|  
 
 | 
| Sunday, April 10, 2005 |  
| S1 Hands-on Linux Security Class: Learn How to Defend Linux/UNIX Systems by Learning to Think Like a Hacker (Day 1 of 2) Rik Farrow, Security Consultant
 9:00 a.m.5:00 p.m.
 
Who should attend: System administrators of Linux and other UNIX systems; anyone who runs a public UNIX server.
 
Few people enjoy learning how to swim by being tossed into the ocean, but that's what happens if a system you manage gets hacked. You often have little choice other than to reload that system, patch it, and get it running again. This two-day class gives you a chance to work with systems that have been "hacked," letting you search for hidden files or services or other evidence of the intrusion. Examples are taken from real, recent attacks on Linux systems. You will perform hands-on exercises with dual-use tools to replicate what intruders do as well as with tools dedicated to security. The tools vary from the ordinary, such as find and strings, to less familiar but very important ones, such as lsof, scanners, sniffers, and the Sleuth Kit.
 
The lecture portion of this class covers the background you need to understand UNIX security principles, TCP/IP, scanning, and popular attack strategies.
 
Day Two will explore the defenses for networks and individual systems. The class will end with a discussion of the use of patching tools for Linux, including cfengine.
 
Class exercises will require that you have an x86-based laptop
computer that can be booted from a KNOPPIX CD. Students will receive
a version of Linux on CD that includes the tools, files, and exercises
used in the course. If you have a laptop but don't know whether it
can run a bootable Linux CD (that will not have an impact on your
installed hard drive or operating systems), please download a copy
of KNOPPIX (https://www.knoppix.org), burn it, and try it out. KNOPPIX
support for wireless is the same as common Linux kernels (not
exciting), but KNOPPIX does a superb job of handling most other
hardware found in laptops.
 
Exercises include:
 
DAY ONE:
 
	DAY TWO:Finding hidden files and evidence of intrusionTCP/IP and its abuseshping2 probes, or xprobe with ethereal againnmap while watching with ethereal or tcpdump (connect and SYN scans)Working with buffer-overflow exploit examplesApache servers and finding bugs in scriptsJohn the Ripper, password cracking 
	Rik Farrow (S1, M1) provides UNIX and Internet security consulting and training.Elevation of privilege and suid shellsRootkits, and finding rootkits (chkrootkit)Sleuth Kit (looking at intrusion timelines)iptables and netfilterTracking down DoS floodscfengine configurationVulnerability scanning with nessus  He has been working with UNIX system security since 1984 and with TCP/IP networks since 1988. He has taught at the IRS, Department of Justice, NSA, NASA, US West, Canadian RCMP, Swedish Navy, and for many US and European user groups. He is the author of UNIX System Security, published by Addison-Wesley in 1991, and System Administrator's Guide to System V (Prentice Hall, 1989). Farrow writes a column for ;login: and a network security column for Network magazine. Rik lives with his family in the high desert of northern Arizona and enjoys hiking and mountain biking when time permits. 
S3 Hot Topics in System Administration Ned McClain, Applied Trust Engineering  
 9:00 a.m.5:00 p.m.
 Who should attend: System and network administrators who are 
interested in picking up several new technologies quickly. 
 
Topics include:
 
	Ned McClain (S3), co-founder and CTO of Applied Trust Engineering, lectures
around the globeBIND9 Tips and Tricks: A Better DNSMost sites have migrated to BIND9, but are you really getting the most out 
of this major rewrite of the Internet's most popular nameserver? Learn 
about powerful new functionality such as split views, remote management, 
and even DNSSEC. This topic is a must for every modern administrator.
Rapid Linux Disaster RecoveryTape backups are essential, but they are not 
an efficient way to restore a server in an emergency. We evaluate the ins 
and outs of Mondo, an open source disaster recovery tool that can create 
bootable recovery CDs from any Linux server. When used in tandem with a 
solid tape backup system, Mondo recovery CDs can reduce "bare metal" 
recovery time from hours to minutes.
Linux Kernel TuningAs Linux's popularity in production environments increases, the need for 
Linux kernel tuning knowledge is more important than ever! Whether it's 
performance, security, or functionality you're looking to cajole your 
system into, we'll give you the "what to's" and the "how to's," and even 
the "what you can'ts" of this rare art.
Practical Integration of UNIX and Active DirectoryWith Active Directory, Microsoft introduced an open LDAP directory that has 
become the de facto authentication store at many organizations. UNIX/Linux 
administrators are often tasked with the unthinkable: to integrate UNIX 
authentication with Active Directory. We'll not only explore the standard 
integration tools, such as OpenLDAP, PAM, and NSS, but will show you 
how to create custom scripts to manage Active Directory from UNIX.
Performance Crises Case Studies #4Don't miss the latest episode of this incredibly popular segment! We've 
taken a new set of real-life system administration performance crises and 
dissected them, providing insight on how to diagnose and remedy situations 
that you may someday face. This is a great way to gain practical 
knowledge in the performance arena.
Custom Open Source Performance MonitoringMost organizations have monitoring systems that provide real-time problem 
alerts, but few can produce graphs of resource utilization over time. We provide practical examples of extending a monitoring 
system to collect historical performance trends. We'll use examples 
specific to Nagios and RRDtool, but the lessons and gotchas discussed here 
will prove useful to anyone looking to implement any new monitoring system.
  on applying cutting-edge technology in production computing
environments. Ned holds a B.S. in Computer Science from
Cornell University and is a contributing author of both
the UNIX Systems Administration Handbook and the Linux Administration
Handbook. 
  
 
S4 Regular Expression Mastery
|   |  
|   |  Mark-Jason Dominus, Consultant and Author
 9:00 a.m.12:30 p.m.
 
Who should attend: System administrators and users who use Perl, grep, sed, awk, procmail, vi, or emacs. Attendees should have prior experience
using regexes in UNIX utilities such as grep, sed, Perl, Python, vi,
or emacs.
 Almost everyone has written a regex that produced unexpected results. Sometimes regexes appear to hang forever, and it's not clear what has gone wrong. Sometimes they behave differently in different utilities, and you can't tell why. This class will fix all these problems. The first section of the class will explore the matching algorithms used internally by common utilities such as grep and Perl. Understanding these algorithms will allow us to predict whether a regex will match, which of several matches will be found, and which regexes are likely to be faster than others, and to understand why all of these behaviors occur. We'll learn why commonly used regex symbols such as ".," "$." and "\1" may not mean what you thought they did.  In the second section, we'll look at common matching disasters, a few practical parsing applications, and some advanced Perl features. We'll finish with a discussion of optimizations that were added to Perl 5.6, and why you should avoid using "/i." Topics include: Inside the regex engineRegular expressions are programsBacktrackingNFA vs. DFAPOSIX and PerlQuantifiersGreed and anti-greedAnchors and assertionsBackreferences
Disasters and optimizationsWhere machines come fromDisaster examplesTokenizingNew optimizationsMatching strings with balanced parentheses
 
Mark-Jason Dominus (S4, S9) has been programming in Perl since 1992. He is a moderator of the comp.lang.perl.moderated newsgroup, the author of the Text::Template, Tie::File, and Memoize modules, a contributor to the Perl core, and author of the perlreftut man page. His work on the Rx regular expression debugger won the 2001 Larry Wall Award for Practical Utility. He lives in Philadelphia with his wife, daughter, and several plush octopuses. 
  
 
S5 Eliminating Backup System Bottlenecks Using Disk-to-Disk and Other Methods
|   |   Jacob Farmer, Cambridge Computer Corp.
 9:00 a.m.12:30 p.m.
 
Who should attend: System administrators involved in the design
and management of backup systems and policymakers responsible for
protecting their organization's data. A general familiarity with
server and storage hardware is assumed. The class focuses on
architectures and core technologies and is relevant regardless of
what backup hardware and software you currently use. Students will
leave this lecture with immediate ideas for effective, inexpensive
improvements to their backup systems.
 
The end may finally be in sight for the pains of backup and restore.
The cost of disk storage has crossed the line: it has finally become
practical to use disk to enhance or replace tape-based backup
systems. In turn, software applications have come to market to
facilitate the use of disk in backup systems. Now the problem is
sorting out all of the options and fitting them into your existing
infrastructure. This lecture identifies the major bottlenecks in
conventional backup systems and explains how to address them. The
emphasis is placed on the various roles inexpensive disk can play in
your data protection strategy; however, attention is given to
SAN-enabled backup, the current state and future of tape drives,
iSCSI, and virtual tape.
 
