Technical Sessions
Wed., Dec. 6 |
Thurs., Dec. 7 |
Fri., Dec. 8 | Guru Is In |
All in one file
All Technical Sessions will be held in the New Orleans Marriott Hotel and include:
|
|
|
|
WEDNESDAY, DECEMBER 6, 2000
Thursday | Friday
|
9:00 am - 10:30
am (Bissonet/Carondelet)
|
Opening Remarks,
Awards, and Keynote
Keynote Address: The World-Wide Syndicate
J.D. "Illiad" Frazer, Co-founder and creator of UserFriendly
J.D. will discuss how the Internet and on-line communities have enabled creators
to offer their work directly to audience members without the traditional
middleman.
|
10:30 am - 11:00
am Break
|
|
|
|
11:00 am - 12:30
pm
|
REFEREED
PAPERS Mardi Gras D-H
Deep
Thoughts
Session Chair: Rémy Evard, Argonne National Laboratory
Theoretical System Administration
Mark Burgess, Oslo College
An Expectant Chat About Script Maturity
Alva L. Couch, Tufts University
An Improved Approach for Generating Configuration Files from a Database
Jon Finke, Rensselaer Polytechnic Institute
|
INVITED
TALKS Acadia
How Not to Get
Fleeced with Employee Stock Options
Jon Rochlis, The Rochlis Group, Inc.
Having stock options can be very rewarding, but if you don't know the rules of
the game you can easily stumble across surprises that lower the value of your
options or give you large tax bills. Even many "financial advisors" can be
confused and make costly mistakes. This talk will cover the basics of employee
stock options--types of stock, stock options (qualified and non-qualified),
stock purchase plans, the IPO process, taxation, risks, strategies, valuation,
and advanced tax planning.
|
NETWORK TRACK Carondelet
Deploying Quality
of Service Features on Your Network
Eliot Lear, Cisco Systems
A lot of trade press has been given to the phrases Quality of Service, Voice
over IP, and the like. This talk will discuss what it means to give precedence
to certain applications on your network, what sort of applications need
preferential treatment, what some of the pitfalls are, and how to know when
you've fallen into one of those pits. It will also look at the future of QoS.
|
12:30 pm - 2:00
pm Lunch (on your own)
|
|
|
|
2:00 pm - 3:30
pm
|
REFEREED
PAPERS Mardi Gras D-H
You, a Rock, and a
Hard Place
Session Chair: Christine Hogan, Imperial College
FOKSTRAUT and Samba--Dealing with Authentication and Performance Issues on a
Large-scale Samba Service
Robert Beck and Steve Holstead, University of Alberta
Designing a Data Center Instrumentation System
Robert Drzyzgula, Federal Reserve Board
Improving Availability in VERITAS Environments
Karl Larson, Tellme Networks, and Todd Stansell, Certainty Solutions
|
INVITED
TALKS Acadia
SAGE
Update
Barb Dijker, SAGE President
Detailed status updates and information about the development of SAGE projects
will be presented: progress on certification, last year's salary survey results
and what's new this year, marketing SAGE to gain recognition and credibility,
student sysadmin internships, mentoring, and internationalization.
|
NETWORK TRACK Carondelet
Analyze
This!
Session Chair: William LeFebvre, CNN Internet Technologies
Wide Area Network Packet Capture and Analysis
Jon T. Meek, American Home Products Corp
Sequencing of Configuration Operations for IP Networks
P. Krishnan, ISPsoft, Inc.; T. Naik, Bell Labs; G. Ramu, CoSine Comm., Inc.; and R. Sequeira, ISPsoft, Inc.
ND: A Comprehensive Network Administration and Analysis Tool
Ellen L. Mitchell, Eric Nelson, and David Hess, Texas A&M University
|
3:30 pm - 4:00
pm Break
|
|
|
|
4:00 pm - 5:30
pm
|
REFEREED
PAPERS Mardi Gras D-H
Users and Passwords
and Scripts, Oh My!
