BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program...

26
2 FOR PROGRAM UPDATES: http://www.usenix.org/events/usenix01/ Important Dates to Remember Pre-Registration Discount Deadline: Friday, May 25, 2001 Hotel Discount Deadline: Friday, June 1, 2001 Contents 3 Letter from the Program Chairs 4 Conference at a Glance 5 Vendor Exhibition 5 FREE PASS for Vendor Exhibition 6–17 Tutorial Program 17–19 Tutorial Instructors 19 AFS Workshop 20–23 Technical Sessions 24 About USENIX and SAGE 24 Upcoming USENIX Events 25 Conference Activities and Services 26 Hotel and Travel Information 26 Registration Information 26 Student Discounts and Stipends 27 Registration Form USENIX is a registered trademark of the USENIX Association. USENIX acknowledges all trademarks herein. BOSTON Monday–Saturday, June 25–30, 2001 KEYNOTE SPEAKER DANIEL D. FRYE, Director of IBM Linux Technology Center Linux: A Strategic Disruptive Force STEVEN M. BELLOVIN AT&T Labs—Research Security Aspects of Napster and Gnutella JIM BOUND & CHARLES PERKINS Nokia Evolution of the Internet Core and Edge: IP Wireless Networking LORRIE FAITH CRANOR AT&T Labs—Research Online Privacy: Promise or Peril? JIM REID Nominum, Inc. Getting to Grips with Secure DNS CHARLIE KAUFMAN Iris Associates Active Content: Really Neat Technology or Impending Disaster? RADIA PERLMAN Sun Microsystems Laboratories Myths, Missteps, and Folklore in Protocol Design STEPHEN R. WALLI Microsoft Corp. Strangely Enough, It All Turns Out Well (Adventures in Venture-Backed Startups and Microsoft Acquisitions) ED BUGNION VMware, Inc. The Future of Virtual Machines: A VMware Perspective SANDEEP SINGHAL ReefEdge Inc. Making the Internet Mobile: Lessons from the Wireless Application Protocol (WAP) Professional-Level Tutorials: see page 6 Free Vendor Exhibition: see page 5 FREENIX Presentations: see page 20 Parties, Quiz Show, & Get-Togethers: see page 25 Peer-Reviewed Research Presentations: see page 20 INVITED TALKS by Research and Industry Leaders AVI RUBIN AT&T Labs—Research Security for E-Voting in Public Elections

Transcript of BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program...

Page 1: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

2 FOR PROGRAM UPDATES: http:/ /www.usenix.org/events/usenix01/

Important Dates to Remember

Pre-Registration Discount Deadline: Friday, May 25, 2001

Hotel Discount Deadline:Friday, June 1, 2001

Contents

3 Letter from the Program

Chairs

4 Conference at a Glance

5 Vendor Exhibition

5 FREE PASS for Vendor

Exhibition

6–17 Tutorial Program

17–19 Tutorial Instructors

19 AFS Workshop

20–23 Technical Sessions

24 About USENIX and SAGE

24 Upcoming USENIX Events

25 Conference Activities and

Services

26 Hotel and Travel Information

26 Registration Information

26 Student Discounts and

Stipends

27 Registration Form

USENIX is a registered trademark of the USENIX Association. USENIX acknowledges all trademarks herein.

BOSTONMonday–Saturday,

June 25–30, 2001

KEYNOTE SPEAKERDANIEL D. FRYE, Director of IBM Linux Technology Center

Linux: A Strategic Disruptive Force

STEVEN M. BELLOVINAT&T Labs—Research

Security Aspects of Napster and Gnutella

JIM BOUND & CHARLES PERKINSNokia

Evolution of theInternet Core andEdge: IP WirelessNetworking

LORRIE FAITH CRANORAT&T Labs—Research

Online Privacy: Promise or Peril?

JIM REIDNominum, Inc.

Getting to Grips with Secure DNS

CHARLIE KAUFMANIris Associates

Active Content: Really NeatTechnology or ImpendingDisaster?

RADIA PERLMANSun Microsystems Laboratories

Myths, Missteps, and Folklore inProtocol Design

STEPHEN R. WALLIMicrosoft Corp.

Strangely Enough, It All TurnsOut Well (Adventures inVenture-Backed Startups andMicrosoft Acquisitions)

ED BUGNIONVMware, Inc.

The Future of Virtual Machines:A VMware Perspective

SANDEEP SINGHALReefEdge Inc.

Making the Internet Mobile:Lessons from the WirelessApplication Protocol (WAP)

Professional-Level Tutorials: see page 6

Free Vendor Exhibition: see page 5

FREENIX Presentations: see page 20

Parties, Quiz Show, & Get-Togethers: see page 25

Peer-Reviewed Research Presentations: see page 20

I N V I T E D TA L K Sby Research and Industry Leaders

AVI RUBINAT&T Labs—Research

Security for E-Voting in Public Elections

Page 2: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

Conference Organizers

Program ChairYoonho Park, ReefEdge Inc.

Program CommitteeMohit Aron, Zambeel Inc.

Carla Ellis, Duke University

Wuchi Feng, Ohio State University

Greg Ganger, Carnegie Mellon University

Sheila Harnett, IBM Linux Technology Center

Peter Honeyman, University of Michigan

Jochen Liedtke, University of Karlsruhe

Robert Miller, Carnegie Mellon University

Vern Paxson, ACIRI

Doug Schmidt, UC-Irvine

Margo Seltzer, Harvard University

Dan Wallach, Rice University

Invited Talks CoordinatorsMatt Blaze, AT&T Labs—Research

John T. Kohl, Rational Software

FREENIX Program ChairClem Cole, Paceline Systems Corp.

FREENIX Program CommitteeKen Coar, The Apache Software Foundation/IBM

Chris Demetriou, Broadcom Corp.

Ted Faber, ISI/USC

Drew Gallatin, Duke/FreeBSD

Alan Nemeth, Compaq

Simon Patience, Zambeel Inc.

Garry Paxinos, Metro Link/XFree86

Stephen Tweedie, Red Hat

The Guru is in ChairLee Damon, University of Washington

An Invitation from the Program Chairs

Dear Colleague,

The USENIX Annual Technical Conference has always been the gatheringplace for like minds in the computer industry, a place to meet peers and expertsand share solutions to common problems.

Our tutorials feature top-of-the-line instructors offering techniques andtechnologies that you can put to immediate use. Choose from 30 full-dayclasses, 17 new this year. Topics? Security, from crackers to cryptography;systems administration, from Perl to performance tuning; networking, fromwireless to WAN design; management of people as well as machines; and muchmore. Our tutorials fill up fast, so register early.

High-quality refereed papers are the cornerstone of this conference's repu-tation for ground-breaking research. Presentations will include new work onoperating systems, security, storage, networking, Web servers, and scheduling.

The very popular refereed FREENIX track is devoted to Linux, *BSD,X11-based graphical user interfaces, and the full range of freely redistributablesoftware. Anyone interested in open-source software will appreciate the techni-cal quality and relevance of the FREENIX track.

The invited talks speakers are featured on the facing page. Fordescriptions of each of the talks, see pages 20–23.

Newcomers and past attendees will find that our Annual TechnicalConference offers a wealth of knowledge and insight. Join us in Boston onJune 25–30, 2001, to learn, to connect with people in your field, and to party!

For the USENIX 2001 Program Committees,

Yoonho Park, ReefEdge Inc.Clem Cole, Paceline Systems Corp.Program Chairs

FOR MORE INFORMATION: Call 1 .510.528.8649 3

YOONHO PARK

NEW SCHEDULE FORMAT FOR 2001

The tutorial program runs Monday through Wednesday.

The technical sessions run Thursday through Saturday.

CLEM COLE

Page 3: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

4 CONFERENCE AT A GLANCE

Conference at a Glance

Sunday, June 244:00 p.m.–9:00 p.m. On-Site Registration6:00 p.m.–7:00 p.m. Welcome Get-Together7:00 p.m.–8:00 p.m. Conference Orientation

Monday, June 257:30 a.m.–5:00 p.m. On-Site Registration9:00 a.m.–5:00 p.m. Tutorial Program

Tuesday, June 267:30 a.m.–5:00 p.m. On-Site Registration9:00 a.m.–5:00 p.m. Tutorial Program

Wednesday, June 277:30 a.m.–5:00 p.m. On-Site Registration9:00 a.m.–5:00 p.m. Tutorial Program6:00 p.m.–10:00 p.m. Birds-of-a-Feather Sessions

Thursday, June 287:30 a.m.–6:00 p.m. On-Site Registration9:00 a.m.–10:30 a.m. Keynote Address11:00 a.m.–5:30 p.m. Technical Program12:00 p.m.–7:00 p.m. Vendor ExhibitionEvening Party6:00 p.m.–10:00 p.m. Birds-of-a-Feather Sessions

Friday, June 297:30 a.m.–5:00 p.m. On-Site Registration9:00 a.m.–5:30 p.m. Technical Program10:00 a.m.–4:00 p.m. Vendor Exhibition12:30 p.m.–2:00 p.m. Lunch in the ExhibitionEvening Party9:00 p.m.–11:00 p.m. Birds-of-a-Feather Sessions

Saturday, June 309:00 a.m.–3:30 p.m. Technical Program4:00 p.m.–5:30 p.m. Joint Closing Session

Page 4: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

USENIX 2001 Vendor Exhibition

QUESTIONS? Ask [email protected] 5

Open: Thursday, June 28, 12 noon–7 p.m.Friday, June 29, 10 a.m–.4 p.m.

Location: Boston Marriott Copley Plaza110 Huntington Ave., Boston, Mass. 02116

USE THIS PASS ONLY if you do not register for USENIX 2001 tutorials or technicalsessions. Please copy and share freely with your colleagues.

NAME First Last

COMPANY

WORK ADDRESS

CITY STATE ZIP

TELEPHONE FAX

EMAIL ADDRESS (one only, please)

Please complete. Information is confidential.❏ I do not want my address made available except for USENIX mailings. ❏ I do not want USENIX to email me notices of Association activities.

What is your affiliation (check one): ❏ academic ❏ commercial ❏ gov’t ❏ R&D

What is your role in the purchase decision (check one): 1. ❏ final 2. ❏ specify 3. ❏ recommend 4. ❏ influence 5. ❏ no role

What is your primary job function (check one):

1. ❏ system/network administrator 2. ❏ consultant3. ❏ academic/researcher 4. ❏ developer/programmer/architect5. ❏ system engineer 6. ❏ technical manager 7. ❏ student8. ❏ security 9. ❏ Webmaster

How did you first hear about this exhibition (check one):

1. ❏ Referral from colleague 2. ❏ Postal mail 3. ❏ The Web4. ❏ Email 5. ❏ Magazine 6. ❏ Newsgroup

F R E E E X H I B I T A D M I S S I O N E V E R Y O N E W E L C O M E !

ActiveState Tool Corp. http://www.ActiveState.comAddison-Wesley Professional Publishing http://www.aw.com/csengAdvanced Computer and Network Corp. http://www.acnc.comAlteon WebSystems, Inc. http://www.alteonwebsystems.comAttachmate Corporation http://www.attachmate.comAurora Software Inc. http://www.sarcheck.comBaydel North America http://www.baydel.comBindview http://www.bindview.comCMP Media http://www.cmp.comCompaq Computer Corp. http://www.compaq.comCovalent Technologies, Inc. http://www.Covalent.comEMC Corporation http://www.emc.comESM Services, Inc. http://www.esm.comImperial Technology Inc. http://www.imperialtech.comIndustrial Light & Magic http://www.ilm-jobs.comInline Corporation http://www.inlinecorp.comIntrusion.com http://www.intrusion.comLinux Journal http://www.linuxjournal.comLinux NetworX http://www.linuxnetworx.comLSI Logic Storage Systems, Inc. http://www.metastor.com

MKS—IBU http://www.mks.com/interopMorgan Stanley Dean Witter http://www.msdw.comNetwork Appliance, Inc. http://www.netapp.comNominum, Inc. http://www.nominum.comO'Reilly & Associates, Inc. http://www.ora.comOverland Data http://www.overlanddata.comPrentice Hall PTR/Macmillan Publishing http://www.mcp.comResilience Corporation http://www.resilience.comSecureSolv.com http://www.xseat.comSendmail, Inc. http://www.sendmail.comSleepycat Software www.sleepycat.comSmart Storage http://www.smartstorage.comStonesoft Corp. http://www.stonesoft.comSun Microsystems, Inc. http://www.forte.comSymark Software http://www.symark.comTandberg Data, Inc. http://www.tandberg.comTeraSolutions, Inc. http://www.terasolutions.comUNIX GURU UNIVERSE http://www.ugu.comVita Nuova Holdings Limited http://www.vitanuova.comZzyzx Peripherals, Inc. http://www.zzyzx.com

THURSDAY, JUNE 28, 12 NOON–7:00 P.M.FRIDAY, JUNE 29, 10:00 A.M.–4:00 P.M.

● Preview in operation innovative products and services

● Get the details from well-informed vendor representatives

● Compare solutions quickly on the floor, saving hours of research

E X H I B I T O R S (A S O F 2/23/01) :

Bring the completed pass to the Registration Desk for free admission to the Exhibition!