Topics include:
 
Identifying and eliminating backup system bottlenecks
Conventional disk staging
Virtual tape libraries
Incremental forever and synthetic full backup strategies
Information life cycle management and nearline archiving
Data replication
Continuous backup
Snapshots
The current and future tape drives
Zero duplication file systems
iSCSI
 
Jacob Farmer (S5, S10)  is the CTO of Cambridge Computer Services, a specialized
integrator of  backup systems and storage networks. He has over 15
years of experience with storage technologies and writes an expert
advice column for InfoStor magazine. He is currently writing a book
on storage networking. 
 
Kerberos 5Revenge of the Three-Headed Dog  S6
  Gerald Carter, Samba Team/Hewlett-Packard
 9:00 a.m.12:30 p.m.
 
Who should attend: Administrators who want to
understand Kerberos 5 implementations on both UNIX/Linux and Windows clients
and servers.
 
For many organizations, Kerberos is an an old technology that has been
driven to the forefront by deployments of Microsoft Active Directory
domains. The introduction of a standard authentication protocol into
Windows domains has caused many network administrators to reexamine ways
to integrate UNIX/Linux and Windows clients in a single authentication
model.
 
Topics include:
 
Key concepts of the Kerberos 5 protocol
Specific related authentication interfaces such as SASL and
      GSSAPI
The specifics of implementing of Krb5 realms
Implementations of Krb5 cross-realm trusts
Integration of Windows and UNIX/Linux clients into Krb5 realms
Possible pitfalls of using popular
      Krb5 implementations such as MIT, Heimdal, and Windows 200x
 
Gerald Carter (S6, T6, W3)  has been a member of the Samba Development Team
since 1998. He has published articles with various
Web-based magazines and teaches courses as a
consultant for several companies. Currently employed by
Hewlett-Packard as a Samba developer, Gerald has written
books for SAMS Publishing and is the author of the recent
LDAP System Administration for O'Reilly Publishing. 
Advanced Shell Programming  S7
  Mike Ciavarella, University of Melbourne
 9:00 a.m.12:30 p.m.
 
Who should attend: Junior or intermediate system administrators or anyone with a basic knowledge of programming, preferably with some experience in Bourne/Korn shells (or their derivatives). 
 
The humble shell script is still a mainstay of UNIX/Linux system administration, despite the wide availability of other scripting languages. This tutorial details techniques that move beyond the quick-and-dirty shell script.
 
Topics include:
 
Common mistakes and unsafe practices
Modular shell script programming
Building blocks: awk, sed, etc.
Writing secure shell scripts
Performance tuning
Choosing the right utilities for the job
Addressing portability at the design stage
When not to use shell scripts
 
Mike Ciavarella (S7, S12,  M7)  has been producing and editing technical documentation since he naively agreed to write application manuals for his first
employer in the early 1980s. He has been a technical editor for
MacMillan Press and has been teaching system administrators about
documentation for the past eight years. Mike has an Honours Degree in
Science from the University of Melbourne. After a number
of years working as Senior Partner and head of the Security Practice
for  Cybersource Pty Ltd, Mike returned to his alma mater, the University
of Melbourne. He now divides his time between teaching Software 
Engineering, providing expert testimony in computer security matters,
and trying to complete a Doctorate. In his ever-diminishing spare time, 
Mike is a caffeine addict and photographer. 
Next-Generation Security Tools  S8
  Peter Baer Galvin, Corporate Technologies
 9:00 a.m.12:30 p.m.
 
Who should attend: Systems managers and security managers interested in
current security problems and the new generation of tools designed to solve
those problems.
 
This course covers a variety of topics of importance to those
designing or implementing security solutions for their installations. It
starts with the nasty world of current security threats and the
problems sites have to solve. It then talks about what is solvable and
what still has no solution. Finally, it covers each of the possible
solutions in detail.
(Note: Most of these solutions are commercial products.)
 
Topics include:
 
	Peter Baer Galvin (S8, M3, T3) is the Chief Technologist for Corporate Technologies, Inc., a systems integrator and VAR,A security methodology
		Determining the state of your world
		Determining the problems to solve
		Policy and procedure
		Risk assessment, security audit, and penetration testing
		 Firewalls: Why don't they work?Protecting Web serversReducing spamPatch management and avoiding patchingNetwork snoopingGaining status knowledge of your facilityContent filtering and antivirus software
	Weak and strong authentication
	Spyware and peer-to-peer networks  and was the Systems Manager for Brown University's Computer Science Department. He has written articles
for Byte and other magazines. He wrote the "Pete's Wicked World" and
"Pete's Super Systems" columns at SunWorld. He is currently
contributing editor for Sys Admin, where he manages the Solaris
Corner. Peter is co-author of the Operating Systems Concepts and Applied Operating Systems Concepts textbooks. As a consultant and trainer, Peter has taught tutorials on security and system administration and has given talks at many conferences and institutions on such topics as Web
services, performance tuning, and high availability. 
Perl Program Repair Shop and Red Flags  S9
 Mark-Jason Dominus, Consultant and Author
 1:30 p.m.5:00 p.m.
 
Who should attend: Anyone who writes Perl programs regularly. Participants should have at least three months'
experience programming in Perl.
 
You've probably been working too hard when you program,
writing twenty lines of code when you only needed ten. But there is a
better way, and I will show it to you. You'll learn how to improve
your own code and the code of others, making it cleaner, more
readable, more reusable, and more efficient, while at the same time
making it 30-50% smaller. Smaller code contains fewer bugs and takes
less time to maintain.
 
We will examine several real code examples in detail and see how to
improve them. We'll focus on red flagswarning
signs in your code that are plainly visible once you know what to look
forand on techniques that require little complex thought or
ingenuity. All the bad code in this class is guaranteed 100% genuine
and typical.
 
Participants are encouraged to submit their own code for anonymous
review in the class.  (Send it to 
mjd-usenix-2005@plover.com by March 1.)  Class
content varies depending on submissions, but is sure to include some
of the topics listed below.
 
Topics include:
 
Families of variables 
Making relationships explicit 
Refactoring 
Programming by convention 
The Flesh Blanket 
Conciseness 
Why you should avoid the "." operator 
Elimination of global variables 
Superstition 
The "use strict" zombies 
Repressed subconscious urges 
The cardinal rule of computer programming 
The psychology of repeated code 
Techniques for eliminating repeated code 
What can go wrong with "if" and "else" 
The Condition That Ate Michigan 
Resisting "Holy Doctrine" 
Trying it both ways 
Structural vs. functional code 
Elimination of structure 
Boolean values 
Programs that take two steps forward and one step back 
Programs that are 10% backslashes 
'print print print print print '
C-style "for" loops 
Loop counter variables 
Array length variables 
Unnecessary shell calls 
How (and why) to let "undef" be the special value 
Confusion of internal and external representations of data 
Tool use 
Elimination of repeated code with higher-order functions 
Learning to use a hammer 
The "swswsw" problem 
Avoiding special cases 
Using uniform data representations
 
Mark-Jason Dominus (S4, S9) has been programming in Perl since 1992. He is a moderator of the comp.lang.perl.moderated newsgroup, the author of the Text::Template, Tie::File, and Memoize modules, a contributor to the Perl core, and author of the perlreftut man page. His work on the Rx regular expression debugger won the 2001 Larry Wall Award for Practical Utility. He lives in Philadelphia with his wife, daughter, and several plush octopuses. 
Jacob Farmer, Cambridge Computer Services  S10 Next-Generation Storage Networking and Data Protection
  
 1:30 p.m.5:00 p.m.
 
Who should attend: Sysadmins running day-to-day operations and those who set or enforce budgets. This lecture is technical in nature, but it
does not address command-line syntax or the operation of
specific products or technologies.   Rather, the focus is on general
architectures and various approaches to scaling in both
performance and capacity.  Since storage technologies tend to be
expensive, there is some discussion of the relative cost of different
technologies and of strategies for managing cost and achieving
results on a limited budget. 
 
There has been tremendous innovation in the data storage industry
in the past few years, and this year the pace has quickened.
Proprietary monolithic SAN and NAS subsystems are giving way to
open-system and distributed architectures. Data-transfer protocols
such as SCSI, NFS, and CIFS are facing competition from VI and
DAFS. Fibre-channel and parallel SCSI interfaces are challenged by
Gigabit Ethernet, iSCSI, and serial ATA. Bottlenecks imposed by
I/O buses and stacks stand to be eliminated by Infiniband and
RDMA.
 
This tutorial describes the latest technologies to hit the market
for storage networking: SAN and NAS architectures, virtual storage,
parallel file systems, storage interfaces, etc.
 