Session Chair: Trey Harris, Mail.com
User-Centric Account Management with Heterogeneous Password Changing
Douglas Hughes, Auburn University
Pelendur: Steward of the Sysadmin
Matt Curtin, Interhack Corp.; Sandy Farrar, and Tami King, The Ohio State University
Network Information Management and Distribution in a Heterogeneous and
Decentralized Enterprise Environment
Alexander D. Kent and James R. Clifford, Los Alamos National Laboratory
|
INVITED
TALKS Acadia
The Digital
House
Lorette Cheswick, cheswick.com
The Cheswicks have been computerizing their house since 1981. They have bent
computer-age services to their very idiosyncratic needs: they are alerted to the
arrival of snail-mail, they know who's at their front door, and their family
photo album has become a Web site. A Linux text-to-speech application announces
phone callers, the weather, and iridium flares. Cron wakes up their kids and
performs other tasks. The whole family is involved planning new applications.
But wait, there's more!
|
NETWORK TRACK Carondelet
Go with the
Netflow
Session Chair: David Williamson, Certainty Solutions
Combining Cisco NetFlow Exports with Relational Database Technology for Usage
Statistics, Intrusion Detection, and Network Forensics
Bill Nickless, John-Paul Navarro, and Linda Winkler, Argonne National
Laboratory
The OSU Flow-tools Package and CISCO NetFlow Logs
Mark Fullmer, OARnet, and Steve Romig, The Ohio State University
FlowScan: A Network Traffic Flow Reporting and Visualization Tool
Dave Plonka, University of Wisconsin. Madison
|
|
|
|
THURSDAY, DECEMBER 7, 2000
Wednesday | Friday
|
9:00 am - 10:30
am
|
INVITED TALKS Acadia
Dr. Felten Goes to
Washington: A Personal View of the Microsoft Case
Edward Felten, Princeton University
Edward Felten recently served as an expert witness in the Microsoft antitrust
case and as a consultant to the Department of Justice. He will talk about his
experiences in working on this high-profile case, and what he learned about the
law, economics, computer science, and connections among them.
|
NETWORK TRACK Carondelet
To Be Announced
|
10:30 am - 11:00
am Break
|
|
|
|
11:00 am - 12:30
pm
|
REFEREED
PAPERS Mardi Gras D-H
The
Toolshed
Session Chair: Phil Scarr, Certainty Solutions
xps--Dynamic Process Tree Watching
Under X
Rocky Bernstein, Breakaway Solutions
Extending UNIX System Logging with SHARP
Matthew Bing and Carl Erickson, Grand Valley State University
Peep (The Network Auralizer): Monitoring Your Network with Sound
Michael Gilfix and Alva Couch, Tufts University
|
INVITED
TALKS Acadia
Experiences with
Incident Response at The Ohio State University
Steve Romig, The Ohio State University
Steve will talk about his experiences with incident response at OSU. He'll talk
briefly about the formation and current structure of the OSU incident response
team, the services they provide, and how they approach incident response. The
majority of the talk will cover real-life successes and failures (and amusing
anecdotes) from a large and long-running investigation of two local cracking
groups.
|
NETWORK TRACK Carondelet
Broadband Changes
Everything
Brent Chapman, Great Circle Associates, Inc.
End users today are connecting to the Internet at speeds that, a couple of years
ago, were available at only the best-connected sites and were shared by hundreds
or even thousands of users. And the "always on" nature of broadband is likely to
have even more fundamental and far-reaching consequences. This talk will give
you an introduction to end-user broadband services and an idea of how they'll
change your life both as a user and as a network manager.