Page 5: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

6 REGISTER BY MAY 25: Save up to $200

Tutorials Mon.–Wed., June 25–27

M1 Network Security Profiles: A Collection (Hodgepodge)of Stuff Hackers Know About You

M2 Building Linux Applications NEW

M3 Advanced Topics in Perl Programming

M4 Topics for System Administrators, 1 NEW

M5 Sendmail Configuration and Operation (Updated for Sendmail 8.12)

M6 Blueprints for High Availability: Designing ResilientDistributed Systems

M7 Exploring the Potential of LDAP NEW

M8 Large Heterogeneous Networks: Planning, Building, andMaintaining Them While Staying Sane NEW

M9 Communicating in Difficult Situations NEW

M10 Wireless Networking Fundamentals:WANs, LANs, and PANs NEW

T1 Internet Security for UNIX and Linux SystemAdministrators

T2 Perl for System Administration: The Power and the Praxis NEW

T3 Advanced CGI Techniques Using Perl

T4 UNIX Network Programming Topics NEW

T5 Cryptography Decrypted NEW

T6 Network Design for High Availability NEW

T7 Advanced Solaris Systems Administration Topics

T8 Forensic Computer Investigations: Principles andProcedures NEW

T9 Basic Management Techniques NEW

T10 Practical Wireless IP Security and Connectivity: How toUse It Safely NEW

MONDAY TUESDAY

To meet your needs, the Tutorial Program at USENIX Annual Technical Conference provides in-depth, immedi-

ately useful instruction in the latest techniques, effective tools, and best strategies.

USENIX tutorials survey the topic, then dive right into the specifics of what to do and how to do it. Instructors are well-

known experts in their fields, selected for their ability to teach complex subjects. Attend the USENIX tutorials at USENIX ’01 and

take valuable skills back to your company or organization. Register now to guarantee your first choice—seating is limited.

Page 6: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

MONDAY,JUNE 25, 2001

M1 Network SecurityProfiles: A Collection(Hodgepodge) of StuffHackers Know About You

Brad Johnson, SystemExperts CorporationWho should attend: Network, system,

and firewall administrators; security audi-tors and those who are audited; peopleinvolved with responding to intrusions orresponsible for network-based applicationsor systems that might be targets for crackers(determined intruders). Participants shouldunderstand the basics of TCP/IP network-ing. Examples will use actual tools and willalso include small amounts of HTML,JavaScript, and Tcl.

Network-based host intrusions, whetherthey come from the Internet, an extranet, oran intranet, typically follow a commonmethodology: reconnaissance, vulnerabilityresearch, and exploitation. This tutorial willreview the ways crackers perform these ac-tivities. You will learn what types of proto-cols and tools they use, and you will becomefamiliar with a number of current methodsand exploits. The course will show how youcan generate vulnerability profiles of yoursystems. Additionally, it will review someimportant management policies and issuesrelated to these network-based probes.

The course will focus primarily on toolsthat exploit many of the common TCP/IP–based protocols, such as WWW, SSL,DNS, ICMP, and SNMP, which underlievirtually all Internet applications, includingWeb technologies, network management,and remote file systems. Some topics will beaddressed at a detailed technical level. Thiscourse will concentrate on examples drawnfrom public-domain tools that are widelyavailable and commonly used by crackers.

Topics include:◆ Profiles: what can an intruder deter-

mine about your site remotely?◆ Review of profiling methodologies:

different “viewpoints” generate differ-ent types of profiling information

Mon.–Wed., June 25–27 Tutorials

W1 Running Web Servers Securely NEW

W2 Hacking Exposed: LIVE!

W3 Inside the Linux Kernel

W4 Network Programming with Perl NEW

W5 Cryptographic Algorithms Revealed

W6 System and Network Performance Tuning

W7 Configuring and Administering Samba Servers

W8 Computer Crime: Investigating Computer-Based EvidenceNEW

W9 Solaris Internals: Architecture, Tips, and Tidbits

W10 Panning for Gold: What System Logs Tell You About YourNetwork Security NEW

WEDNESDAYCONTINUINGEDUCATION UNITS(CEUs)USENIX providesContinuing Educa-tion Units for asmall additional ad-ministrative fee. TheCEU is a nationallyrecognized standardunit of measure forcontinuing educationand training, and isused by thousandsof organizations.Each full-day tutorialqualifies for 0.6CEUs. You can re-quest CEU credit bycompleting the CEUsection on the regis-tration form. USENIXprovides a certifi-cate for each atten-dee taking a tutorialfor CEU credit andmaintains tran-scripts for all CEUstudents. CEUs arenot the same as col-lege credits. Consultyour employer orschool to determinetheir applicability.

Our guarantee: If you’re not happy, we’re not

happy. If you feel a tutorial does not meet the

high standards you have come to expect from

USENIX, let us know by the first break and we

will change you to any other available tutorial

immediately.

TUTORIAL FEES INCLUDE:◆ ADMISSION TO THE TUTORIALS YOU

SELECT

◆ LUNCH

◆ TUTORIAL CD-ROM

◆ PRINTED AND BOUND TUTORIAL

MATERIALS FROM YOUR SESSIONS

◆ ADMISSION TO THE VENDOR EXHIBIT

QUESTIONS? Call 1 .510.528.8649 7

Page 7: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

8 REGISTER EARLY FOR TUTORIALS: Get Your First Choice!

Tutorials Mon.–Wed., June 25–27

◆ Techniques: scanning, on-lineresearch, TCP/IP protocol “mis”uses,denial of service, cracking clubs

◆ Important intrusion areas: discoverytechniques, SSL, SNMP, WWW,DNS

◆ Tools: scotty, strobe, netcat, SATAN,SAINT, ISS, mscan, sscan, queso,curl, Nmap, SSLeay/upget

◆ Defining management policies tominimize intrusion risk

Topics not covered:◆ Social engineering◆ Buffer overflow exploits◆ Browser (frame) exploits◆ Shell privilege escalation

M2 Building Linux Applications NEW

MIchael K. Johnson, Red Hat, Inc.Who should attend: This class is

designed for programmers who are familiarwith the C programming language, thestandard C library, and some basic ideas ofUNIX shells: primarily pipes, I/O redirec-tion, and job control. We will discuss(come prepared to ask questions) the majorO/S related components of a Linux applica-tion and how they fit together. This coursewill prepare you to start building Linuxapplications. Since Linux is very similar toUNIX, you will be fundamentally ready tobuild UNIX applications as well.

The core of the tutorial will be an intro-duction to system programming: theprocess model, file I/O, file name anddirectory management, and signal process-ing lead the list. We will more briefly cover(in more or less depth depending on partic-ipant interest) ttys and pseudo ttys, time,random numbers, and simple networking.

We will then cover some system libraryfunctionality, including globbing and regu-lar expressions, command line parsing, anddynamic loading. If there is sufficient inter-est and time, we will briefly survey the greatvariety of application programminglibraries.

M3 Advanced Topics in PerlProgramming

Tom Christiansen, Consultant

Who should attend: Perl programmersinterested in honing their skills for quickprototyping, system utilities, software tools,system management tasks, database access,and WWW programming. Participantsshould have several months’ experience inbasic Perl scripting.

Topics include:◆ Complex data structures◆ References◆ Memory management and

anonymous data structures◆ Packages and modules◆ Namespaces, scoping, and extent◆ Classes and objects◆ Object-oriented programming◆ Process control and management◆ Pipes and signals◆ Advanced I/O techniques and file

locking◆ Assorted tips and tricks to use Perl

effectivelyUpon completion of this course,

students will be able to:◆ Develop standard and OO modules◆ Understand complex and hierarchical

data structures◆ Understand Perl’s facilities for file

locking◆ Use Perl for multi-process and

daemon programming◆ Understand inheritance, closures, and

scoping in Perl

M4 Topics for SystemAdministrators, 1 NEW

Evi Nemeth, University of Colorado;Ned McClain, XOR Network Engineering;Tor Mohling, University of Colorado

Who should attend: This class willcover a range of timely and interestingUNIX system administration topics. It isintended for system and network adminis-trators who are interested in picking up sev-eral new technologies in an acceleratedmanner. The format consists of five topicsspread throughout the day.

File systems and storage: This sectionwill cover features of modern file systemsand how they affect the life of a systemadministrator. We will survey existing filesystems, ending with a brief discussion oftrends and probable developments.

What's new in BIND9? BINDv9includes a long laundry list of featuresneeded for modern architectures, hugezones, machines serving a zillion zones, co-existence with PCs, security, and IPv6—specifically, dynamic update, incrementalzone transfers, DNS security via DNSSECand TSIG, A6, and DNAME records.

Machine room design: With the ever-increasing popularity of the Web as well asthe general necessity for reliable data-access,more and more sites are requiring 24x7 serv-er availability. We will look at the transitionfrom small machine room to (large) datacenter, and what you can do to make it eas-ier to manage cables, power, A/C, and so on.

Security tools: A new generation’s worthof security management tools are on theloose. We’ll help you understand how touse such tools as Nessus, nmap, hostfirewalling software, CFS, and TCFS.

Host security: Although the specificconfiguration tips refer to Linux andSolaris, the concepts are generic, applyingwell to other UNIX operating systems. Thissection will include technical discussiondesigned to help administrators identifyweak points in their own installations.

M5 Sendmail Configurationand Operation (Updatedfor Sendmail 8.12)

Eric Allman, Sendmail, Inc.

Who should attend: System administra-tors who want to learn more about thesendmail program, particularly details ofconfiguration and operational issues (thistutorial will not cover mail front ends).This will be an intense, fast-paced, full-daytutorial for people who have already beenexposed to sendmail. This tutorial describesthe latest release of sendmail from Berkeley,version 8.12.

We begin by introducing a bit of thephilosophy and history underlying sendmail.

Page 8: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

Mon.–Wed., June 25–27 Tutorials

Topics include:◆ The basic concepts of configuration:

mailers, options, macros, classes,keyed files (databases), and rewritingrules and rulesets

◆ Configuring sendmail using the M4macro package

◆ Day-to-day management issues,including alias and forward files,“special” recipients (files, programs,and include files), mailing lists, com-mand-line flags, tuning, and security

◆ How sendmail interacts with theDomain Name System

M6 Blueprints for HighAvailability: DesigningResilient DistributedSystems

Evan Marcus, VERITAS SoftwareCorporation

Who should attend: Beginning andintermediate UNIX system and networkadministrators, and UNIX developers con-cerned with building applications that canbe deployed and managed in a highlyresilient manner. A basic understanding ofUNIX system programming, UNIX shellprogramming, and network environmentsis required.

This course will explore procedures andtechniques for designing, building, andmanaging predictable, resilient UNIX-basedsystems in a distributed environment.Hardware redundancy, system redundancy,monitoring and verification techniques,network implications, and system andapplication programming issues will all beaddressed. We will discuss the trade-offsamong cost, reliability, and complexity.

Topics include:◆ What is high availability? Who needs it?◆ Defining uptime and cost; “big rules”

of system design◆ Disk and data redundancy; RAID

and SCSI arrays◆ Host redundancy in HA

configurations◆ Network dependencies◆ Application system programming

concerns◆ Anatomy of failovers: applications,

systems, management tools

◆ Planning disaster recovery sites anddata updates

◆ Security implications◆ Upgrade and patch strategies◆ Backup systems: off-site storage,

redundancy, and disaster recovery◆ Managing the system: managers,

processes, verification

M7 Exploring the Potential ofLDAP NEW

Gerald Carter, VA Linux Systems

Who should attend: Administratorsand programmers interested in the potentialof the Lightweight Directory Access Proto-col (LDAP) and in exploring issues relatedto deploying an LDAP infrastructure. Thistutorial is not designed to be a how-to for aspecific LDAP server, nor is it an LDAPdevelopers’ course. Rather, it is an evalua-tion of the potential of LDAP to allow theconsolidation of existing deployed directo-ries. No familiarity with LDAP or otherDirectory Access Protocols will be assumed.

System administrators today run manydirectory services, though they may becalled by such names as DNS and NIS.LDAP, the up-and-coming successor to theX500 directory, promises to allow adminis-trators to consolidate multiple existingdirectories into one. Vendors across operat-ing-system platforms are lending support.

Topics include:◆ The basics of LDAP◆ Current technologies employing

LDAP services◆ Replacing NIS using LDAP◆ Integrating authentication

mechanisms for other services (e.g.,Apache, Sendmail, Samba) withLDAP

◆ LDAP interoperability with otherproprietary Directory Services, suchas Novell's NDS and Microsoft'sActive Directory

◆ Programming tools and languagesavailable for implementing LDAPsupport in applications

M8 Large HeterogeneousNetworks: Planning,Building, and MaintainingThem While Staying SaneNEW

Lee Damon, University of Washington

Who should attend: Anyone who isdesigning, implementing or maintaining aUNIX environment with 2 to 20,000+hosts. System administrators, architects,and managers who need to maintain multi-ple hosts with few admins.

This tutorial won't propose one “perfectsolution.” Instead, it will try to raise all thequestions you should ask in order to designthe right solution for your needs.

Topics include:◆ Administrative domains: Who is

responsible for what? What can usersdo for themselves?

◆ Desktop services vs. farming: Do youdo serious computation on the desk-top, or do you build a compute farm?

◆ Disk layout: How should you planfor an upgrade? Where do things go?

◆ Free vs. purchased solutions: Do youwrite your own, or do you outsource?

◆ Homogeneous vs. heterogeneous:Homogeneous is easier, but will it dowhat your users need?

◆ Master database: What do you needto track, and how?

◆ Policies to make your life easier◆ Push vs. pull: Do you force data to

each host, or wait for a client request?◆ Quick replacement techniques: How

to get the user back up in 5 minutes◆ Remote install/upgrade/patching:

How can you implement lights-outoperation? Handle remote user sites?Keep up with vendor patches?