Topics include:
 
	Fundamentals of storage networkingShortcomings of conventional SAN and NAS architectures Comparison of storage interfaces: fibre channel, SCSI, serial ATA, Infiniband, Ethernet Comparison of storage protocols: CIFS, NFS, SCSI, VI, DAFS Open systems storage virtualization The convergence of SAN and NAS High-performance file sharing (NAS on steroids) SAN-enabled file systemsWide-area file systemsParallel file systems Content-addressable storage 
Jacob Farmer (S5, S10)  is the CTO of Cambridge Computer Services, a specialized
integrator of  backup systems and storage networks. He has over 15
years of experience with storage technologies and writes an expert
advice column for InfoStor magazine. He is currently writing a book
on storage networking. 
 
David N. Blank-Edelman, Northeastern University  S11 Over the Edge System Administration, Volume 1
  
 1:30 p.m.5:00 p.m.
 
Who should attend: Old-timers who think they've already seen it all, and those who
want to develop inventive thinking early in their career. Join us and be
prepared to be delighted, disgusted, and amazed. Most of all, be ready to
enrich your network and system adminstration by learning to be different.
 
Can you think "out of the box" about system administration? One of the 
things that distinguishes the really great sysadmins from the good ones 
is their ability to be creative in their approach to problems and 
solutions. It's time to learn how to break the rules, abuse the tools, and generally
turn your system administration knowledge inside out. This class is a
cornucopia of ideas for creative ways to take the standard (and sometimes
not-so-standard) system administration tools and techniques and use them in
ways no one would expect. We'll also cover some tools you may have missed. 
 
Topics include:
 
How to (ab)use perfectly good network transports by using them for
     purposes never dreamed of by their authors
How to increase user satisfaction during downtimes with 6 lines of Perl
How to improve your network services by intentionally throwing away data
How to drive annoying Web-only applications that don't have a command
     line interfacewithout lifting a finger
How to use ordinary objects you have lying around the house, such as Silly
     Putty, to make your life easier (seriously!)
 
David N. Blank-Edelman (S11, M4) is the Director of Technology
at the Northeastern University College of  Computer and Information Science
and the author of the O'Reilly book Perl for System Administration. He has
spent the last 19 years as a system/network administrator in large multi-platform environments, including Brandeis University, Cambridge Technology
Group, and the MIT Media Laboratory. He has given several successful invited talks off the beaten path at LISA and is the LISA '05 Program Chair. 
Mike Ciavarella, University
of Melbourne  S12 Documentation Techniques for SysAdmins
  
 1:30 p.m.5:00 p.m.
 
Who should attend: System administrators who need to produce documention for the systems they manage or who want to improve their documentation skills.
 Attendees should be able to make immediate, practical use of the techniques presented in this tutorial in their day-to-day tasks. Particular emphasis is placed on documentation as a time-saving tool rather than a workload imposition. 
 
Topics include:
 
Why system administrators need to document
The document life cycle
Targeting your audience
An adaptable document framework
Common mistakes
Tools to assist the documentation process
 
Mike Ciavarella (S7, S12, M7)  has been producing and editing technical documentation since he naively agreed to write application manuals for his first
employer in the early 1980s. He has been a technical editor for
MacMillan Press and has been teaching system administrators about
documentation for the past eight years. Mike has an Honours Degree in
Science from the University of Melbourne. After a number
of years working as Senior Partner and head of the Security Practice
for  Cybersource Pty Ltd, Mike returned to his alma mater, the University
of Melbourne. He now divides his time between teaching software 
engineering, providing expert testimony in computer security matters,
and trying to complete a Doctorate. In his ever-diminishing spare time, 
Mike is a caffeine addict and photographer. 
Geoff Halprin, The SysAdmin Group  S13 Troubleshooting: A Basic Skill
  
 1:30 p.m.5:00 p.m.
 
Who should attend: System administrators wishing to hone their ability to
troubleshoot a problem under pressure, on a system of which their knowledge may be limited. 
 
One of the most basic skills a system administrator must be
able to call upon is that of problem diagnosis and resolution, that is,
 troubleshooting. It doesn't matter what else you do; if the system
is broken, your priority is to fix it.
 
Topics include:
 
A general process for troubleshooting
Specific techniques that will help you get to the root of the problem
Ways to identify candidate solutions with confidence
 
Geoff Halprin (S13, T8) has spent over 25 years as a software developer,  system administrator, consultant, and troubleshooter. He has written software from system management tools to mission-critical billing systems, has built and run networks for enterprises
of all sizes, and has been called upon to diagnose problems in every aspect of computing infrastructure and software. He has spent more years troubleshooting other
people's systems and programs than he cares to remember. Geoff was on the board
of the System Administrators Guild (SAGE) and is now a member of the
USENIX board of directors. |  
| Monday, April 11, 2005 |  | M1 Hands-On Linux Security Class: Learn How to Defend Linux/UNIX Systems by Learning to Think Like a Hacker (Day 2 of 2) Rik Farrow, Security Consultant
 9:00 a.m.5:00 p.m.
 
See Part 1, S1, for the description of the first day of this tutorial.
 
Day two of this class focuses on practical forensics, that is, how to analyze a possibly hacked Linux or UNIX system from a system administrator's perspective.  As a system administrator, you will not be acting as law enforcement, trying to find the perpetrator, but instead will be working as quickly as possible with the goal of uncovering what went wrong. Finding rootkits and backdoors on a sample hacked system gives you an idea of what you might find on other similar systems. You can also get clues about the nature of the attack by discovering the tools left behind on a system by an attacker.
 
The final portion of this class focuses on patching, with a discussion of cfengine. As this is the second day of a two-day, hands-on course, we will not repeat material covered on the first day, including getting the CD working with your laptop.  If you plan on attending the course only the second day, you might want to contact the instructor before the class and get a test CD to ensure that your laptop will work in the classroom environment.
 
Exercises include:
 
	Elevation of privilege and suid shellsRootkits, and finding rootkits (chkrootkit)Sleuth Kit (looking at intrusion timelines)iptables and netfilterTracking down DoS floodsCfengine configurationVulnerability scanning with nessus 
Rik Farrow (S1, M1) provides UNIX and Internet security consulting and training.  He has been working with UNIX system security since 1984 and with TCP/IP networks since 1988.  He has taught at the IRS, Department of Justice, NSA, NASA, US West, Canadian RCMP, Swedish Navy, and for many US and European user groups.  He is the author of UNIX System Security, published by Addison-Wesley in 1991, and System Administrator's Guide to System V (Prentice Hall, 1989).  Farrow writes a column for ;login: and a network security column for Network magazine.  Rik lives with his family in the high desert of northern Arizona and enjoys hiking and mountain biking when time permits. 
M2 Network Security Protocols: Theory and Current Standards
Radia Perlman, Sun Microsystems,
and Charlie Kaufman, Microsoft
 9:00 a.m.5:00 p.m.
 
Who should attend:  Anyone who wants to understand the theory behind network security protocol design, with an overview of the alphabet soup of standards and cryptography. This tutorial is especially useful for anyone who needs to design or implement a network security solution, but it is also useful to anyone who needs to understand existing offerings in order to deploy and manage them.  Although the tutorial is technically deep, no background other than intellectual curiosity and a good night's sleep in the recent past is required.
 
First, without worrying about the details of particular standards, we discuss the pieces out of which all these protocols are built.
 We then cover subtle design issues, such as how secure email interacts with distribution lists, how designs maximize security in the face of export laws, and the kinds of mistakes people generally make when designing protocols.
 
Armed with this conceptual knowledge of the toolkit of tricks, we describe and 
critique current standards.
 
