can use to perform forensic analysis and properly
sanitize media. Finally, he'll show how the results of this research
are applicable to digital cameras, flash memory, MP3 players, Palm
Pilots, and a wide variety of other systems.
  | 
 
GURU SESSIONS
 Marquis IV
Professional Growth  
David Parter, University of Wisconsin   David has been a
system administrator at the University of Wisconsin Computer Science
Department since 1991, serving as Associate Director of the Computer
Systems Lab since 1995. David has been the senior system administrator,
guiding a staff of 8 full-time sysadmins and supervising up to 12
student sysadmins at a time. His experiences in this capacity include
working with other groups on campus; providing technical leadership to
the group; managing the budget; dealing with vendors; dealing with
faculty; and training students. As a consultant, he has dealt with a
variety of technical and management challenges. He has sat on the SAGE
executive committee since December 1999, serving as SAGE President in
20012002.
  |   
 
  |   
 | 
 12:30
p.m.2:00 p.m.   Lunch (on your own) 
 |  
 
  |   
 | 
 2:00 p.m.3:30 p.m.  |   Friday  |  
 
 
Work-in-Progress Reports
(WiPs)  Marquis I
 Session Chair:  Esther Filderman,
Pittsburgh Supercomputing Center
 Short, pithy, and fun, Work-in-Progress reports introduce
interesting new or ongoing work. If you have work you would like to
share or a cool idea that's not quite ready for publication, send a
one- or two-paragraph summary to lisa04wips@usenix.org. We are
particularly interested in presenting students' work. A schedule of
presentations will be posted at the conference, and the speakers will
be notified in advance. Work-in-Progress reports are five-minute
presentations; the time limit will be strictly enforced.
 Click here for a current WiPs schedule
  | 
 
INVITED TALKS
 Marquis II
Session Chair: David Blank-Edelman, Northeastern University
  Lessons Learned from Howard Dean's Digital Campaign
  Speakers:  Keri Carpenter, UC Irvine; Tom Limoncelli,
Consultant
  Listen in MP3 format 
View Keri Carpenter's Presentation Slides (PDF) 
View Tom Limoncelli's Presentation Slides (PDF) 
Howard Dean's campaign use of Web technology has had a lasting
effect on politics.  Their Internet-based tools had 2 goals: raise
funds and raise the level of participation.  They broke all fundraising
records ($50 million during the campaign) and invigorated a volunteer
base the like of which had not been seen before.  The talk will
describe tools including the Web site, the blog, fundraising tools, and
online meet-up tools.  The culture and the tools employed during the
campaign offer important lessons on how the Internet can be used by any
campaign and any political party to organize distributed masses of
people to collaborate for active participation in the democratic
process. Campaigns from local races to national campaigns have adopted
the techniques developed by Dean for America.
  | 
 
 NETWORK/SECURITY/
PROFESSIONAL TRACK
 Marquis III
Session Chair: David
Hoffman, Stanford University
  Storage Security: You're Fooling Yourself   Speaker: W.
Curtis Preston, Glasshouse Technologies
  Those of us who design and administer networked storage must now
begin to apply security principles and techniques to our storage
networks. This talk will start with brief explanations of security for
storage administrators, and storage for security administrators.  It
will then cover the vulnerabilities and exploits of SAN and NAS
networks. Once these issues are on the table, we will discuss
techniques to overcome these vulnerabilities, from readily available
configuration choices to future industry directions.   | 
 
GURU SESSIONS
 Marquis IV
Configuration Management   Gene Kim,
Tripwire, Inc.   So you need to build a change management
process: either you were nailed by an IT audit, an industry regulation,
or Sarbanes-Oxley, or you just need a better way to integrate security
into your IT operational processes. How are you identifying the gaps
and bootstrapping the necessary controls, with each step having a
beginning and a clearly defined goal? Join our guru session to discuss
and explore how to build auditable change and configuration management
processes, not only to achieve sustainable security and auditable
processes, but also to build a high-performing IT ops team with the
best service levels (MTTR, MTBF, low amounts of unplanned work) and
efficiencies (improved server to system administrator ratios).   | 
 
 
  |   
 | 
 3:30
p.m.4:00 p.m.   Break  |  
 
  |   
 | 
 4:00
p.m.5:30 p.m.  | 
 Friday  |  
 LISA Game Show
 Marquis II 
Closing this year's conference, the LISA Game Show will once again pit
attendees against each other in a test of technical knowledge and
cultural trivia. Host Rob Kolstad and sidekick Dan Klein will provide
the questions and color commentary for this always memorable event.
  |  
  
 |