◆ Scaling and sizing: How do you plan? ◆ Security vs. sharing: Users want

access to everything. So do crackers.Where and how do you draw the line?

◆ Single sign-on: Can one-passwordaccess to multiple services be secure?

◆ Single system images: Can you findthe Holy Grail? Should each user seeeverything the same way, no matterwhat environment they're workingin, or should each user's access to

REGISTER ON-LINE: http:/ /www.usenix.org/events/usenix01 9

Page 9: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

10 QUESTIONS? Call 1 .510.528.8649

Tutorials Mon.–Wed., June 25–27

each service be consistent withhis/her own environment?

◆ Tools: What's free? What should youbuy? What can you can writeyourself?

The class will concentrate on UNIX.

M9 Communicating in Difficult SituationsNEW

Stephen C. Johnson, Transmeta Corp.; DustyL. White, Consultant

Who should attend: Anyone whose jobinvolves important communication, be itwith customers, management, or co-work-ers. This class should be especially useful tomanagers.

Do you work with difficult people? Theymay be clients, employees, peers, ormanagers. Or do you have to communicateor even manage people who are remote,communicating mostly through email? Thistutorial discusses why some people and sit-uations are difficult, and how to developyour own abilities and become more flexi-ble in dealing with these difficulties. Thefocus is on giving you specific techniquesyou can try in the class and then take hometo use immediately.

Technical people communicate a lot ofinformation. Typically, this informationseems quite clear to us, yet othersfrequently misinterpret it. The misinterpre-tation may distort facts, but often it distortsintention as well, leading to furtherproblems. Most of us find that some peoplewe work with seem almost to read ourmind, while others seem unable to under-stand anything we say.

We focus on examples and simple exer-cises that demonstrate that there are manydifferent ways to communicate, and thatmost people use only a small fraction of theavailable ways. The more communicationtechniques you master, the more people youcan communicate with easily. The key toovercoming difficulties in communicationis not just to keep trying, but to keep tryingdifferent things until you find somethingthat works.

Topics include:◆ Reaching agreement with negative

people◆ Saying “no” so that it will be under-

stood and stick◆ Negotiating compromises◆ Building trust◆ Giving feedback constructively◆ Communicating with people who

don’t like to communicate◆ Fitting loners into a group◆ Knowing when to disengage from

difficult people

M10 Wireless NetworkingFundamentals: WANs,LANs, and PANs NEW

Chris Murphy, MIT; Jon Rochlis, The RochlisGroup, Inc.

Who should attend: Anyone involvedwith network design, implementation, andsupport, and content providers who needfamiliarity with wireless technologies andhow those technologies can affect theirservice offerings. A basic understanding ofwired network architecture over localand/or wide areas is required.

For years people have dreamed of“unwired” access—anywhere, anytime—tonetworks and the data they contain.Recently, the advent of standards for wire-less LANs, the development of powerfulhandheld devices, and widespread deploy-ment of services such as digital cellular sys-tems have made the promise of wirelessnetworking more realizable than everbefore.

Topics include:◆ Wide-area networks

• CDPD• Cellular modem• PCS• GSM• pager• satellite

◆ Local-area networks• 802.11

◆ Personal-area networks• Bluetooth• IrDA

◆ Home vs. office use◆ Standards and interoperability

◆ Integration with wired networks andservices

◆ Cost: Budget salvation, or sinkhole?◆ Support: Will you need new skills?◆ Security◆ Product survey◆ Future trends and possibilities

TUESDAY,JUNE 26, 2001

T1 Internet Security forUNIX & Linux SystemAdministrators

Ed DeHart, Prism Servers, Inc.

Who should attend: UNIX and Linuxsystem and network administrators andoperations/support staff. After completingthe tutorial, you should be able to establishand maintain a site that allows the benefitsof Internet connectivity while protectingyour organization's information.

You will learn strategies to reduce thethreat of Internet intrusions and to improvethe security of your UNIX and Linux sys-tems connected to the Internet, as well ashow to set up and manage Internet servicesappropriate to your site's mission.

Topics include:◆ Latest news on security problems◆ UNIX and Linux system security◆ TCP/IP network security◆ Site security policies

T2 Perl for SystemAdministration—ThePower and the PraxisNEW

David N. Blank-Edelman, NortheasternUniversity CCS

Who should attend: People with systemadministration duties, advanced-beginner tointermediate Perl experience, and a desire tomake their jobs easier and less stressful intimes of sysadmin crises.

Perl was originally created to help withsystem administration, so it is a wonderthat there isn’t more instructional material

Page 10: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

Mon.–Wed., June 25–27 Tutorials

devoted to helping people use Perl for thispurpose. This tutorial hopes to begin toremedy this situation by giving you six solidhours of instruction geared towards puttingyour existing Perl knowledge to practice inthe system administration realm.

The morning section will concentrate onthe power of Perl in this context. Based onthe instructor’s O’Reilly book, we'll take amulti-platform look at using Perl incutting-edge and old-standby systemadministration domains. This jam-packedsurvey will include:

◆ Secure Perl scripting◆ Dealing with files and file systems

(including source control, XML,databases, and log files)

◆ Dealing with SQL databases via DBIand ODBC

◆ Email as a system administration tool(including spam analysis)

◆ Network directory services (includingNIS, DNS, LDAP, and ADSI)

◆ Network management (includingSNMP and WBEM)

In the afternoon, we will look at puttingour Perl knowledge to work for us to solvetime-critical system administrationproblems using short Perl programs.Centered around a set of “battle stories”and the Perl source code used to deal withthem, we’ll discuss different approaches todealing with crises using Perl.

At the end of the day, you’ll walk awayfrom this class with Perl approaches andtechniques that can help you solve yourdaily system administration problems.You’ll have new ideas in hand for writingsmall Perl programs to get you out of bigsysadmin pinches. And on top of all this,you are also likely to deepen your Perlknowledge.

T3 Advanced CGITechniques Using Perl

Tom Christiansen, ConsultantWho should attend: Experienced Perl

programmers and Webmasters interested inlearning more about CGI techniques thanwould be learned in a class on how to write

a CGI program in Perl. Attendees areassumed to know the fundamentals ofHTML and CGI programming, as well asusing (but not writing) Perl modules.

CGI programming is fundamentally aneasy thing. The Common GatewayInterface merely defines that a CGIprogram be able to read stdin and environ-ment variables, and to write stderr. Butwriting efficient CGI programs of anydegree of complexity is a difficult process.

Topics include:◆ Multi-stage forms

◆ Sequential “shopping cart” systems◆ Undirected “jump page” systems◆ Techniques for recording

selections across pages◆ Cookies

◆ For authentication and authori-zation

◆ For user tracking◆ For data validation◆ For data hiding and indirection◆ Data exchange and efficiency◆ File uploading◆ Redirection and temporary alias-

ing◆ CGI Security

◆ Taint checking◆ Denial-of-Service attacks◆ Data security

◆ Daemonization of processes◆ Fast CGI and mod_perl◆ Front-end/back-end solutions◆ Backgrounding

◆ Invocation and response techniques◆ Statelessness and statefulness◆ PATH_INFO vs. cookies vs. CGI

parameters◆ Static vs. dynamic vs. locally

cached responses◆ Web automation from CGI scripts

◆ Fetching remote pages◆ Parsing HTML and extracting

data◆ Determining and setting image

sizesIn all examples, we will show which Perl

modules make these tasks easier. Numerouscode examples will be provided, as well aspointers to Web pages containing fullyfunctioning examples for later examination.

T4 UNIX NetworkProgramming Topics NEW

Evi Nemeth, University of Colorado; NedMcClain, XOR Network Engineering; AndyRudoff, Sun Microsystems; Bill Fenner,AT&T Labs–Research

Who should attend: Programmers whoare rusty in network programming or new-comers to network programming. Weassume that you know programming in Cand a bit of Perl and Java, so weconcentrate on the interfaces to thenetwork libraries. We look at both thesocket level and higher-level interfaces suchas RPC and RMI.

This tutorial attempts to follow in thefootsteps of Richard Stevens' wonderfulUSENIX tutorials of the past. We beginwith an introduction to the client-serverparadigm and the various levels of networkprogramming interfaces. We include the Csocket interfaces and data structures, Perlnetworking interfaces, and of course Java.For the C interfaces we look in detail at theIPv4 and IPv6 constructs available and alsoat the ioctl magic necessary to make asocket connection behave properly.

We briefly cover multicast program-ming, which is used for applications typi-cally involving audio or video data thatneeds to go from one source to many desti-nations efficiently. Finally, we discussdebugging network programs.

T5 Cryptography DecryptedNEW

H.X. Mel and Doris Baker, Consultants

Who should attend: Anyone workingwith computer security—securityprofessionals, network administrators, ITmanagers, CEOs, and CIOs—will want tohave a comfortable understanding of thecryptographic concepts covered in this sem-inar.

The tutorial is based on the book,Cryptography Decrypted, a pictorialintroduction to cryptography recently pub-lished by Addison-Wesley, which describesthe component parts of secret key and pub-lic key cryptography with easy-to-

FOR PROGRAM UPDATES: http:/ /www.usenix.org/events/usenix01 11

Page 11: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

12 REGISTER BY MAY 25: Save up to $200

Tutorials Mon.–Wed., June 25–27

understand analogies, visuals, and historicalanecdotes.

The tutorial covers four broadcategories:

◆ Secret keys and secret-key methodssuch as DES and the new AdvancedEncryption Standard Rijndael

◆ Public and private keys and publickey methods like RSA

◆ How keys are distributed throughdigital certificates

◆ Three real-world systems. Commoncryptographic terminology is clarifiedand made concrete with numerousgraphics.

This presentation is designed to beunderstandable by those with little previousknowledge of cryptography but systematicand comprehensive enough to solidify theknowledge for those with some understand-ing of the subject. Cryptographic terms(e.g. confidentiality, authentication,integrity, etc) are clarified and madeconcrete with images. As we examine thepieces (e.g. digital signatures, hash, and dig-ital certificates), we'll look at cryptographiccapabilities like detecting imposters andstopping eavesdropping. We'll also examinesome possible attacks such as man-in-the-middle and birthday attacks.

Cryptographic systems such as secureemail (S-MIME and PGP mail), securesocket layers (SSL), and internet protocolsecurity (IPsec) are outlined using the com-ponent parts described. Both X-509 andPGP public key distribution and authenti-cation systems are described and contrasted.

A security professional who authoredCryptography Decrypted’s Foreword wrote: "Evenafter 10 years working in the field of infor-mation protection for a major electronicsmanufacturing company, I learned a lotfrom this book. I think you will too."

T6 Network Design for HighAvailability NEW

Vincent C Jones, Networking Unlimited, Inc.

Who should attend: System andnetwork designers and administrators whowant to improve the availabiity of their net-work infrastructure and Internet access, andanyone looking for a survey of how IP net-works can fail and techniques for keeping

critical network services available despitefailures. Attendees should already be famil-iar with basic network terminology andconcepts, TCP/IP protocols, and the role ofrouters and switches. (This tutorial isdesigned to complement Tutorial M6,“Designing Resilient Distributed Systems—High Availability.”)

No matter how the price is measured,downtime impacts the bottom line. Asorganizations grow ever more dependentupon computers and their supportnetworks, hardware and software failuresthat interfere with business operations areincreasingly seen to be unacceptable.Availability has become a key network per-formance metric, commensurate withthroughput and delay.

We will discuss how to select and config-ure appropriate redundancy for commonproduction network needs. The emphasiswill be on how to take advantage ofstandard capabilities to make the networkmore reliable and to minimize the need foremergency manual intervention. Provensolutions based on open standards and pro-tocols will be provided for a wide range ofapplication requirements.

Topics include:◆ Providing bullet-proof network access

to servers◆ Forcing dial backup calls on soft as

well as hard link failures◆ Tuning popular routing protocols to

speed up failure recovery◆ Building very large hub and spokes

networks with small spoke routers◆ Routing around firewall failures with-

out sacrificing security◆ Making Internet connectivity

immune to the loss of a router, link,or ISP

◆ Continuing to provide servicesdespite loss of an entire facility

T7 Advanced SolarisSystems AdministrationTopics

Peter Baer Galvin, Corporate Technologies

Who should attend: UNIX administra-tors who need more knowledge of Solarisadministration.

We will discuss the major new featuresof recent Solaris releases, including whichto use (and how) and which to avoid. Thisin-depth course will provide the informa-tion you need to run a Solaris installationeffectively. Updated to include Solaris 8 andseveral other new topics.

Topics include:◆ Installing and upgrading

◆ Architecting your facility◆ Choosing appropriate hardware◆ Planning your installation, file-

system layout, post-installation◆ Installing (and removing) patches

and packages◆ Advanced features of Solaris 2

◆ File systems and their uses◆ The /proc file system and commands◆ Useful tips and techniques

◆ Networking and the kernel◆ Virtual IP: configuration and uses◆ Kernel and performance tuning:

new features, adding devices, tun-ing, debugging commands

◆ Devices: naming conventions,drivers, gotchas

◆ Enhancing Solaris◆ High-availability essentials: disk

failures and recovery, RAID levels,uses and performance, H-A tech-nology and implementation

◆ Performance: how to track downand break up bottlenecks

◆ Tools: useful free tools, tool usestrategies

◆ Security: locking down Solaris,system modifications, tools

◆ Resources and references

T8 Forensic ComputerInvestigations: Principlesand Procedures NEW

Steve Romig, Ohio State University

Who should attend: People who inves-tigate computer crimes and are familiarwith systems or network administration andthe Internet.