Topics include:
 
What problems are we trying to solve?
Cryptography
Key distribution
Trust hierarchies
Public key (PKI) vs. secret key solutions
Handshake issues
Diffie-Hellman
Man-in-middle defense
Perfect forward secrecy
Reflection attacks
PKI standards
Real-time protocols
SSL/TLS
IPsec (including AH, ESP, and IKE)
Secure email
Web security
 
Radia Perlman (M2)  is a Distinguished Engineer at Sun Microsystems.  She is known for her contributions to bridging (spanning tree algorithm) and routing (link
state routing), as well as security (sabotage-proof networks). She is the
author of Interconnections: Bridges, Routers, Switches, and Internetworking
Protocols and co-author of Network Security: Private Communication in a
Public World, two of the top ten networking reference books, according to
Network Magazine. She is one of the twenty-five people whose work has most influenced the networking industry, according to Data Communications Magazine. She has about fifty issued patents, an S.B. and S.M. in mathematics and a Ph.D. in computer science from MIT, and an honorary doctorate from KTH, the Royal Institute of Technology in Sweden. 
Charlie Kaufman (M2)  is Security Architect for the Common Language Runtime group at  Microsoft. He is editor of the new Internet Key Exchange 
(IKEv2) protocol for the IPsec working group of IETF. He has contributed 
to a number of IETF standards efforts, including chairing the Web 
Transaction Security WG and serving as a member of the Internet 
Architecture Board (IAB).  He served on the National Academy of Sciences 
expert panel that wrote the book Trust in Cyberspace. He was previously a
Distinguished Engineer at IBM, where he was Chief Security Architect for 
Lotus Notes and Domino, and before that Network Security Architect for 
Digital. He holds over 25 patents in the fields of computer security and 
computer networking. He is coauthor of Network Security: Private 
Communication in a Public World (Prentice Hall, 2002). 
M3 Advanced Solaris System Administration Topics Peter Baer Galvin, Corporate Technologies, Inc.  
 9:00 a.m.5:00 p.m.
 
Who should attend: UNIX administrators who need more knowledge of Solaris administration, especially the next-generation features of Solaris 10.
 
We will discuss the major new features of recent Solaris releases, including which to use (and how) and which to avoid. This in-depth course will provide the information you need to run a Solaris installation effectively. This tutorial has been updated to include Solaris 10 and several other new
topics.
 
Topics include:
 
Installing and upgrading
Planning your installation, filesystem layout, post-installation stepsInstalling (and removing) patches and packages Advanced features of Solaris
	
Filesystems and their usesThe /proc filesystem and commandsZFSThe Kernel
Kernel and performance tuning: new features, adding devices, tuning, debugging commandsDTrace Enhancing Solaris
Virtual IP: configuration and usesPerformance: how to track down and resolve bottlenecksTools: useful free tools, tool use strategiesSecurity: locking down Solaris, system modifications, tools, zones, privilegesResource management: fair share schedulerResources and references 
Peter Baer Galvin (S8, M3, T3) is the Chief Technologist for Corporate Technologies, Inc., a systems integrator and VAR,  and was the Systems Manager for Brown University's Computer Science Department. He has written articles
for Byte and other magazines. He wrote the "Pete's Wicked World" and
"Pete's Super Systems" columns at SunWorld. He is currently
contributing editor for Sys Admin, where he manages the Solaris
Corner. Peter is co-author of the Operating Systems Concepts and Applied Operating Systems Concepts textbooks. As a consultant and trainer, Peter has taught tutorials on security and system administration and has given talks at many conferences and institutions on such topics as Web
services, performance tuning, and high availability. 
M4 Perl for System Administration: The Power and the PraxisDavid N. Blank-Edelman, Northeastern University
 9:00 a.m.5:00 p.m.
 
Who should attend: System and
network administrators with at least advanced-beginner to intermediate Perl skills, who would like to make their jobs easier and less stressful in times of sysadmin crisis.
 
Perl was originally created to help with system administration, so
it is a wonder there isn't more instructional material
available to help people in our field use Perl to their
advantage. This tutorial hopes to begin to remedy this situation by presenting
six solid hours of instruction on using Perl for system
administration.
 
The morning section, based on the instructor's O'Reilly book, will concentrate on the 
power of Perl for sysadmin tasks. This jam-packed survey will take a 
multi-platform look at using Perl in cutting-edge and old-standby 
system administration domains.
 
Topics include:
 
In the afternoon, we'll look at ways to use short Perl programs to solve time-critical sysadmin
problems. Focusing on a set of battle stories, we'll discuss various approaches to dealing with crises with the help of Perl.Secure Perl scripting
Dealing with files and filesystems
	
	Source control
	XML
	Databases
	Log files
	Dealing with SQL databases via DBI and ODBC
Email as a sysadmin tool (including spam analysis)
Network directory services: NIS, DNS, LDAP, ADSI
Network management: SNMP and WBEM
 
You'll walk away from this class with Perl 
approaches and techniques that can help you solve your daily system 
administration problems. You'll have new ideas for writing 
small Perl programs to get you out of big sysadmin pinches. On top 
of all this, you are  likely to have deepened your knowledge of Perl.
 
David N. Blank-Edelman (S11, M4) is the Director of Technology
at the Northeastern University College of  Computer and Information Science
and the author of the O'Reilly book Perl for System Administration. He has
spent the last 19 years as a system/network administrator in large multi-platform environments, including Brandeis University, Cambridge Technology
Group, and the MIT Media Laboratory. He has given several successful invited talks off the beaten path at LISA and is the LISA '05 Program Chair. 
M5 Inside the Linux Kernel (Updated for Version 2.6)
 Theodore Ts'o, IBM
 9:00 a.m.5:00 p.m.
 
Who should attend: Application programmers and kernel developers. You should be reasonably familiar with C
programming in the UNIX environment, but no prior experience with the UNIX or Linux kernel code is assumed.
 This tutorial will give you an introduction to the structure of the Linux kernel, the basic features it provides, and the most important algorithms it employs.
 The Linux kernel aims to achieve conformance with existing standards and compatibility with existing operating systems; however, it is not a reworking of existing UNIX kernel code. The Linux kernel was written from scratch to provide both standard and novel features, and it takes advantage of the best practice of existing UNIX kernel designs.
 Although the material will focus on the latest release version of the Linux kernel (v. 2.6), it will also address aspects of the development kernel codebase (v. 2.7) where its substance differs from 2.6. It will not contain any detailed examination of the source code but will, rather, offer an overview and roadmap of the kernel's design and functionality.
 
Topics include:
 
How the kernel is organized (scheduler, virtual memory system,
filesystem layers, device driver layers, networking stacks)
	The interface between each module and the rest of the kernelKernel support functions and algorithms used by each moduleHow modules provide for multiple implementations of similar functionality Ground rules of kernel programming (races, deadlock conditions)Implementation and properties of the most important algorithms
	PortabilityPerformanceFunctionality Comparison between Linux and UNIX kernels, with emphasis on differences in algorithmsDetails of the Linux scheduler
	Its VM systemThe ext2fs filesystem The requirements for portability between architectures 
Theodore Ts'o (M5) has been a Linux kernel developer since almost the very
beginnings of Linux: he implemented POSIX job control in the
0.10 Linux kernel. He is the maintainer and author of the Linux COM
serial port driver and the Comtrol Rocketport driver, and he architected
and implemented Linux's tty layer. Outside of the kernel, he is 
the maintainer of the e2fsck filesystem consistency checker. Ted
is currently employed by IBM Linux Technology Center. 
M6 VoIP Principles and Practice Heison Chak, SOMA Networks  
 9:00 a.m.5:00 p.m.
 
Who should attend: Managers and system administrators involved in the evaluation, design,
implementation, and deployment of VoIP infrastructures.  Participants do
not need prior exposure to VoIP but should be familiar with network
principles. Attendees will come away from this tutorial with a foundation
in VoIP enabling strategic and cost-effective VoIP deployments in a
varierty of environments.
 
This tutorial will cover VoIP principles, and their interaction and
interface with the PSTN and IP networks. While CODECs, protocols, quality,
and some IETF standards are being discussed, this tutorial is also filled
with practical examples. Asterisk, which is open-source PBX software, will be used to demonstrate some of the unique features of VoIP. 
 
Topics include:
 
Heison Chak (M6) is a system and network administrator who works forToll bypassInteractive Voice Response SystemText-to-speech applicationsAnalog telephone adapter provisioningCall detail recording and blacklistingEcho training  SOMA Networks, focusing on network management and performance analysis
of data and voice networks. Heison has been an active member of the
Asterisk community. He started delivering tutorials at USENIX conferences and contributing
articles to ;login: in 2004. 
M7 Seven Habits of the Highly Effective System Administrator Mike Ciavarella, University
of Melbourne, and Lee Damon, University of Washington 
 9:00 a.m.5:00 p.m.
 
Who should attend: Junior system
administrators with anywhere from little to 3+ years of experience
in computer system administration.  We will focus on enabling the
junior system administrator to "do it right the first time." Some topics will use UNIX-specific tools as examples, but the class is applicable to any sysadmin and
any OS. Most of the material covered is "the other 90%" of system administrationthings
every sysadmin needs to do and to know, but which aren't details of specific
technical implementation.
 
We aim to accelerate the experience curve for junior system
administrators by teaching them the time-honored tricks (and
effective coping strategies) that experienced administrators take
for granted and which are necessary for successful growth of both
the administrator and the site.
 