|
12:30 pm - 2:00
pm Lunch (on your own)
|
|
|
|
2:00 pm - 3:30
pm
|
REFEREED
PAPERS Mardi Gras D-H
1984
Session Chair: Jeff Allen
Thresh--A Data-Directed SNMP Threshold Poller
John Sellens, Certainty Solutions
eEMU: A Practical Tool and Language for System Monitoring and Event
Management
Jarra Voleynik, eEMUconcept Pty Ltd
Aberrant Behavior Detection in Time Series for Network Service Monitoring
Jake D. Brutlag, Microsoft WebTV
|
INVITED
TALKS Acadia
Integrating LDAP in a Heterogeneous Environment
Leif Hedstrom, Netscape
This talk discusses the intricacies and obstacles, as well as the joy, in
integrating LDAP into a heterogeneous environment at Netscape. The audience will
learn from our experiences, as well as find out what is available today. Not
just a beginner's guide to LDAP, the presentation emphasizes a primarily UNIX
environment but of course covers Windows NT and 2000 integration.
|
SECURITY TRACK Carondelet
Cops are from Mars,
Gurus are from Pluto: Dealing with "the Feds" and Other Cops
Tom Perrine, Pacific Institute of Computer Security
Every system administrator will have to deal with law enforcement at some time,
usually in connection with a security incident. This talk is about how to
interact with them effectively. It covers cultural differences and language
barriers, differing goals, ways to build bridges, and how to spot a "fake Fed."
Jurisdictional issues, preserving evidence, and guidelines for testifying in
court are also covered.
|
3:30 pm - 4:00
pm Break
|
|
|
|
4:00 pm - 5:30
pm
|
REFEREED
PAPERS Mardi Gras D-H
The Sorcerer's
Apprentice
Session Chair: Josh Simon, Collective Technologies
PIKT, "Problem Informant/Killer Tool"
Robert Osterlund, University of Chicago
Relieving the Burden of System Administration Through Support Automation
Allan Miller and Alex Donnini, HandsFree Networks
FTP Mirror Tracker: First Steps Towards URN
Alexei Novikov, ITEP, and Martin Hamilton, Loughborough Univ, UK,
|
INVITED
TALKS Acadia
Mapping Corporate Intranets and Internets
Bill Cheswick, Lumeta Corporation
Bill will talk about what the researchers at Bell Labs and Lumeta have learned
about mapping corporate intranets. As intranets grow they become more difficult
to track. By mapping corporate networks they have been able to find security
problems, gain a better understanding of what's out there, and provide pretty
pictures of the network which management finds useful.
|
SECURITY TRACK Carondelet
Does It Take the
Same Skill Set to Secure a System as to Break into It?
Panelists: Peter Shipley, Lab OneSecure Inc.; Mark Hardy, Guardent,
Inc.; and Elias Levy, securityfocus.com
With myriad companies bidding for the contract to secure your Internet services,
two questions arise: (1) "What does it take to do the job?" (2) "If this company
hires 'reformed hackers,' is that good or bad?" Are these people competent?
Should you contract with a company that employs reformed hackers or convicted
felons? Conversely, why should you trust a company that doesn't have people who
know security from both sides? This panel includes representatives from the
cracking community, corporate and professional services, and law enforcement.
|
|
|
|
FRIDAY, DECEMBER 8, 2000
Wednesday | Thursday
|
9:00 am - 10:30
am
|
REFEREED
PAPERS Mardi Gras D-H
Fully
Automatic
Session Chair: John Orthoefer, Genuity Inc.
Deployme: Tellme's Package Management and Deployment System
Kyle Oppenheim and Patrick McCormick, Tellme Networks
Automating Request-based Software Distribution
Christopher Hemmerich, Indiana University
Use of Cfengine for Automated, Multi-Platform Software and Patch
Distribution
David Ressman and John Valdes, University of Chicago
|
INVITED
TALKS Acadia
The Design and
Implementation of Highly Scalable Email Systems
Brad Knowles, Belgacom Skynet SA/NV
Email systems can scale larger than had been thought possible! This talk will
detail fundamental flaws in the current mailbox-per-user paradigm of standard
off-the-shelf Local Delivery Agent software. It will describe how they can be
scaled up to handle many more users, how virtually all synchronous metadata and
file locking can be eliminated, how storage requirements can be reduced to grow
at a rate less than O(n), and how various services can be broken out and
handled by multiple separate servers.