This tutorial will explain where evidencecan be found, how it can be retrieved secure-ly, how to build a picture of the “crimescene,” and what can be done beforehand tomake investigations easier and more success-

Page 12: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

Mon.–Wed., June 25–27 Tutorials

ful. Examples are drawn from UNIX, Win-dows NT, and telecommunications hardware.

Topics include:◆ Basic forensic science

◆ What evidence is◆ How evidence is used in an inves-

tigation◆ The investigation game plan◆ How to collect and process

evidence◆ Where the evidence is

◆ How computers and networkswork

◆ Examples of incidents andlocation of evidence

◆ Host-based investigations◆ Memory and swap space◆ Processes◆ Network activity◆ Files and file systems

◆ Network-based investigations◆ Host-based network service logs◆ Network activity logs◆ Authentication logs◆ Telco logs, including pen registers,

phone traces, caller ID◆ Tying it all together

T9 Basic ManagementTechniques NEW

Stephen C. Johnson, Transmeta Corp.; Dusty L. White, Consultant

Who should attend: Newly promotedtechnical managers and those who expectpromotion in the near future, and peoplewho want to understand managementissues better.

So you have done well at your technicaljob and have been asked to take on somemanagement responsibility. You understandthe technical side of the jobs your group isdoing. What else do you need to do to suc-ceed as a manager? This class will orientyou, show you techniques you can applyimmediately to become more effective, andsuggest ways you can guide your owngrowth as a manager.

One issue each new manager must dealwith is power. Many managers report thatalthough their job seemed powerful beforethey took it, it does not feel that way anylonger. We show how power is typically

associated more with the person than withthe job, and we offer practical ways you canempower yourself and others. True empow-erment comes from within and can bedeveloped even in a hostile environment.

Topics include:◆ How to find out what your job really

is ◆ How to develop a new definition of

job satisfaction and success◆ How to help your people grow◆ How to handle performance reviews◆ Why being right is not enough◆ How to avoid common mistakes

technical managers make ◆ A theory of power and empowerment ◆ How to experience how empowered

you already are◆ Empowerment and trust ◆ How to gain and keep agreement◆ How to make goals, plans, and budg-

ets work for you

T10 Practical Wireless IPSecurity andConnectivity: How toUse It Safely NEW

Phil Cox and Brad C. Johnson,SystemExperts Corporation

Who should attend: Users, administra-tors, managers, and anyone who isinterested in learning about some of thefundamental security and usage issues thatwe all must come to grips with in purchas-ing, setting up, and using wireless IP ser-vices. This course assumes some knowledgeof TCP/IP networking and client/servercomputing, the ability or willingness to useadministrative GUIs to setup a device, anda general knowledge of common laptopenvironments. It does not assume that theattendee is intimately familiar with thephysics of signals, the various wireless pro-tocols, or the details of various emergingwireless standards (e.g., WML, Bluetooth,802.11, CDPD, WTLS).

The primary focus is on wireless IP ser-vices for laptops, although we’ll glance atsome popular mobile devices such as hand-held systems and cell-phones with Internetaccess.

Whether you like it or not, wireless ser-vices are popping up everywhere. As timegoes on, more of your personal and corpo-rate data communications will be done overvarious types of wireless devices. We’refaced with a proliferation of business andtechnical choices concerning security, hard-ware, software, protocols, and administra-tion.

The good news is that generally some-body else will handle these complicatedissues for users (of course, that “someoneelse” may be you!). However, since for mostwireless services you’re carrying the deviceeverywhere you go, you and your organiza-tion will still be responsible for understand-ing and managing them. Since the purposeof wireless is to share data when you aren’tdirectly attached to a wired resource, youneed to understand the fundamental secu-rity and usage options.

In this course we will cover a number oftopics that affect you in managing andusing wireless services. Some of the topicswill be demonstrated live using popularwireless devices.

Topics include:◆ Wireless practicals

◆ Transmission networks: packetand cellular

◆ Who's using what?◆ What really matters?

◆ Popular access points◆ Cisco Aironet◆ Apple Airport◆ Lucent ORiNOCO◆ 3Com Airconnect

◆ Configuration issues◆ Setting up an access point◆ Using an access point◆ Setting up your laptop

◆ Threats◆ Eavesdropping◆ Transitive trust◆ Denial of service

◆ Practical uses◆ At home◆ At a conference◆ At work◆ At a university

◆ Miscellaneous wireless topics

REGISTER EARLY FOR TUTORIALS: Get Your First Choice! 13

Page 13: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

14 REGISTER ON-LINE: http:/ /www.usenix.org/events/usenix01/

Tutorials Mon.–Wed., June 25–27

WEDNESDAY,JUNE 27, 2001

W1 Running Web ServersSecurely NEW

Rik Farrow, ConsultantWho should attend: Web server admin-

istrators, managers, and security consultantswho manage or audit Web servers. We willexamine every aspect of Web server security,from configuration and file permissions toscripting. At the end of this class, you willhave learned how to harden a UNIX systemfor use as a Web server, configure Apachecorrectly for tightest security, write andaudit Perl scripts for common weaknesses,and use the safest techniques for remoteadministration of Web servers.

Among the favorite targets for hackersare Web servers, because they need to beexposed in order to be useful, and, oncebroached, they often provide access tointernal servers. While misconfiguration ofthe Web server can provide a way in, CGIprogramming has been used so often thatthere are even tools designed specifically tolook for weaknesses in CGI.

You will learn about securing Webservers through the examples of others whowere not so careful. The class begins withan in-depth description of a famous hack ofa Linux server running Apache. We willlook at tools for scanning Web servers, suchas Whisker, that look for commonmistakes, and we’ll take a look at other leg-endary mistakes in CGI scripts. You willlearn the role of Perl's taint mechanism inuncovering flaws in script design. We willexplore Java's servlet mechanism and seehow Java's security mechanisms can providean additional layer of security.

Topics include:◆ HTTP protocol◆ The difference between GET and

POST◆ Hidden and browser variables◆ How attackers fake requests◆ Hardening the base operating system◆ Use of firewalls to control access◆ Secure configuration of Apache

◆ Safe use of modules◆ Auditing Perl CGI scripts◆ Use of Java servlets◆ Scanning tools◆ Monitoring logs for security◆ Remote administration technique

W2 Hacking Exposed:LIVE!

George Kurtz and Stuart Mcclure,Foundstone, Inc.

Who should attend: Network and sys-tem administrators, security administrators,and technical auditors who want to securetheir UNIX/NT–based networks.

Is your UNIX/NT–based network infra-structure up to meeting the challenge ofmalicious marauders? In this tutorial we’llpresent the methodologies used by today’shackers to gain access to your networks andcritical data. We’ll demonstrate a typicalattack exploiting both well-known andlittle-known NT-based vulnerabilities. We’llshow how NT attackers can leverage UNIXvulnerabilities to circumvent traditionalsecurity mechanisms. And we’ll identifyopportunities to better secure the host andnetworks against more esoteric attacks. Allexamples will be demonstrated on a livenetwork of machines.

Topics include:◆ Footprinting your e-commerce site

◆ Port scanning◆ Banner grabbing

◆ Exploiting common configurationand design weaknesses in NTnetworks◆ Enumerating user and system

information from NT 4 andWindows 2000 hosts

◆ Exploiting Web services◆ Logging on to NT using only the

password hash◆ Routing through IPX and

NetBEUI networks◆ Grabbing remote shells on NT◆ Hijacking the GUI◆ Hidden trojans: executing

streamed files

◆ Bypassing routers and firewallfiltering◆ Using source ports◆ Leveraging port redirection◆ 101 uses for Netcat

◆ Linking NT and UNIX vulnerabili-ties for maximum exploitation

◆ Securing NT systems to preventattacks

W3 Inside the Linux Kernel

Ted Ts’o, VA Linux SystemsWho should attend: Application

programmers and kernel developers. Youshould be reasonably familiar with Cprogramming in the UNIX environment,but no prior experience with the UNIX orLinux kernel code is assumed.

This tutorial will give you an introduc-tion to the structure of the Linux kernel,the basic features it provides, and the mostimportant algorithms it employs.

The Linux kernel aims to achieveconformance with existing standards andcompatibility with existing operatingsystems; however, it is not a reworking ofexisting UNIX kernel code. The Linux ker-nel was written from scratch to provideboth standard and novel features, and takesadvantage of the best practice of existingUNIX kernel designs.

Although the material will focus on therelease version of the Linux kernel, it willalso address aspects of the development ker-nel codebase where its substance differs. Itwill not contain any detailed examinationof the source code but will rather offer anoverview and roadmap of the kernel'sdesign and functionality.

Topics include:◆ How the Linux kernel is organized:

scheduler, virtual memory system,filesystem layers, device driver layers,and networking stacks◆ The interface between each mod-

ule and the rest of the kernel, andthe functionality provided by thatinterface

◆ The common kernel supportfunctions and algorithms used bythat module

Page 14: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

Mon.–Wed., June 25–27 Tutorials

◆ How modules provide for multi-ple implementations of similarfunctionality (network protocols,filesystem types, device drivers,and architecture-specific machineinterfaces)

◆ Basic ground rules of kernel program-ming (dealing with issues such asraces and deadlock conditions)

◆ Implementation of the most impor-tant kernel algorithms and their gen-eral properties (aspects of portability,performance, and functionality)

◆ The main similarities and differencesbetween Linux and traditional UNIXkernels, with attention to placeswhere Linux implements significantlydifferent algorithms

◆ Details of the Linux scheduler, itsVM system, and the ext2fs filesystem.

◆ The strict requirements for ensuringthat kernel code is portable

W4 Network Programmingwith Perl NEW

Lincoln Stein, Perl hackerWho should attend: Novice to interme-

diate Perl programmers who understand thebasics of input and output, loops, regularexpression matches, and the array and hashdata types. A working familiarity withPerl5's object-oriented syntax is also recom-mended. You should understand the basicsof networking, including the concepts of IPaddresses, DNS names, and servers.

This tutorial will show you how to writerobust client/server applications in Perl. Wewill begin with simple TCP-based clientsthat you can use to talk such standard ser-vices as ftp, http, mail, and news. We willthen turn to writing client/serverapplications from scratch, using as ourexamples applications that range from toys(a TCP-based psychotherapist server) tofull-scale applications (an Internet chat sys-tem based on multicasting).

Topics include:◆ Perl's low-level socket interface.◆ The high-level IO::Socket, IO::Select

and IO::Poll modules.◆ Forward and reverse name resolution.

◆ The Net::FTP, Net::Telnet,Net::SMTP, LWP and MIME mod-ules

◆ Choosing between TCP and UDPservices.

◆ Choosing the right serverarchitecture:◆ Fork-and-select◆ Multiplexed◆ Multithreaded◆ Preforked

◆ Advanced networking topics◆ Broadcasting◆ Multicasting◆ Non-blocking I/O

W5 CryptographicAlgorithms Revealed

Greg Rose, Qualcomm

Who should attend: Anyone interestedin a fairly detailed overview of what makescryptographic algorithms work, and, whenthey don’t work, how they are broken.Some of the Advanced Encryption Standardfinalists are covered to provide lessons inblock ciphers, with the winner, Rijndael,treated in depth.

Some mathematical background isrequired—at the very least, familiarity withcommon mathematical notation and poly-nomials, and some elementary statisticalknowledge. You’ve been warned.

Topics include (unless time runs out):◆ Brief history

◆ substitution and transposition◆ development of DES◆ public-key cryptography

◆ Symmetric block ciphers◆ Feistel ciphers in general◆ DES◆ Other AES candidates (Twofish,

RC6, Serpent)◆ Rijndael (AES) in depth◆ Block-cipher modes of operation

◆ Symmetric stream ciphers◆ Linear feedback shift registers◆ A5, SOBER, and other LFSR-

based constructions◆ Cryptanalysis

◆ Differential & linear cryptanalysis◆ Attack assumptions and threat

models◆ Attacks on stream ciphers

◆ Public-key systems◆ Group and finite field theory◆ Discrete log systems (El Gamal,

Diffie-Hellman, DSS)◆ RSA◆ Elliptic curves

◆ Other stuff◆ Hash functions, SHA-1, SHA-256

W6 System and NetworkPerformance Tuning

Marc Staveley, Soma Networks

Who should attend: Novice andadvanced UNIX system and networkadministrators, and UNIX developers con-cerned about network performanceimpacts. A basic understanding of UNIXsystem facilities and network environmentsis assumed.

We will explore techniques for tuningsystems, networks, and application code.Starting from a single-system view, we’llexamine how the virtual memory system,the I/O system, and the file system can bemeasured and optimized. We’ll move on toNetwork File System tuning and perfor-mance strategies. Detailed treatment of net-work performance problems, includingnetwork design and media choices, will leadto examples of network capacity planning.Application issues, such as system call opti-mization, memory usage and monitoring,code profiling, real-time programming, andcontrolling response time will be covered.Many examples will be given, along withguidelines for capacity planning andcustomized monitoring based on your work-loads and traffic patterns. Analysis periodsfor particular situations will be provided.