The class covers many of the best practices that senior administrators
have long incorporated into their work.  We will touch on tools you
should use, as well as tools you should try to avoid.  We will touch
on things that come up frequently, as well as those which happen
only once or twice a year.  We will look at a basic security approach.
 
Topics include:
 
	Why your computers should all agree on what time it isWhy root passwords should not be the same on every computerWhy backing up every filesystem on every computer is not always a good ideaPolicies: where you want them and where you might want to avoid themEthical issuesGrowth and success as a solo sysadmin and as part of small, medium, and large teamsTraining, mentoring, and personal growth planningSite planning, budgeting, and logisticsBooks that can help you and your users 
Mike Ciavarella (S7, S12, M7)  has been producing and editing technical documentation since he naively agreed to write application manuals for his first
employer in the early 1980s. He has been a technical editor for
MacMillan Press and has been teaching system administrators about
documentation for the past eight years. Mike has an Honours Degree in
Science from the University of Melbourne. After a number
of years working as Senior Partner and head of the Security Practice
for  Cybersource Pty Ltd, Mike returned to his alma mater, the University
of Melbourne. He now divides his time between teaching software 
engineering, providing expert testimony in computer security matters,
and trying to complete a Doctorate. In his ever-diminishing spare time, 
Mike is a caffeine addict and photographer. 
Lee Damon (M7, T8) has a B.S. in Speech Communication from Oregon State University. He
has been a UNIX system administrator since 1985 and has been active in SAGE
since its inception. He assisted in developing a mixed AIX/SunOS environment
at IBM Watson Research and has developed mixed environments for Gulfstream
Aerospace and QUALCOMM. He is currently leading the development effort
for the Nikola project at the University of Washington Electrical Engineering
Department. He is past chair of the SAGE Ethics and Policies Working Groups. 
M8System Log Aggregation, Statistics, and Analysis 
 
Marcus Ranum, Tenable Security, Inc.
|   |  
|   |  9:00 a.m.5:00 p.m.
 Who should attend: System and network administrators who are interested in
learning what's going on in their firewalls, servers, network,
and systems; anyone responsible for security and audit or
forensic analysis.
 
This tutorial covers techniques and software tools for
building your own log analysis system, from aggregating
all your data in a single place, through normalizing it,
searching, and summarizing, to generating statistics and
alerts and warehousing it. We will focus primarily on
open source tools for the UNIX environment, but will
also describe tools for dealing with Windows systems
and various devices such as routers and firewalls.
 
Topics include:
 
Marcus Ranum (M8)  is Chief Security Officer at Tenable Security, Inc., and a world-renowned expert Estimating log quantities and log system requirementsSyslog: mediocre but pervasive logging protocolBack-hauling your logsBuilding a central loghostDealing with Windows logsLogging on Windows loghostsParsing and normalizingFinding needles in haystacks: searching logsI'm dumb, but it works: artificial ignoranceBayesian spam filters for loggingStorage and rotationDatabases and logsLeveraging the human eyeball: graphing log dataAlertingLegalities of logs as evidence  on security system design and implementation.
He is recognized as the inventor of the proxy firewall and the
implementer of the first commercial firewall product. Since the
late 1980s, he has designed a number of groundbreaking security
products, including the DEC SEAL, the TIS firewall toolkit, the
Gauntlet firewall, and NFR's Network Flight Recorder intrusion
detection system. He has been involved in every level of operations
of a security product business, from developer, to founder and CEO
of NFR. Marcus has served as a consultant to many FORTUNE 500 firms
and national governments, as well as serving as a guest lecturer
and instructor at numerous high-tech conferences.  In 2001, he was
awarded the TISC Clue award for service to the security community,
and he holds the ISSA lifetime achievement award. 
 |  
| Tuesday, April 12, 2005 |  | T2 Solaris Kernel Performance, Observability, and Debugging (Day 1 of 2)  
 
James Mauro and Richard McDougall, Sun Microsystems
|   |  
|   |  9:00 a.m.5:00 p.m.
 
Who should attend:  System and database administrators,
software architects, developers and programmers, performance and systems 
analysts, and IT architects wanting to obtain a deeper understanding of the
key Solaris subsystems, as well as the tools and facilities that can
be used to:
 
	Attendees should have some basic understanding of operating system principles
and application performance analysis. Students choosing to attend only
Day Two should be familiar with Solaris kernel subsystems and have
at least rudimentary  knowledge of the bundled tools and utilities and their
use.Observe, trace, and debug to optimize performanceObserve, trace, and debug to root-cause aberrent behaviorObserve and trace to understand how the application workload interacts with the operating systemBetter understand the system as a whole 
Applications are becoming more complex every day, and many of the new
Solaris features significantly reduce the effort required to
administer and anazlyze performance of the entire application and
operating system stack.
 
You may take this class as either a one-day experts class or a two-day complete class. On Day One, we provide an architectual
overview of the major Solaris subsystems and an introduction to
Solaris performance analysis. On Day Two, we cover advanced topics
and spend significant time with hands-on case studies, using the latest
tools, including dtrace, mdb, memtool, mdb, trapstat and the Solaris
process "ptools."
 
Topics include:
 
DAY ONE:
 
DAY TWO:
Solaris overview with performance monitoring and tuning
	Introduction to the Solaris kernelUsing DTrace for performance optimizationOverview of Solaris perf tools
Memory
	Overview of Solaris virtual memoryObserving and managing memoryUnderstanding memory utilization, optimizing, and monitoring
Process managment & scheduling
	Introduction to the Solaris process and thread modelDeveloping and tuning multi-threaded processesObserving debugging processes with the ptoolsControlling processes with ptoolsIntroduction to scheduling
Filesystems
	Overview of Solaris file system architectureUnderstanding cachingMeasurement and tuningFilesystems in Solaris: UFS, NFS, and the new S10 ZFS
Networking and I/O
	Solaris I/O architectureTCP/IP recapSolaris network performance and tuning 
Solaris observability and debugging tools
	Mastering Solaris DTraceHow to debug/monitor with "mdb"Kernel profiling and lock statistics with lockstatApplication lock statistics with plockstat
Advanced memory architecture and tuning
	TLB analysis using trapstatUsing large pages with the MPSS featuresNUMA memory allocation and techniques
Filesystem performance
	Tools for measuring and characterizingAnalysing file system performance using dtrace
Advanced thread scheduling and tools
	Thread scheduling, parking lots and queuesTracking thread priorities and sleep eventsUsing CPU binding and processor sets
Advanced dtrace
	Attributing network, file I/O to applicationsInvestigating complex inter-process performance problemsTracing unmodified customer applications
Workload consolidation and resource management
	Introduction to tools for workload and resource managementWorkload measurementUsing Solaris resource manager to isolate and control workloadsUsing Solaris Zones to create Application Containers 
James Mauro (T2, W2) is a Senior Staff Engineer in the Performance and Availability Engineering group at Sun Microsystems. Jim's
current projects are focused on quantifying and improving
enterprise platform availability, including minimizing recovery
times for data services and Solaris. Jim co-developed a framework
for system availability measurement and benchmarking and is
working on implementing this framework within Sun. 
Richard McDougall (T2, W2) is a Sun Microsystems Distinguished Engineer who
specializes in  operating systems technology and system performance. He
is based at the Menlo Park Performance and Availability Engineering
group, where he drives development of performance and behavior
enhancements to the Solaris operating system and Sun's hardware
architectures. He has led the development of resource management
principles, has contributed to the development of virtual memory and file
systems within the Solaris operating system, and has architected many
tools for analysis, monitoring, and capacity planning. He is the lead author
of Resource Management (Prentice Hall). He has written numerous
articles and papers on measurement, monitoring, and capacity planning
of Solaris systems and frequently speaks at industry and customer
technical conferences on the topics of system performance and resource
management. 
Richard and Jim authored Solaris Internals: Architecture Tips and
Techniques (Sun Microsystems Press/Prentice Hall, Feb 2000, ISBN
0-13-022496-0) and are currently collaborating on an update of the book for
Solaris 8, as well as volume II.
 
T3 Solaris 10 Security Features Workshop Peter Baer Galvin, Corporate Technologies 
 9:00 a.m.5:00 p.m.
 
Who should attend: Solaris systems managers and administrators interested in
the new security features in Solaris 10 (and features in previous Solaris
releases that they may not be using).
 