|
SECURITY TRACK Carondelet
Real-World Intrusion Detection--First Steps
Mark K. Mellis, SystemExperts Corporation
For decades intrusion detection has been desired but rarely implemented at most
organizations. Finally, emerging technologies and proven techniques are making
intrusion detection not only possible but downright practical. This talk is
addressed to all technical staff and managers who want to understand how to
practice integrated intrusion detection at their site. Examples of actual
scripts and a discussion of when to use them will be included.
|
10:30 am - 11:00
am Break
|
|
|
|
11:00 am - 12:30
pm
|
REFEREED
PAPERS Mardi Gras D-H
Building
Blocks
Session Chair: Ruth Milner, NRAO
Unleashing the Power of JumpStart--A New Technique for Disaster Recovery,
Cloning, or Snapshotting a Solaris System
Lee Amatangelo, Collective Technologies
A Linux Appliance Construction Set
Michael W. Shaffer, Agilent Labs RCS
Automating Dual Boot (Linux & NT) Installations
Rajeev Agrawala, Shaun Erickson, and Robert Fulmer, Lucent/Bell Labs
Research
|
INVITED
TALKS Acadia
SANs--From A to
Reality
W. Curtis Preston, Collective Technologies
Storage Area Networks (SANs) are showing up everywhere. Many IT managers have
been overheard making statements such as, "We're going to completely get rid of
X, Y, and Z, and replace it with a SAN," or "We've got to have a SAN road map."
This talk gives you the information you need to be able to respond appropriately
to such statements, and it includes examples of real-life applications of SAN
technology so that you can decide whether or not a SAN is in your future.
|
SECURITY TRACK Carondelet
Someone's Knocking
at the Door...
Session Chair: Cat Okita, Global Crossing Ltd.
Tracing Anonymous Packets to Their Approximate Source
Hal Burch, Carnegie Mellon Univ, and Bill Cheswick, Lumeta Corporation
Analyzing Distributed Denial of Service Tools: The Shaft Case
Sven Dietrich, NASA Goddard Space Flight Center; Neil Long, Oxford University; and David Dittrich, University of Washington
|
12:30 pm - 2:00
pm Lunch (on your own)
|
|
|
|
2:00 pm - 3:30
pm
|
REFEREED
PAPERS Mardi Gras D-H
Work-in-Progress
Reports
Session Chair: Peg Schafer, Harvard University
Short, pithy, and fun, Work-in-Progress reports introduce interesting new or
on-going work, and the LISA audience provides valuable discussion and feedback.
A schedule of presentations will be posted at the conference.
To present a WiP, please see the
submission instructions.
|
INVITED
TALKS Acadia
Why the
Documentation Sucks and What You Can Do About It
Steven Levine, SGI
System administrators often complain about documentation. It can be difficult to
find just the right information in the circumstances you most need it. Why is
this so? This talk will discuss some inherent difficulties of writing
administration documentation, presented from the point of view of a technical
writer. It will also present proposals for how system administrators and
technical writers can work together to improve the general state of
administration documentation.
|
SECURITY TRACK Carondelet
. . . Don't Let
Them In
Session Chair: Simon Cooper, SGI
YASSP! A Tool for Improving Solaris Security
Jean Chouanard, Xerox PARC
SubDomain: Parsimonious Server Security
Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, and
Virgil Gligor, WireX Communications, Inc.
NOOSE--Networked Object-Oriented Security Examiner
Bruce Barnett, General Electric Corporate Research & Development
|
3:30 pm - 4:00
pm Break
|
|
|
|
4:00 pm - 5:30
pm (Bissonet/Carondelet)
|
The LISA Game Show,
with your host, Rob
Kolstad
Back by popular demand, Rob Kolstad hosts this challenging test of wits for
LISA attendees. Watch contestants wither under the dual spotlights of difficult
questions and special attention of the moderator. Entry forms for contestants
available Thursday around noon.
|
|
|
|
|