Topics include:◆ Performance tuning strategies

◆ Practical goals◆ Monitoring intervals◆ Useful statistics◆ Tools, tools, tools

◆ Server tuning◆ Filesystem and disk tuning◆ Memory consumption and swap

space◆ System resource monitoring

QUESTIONS? Ask [email protected] 15

Page 15: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

16 REGISTER EARLY FOR TUTORIALS: Get Your First Choice!

Tutorials Mon.–Wed., June 25–27

◆ NFS performance tuning◆ NFS server constraints◆ NFS client improvements◆ NFS over WANs◆ Automounter and other tricks

◆ Network performance, design, andcapacity planning◆ Locating bottlenecks◆ Demand management◆ Media choices and protocols◆ Network topologies: bridges,

switches, routers◆ Throughput and latency◆ Modeling resource usage

◆ Application tuning◆ System resource usage◆ Memory allocation◆ Code profiling◆ Job scheduling and queuing◆ Real-time issues◆ Managing response time

W7 Configuring andAdministering SambaServers

Gerald Carter, VA Linux SystemsWho should attend: System and

network administrators who wish tointegrate Samba running on a UNIX-basedmachine with Microsoft Windows clients.No familiarity with Windows networkingconcepts will be assumed.

Samba is a freely available suite of pro-grams that allows UNIX-based machines toprovide file and print services to MicrosoftWindows PCs without installing any third-party software on the clients. This allowsusers to access necessary resources fromboth PCs and UNIX workstations. AsSamba makes its way into more and morenetwork shops all over the world, it is com-mon to see “configuring Samba servers”listed as a desired skill on many job descrip-tions for network administrators.

This tutorial will use real-world exam-ples taken from daily administrative tasks.

Topics include:◆ Installing Samba from the ground up◆ The basic Microsoft networking

protocols and concepts, such asNetBIOS, CIFS, and Windows NTdomains (including Windows 2000)

◆ Configuring a UNIX box to provideremote access to local files and print-ers from Microsoft Windows clients

◆ Utilizing client tools to access files onWindows servers from a UNIX host

◆ Configuring Samba as a member of aWindows NT domain in order toutilize the domain’s PDC for userauthentication

◆ Using Samba as a domain controller◆ Configuring Samba to participate in

network browsing◆ Automating daily management tasks

W8 Computer Crime:InvestigatingComputer-BasedEvidence NEW

Steve Romig, Ohio State University

Who should attend: People who inves-tigate computer crimes who have somefamiliarity with systems or network admin-istration and a basic understanding of whatthe Internet is and what people commonlyuse it for. This tutorial picks up whereTutorial T8, “Forensic ComputerInvestigations: Principles and Procedures,”leaves off.

We will see where to find evidence in awide variety of sources, including variousflavors of UNIX, Windows, NT, and suchnetwork devices as routers and switches.Specific and detailed case studies will showhow to safely recover and preserve this evi-dence. Real-life examples will be used toillustrate the application of the principlesand suggested procedures from theintroductory tutorial.

Finally, we will demonstrate how to cor-relate evidence from different sources tobuild a coherent and robust reconstructionof events that comprises the “crime scene.”

Topics include:◆ Review of basic issues, procedures◆ Big picture: where the evidence is◆ Host-based investigations

◆ Memory, swap◆ Processes◆ Network activity◆ Files and file systems

◆ UNIX- and NT-specific examples

◆ Network-based investigations◆ Host-based network service logs◆ Network activity logs◆ Authentication logs◆ Telco logs, including pen registers,

phone traces, and caller ID◆ Specific examples from a variety of

network devices◆ Tool demonstrations (may be

interleaved with previous material)◆ Tying it all together

W9 Solaris Internals:Architecture, Tips, andTidbits

Richard McDougall and James Mauro, Sun Microsystems, Inc.

Who should attend: Softwareengineers, application architects and devel-opers, kernel developers, device driver writ-ers, system administrators, performanceanalysts, capacity planners, Solaris userswho wish to know more about the systemthey’re using and the information availablefrom bundled and unbundled tools, andanyone interested in operating system inter-nals.

The installed base of Solaris systemsbeing used for various commercial data-processing applications across all marketsegments and scientific computing applica-tions has grown dramatically over the lastseveral years, and it continues to grow. Asan operating system, Solaris has evolvedconsiderably, with some significant changesmade to the UNIX SVR4 source base onwhich the early system was built. An under-standing of how the system works isrequired in order to design and developapplications that take maximum advantageof the various features of the operating sys-tem, to understand the data made availablevia bundled system utilities, and tooptimally configure and tune a Solaris sys-tem for a particular application or load.

Topics include the major componentsof the Solaris 8 kernel. We discusssignificant differences between Solaris 8 andthe previous volume release (Solaris 2.6).We discuss in detail the kernel system ser-vices facilities, such as system calls, trapsand interrupts, system clocks and synchro-nization primitives. We discuss the 64-bitkernel, loadable kernel modules, and the

Page 16: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

runtime linker. We examine the multi-threaded process model, the threads imple-mentation, and thread scheduling at thelibrary and kernel level. Interprocess com-munication, including Solaris Doors, is alsocovered. The kernel's virtual memory im-plementation, file system, and file supportare also covered. Along the way, we useexamples from bundled Solaris utilities(mpstat, vmstat, cpustat, etc.) and the ker-nel debugger (mdb) to illustrate points andprovide examples.

After completing this course, partici-pants will have a solid understanding of theinternals of the major areas of the Solariskernel that they will be able to apply tosystems performance analysis, tuning, load/behavior analysis, and application develop-ment.

W10 Panning for Gold: WhatSystem Logs Tell YouAbout Your NetworkSecurity NEW

Tina Bird, Counterpane Internet SecurityWho should attend: System administra-

tors and network managers responsible formonitoring and maintaining the health andwell-being of computers and networkdevices in an enterprise environment.Participants should be familiar with theUNIX operating system and basic networksecurity, although some review is provided.

The purpose of this tutorial is toillustrate the importance of a network-widecentralized logging infrastructure, to intro-duce several approaches to monitoringaudit logs, and to explain the types of infor-mation and forensics that can be obtainedwith well-managed logging systems.

Every device on your network—routers,servers, firewalls, application software—spits out millions of lines of audit informa-tion a day. Hidden within the data thatindicates normal day-to-day operation (andknown problems) are the first clues that anattacker is starting to probe and penetrateyour network. If you can sift through theaudit data and find those clues, you canlearn a lot about your present state of secu-rity and maybe even catch attackers in theact.

Topics include:◆ The extent of the audit problem: how

much data are you generating everyday, and how useful is it?

◆ Logfile content◆ Logfile generation: syslog and its rela-

tives◆ Log management: centralization,

parsing, and storage◆ Log analysis: methods for reconstruc-

tion of an attackThis class won’t teach you how to write

Perl scripts to simplify your logfiles. It willteach you how to build a log managementinfrastructure, how to figure out what yourlog data means, and what in the world youdo with it once you've acquired it.

INSTRUCTORS

Eric Allman (M5) is the original author of sendmail. Heis the author of syslog, tset, the -metroff macros, and trek. He was thechief programmer on the INGRES data-base management project, designeddatabase user and applicationinterfaces at Britton Lee,and contrib-uted to the Ring Array Processor proj-

ect at the International Computer Science Institute. He isa former member of the USENIX Board of Directors.

Doris Baker (T5), as a freelance writer and technicaleditor, has collaborated with H. X. Mel on many projects.Over the past twenty years, she’s worn the hats of maga-zine editor, public relations manager, and computer-train-ing government contractor.

Tina Bird (W10) is a network security architect atCounterpane Internet Security. She hasimplemented and managed a variety ofwide-area-network security technolo-gies and has developed, implemented,and enforced corporate IS securitypolicies. She is the moderator of theVPN mailing list and the owner of

“VPN Resources on the World Wide Web.” Tina has aB.S. in physics from Notre Dame and an M.S. and Ph.D.in astrophysics from the University of Minnesota.

David N. Blank-Edelman (T2) is the Director ofTechnology at the NortheasternUniversity College of ComputerScience and the author of Perl forSystem Administration (O’Reilly). Hehas spent the last 15 years as a sys-tem/network administrator in largemulti-platform environments and has

served as Senior Technical Editor for the Perl Journal. Hehas also written many magazine articles on world music.

Gerald Carter (M7, W7), a member of the Samba Teamsince 1998, is employed by VA LinuxSystems. He is working with O'ReillyPublishing on a guide to LDAP for sys-tem administrators. He holds an M.S.in computer science from AuburnUniversity, where he also served as anetwork and systems administrator.

Gerald has published articles with Web-based magazinessuch as Linuxworld and has authored courses for compa-nies such as Linuxcare. He is the lead author of TeachYourself Samba in 24 Hours (Sams Publishing).

Tom Christiansen (M3, T3) has been involved with Perlsince day zero of its initial publicrelease in 1987. Lead author of ThePerl Cookbook, co-author of the secondeditions of Programming Perl andLearning Perl, and co-author ofLearning Perl on Win32 Systems, Tomis also the major caretaker of Perl’s

online documentation. He holds undergraduate degrees

Mon.–Wed., June 25–27 Instructors

REGISTER BY MAY 25: Save up to $200 17

Page 17: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

Instructors Mon.–Wed., June 25–27

in computer science and Spanish and a master‘s in com-puter science. He now lives in Boulder, Colorado.

Phil Cox (T10) is a consultant for SystemExpertsCorporation. Phil frequently writes andlectures on issues of UNIX andWindows NT integration and on infor-mation security. He is the lead authorof Windows 2000 Security Handbook,2nd Edition, and a featured columnistin ;login: The Magazine of USENIX &

SAGE. He has served on numerous USENIX program com-mittees. Phil holds a B.S. in computer science from theCollege of Charleston, South Carolina.

Lee Damon (M8) holds a B.S. in speech communicationfrom Oregon State University. He hasbeen a UNIX system administratorsince 1985 and has been active inSAGE since its inception. He hasdeveloped several large-scale mixedenvironments. He is a member of theSAGE Ethics Working Group and was

one of the commentators on the SAGE Ethics document.

Ed DeHart (T1) is a former member of Carnegie MellonUniversity's CERT Coordination Center,which he helped found in 1988. Ed hasalso owned an ISP, Pittsburgh OnLineInc., which operated several UNIXservers. Currently, Ed is President ofPrism Servers, Inc., a manufacturer ofInternet firewalls and UNIX-based

Internet servers.

Rik Farrow (W1) provides UNIX and Internet securityconsulting and training. He has beenworking with UNIX system securitysince 1984 and with TCP/IP networkssince 1988. He has taught at the IRS,Department of Justice, NSA, US West,Canadian RCMP, Swedish Navy, and forU.S. and European user groups. He is

the author of UNIX System Security (Addison-Wesley)and System Administrator’s Guide to System V (PrenticeHall). He writes columns for ;login: and for Network.

Bill Fenner (T4) is a Principal Technical Staff Member atAT&T Labs–Research in Menlo Park, California, where heprimarily works on IP multicasting and IP network man-agement and measurement. Bill is an active participantin the IETF, chairing two working groups and contributingto several more. He also occasionally acts as a developerfor the FreeBSD project, concentrating on networkingissues.

Peter Baer Galvin (T7) is the chief technologist forCorporate Technologies, Inc., and wasthe systems manager for BrownUniversity’s Computer Science Depart-ment. He has written articles for Byteand other magazines, is a columnist forSunWorld, and is co-author of theOperating Systems Concepts and the

Applied Operating Systems Concepts textbooks. Peterhas taught tutorials on security and systems administra-tion and has given talks at many conferences.

Brad Johnson (M1, T10) is vice president ofSystemExperts Corporation. He hasparticipated in the Open SoftwareFoundation, X/Open, and the IETF, andhas often published about opensystems.Brad has served as a securityadvisor to organizations such asDateline NBC and CNN. He is a

frequent tutorial instructor and conference speaker onnetwork security, penetration analysis, middleware, anddistributed systems. He has a B.A. in computer sciencefrom Rutgers University and an M.S. in applied manage-ment from Lesley University.

Michael K. Johnson (M2) has worked with Linux sincethe first publicly released version. He is the co-author ofLinux Application Development (Addison-Wesley, 1998)and is a software developer for Red Hat, Inc. Michaelhas written kernel, system, and application code forLinux and has been teaching Linux courses and tutorialsfor six years.

Stephen Johnson (M9, T9) has been a technical man-ager on and off for nearly twodecades, in both large and small com-panies. At AT&T, he is best known forwriting Yacc, Lint, and the Portable CCompiler. He served as the head of theUNIX Languages Department at AT&T‘sSummit Labs and has been involved in

a number of Silicon Valley startup companies. He servedfor ten years on the USENIX Board of Directors, four ofthem as president. He presented an invited talk at LISAthree years ago, he has taught USENIX tutorials on tech-nical subjects, and he has led management training sem-inars at USENIX conferences, as well as at Transmeta.

Vincent C. Jones (T6) is the founder and principal con-sultant of Networking Unlimited, Inc., anetwork design consulting firm special-izing in network performance and relia-bility enhancement. Vince has beenapplying the theory of networking tothe solution of real-world problems foralmost three decades and is the author

of High Availability Network Design, to be publishedlater this year by Addison-Wesley.

George Kurtz (W2) has performed hundreds of firewall,network, and e-commerce–relatedsecurity assessments throughout hissecurity consulting career. He is a reg-ular speaker at many security confer-ences and is frequently quoted in TheWall Street Journal, InfoWorld, USAToday, and the Associated Press and is

a co-author of the widely acclaimed Hacking Exposed:Network Security Secrets & Solutions.