This course covers a variety of topics surrounding Solaris 10 and security.
Solaris 10 includes many new features, and there are new issues to consider
when deploying, implementing, and managing Solaris 10. This will be a workshop featuring instruction and practice/exploration.  Each student should have a laptop with wireless access for remote access into a Solaris 10 machine.
 
Topics include:
 
Solaris cryptographic framework
NFSv4
Solaris privileges
Solaris Flash archives and live upgrade
Moving from NIS to LDAP
Dtrace
WBEM
Smartcard interfaces and APIs
Kerberos enhancements
Zones
FTP client and server enhancements
PAM enhancements
Auditing enhancements
Password history checking
ipfilters
 
Peter Baer Galvin (S8, T3) is the Chief Technologist for Corporate Technologies, Inc., a systems integrator and VAR,  and was the Systems Manager for Brown University's Computer Science Department. He has written articles
for Byte and other magazines. He wrote the "Pete's Wicked World" and
"Pete's Super Systems" columns at SunWorld. He is currently
contributing editor for Sys Admin, where he manages the Solaris
Corner. Peter is co-author of the Operating Systems Concepts and Applied Operating Systems Concepts textbooks. As a consultant and trainer, Peter has taught tutorials on security and system administration and has given talks at many conferences and institutions on such topics as Web
services, performance tuning, and high availability. 
T4 Advanced Perl Programming
Tom Christiansen, Consultant
 9:00 a.m.5:00 p.m.
 
Who should attend: Anyone with a journeyman-level knowledge of Perl programming who wants to hone Perl skills. This class will cover a wide variety of advanced topics in Perl, including
    many insights and tricks for using these features effectively.  After
    completing this class, attendees will have a much richer understanding of
    Perl and will be better able to make it part of their daily routine.
 
Topics include:
 
Symbol tables and typeglobs
	Symbolic referencesUseful typeglob tricks (aliasing) Modules
	AutoloadingOverriding built-insMechanics of exportingFunction prototypes References
	Implications of reference countingUsing weak references for self-referential data structuresAutovivificationData structure management, including serialization and persistenceClosures Fancy object-oriented programming
	Using closures and other peculiar referents as objectsOverloading of operators, literals, and moreTied objects Managing exceptions and warnings
	When die and eval are too primitive for your tasteThe use warnings pragmaCreating your own warnings classes for modules and objects Regular expressions
	Debugging regexesqr// operatorBacktracking avoidanceInterpolation subtletiesEmbedding code in regexes Programming with multiple processes or threads
	The thread modelThe fork modelShared memory controls Unicode and I/O layers
	Named Unicode charactersAccessing Unicode propertiesUnicode combined charactersI/O layers for encoding translationUpgrading legacy text files to UnicodeUnicode display tips What's new in Perl lately
	Switch statementDefined-or operatorsPre-compiled modulesDynamic handlesVirtual I/O through strings 
Tom Christiansen (T4) has been involved with Perl since day zero of its initial public release  in 1987.  Author of several books on Perl,
including The Perl Cookbook and Programming Perl from O'Reilly, Tom is
also a major contributor to Perl's online documentation.  He holds
undergraduate degrees in computer science and Spanish and a Master's in
computer science.  He now lives in Boulder, Colorado. 
T5 RPM Package Management Joshua Jensen, IBM  
 9:00 a.m.5:00 p.m.
 
Who should attend: System administrators deploying, or interested in 
deploying, RPM-based Linux systems in a production environment. Attendees should be familiar with
the basics of system administration in a UNIX/Linux
environment, user-level commands and TCP/IP networking. Novice
administrators and gurus alike should leave the tutorial having learned
something.
 
Whether your environment is a single server or a
network with thousands of desktops, workstations, and servers, Linux
application deployment, upgrades, and errata policy can be effectively
managed with RPM packages. From simple command-line queries to source build
environments, from networked package management solutions such as Novell's
Zenworks for Linux and Red Hat's RHN to the simple but effective Yum,
this course emphasizes real-world solutions, covering everything you need to know to use, create, and manage RPM packages and systems.
 
Topics include:
 
Introduction to RPM: What's a package and what isn'tWorking with RPMs: Basic functionality exploredAdvanced RPM use: Auto dependency aid, rollback, and moreBuilding RPMs: Source RPMs, spec files, RPM macrosSpecial considerations for dual architecture systemsAdvanced functionality: Triggers and pre/post scriptingRPM security: Build signing and pre-installation verificationPackage management systems: APT, RHN, RCE/Zenworks, Yum 
Joshua Jensen (T5)  has worked  for IBM and Cisco Systems, and was Red Hat's
first instructor, examiner, and RHCE.  He worked with Red Hat for 4 1/2
years during which he wrote and maintained large parts of the Red Hat
curriculum: Networking Services and Security, System Administration,
Apache and Secure Web Server Administration, and the Red Hat Certified
Engineer course and exam.  Joshua has been working with Linux since
1996, and finds himself full circle having recently left IBM to work
with Red Hat Linux for Cisco Systems.  In his spare time he dabbles in
cats, fish, boats, and frequent flyer miles. 
T6 Managing Samba 3.0
Gerald Carter, Samba Team/Hewlett-Packard
 9:00 a.m.5:00 p.m.
 
Who should attend: System administrators who are 
currently managing Samba servers or are planning to deploy 
new servers this year.  This course will outline the new
features of Samba 3.0, including working demonstrations 
throughout the course session.
 
Topics include:
 
Gerald Carter (S6, T6, W3)  has been a member of the Samba Development Team
since 1998. HeProviding basic file and print servicesCentrally managing printer drivers for Windows clientsConfigure Samba's support for Access Control Lists
  and the Microsoft Distributed File SystemMaking use of Samba VFS modules for features such as virus 
    scanning and a network recycle binIntegrating with Windows NT 4.0 and Active Directory 
    authentication servicesImplementing a Samba primary domain controller along with
    Samba backup domain controllersMigrating from a Windows NT 4.0 domain to a Samba domainUtilizing account storage alternatives to smbpasswd such 
    as LDAP  has published articles with various
Web-based magazines and teaches courses as a
consultant for several companies. Currently employed by
Hewlett-Packard as a Samba developer, Gerald has written
books for SAMS Publishing and is the author of the recent
LDAP System Administration for O'Reilly Publishing. 
T7 Practical System and Network MonitoringJohn Sellens, SYONEX
 9:00 a.m.5:00 p.m.
 
Who should attend: Network and system administrators interested in real-life, practical, host- and network-based monitoring of their systems and networks. Participants should have an understanding of the fundamentals of networking, basic familiarity with computing and network components, and some familiarity with UNIX and scripting languages.
 Participants will leave this tutorial able to immediately start using a number of monitoring systems and techniques that will improve their ability to manage and maintain their systems and networks. 
 
Topics include:  
John Sellens (T7, W4) has been involved in system and network administrationMonitoring: goals, techniques,
reporting
SNMP: the protocol, reference
materials, relevant RFCs
Introduction to SNMP MIBs (Management Information Bases)
SNMP tools and libraries
Other (non-SNMP) tools
Security concerns when using SNMP and other tools on the network
Monitoring applications: introductions, use, benefits and complications, installation and configuration (Big Brother, Nagios, SNIPS, MRTG, Cricket, etc.)
Special situations: remote locations, firewalls, etc.
Monitoring implementation roadmap: policies, practices, notifications, escalations, reporting
  since 1986 and is the author of several related USENIX papers, a number of ;login: articles, and the SAGE Short Topics in System Administration booklet #7, System and Network Administration for Higher Reliability. He holds an M.Math. in computer science from the University of Waterloo and is a chartered accountant. He is the proprietor of SYONEX, a systems and networks consultancy. From 1999 to 2004, he was the General Manager for Certainty Solutions in Toronto. Prior to joining Certainty, John was the Director of Network Engineering at UUNET Canada and was a staff member in computing and information technology at the University of Waterloo for 11 years. 
T8Release Engineering and Project Lifecycle  Geoff Halprin, The Sysadmin Group, and Lee Damon, University of Washington
 9:00 a.m.5:00 p.m.
 
Who should attend: Software developers, system administrators, and
managers who deal with internal or external project/product lifecycles
and quality.
 
We will look at projects varying in scope from "Here's a new product
we just bought; roll it out," through "We need an internal _foo_ server;
make it happen," to "Here's this new thing we are developing; let's
do it right so we can ship it."  We will cover matters from quick
projects to "This will take a year and 20 people to deploy."
 
The focus of this class will be on internally developed projects
for internal use with some extrapolation to sold or shipped
products.  Large and small projects alike can benefit from proper
planning and roll-outs.  We will prove that the old adage, "There
is never time to do it right, but there is always time to do it over,"
is never a good answer or a good philosophy.  We will also examine the
phenomenon of "Shoot the engineer and ship the product" in light of the reality most of us face: "The first 90% of the project takes 10% of the time; the remaining 10%
takes 90% of the time."
   Students should have a project or large task-set in mind when coming to
  the class. There will be break-out sessions where the student's real
  world tasks will be used as examples.
 
This is not intended to replace formal training for project planners.
It is intended to make life better for people who deal with projects
on a day-to-day basis. We will provide you with the ideas and some of the tools to take
your projects from "We need this quick" to a supportable and released
projector even product.
 Topics include:  
	Geoff Halprin (S13, T8) has spent over 25 years as a software developer,Test planning and implementationProject release planningProject lifecyclesReplacement planning and updating  system administrator, consultant, and troubleshooter. He has written software from system management tools to mission-critical billing systems, has built and run networks for enterprises
of all sizes, and has been called upon to diagnose problems in every aspect of computing infrastructure and software. He has spent more years troubleshooting other
people's systems and programs than he cares to remember. Geoff was on the board
of the System Administrators Guild (SAGE) and is now a member of the
USENIX board of directors. 
Lee Damon (M7, T8) has a B.S. in Speech Communication from Oregon State University. He
has been a UNIX system administrator since 1985 and has been active in SAGE
since its inception. He assisted in developing a mixed AIX/SunOS environment
at IBM Watson Research and has developed mixed environments for Gulfstream
Aerospace and QUALCOMM. He is currently leading the development effort
for the Nikola project at the University of Washington Electrical Engineering
Department. He is past chair of the SAGE Ethics and Policies Working Groups. |  
| Wednesday, April 13, 2005 |  | W2 Solaris Kernel Performance, Observability, and Debugging (Day 2 of 2)  
 
James Mauro and Richard McDougall, Sun Microsystems
|   |  
|   |  9:00 a.m.5:00 p.m.
 
See Part 1, T2, for the description of the first day of this tutorial.
 
Who should attend:  System and database administrators,
software architects, developers and programmers, performance and systems 
analysts, and IT architects wanting to obtain a deeper understanding of the
key Solaris subsystems, as well as the tools and facilities that can
be used to:
 
	Attendees should have some basic understanding of operating system principles
and application performance analysis. Students choosing to attend only
Day Two should be familiar with Solaris kernel subsystems and have
at least rudimentary  knowledge of the bundled tools and utilities and their
use.Observe, trace, and debug to optimize performanceObserve, trace, and debug to root-cause aberrent behaviorObserve and trace to understand how the application workload interacts with the operating systemBetter understand the system as a whole 
Applications are becoming more complex every day, and many of the new
Solaris features significantly reduce the effort required to
administer and anazlyze performance of the entire application and
operating system stack.
 
You may take this class as either a one-day experts class or a two-day complete class. On Day One, we provide an architectual
overview of the major Solaris subsystems and an introduction to
Solaris performance analysis. On Day Two, we cover advanced topics
and spend significant time with hands-on case studies, using the latest
tools, including dtrace, mdb, memtool, mdb, trapstat and the Solaris
process "ptools."
 
Topics include:
 
Solaris observability and debugging tools
	Mastering Solaris DTraceHow to debug/monitor with "mdb"Kernel profiling and lock statistics with lockstatApplication lock statistics with plockstat
Advanced memory architecture and tuning
	TLB analysis using trapstatUsing large pages with the MPSS featuresNUMA memory allocation and techniques
File system performance
	Tools for measuring and characterizingAnalysing file system performance using dtrace
Advanced thread scheduling and tools
	Thread scheduling, parking lots and queuesTracking thread priorities and sleep eventsUsing CPU binding and processor sets
Advanced dtrace
	Attributing network, file I/O to applicationsInvestigating complex inter-process performance problemsTracing unmodified customer applications
Workload consolidation and resource management
	Introduction to tools for workload and resource managementWorkload measurementUsing Solaris resource manager to isolate and control workloadsUsing Solaris Zones to create Application Containers 
James Mauro (T2, W2) is a Senior Staff Engineer in the Performance and Availability Engineering group at Sun Microsystems. Jim's
current projects are focused on quantifying and improving
enterprise platform availability, including minimizing recovery
times for data services and Solaris. Jim co-developed a framework
for system availability measurement and benchmarking and is
working on implementing this framework within Sun. 
Richard McDougall (T2, W2) is a Sun Microsystems Distinguished Engineer who
specializes in  operating systems technology and system performance. He
is based at the Menlo Park Performance and Availability Engineering
group, where he drives development of performance and behavior
enhancements to the Solaris operating system and Sun's hardware
architectures. He has led the development of resource management
principles, has contributed to the development of virtual memory and file
systems within the Solaris operating system, and has architected many
tools for analysis, monitoring, and capacity planning. He is the lead author
of Resource Management (Prentice Hall). He has written numerous
articles and papers on measurement, monitoring, and capacity planning
of Solaris systems and frequently speaks at industry and customer
technical conferences on the topics of system performance and resource
management. 
Richard and Jim authored Solaris Internals: Architecture Tips and
Techniques (Sun Microsystems Press/Prentice Hall, Feb 2000, ISBN
0-13-022496-0) and are currently collaborating on an update of the book for
Solaris 8, as well as volume II.
 
W3 Implementing LDAP Directories
Gerald Carter, Samba Team/Hewlett-Packard
 9:00 a.m.5:00 p.m.
 
Who should attend: Both LDAP directory administrators and architects. The focus is on integrating standard network services with LDAP directories. The examples are based on UNIX hosts and the OpenLDAP directory server and will include actual working demonstrations throughout the course.
 
System administrators today run a variety of directory services, although these are referred to by names such as DNS and NIS. The Lightweight Directory Access Protocol (LDAP) is the up-and-coming successor to the X500 directory and has the promise of allowing administrators to consolidate multiple existing directories into one.
 
Topics include:
 
Gerald Carter (S6, T6, W3)  has been a member of the Samba Development Team
since 1998. HeReplacing NIS domainsIntegrating Samba user accountsIntegrating MTAs such as Sendmail, Qmail, or PostfixCreating address books for mail clientsManaging user access to HTTP and FTP servicesIntegrating with DHCP & DNS serversScripting with the Net::LDAP Perl moduleDefining custom attributes and object classes  has published articles with various
Web-based magazines and teaches courses as a
consultant for several companies. Currently employed by
Hewlett-Packard as a Samba developer, Gerald has written
books for SAMS Publishing and is the author of the recent
LDAP System Administration for O'Reilly Publishing. 
W4 System and Network Monitoring: Tools in Depth
 John Sellens, SYONEX
 9:00 a.m.5:00 p.m.
 
Who should attend: Network and system administrators ready to
implement comprehensive monitoring of their systems and networks
using the best of the freely available tools.  Participants should
have an understanding of the fundamentals of networking, familiarity
with computing and network components, UNIX system administration
experience, and some understanding of UNIX programming and scripting
languages.
 This tutorial will provide in-depth instruction in the installation
and configuration of some of the most popular and effective system
and network monitoring tools, including Nagios, Cricket, MRTG, and
Orca. 
Participants should expect to leave the tutorial with the information
needed to immediately implement, extend, and manage popular monitoring
tools on their systems and networks.
 
Topics include, for each of Nagios, Cricket, MRTG, and Orca:
 
	John Sellens (T7, W4) has been involved in system and network administrationInstallationBasic steps, prerequisites, common problems, and solutionsConfiguration, setup options, and how to manage larger and non-trivial configurationsReporting and notificationsproactive and reactiveSpecial caseshow to deal with interesting problemsExtending the toolshow to write scripts or programs to extend the functionality of the basic packageDealing effectively with network boundaries and remote sitesSecurity concerns and access controlOngoing operation  since 1986 and is the author of several related USENIX papers, a number of ;login: articles, and the SAGE Short Topics in System Administration booklet #7, System and Network Administration for Higher Reliability. He holds an M.Math. in computer science from the University of Waterloo and is a chartered accountant. He is the proprietor of SYONEX, a systems and networks consultancy. From 1999 to 2004, he was the General Manager for Certainty Solutions in Toronto. Prior to joining Certainty, John was the Director of Network Engineering at UUNET Canada and was a staff member in computing and information technology at the University of Waterloo for 11 years. 
W5 Administering Linux in Production Environments
Æleen Frisch, Exponential Consulting
 9:00 a.m.5:00 p.m.
 