Evan Marcus (M6) , who has 14 years of experience inUNIX systems administration, is nowVERITAS Software Corporation’s DataAvailability Maven. At Fusion Systemsand OpenVision Software, Evanworked to bring the first high availabil-ity software application for SunOS andSolaris to market. He is the author of

several articles and talks on the design of high availabil-ity systems and is the co-author, with Hal Stern, ofBlueprints for High Availability: Designing ResilientDistributed Systems (John Wiley & Sons, 2000).

Ned McClain (M4, T4) is a lead engineer at XORNetwork Engineering. He is currentlyhelping with the 3rd edition of theUNIX System Administration Handbook(by Nemeth, Snyder, and Hein). He hasa degree in computer science fromCornell University and has doneresearch with both the CS and

Engineering Physics departments at Cornell.

Stuart McClure (W2) specializes in security assess-ments, firewall reviews, e-commerceapplication testing, hosts reviews, PKItechnologies, intrusion detection, andincident response. For the past twoyears Stuart has co-authored a weeklycolumn on security for InfoWorld maga-zine. For the past four years, he has

worked both with Big 5 security consulting and theInfoWorld Test Center. Before InfoWorld, Mr. McClurehas managed and secured a wide variety of corporate,academic, and government networks and systems.

Richard McDougall (W9), an Established Engineer inthe Performance Application Engin-eering Group at Sun Microsystems,focuses on large systems performanceand architecture. He has over twelveyears of experience in UNIX perform-ance tuning, application/kernel devel-opment, and capacity planning. Richard

is the author of many papers and tools for measurement,monitoring, tracing and sizing UNIX systems, includingthe memory-sizing methodology for Sun, the MemToolset for Solaris, the recent Priority Paging memory algo-rithms in Solaris, and many unbundled tools for Solaris,and is co-author of Solaris Internals: Architecture Tipsand Techniques (Sun Microsystems Press/Prentice Hall,2000).

James Mauro (W9) is a Senior Staff Engineer in thePerformance and AvailabilityEngineering group at SunMicrosystems. His current projects arefocused on quantifying and improvingenterprise platform availability, includ-ing minimizing recovery times for dataservices and Solaris. Jim, co-author ed

Solaris Internals: Architecture Tips and Techniques (SunMicrosystems Press/Prentice Hall, 2000) and writes themonthly “Inside Solaris” column for UNIX Insider.

H.X. Mel (T5) has taught custom-designed technologycourses for employees of Lucent, Xerox, MIT, the USTreasury/GAO, Motorola, Goldman Sachs, and PriceWaterhouse Coopers. Over the last seven years, Mel hastaught a variety of subjects, including Java, C++, andVisual Basic, and in the past two years he managed thedevelopment of a secure file-transport program usingcryptographic technologies and wrote CryptographyDecrypted.

18 REGISTER ON-LINE: http:/ /www.usenix.org/events/usenix01

Page 18: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

Tor Mohling (M4) is currently a Unix systems adminis-trator for the University of Colorado atBoulder's Computer Sciencedepartment. He was bewitched by EviNemeth as a young child and forced torun dump(8) on VAX 11/780's runningBSD 4.0. After under-graduate work inComparative Religion and Philosophy,

he worked as a brewer. This work drove him into gradu-ate school studying Computer Science. He teaches sys-admin classes for the CS department at CU Boulder.

Chris Murphy (M10) is a network engineer in the Net-work Operations Group at MIT. He andhis colleagues manage the design,implementation, and operation of aTCP/IP and Appletalk network withover 25,000 hosts and 18,000 users. Hewas responsible for the design andimplementation of MIT's dial-up PPP

service, Tether. Mr. Murphy is also a co-manager ofMIT's Desktop Products team.

Evi Nemeth (M4, T4), a faculty member in computer sci-ence at the University of Colorado, hasmanaged UNIX systems for the past 20years, both from the front lines andfrom the ivory tower. She is co-authorof the UNIX System AdministrationHandbook.

Jon Rochlis (M10) provides advice on networking, net-work security, distributed systemsdesign and management, and electron-ic commerce to both large and smallbusinesses. He has been a senior con-sultant with SystemExperts Corp., anengineering manager with BBN Planet,Director of the Cambridge Technology

Center of OpenVision Technologies, and a technicalsupervisor for the Development Group of MIT's Distrib-uted Computing and Network Services, the follow-on toProject Athena. Jon has also served on the NEARnetTechnical Committee. He holds a B.S. in computerscience and engineering from MIT.

Steve Romig (T8, W8) is in charge of the Ohio StateUniversity Incident Response Team andis working with a group of Central Ohiobusinesses to improve Internet securitypractices. Steve has also worked aslead UNIX system administrator at onesite with 40,000 users and 12 hosts andanother with 3,000 users and over 500

hosts. Steve received his B.S. in mathematics (computerscience track) from Carnegie Mellon University.

Greg Rose (W5) is a Principal Engineer for QUALCOMMInternational, based in Australia, wherehe works on cryptographic security andauthentication for third-generationmobile phones and other technologies.He holds a number of patents for cryp-tographic methods and has successfullycryptanalyzed widely deployed ciphers.

Andy Rudoff (T4) works for Sun Microsystems inBoulder, Colorado, where he is a soft-ware architect focusing on reliability,availability, and serviceability. His back-ground is in operating systems,networking, and fle systems. He hastaught various courses over the years,including network programming and part

of Evi Nemeth's first USENIX tutorial.

Marc Staveley (W6) recently took a position with SomaNetworks, where he is applying his 18years of experience with UNIX develop-ment and administration in leading theirIT group. Previously Marc was an inde-pendent consultant and has also heldpositions at Sun Microsystems, NCR,Princeton University, and the University

of Waterloo. He is a frequent speaker on the topics ofstandards-based development, multi-threaded program-ming, systems administration, and performance tuning.

Lincoln Stein (W4) is a researcher at Cold SpringHarbor Laboratory, where he works oninformation architecture related to theHuman Genome Project. He is theauthor of How to Set Up and Maintain aWeb Site, Web Security: A Step-by-StepReference Guide, The Official Guide toProgramming with CGI.pm, and, most

recently, Network Programming with Perl.

Theodore Ts’o (W3) has been a Linux kernel developersince almost the very beginnings ofLinux—he implemented POSIX job con-trol in the 0.10 Linux kernel. He is themaintainer and author for the LinuxCOM serial port driver and the ComtrolRocketport driver. He architected andimplemented Linux’s tty layer. Outside of

the kernel, he is the maintainer of the e2fsck filesystemconsistency checker. Ted is currently employed by VALinux Systems.

Dusty White (M9, T9) was an early employee of Adobe,where she served in various managerialpositions. She now works in SiliconValley as a trainer, coach, andtroubleshooter for technical companies.She has presented tutorials at LISA andthe USENIX Annual TechnicalConference.

Mon.–Wed., June 25–27 Instructors

QUESTIONS? Call 1 .510.528.8649 19

AFSWorkshopTuesday, June 26

AFS is seeing a flurry of development

in the wake of it being open-sourced,

and ARLA is becoming a viable, stable

project. There is more change in the

AFS community than has been seen in

recent years.

The AFS workshop is the perfect

place to discuss with other AFS-

interested folks the current and future

progress of AFS. Attendees are expected

to suggest topics of discussion—these

may be as developed as a mini-talk or as

simple as questions for the group. Topics

discussed may direct AFS's future

progress.

The workshop will be coordinated by

Esther Filderman [Pittsburgh

Supercomputing Center], Derrick

Brashear [Carnegie Mellon University],

and Ted McCabe [Massachusetts

Institute of Technology]. Both Derrick

and Ted are on the OpenAFS Council of

Elders, the advising board for OpenAFS

development.

Interested in attending the workshop?

Send email to [email protected]

suggesting a topic for discussion.

All workshop attendees must be reg-

istered for the Annual Technical

Conference.

Page 19: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

General Track Invited Talks FREENIX Track

20 FOR PROGRAM UPDATES: http:/ /www.usenix.org/events/usenix01

3:30 PM–4:00 PM BREAK

Technical Sessions June 28–30

THURSDAY (day one)

OPENING REMARKS, AWARDS, AND KEYNOTE

Keynote Address: Linux: A Strategic Disruptive ForceDaniel D. Frye, Director of IBM Linux Technology Center

In much the same way that the Internet is a disruptive technology that has changed the way people live and work, Linux is a disruptive technology that will change the way peo-ple run their businesses. Linux is paving the way for e-business much like the Internet did, having as much impact as did electricity, phones, and faxes. Linux will make Internetbusiness applications ubiquitous. No one vendor will be able to lock customers into buying specific hardware that runs specific applications. Software developers will be able todramatically accelerate market access for the applications they write as they will readily run on any type of hardware. Moreover, increasing reliance on de facto standards pro-duced by open source will fundamentally change the relationship between IT customers and IT suppliers.

9:00 AM–10:30 AM

OPERATING SYSTEMSSession Chair: Jochen Liedtke, University of Karlsruhe

Virtualizing I/O Devices on VMwareWorkstation's Hosted Virtual Machine MonitorJeremy Sugerman, Ganesh Venkitachalam andBeng-Hong Lim, VMware, Inc.

Magazines and Vmem: Extending the SlabAllocator to Many CPUs and Arbitrary ResourcesJeff Bonwick, Sun Microsystems, and JonathanAdams, California Institute of Technology

Measuring Thin-Client Performance UsingSlow-Motion BenchmarkingS. Jae Yang, Jason Nieh, and Naomi Novik,Columbia University

MAKING THE INTERNET MOBILE: LESSONS

FROM THE WIRELESS APPLICATION PROTOCOL

(WAP)Sandeep Singhal, ReefEdge Inc.

Wireless operators around the world are deployingmobile Internet services based on the Wireless Appli-cation Protocol, a new suite of protocols and contentformats tailored to the limited bandwidth, screen sizes,and input capabilities found in mobile devices. Thistalk will describe how the WAP protocols and contentformats meet the challenge of extending the Internet tomobile devices and will place them in context withother emerging technologies. The talk will concludewith a discussion of the future of WAP.

MAC SECURITYSession Chair: Dan Geer, @stake, Inc.

LOMAC: MAC You Can Live WithTimothy Fraser, NAI Labs

TrustedBSD: Adding Trusted Operating SystemFeatures to FreeBSDRobert N. M. Watson, FreeBSD Project, NAI Labs

Integrating Flexible Support for Security Policiesinto the Linux Operating SystemPeter Loscocco, NSA, and Stephen Smalley, NAI Labs

11:00 AM–12:30 PM

10:30 AM–11:00 AM BREAK

SECURITYSession Chair: Dan Wallach, Rice University

An Architecture for Secure Generation andVerification of Electronic CouponsRahul Garg, Parul Mittal, Vikas Agarwal, andNatwar Modani, IBM India Research Lab

Defective Sign & Encrypt in S/MIME, PKCS#7,MOSS, PEM, PGP, and XMLDon Davis, Shym Technology

Unifying File System ProtectionChristopher A. Stein, Harvard University; John H.Howard, Sun Microsystems; and Margo I. Seltzer,Harvard University

EVOLUTION OF THE INTERNET CORE AND

EDGE: IP WIRELESS NETWORKINGJim Bound, Nokia Networks, and Charles E. Perkins,Nokia Research Center

We discuss IP wireless and mobile computing, whichare likely to once again revolutionize the Internet. TheInternet core infrastructure and edge architecture willbe affected, including adaptations to IP itself. Newfeatures and services will be installed to support bil-lions of IP mobile nodes carried by home users, embed-ded devices, and professionals. Finally, we describethe evolution and integration of these new technolo-gies into the existing Internet.

SCRIPTINGSession Chair: Erez Zadok, SUNY at Stony Brook

A Practical Scripting Environment for MobileDevicesBrian Ward, University of Chicago

Nickle: Language Principles and PragmaticsBart Massey, Portland State University, and KeithPackard, SuSE Inc.

The Design and Implementation of the NetBSDrc.d SystemLuke Mewburn, Wasabi Systems, Inc.

2:00 PM–3:30 PM

12:30 PM–2:00 PM LUNCH (ON YOUR OWN)

Page 20: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

USER ENVIRONMENTSession Chair: Ken Coar, The Apache Foundation/IBM

Sandboxing ApplicationsVassilis Prevelakis, University of Pennsylvania, andDiomidis Spinellis, Athens University

Building a Secure Web BrowserSotiris Ioannidis, University of Pennsylvania, andSteven M. Bellovin, AT&T Labs–Research

Citrus Project: True Multilingual Support for BSDOperating SystemsJun-ichiro itojun Hagino, Internet Initiative Japan

SECURITY FOR E-VOTING IN PUBLIC ELECTIONSAvi Rubin, AT&T Labs—Research

In this talk I will discuss the security considerations for remote electronic voting in public elections. In particular,I’ll examine the feasibility of running national federal elections over the Internet. The focus of this talk is on thelimitations of the current deployed infrastructure in terms of the security of the hosts and the Internet itself. Iwill conclude that at present, our infrastructure is inadequate for remote Internet voting.

QUESTIONS? Call 1 .510.528.8649 21

General Track Invited Talks FREENIX Track

June 28–30 Technical Sessions

STORAGE ISession Chair: Greg Ganger, Carnegie Mellon Univ.

The Multi-Queue Replacement Algorithm forSecond Level Buffer CachesYuanyuan Zhou and James Philbin, NEC ResearchInstitute; and Kai Li, Princeton University

Design and Implementation of a Predictive FilePrefetching AlgorithmThomas M. Kroeger, Nokia Clustered IP Solutions,and Darrell D. E. Long, University of California,Santa Cruz

Extending Heterogeneity to RAID Level 5T. Cortes and J. Laborta, Universitat Politècnicade Catalunya

SECURITY ASPECTS OF NAPSTER AND

GNUTELLASteven M. Bellovin, AT&T Labs—Research

Napster and Gnutella have attracted a great deal ofattention because of their implications for (and con-flicts with) copyright law, but they have much broaderimplications for network security. I recently analyzedboth protocols, focusing on issues such as possiblenew attacks, traceability of behavior, and privacy. Bothraise interesting questions, especially Gnutella.

USER SPACESession Chair: Alan Nemeth, Compaq

User-Level Checkpointing for LinuxThreadsProgramsWilliam R. Dieter and James E. Lumpp, Jr., University of Kentucky

Building an Open-source Solaris-compatibleThreads LibraryJohn Wood, Compaq Computer UK Ltd

Are Mallocs Free of Fragmentation?Aniruddha Bohra, Rutgers University, and EranGabber, Lucent Technologies–Bell Labs

4:00 PM–5:30 PM

FRIDAY (day two)9:00 AM–10:30 AM

TOOLSSession Chair: Wuchi Feng, Ohio State University

Reverse-Engineering Instruction EncodingsWilson C. Hsieh, University of Utah; DawsonEngler, Stanford University; and Godmar Back,University of Utah

An Embedded Error Recovery and DebuggingMechanism for Scripting Language ExtensionsDavid M. Beazley, University of Chicago

Interactive Simultaneous Editing of MultipleText RegionsRobert C. Miller and Brad A. Myers, CarnegieMellon University

ONLINE PRIVACY: PROMISE OR PERIL?Lorrie Faith Cranor, AT&T Labs—Research

This talk will discuss the privacy concerns raised byonline data-collection practices, as well as the effortsto address these concerns through laws, self-regula-tion, and technology. The talk will focus on the emerg-ing Platform for Privacy Preferences (P3P) standard.P3P-enabled Web sites make statements about howthey handle user data available in a machine-readable(XML) format. P3P-enabled browsers can “read” thesestatements automatically and compare them to theuser's privacy preferences.

KERNELSession Chair: Drew Gallatin, Duke/FreeBSD

Kqueue–A Generic and Scalable EventNotification FacilityJonathan Lemon, FreeBSD Project

Improving the FreeBSD SMP ImplementationGreg Lehey, IBM LTC Ozlabs

Page Replacement in Linux 2.4 MemoryManagementRik van Riel, Conectiva Inc.

11:00 AM–12:30 PM

12:30 PM–2:00 PM LUNCH (ON YOUR OWN)

10:30 AM–11:00 AM BREAK

Page 21: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

General Track Invited Talks FREENIX Track

22 REGISTER ON-LINE: http:/ /www.usenix.org/events/usenix01

Technical Sessions June 28–30

SCHEDULINGSession Chair: Sheila Harnett, IBM LinuxTechnology Center

Pragmatic Nonblocking Synchronization forReal-Time SystemsMichael Hohmuth and Hermann Härtig, DresdenUniversity of Technology

Scalability of Linux Event-Dispatch MechanismsAbhishek Chandra, University of Massachusetts,Amherst, and David Mosberger, HP Labs

Virtual-Time Round-Robin: An O(1)Proportional Share SchedulerJason Nieh, Chris Vaill, and Hua Zhong, Columbia Univ.

MYTHS, MISSTEPS, AND FOLKLORE IN

PROTOCOL DESIGNRadia Perlman, Sun Microsystems Laboratories

Network protocol design is not a nice, clean science,where what gets deployed is the best possible design.Instead, designs are influenced by issues such as poli-tics, general confusion, and backward compatibility.Statements get repeated until it never occurs to any-one to question whether they're true. This talk discuss-es how some of the odder things we live with (e.g.,bridges, SNAP encoding) came about, some commonmistakes that have been made, and what really shouldmatter when evaluating two competing designs. It’sintended to make you question your assumptions.

GRAPHICSSession Chair: Garry Paxinos, Metro Link/XFree86

Design and Implementation of the X RenderingExtensionKeith Packard, XFree86 Core Team, SuSE Inc.

Scwm: An Extensible Constraint-Enabled WindowManagerGreg J. Badros, InfoSpace.com; Jeffrey Nichols,Carnegie Mellon University; Alan Borning, Universityof Washington

The X Resize and Rotate Extension–RandRJim Gettys, Compaq, and Keith Packard, XFree86Core Team, SuSE Inc.

9:00 AM–10:30 AM

WEB SERVERSSession Chair: Mohit Aron, Zambeel Inc.

High-Performance Memory-Based WebServers: Kernel and User-Space PerformancePhilippe Joubert, ReefEdge Inc.; Robert B. King,IBM Research; Richard Neves, ReefEdge Inc.;Mark Russinovich, Winternals Software; andJohn M. Tracey, IBM Research

Kernel Mechanisms for Service Differentiationin Overloaded Web ServersThiemo Voigt, Swedish Institute of ComputerScience; Renu Tewari and Douglas Freimuth, IBMT.J. Watson Research Center; and Ashish Mehra,iScale Networks

Storage Management for Web ProxiesElizabeth Shriver and Eran Gabber, Bell Labs; LanHuang, SUNY Stony Brook;; and Christopher A.Stein, Harvard University

GETTING TO GRIPS WITH SECURE DNSJim Reid, Nominum, Inc.

Secure DNS (DNSSEC) has been developed as a way ofvalidating the data in the DNS and preventing spoofingattacks. The protocol uses public-key cryptography todigitally sign DNS traffic. This talk explains the newresource records that have been added to the DNS andhow to use the tools in BIND9 that are provided forcreating and maintaining signed zones. The practicaland operational problems of deploying DNSSEC,notably key management, will also be discussed.

STORAGESession Chair: Clem Cole, Paceline Systems Corp.

User-Level Extensibility in the Mona File SystemPaul W. Schermerhorn, Robert J. Minerick, PeterRijks, and Vincent W. Freeh, University of NotreDame

Volume Managers in LinuxDavid Teigland and Heinz Mauelshagen, SistinaSoftware, Inc.

The Design and Implementation of a TransparentCryptographic File System for UNIXGiuseppe Cattaneo, Luigi Catuogno, Aniello DelSorbo, and Pino Persiano, Università di Salerno

2:00 PM–3:30 PM

3:30 PM–4:00 PM BREAK

WORK-IN-PROGRESS REPORTSSession Chair: Greg Ganger, Carnegie MellonUniversity

Short, pithy, and fun, Work-in-Progress reportsintroduce interesting new or on-going work, andthe USENIX audience provides valuable discussionand feedback. A schedule of presentations will beposted at the conference.

See page 25 for complete information on how tosubmit presentations.

ACTIVE CONTENT: REALLY NEAT TECHNOLOGY

OR IMPENDING DISASTER?Charlie Kaufman, Iris Associates

From Java-enabled Web pages to self-extracting zipfiles, the world has become addicted to active content.This powerful technique improves data compression,CPU and network efficiency, and interactive user inter-faces. The price? It’s nearly impossible to make secure.This talk discusses surprising places we use activecontent, the security threats we are ignoring, and whatwe as individuals and as a community can do about it.

WORK-IN-PROGRESS REPORTSSession Chair: Greg Ganger, Carnegie MellonUniversity

See the General Track (column 1) for a descriptionof this shared session.

4:00 PM–5:30 PM

SATURDAY (day three)

Page 22: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

General Track Invited Talks FREENIX Track

STORAGE IISession Chair: Carla Ellis, Duke University

A Toolkit for User-Level File SystemsDavid Mazières, NYU

Charm: An I/O-Driven Execution Strategy forHigh-Performance Transaction ProcessingLan Huang and Tzi-cker Chiueh, State Universityof New York at Stony Brook

Fast Indexing: Support for Size-ChangingAlgorithms in Stackable File SystemsErez Zadok, SUNY Stony Brook; Johan M.Andersen, Ion Badulescu, and Jason Nieh,Columbia University

STRANGELY ENOUGH, IT ALL TURNS OUT

WELL (ADVENTURES IN VENTURE-BACKED

STARTUPS AND MICROSOFT ACQUISITIONS)Stephen R. Walli, Microsoft Corp.

Building and running a software startup is an excitingand wild ride. Six founders started Softway Systems inSeptember 1995. Before Microsoft acquired it, Softwayhad taken four rounds of venture capital, built itself toalmost forty people, had some brilliant successes andpainful failures, and come close to being acquired sev-eral times by some surprising players. This talk on thestart-up experience describes what it took, whatworked, and what failed, from bootstrap excitement toacquisition angst (and assimiliation).

SECURING NETWORKSSession Chair: Ted Faber, ISI/USC

MEF, Malicious Email Filter–A UNIX Mail FilterThat Detects Malicious Windows ExecutablesMatthew G. Schultz and Eleazar Eskin, ColumbiaUniversity; Erez Zadok, SUNY Stony Brook; ManasiBhattacharyya and Salvatore J. Stolfo, ColumbiaUniversity

Cost Effective Security for Small BusinessesSean R. Brown, Applied Geographics, Inc.

Heimdal and Windows 2000 Kerberos: How to GetThem to Play TogetherAssar Westerlund, Swedish Institute of ComputerScience, and Johan Danielsson, Center for ParallelComputers, KTH

REGISTER BY MAY 25: Save up to $200 23

June 28–30 Technical Sessions

10:30 AM–11:00 AM BREAK

11:00 AM–12:30 PM

12:30 PM–2:00 PM LUNCH (ON YOUR OWN)

NETWORKINGSession Chair: Robert Miller, Carnegie MellonUniversity

Payload Caching: High-Speed DataForwarding for Network IntermediariesKenneth Yocum and Jeffrey Chase, DukeUniversity

A Waypoint Service Approach to ConnectHeterogeneous Internet Address SpacesT. S. Eugene Ng, Ion Stoica, and Hui Zhang,Carnegie Mellon University

Flexible Control of Parallelism in aMultiprocessor PC RouterBenjie Chen and Robert Morris, MassachusettsInstitute of Technology

THE FUTURE OF VIRTUAL MACHINES: AVMWARE PERSPECTIVEEd Bugnion, VMware, Inc.

The virtual-machine concept goes back to 1960s main-frames. It has since been applied to executing legacyenvironments and to Java. Today, VMware productsallow multiple complete operating systems, from Linuxto Windows, to run concurrently on Intel computers.This talk shows how virtual machines, which offercompatibility, isolation, encapsulation, and mobility,can solve current problems from desktops to data cen-ters, and how this return to virtual machines mayaffect hardware and operating system trends.

RESOURCE MANAGEMENTSession Chair: Theodore Ts’o, VA Linux Systems

Predictable Management of System Resourcesfor LinuxMansoor Alicherry, Bell Labs, and K. Gopinath, IndianInstitute of Science

Scalable Linux SchedulingStephen Molloy and Peter Honeyman, CITI–Universityof Michigan

A Universal Dynamic Trace for Linux and OtherOperating SystemsRichard J Moore, IBM, Linux Technology Centre

2:00 PM–3:30 PM

3:30 PM–4:00 PM BREAK

SPECIAL CLOSING SESSION

See http://www.usenix.org/events/usenix01 for updates!

4:00 PM–5:30 PM

Page 23: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

Thank youUSENIX Supporting Members

❖ Addison-Wesley ❖ Kit Cosper ❖ Earthlink Network ❖ Edgix ❖ Interhack Corporation ❖ Interliant

❖ Linux Security, Inc. ❖ Lucent Technologies ❖ Microsoft Research ❖ Motorola Australia Software Centre

❖ New Riders Press ❖ Nimrod AS ❖ O’Reilly & Associates Inc. ❖ Raytheon Company

❖ Sams Publishing ❖ Sendmail, Inc. ❖ Smart Storage, Inc. ❖ Sun Microsystems, Inc. ❖ Sybase, Inc.

❖ Syntax, Inc. ❖ Taos: The Sys Admin Company ❖ UUNET Technologies, Inc.

SAGE Supporting Members❖ Certainty Solutions ❖ Collective Technologies ❖ Electric Lightwave, Inc. ❖ ESM Services, Inc.

❖ Linux Security, Inc. ❖ Mentor Graphics Corp ❖ Microsoft Research ❖ Motorola Australia Software Centre

❖ New Riders Press ❖ O’Reilly & Associates Inc. ❖ Raytheon Company ❖ Remedy Corporation ❖ RIPE NCC

❖ Sams Publishing ❖ SysAdmin Magazine ❖ Taos: The Sys Admin Company ❖ Unix Guru Universe (UGU)

About USENIXhttp://www.usenix.org/

USENIX is the Advanced ComputingSystems Association. Since 1975,USENIX has brought together thecommunity of system administrators,engineers, scientists, andtechnicians working on the cuttingedge of the computing world.USENIX and its members areengaged in problem-solving, ininnovation, and inresearch that works.

About SAGEhttp://www.sage.org/

SAGE, the System AdministratorsGuild, is a special technical groupwithin USENIX. SAGE is dedicatedto the recognition and advancementof the system administrationprofession.