Who should attend: Both current Linux system administrators and
 administrators from sites considering converting to Linux or adding
Linux systems to their current computing resources. We will be focusing on the
administrative issues that arise when Linux systems are deployed
to address a variety of real-world tasks and problems arising from
both commercial and research-and-development contexts.
 
Topics include:
 
Recent kernel developmentsHigh-performance I/O
	
	Advanced filesystems and logical volumesDisk stripingOptimizing I/O performanceAdvanced compute-server environments
	BeowulfClusteringParallelization environments/facilitiesCPU performance optimization High availability Linux: fault tolerance optionsEnterprise-wide authenticationFixing the security problems you didn't know you had (or, what's good
  enough for the researcher/hobbyist won't do for you)Automating installations and other mass operationsLinux in the office environment 
Æleen Frisch (W5)  has been a system administrator for over 20 years. She currently
looks  after a pathologically heterogeneous network of UNIX and Windows
systems. She is the author of several books, including Essential
System Administration (now in its 3rd edition).  
 |  
| Thursday, April 14, 2005 |  | R1 Hacking & Securing Web-based Applications David Rhoades, Maven Security Consulting, Inc.
 9:00 a.m.5:00 p.m.
 Who should attend:  People who are auditing Web application security,   
developing Web applications, or managing the development of a Web
application.
 
Is your Web application secure?  CD Universe, CreditCard.com, and
others have found out the hard way: encryption and firewalls are
not enough. Numerous commercial and freeware tools assist in locating network-level
security vulnerabilities.  However, these tools are incapable of
locating security issues for Web-based applications.
 
With numerous real-world examples from the instructor's years of
experience with security assessments, this informative and entertaining
course is based on fact, not theory.  The course material is
presented in a step-by-step approach, and will apply to Web portals,
e-commerce (B2B or B2C), online banking, shopping, subscription-based
services, or any Web-enabled application.
 
Students will learn:
 
Students will be shown several target Web applications.
Some of these applications are real applications with known security
issues.  Others are mock applications
designed by Maven Security to simulate real security issues.  At
each step, the instructor will demonstrate the tools needed and 
the required techniques. All software demonstrated will be publicly available freeware.The primary risks facing Web applicationsExposures and vulnerabilities in HTML and JavaScript, authentication,
     and session trackingTools, techniques, and methodologies required to locate weaknessesRecommendations for mitigating exposures foundBest practices for Web application security 
Topics include:
 
Foundational security
	OS vulnerabilitiesWeb server security highlights
Web server and Web application output
	HTTP headersHTML and JavaScriptEncryption ciphersError messagesCaching
Authentication
	Authentication: digital certificates; form-based; HTTP basicThreats to authentication
Sign-on
	User name harvestingBrute-force password guessingPassword harvestingResource exhaustion 
Session issues
	Session tracking mechanismsSession ID best practicesSession cloning
Transaction issues
	Malicious user inputHidden form elementsGET vs. POSTJavaScript filtersImproper application logicCross-site scripting (XSS)Third-party productsTesting proceduresMethodology and safety 
David Rhoades (R1) is a principal consultant with Maven Security
Consulting, Inc.  Since 1996, David has provided information protection services
for various FORTUNE 500 customers.  His work has taken him across the US
and abroad to Europe and Asia, where he has lectured and consulted in
various areas of information security.  David has a B.S. in computer
engineering from the Pennsylvania State University and has taught
for the SANS Institute, the MIS Training Institute, and ISACA. 
R2 Network Security Monitoring with Open Source Tools Richard Bejtlich, TaoSecurity.com 
 9:00 a.m.5:00 p.m.
 
Who should attend: Engineers and analysts 
who detect and respond to security incidents. Participants should be 
familiar with TCP/IP. Command-line knowledge of BSD, Linux, or another 
UNIX-like operating system is a plus. A general knowledge of offensive 
and defensive security principles is helpful.
 
This tutorial will equip participants with the theory, tools, and 
techniques to detect and respond to security incidents. Network 
Security Monitoring (NSM) is the collection, analysis, and escalation of 
indications and warnings to detect and respond to intrusions. NSM 
relies upon alert data, session data, full content data, and statistical 
data to provide analysts with the information needed to achieve network 
awareness. Whereas intrusion detection cares more about identifying 
successful and usually known attack methods, NSM is more concerned with 
providing evidence to scope the extent of an intrusion, assess its 
impact, and propose efficient, effective remediation steps.
 
NSM theory will help participants understand the various sorts of data 
that must be collected. This tutorial will bring theory to life by 
introducing numerous open source tools for each category of NSM data. 
Attendees will be able to deploy these tools alongside existing 
commercial or open source systems to augment their network awareness and 
defensive posture.
 
Topics include:
 
Material in the class is supported by the author's book The Tao of 
Network Security Monitoring: Beyond Intrusion Detection 
(Addison-Wesley, 2005; https://www.taosecurity.com/books.html).NSM theoryBuilding and deploying NSM sensorsAccessing wired and wireless trafficFull content tools: Tcpdump, Ethereal/Tethereal, Snort as packet loggerAdditional data analysis tools: Tcpreplay, Tcpflow, Ngrep, NetdudeSession data tools: Cisco NetFlow, Fprobe, Flow-tools, Argus, SANCPStatistical data tools: Ipcad, Trafshow, Tcpdstat, Cisco accounting recordsSguil (sguil.sf.net)Case studies, personal war stories, and attendee participation 
Richard Bejtlich (R2) is technical director for specialized security
monitoring in ManTech International  Corporation's Computer Forensics
and Intrusion Analysis division.  He was previously a principal
consultant at Foundstone, performing incident response, emergency
network security monitoring, and security research. Prior to joining
Foundstone in 2002, Richard served as senior engineer for managed
network security operations at Ball Aerospace & Technologies
Corporation. From 1998 to 2001 Richard defended global American
information assets as a captain in the Air Force Computer Emergency
Response Team (AFCERT). He led the AFCERT's real time intrusion
detection mission, supervising 60 civilian and military analysts.
He is the author of The Tao of Network Security Monitoring:
Beyond Intrusion Detection and the co-author of the forthcoming
 Real Digital Forensics, both published by Addison-Wesley.  He
also wrote original material for Hacking Exposed, 4th Edition, and
Incident Response, 2nd Edition, both published by McGraw-Hill/Osborne.
He acquired his CISSP certification in 2001 and CIFI credentials
in 2004. His home page is https://www.taosecurity.com and his popular Web
log resides at https://taosecurity.blogspot.com. 
R3 Configuration Management with Cfengine Mark Burgess, Oslo University College  
 9:00 a.m.5:00 p.m.
 
Who should attend: System administrators with a basic
knowledge of scripting who wish to get to grips with cfengine to
automate the maintenance and security of their systems. UNIX
administrators will be most at home in this tutorial, but cfengine can
also be used on Windows 2000 and above. This tutorial works as a guide to the
extensive documentation, focusing pragmatically on the key issues and
filtering out details.
 
Cfengine is a tool for setting up and maintaining a configuration
across a network of hosts. It is sometimes called a tool for "Computer
Immunology"your computer's own immune system. You can think of
cfengine as a very high-level language, much higher-level than Perl
or shell, together with a smart agent. The idea behind cfengine is to
create a single "policy" or set of configuration files that describes
the setup of every host on your network, without sacrificing their
autonomy.
 
Cfengine runs on every host and makes sure that it is in a
policy-conformant state; if necessary, any deviations from policy
rules are fixed automatically. Unlike tools such as rdist, cfengine does
not require hosts to open themselves to any central authority nor to
subscribe to a fixed image of files. It is a modern tool, supporting
state-of-the-art encryption and IPv6 transport, that can handle
distribution and customization of system resources in huge networks
(tens of thousands of hosts). Cfengine runs on hundreds of thousands
of computers all over the world. 
Topics include:
 
The components of cfengine and how they are usedHow to get the system runningHow to develop a suitable policy, step by stepSecurityOrganizing configuration files (updating and configuring)Ordering issues in configuration managementCfservd security and key deploymentSearching for data with filtersSpecial functions and arraysAlerts and persistent classesMulti-homed host issuesIPv6 issuesMethods and modules and when to use themHost monitoring with FriendStatusAnomaly detection and response with cfenvdWhat is coming in cfengine? 
Mark Burgess (R3) is a professor at Oslo University College and is the
author of
 cfengine. He has been researching the 
principles of network
and system administration for over ten years and is the author
of Principles of Network and System Administration (John Wiley & Sons).
He is  frequently invited to speak at conferences.  
 
 |  |  |