USENIX & SAGE Membership Info & Upcoming Events

24 FOR MORE INFORMATION: Ask [email protected]

U S E N I X A N D S A G E T H A N K T H E I R S U P P O R T I N G M E M B E R S

THE SYSTEMS & NETWORK ADMINISTRATION CONFERENCE (SNAC)Sponsored by USENIX and SAGE, the System Administrators GuildJuly 30–August 3, 2001 Hotel Inter-Continental, Dallas, TX, USAwww.usenix.org/events/snac

10TH USENIX SECURITY SYMPOSIUMAugust 13–17, 2001 JW Marriott Hotel, Washington D.C., USAhttp://www.usenix.org/events/sec01

5TH ANNUAL LINUX SHOWCASE AND CONFERENCENovember 6–10, 2001 Oakland Convention Center, Oakland, California, USAhttp://www.linuxshowcase.org

15TH SYSTEMS ADMINISTRATION CONFERENCE (LISA 2001)Sponsored by USENIX and SAGE, the System Administrators GuildDecember 2–7, 2001 Town & Country Resort Hotel, San Diego, California, USAhttp://www.usenix.org/events/lisa2001

FIRST CONFERENCE ON FILE & STORAGE TECHNOLOGIES (FAST)Sponsored by USENIX in cooperation with ACM SIGOPS and IEEE TCOSJanuary 28–29, 2002 Monterey, California, USAhttp://www.usenix.org/events/fast/

UPCOMING USENIX EVENTS

Page 24: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

fun! fun! fun!SOCIAL ACTIVITIES

There will be many opportunities for conference attendees to socialize and get to know one another!

Be sure to take a break and enjoy the “hallway track”; eat, drink, and talk shop in the evenings at the special receptions;

play along with Rob Kolstad and Dan Klein at the infamous USENIX Quiz Show;win free goodies at vendor hospitality parties;

and much much more!

CONFERENCE ACTIVITIES

Birds-of-a-Feather Sessions (BoFs)Wednesday, Thursday, and Friday evenings, June 27–29

Lead or attend a BoF! Meet with your peers! Present new work!Don't miss these special activities designed to maximize the valueof your time at the conference. The always-popular evening Birds-of-a-Feather sessions are very informal gatherings of persons inter-ested in a particular topic. BoFs may be scheduled during theconference at the registration desk or in advance by contacting theUSENIX Conference Office, either by phone (1.510.528.8649) orby email ([email protected]). BoFs are open to all attendees.Topics are announced at the conference.

Work-in-Progress Reports (WiPs)Friday, June 29, 4:00 pm–5:30 pm

Short, pithy, and fun, Work-in-Progress reports introduce inter-esting new or ongoing work. If you have work you would like toshare or a cool idea that’s not quite ready for publication, send aone- or two-paragraph summary to [email protected]. Weare particularly interested in presenting students’ work. A scheduleof presentations will be posted at the conference, and the speakerswill be notified in advance. Work-in-Progress reports are five-minute presentations; the time limit will be strictly enforced.

Conference Proceedings and CD-ROMsOne copy of the Proceedings is included with your technical

sessions registration fee. Additional copies may be purchased at theconference. To order additional copies after the conference, seehttp://www.usenix.org/publications/ordering/, telephone theUSENIX Office at 1.510.528.8649, or send email [email protected].

CONFERENCE SERVICES

Internet ConnectivityUSENIX is pleased to offer Internet connectivity and a termi-

nal room at the Annual Technical Conference. The terminal roomitself will be furnished with PCs running OpenBSD, drops for youto connect your laptop to our switches, and 802.11b wireless con-nectivity

During the tutorials there will be limited hours of operationcovering peak times. On Thursday and Friday we will be openfrom 7 a.m. until 2 a.m., except for all-inclusive conference func-tions such as the Opening Session and the Conference Reception.We will close on Saturday by 2 p.m.

If you are interested in being a terminal room volunteer inexchange for a free Technical Session registration, please contactLynda McGinley ([email protected]).

Attendee Message ServiceStay in touch with your home and office!

An email message service will be available Monday, June 25,through Saturday, June 30. Email to conference attendees shouldbe addressed: [email protected].

Telephone messages may be left at the USENIX MessageCenter Desk, 1.617.236.5800. The Message Center will be openSunday, June 24, through Friday, June 29, from 7:30 a.m. until5:00 p.m., and Saturday, June 30, until 3:00 p.m.

Your telephone and email messages will be posted on the mes-sage board in the Registration area.

Conference Activities and Services

F O R M O R E I N F O R M AT I O N: Call 1 .510.528.8649 25

Page 25: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

REGISTRATION INFORMATION

Early registration deadline: Friday, May 25, 2001

TUTORIAL FEES (JUNE 25–27)Tutorial registration fees include:

◆ Admission to the tutorials you select◆ Lunch◆ Tutorial CD-ROM◆ Printed tutorial materials for your courses◆ Admission to the Vendor Exhibition

Select only one full-day tutorial per day.

Members/NonmembersOne day $465Two days $780Three days $1095CEU credit (optional) $15/day

After May 25, add $100 to the tutorial fee.

StudentsOne day $70Two days $140Three days $210CEU credit (optional) $15/day

TECHNICAL SESSIONS FEES (JUNE 28–30)Technical sessions registration fees include:

◆ Admission to all technical sessions◆ Free USENIX T-shirt◆ Copy of Conference Proceedings◆ Admission to the Conference Receptions◆ Admission to the Vendor Exhibition

Early Registration Fees (before May 25)Member* $495Nonmember** $590Student $75

After May 25, members and nonmembers add$100 to the technical sessions fee.

* The member fee applies to current members ofUSENIX and EurOpen.SE.** The nonmember fee includes a free one-yearmembership in the USENIX Association.

Payment by check or credit card must accompanythe registration form. Purchase orders, vouchers, ortelephone or email registrations cannot beaccepted.

STUDENT DISCOUNTS & STIPENDS

TUTORIALSA limited number of tutorial seats are reserved forfull-time students at the very special rate of $70for a full-day tutorial. You must telephone theConference Dept. to confirm availability and makea reservation. You will be given a code number,which you must use when you register. TheConference Dept. must receive your registrationform, with the code number, full payment, and aphotocopy of your current student I.D. card,within 14 days from the date you make your reser-vation, or your reservation will be canceled. Thisspecial fee is not transferable.

TECHNICAL SESSIONSUSENIX offers full-time students a special discountrate of $75 for its technical sessions. You mustinclude a copy of your current student I.D. cardwith your registration. This special fee is not trans-ferable.

STUDENT STIPENDSThe USENIX student stipend program coverstravel, hotel, and registration fees to enable full-time students to attend USENIX meetings.Application information is posted oncomp.org.usenix 6–8 weeks before the conference,and is also available athttp://www.usenix.org/students/stipend.html.

STUDENT MEMBERSHIPUSENIX offers full-time students a special mem-bership rate of $25 a year. Students must provide acopy of current student ID. To join SAGE, theSystem Administrators Guild, you must be a mem-ber of USENIX. Student SAGE membership is anadditional $15. Students receive the same memberbenefits as individual members.Join when you register by filling out the appropri-ate line on the print or on-line registration form.

HOTEL AND TRAVEL INFORMATION

Hotel discount reservation deadline:Friday, June 1, 2001USENIX has negotiated special rates forconference attendees at the Boston MarriottCopley Place. Contact the hotel directly to makeyour reservation as soon as possible. You mustmention USENIX to get the special rate. A one-night room deposit must be guaranteed to a majorcredit card. To cancel your reservation, you mustnotify the hotel by 6:00 p.m. on the day of yourscheduled arrival.

Boston Marriott Copley Place110 Huntington AvenueBoston, MA 02116Toll-free: 1.800.228.9290 Local telephone: 1.617.236.5800Reservation fax: 1.617.937.5685

Room Rates (single/double occupancy)$169.00(plus local and state taxes, currently at12.45%)

Note: All requests for hotel reservations made afterthe June 1 deadline (or after the room block is soldout) will be handled on a space-available basis atthe hotel’s standard rate. You are encouraged tomake your reservations as soon as possible in orderto get the special discount rate.

Need a Roommate?Usenet facilitates room-sharing. If you wish toshare a room, post to and checkcomp.org.usenix.roomshare.

TRANSPORTATIONBoston’s Logan International Airport isapproximately 5 miles from the hotel. Taxi serviceto the hotel is approximately $20–25. Severalshuttle services are also available for approximately$9 per person, one way. Check with the GroundTransportation Desk on the lower level of each airport terminal for further information.

PARKINGParking at the Marriott costs $29/day for valetparking and $27/day for self-parking, which hasno in/out privileges.

Registration, Hotel, and Travel Information

26 R E G I S T E R O N-L I N E: http:/ /www.usenix.org/events/usenix01/

Other

Questions?

USENIX Conference Department

2560 Ninth St., Suite 215

Berkeley, CA 94710

Phone: 1.510.528.8649

Fax: 1.510.548.5738

Email: [email protected]

Refund &

Cancellation PolicyAll refund requests must be in writing,

postmarked no later than Friday,

June 15, 2001.You may fax or email

your cancellation, but telephone

cancellations cannot be accepted.You

may substitute another in your place.

Registration

Questions?

RCS Registration Control Systems

2368 Eastman Avenue, Suite 11

Ventura, CA 93003-7797

Phone: 1.800.235.3332.

Fax: 1.805.654.1676

Email: [email protected]

Page 26: BOSTON - USENIX | The Advanced Computing Systems ... Cole, Paceline Systems Corp. FREENIX Program Committee Ken Coar,The Apache Software Foundation/IBM Chris Demetriou,Broadcom Corp.

Registration Form USENIX ’01 June 25–30, 2001

This address will be used for all USENIX mailings unless you notify us in writing.

First name Last name

Name for Badge Member Number

Company/Institution

Mail Stop Mail Address

City State Zip Country

Telephone No. Fax

Email Address (one only, please)

Attendee ProfileWould you like to receive email about USENIX activities? ❏ Yes ❏ No

Would you like us to provide your name to carefully selected partners? USENIXdoes not sell its mailing lists. ❏ Yes ❏ No

Would you like to be included on the Attendee list? ❏ Yes ❏ No

What is your affiliation (check one): ❏ academic ❏ commercial ❏ gov’t ❏ R&DWhat is your role in the purchase decision (check one): 1. ❏ final 2. ❏ specify 3. ❏ recommend 4. ❏ influence 5. ❏ no role

What is your primary job function (check one):

1. ❏ system/network administrator 2. ❏ consultant3. ❏ academic/researcher 4. ❏ developer/programmer/architect5. ❏ system engineer 6. ❏ technical manager 7. ❏ student8. ❏ security 9. ❏ WebmasterHow did you first hear about this meeting (check one):

1. ❏ Referral from colleague 2. ❏ Postal mail 3. ❏ The Web4. ❏ Email 5. ❏ Magazine 6. ❏ Newsgroup

What publications or Web sites do you read related to the topics of thisconference?

Payment Must Accompany This FormPayment (U.S. dollars only) must accompany this form. Purchase orders, vouch-ers, email, or telephone registrations cannot be accepted.

MAIL THIS FORM TO:RCS, 2368 Eastman Avenue, Suite 11, Ventura, CA 93003-7797.

❏ Payment enclosed. Make check payable to USENIX Conference.

Charge to my: ❏ VISA ❏ MasterCard ❏ American Express ❏ Discover

Account No. Exp. Date

Print Cardholder’s Name

Cardholder’s Signature

Tutorial Program (Monday–Wednesday, June 25–27)Select only one full-day tutorial per day (9:00 a.m.–5:00 p.m.)

Monday , June 25

Tuesday, June 26

Wednesday, June 27

EARLY BIRD TUTORIAL FEES (until May 25)One-day, $465.00 / Two-day, $780.00 / Three-day, $1095.00 $

CEU fee (optional) ...........................................$15.00 per day $

STANDARD TUTORIAL FEES (after May 25)One-day, $565.00 / Two-day, $880.00 / Three-day, $1195.00 $

CEU fee (optional) ...........................................$15.00 per day $

STUDENT TUTORIAL FEES (special rate)CODE NO. ................................................$70.00 $

CODE NO. ................................................$70.00 $

CODE NO. ................................................$70.00 $*Students: Attach a photocopy of current student I.D.

Technical Program (Thursday–Saturday, June 28–30)

EARLY BIRD REGISTRATION (until May 25)Current member fee....................................................... $495.00 $(applies to individual members of USENIX or EurOpen.SE)

Non-member fee (includes FREE one-year membership) $590.00 $

I do NOT wish to join USENIX at this time (check here): ❏STANDARD REGISTRATION (after May 25)Current member fee....................................................... $595.00 $

(applies to individual members of USENIX and EurOpen.SE)

Non-member fee (includes FREE one-year membership) $690.00 $

I do NOT wish to join USENIX at this time (check here): ❏STUDENT REGISTRATION (special rate) $75.00 $*Students: Attach a photocopy of current student I.D.

Membership RenewalRenew your USENIX membership ................................. $95.00 $Join or renew your SAGE membership ......................... $30.00 $

(You must be a current member of USENIX to join SAGE)

STUDENTS:Join USENIX or renew your student membership....... $25.00 $Join SAGE or renew your student SAGE membership $15.00 $

(You must be a current member of USENIX to join SAGE)*Students: Attach a photocopy of current student I.D.

TOTAL DUE $

27R C S2 3 6 8 E A S T M A N A V E N U E , S U I T E 1 1V E N T U R A , C A 9 3 0 0 3 - 7 7 9 7

Copy this form as needed. Type or print clearly.

❏ M1 Network Security Profiles❏ M2 Building Linux Applications❏ M3 Advanced Perl Programming❏ M4 Topics for SysAdmins, 1❏ M5 Sendmail Config. & Operation

❏ M6 Blueprints for High Availability❏ M7 Exploring LDAP❏ M8 Large Heterogeneous Networks❏ M9 Communicating❏ M10 Wireless Net Fundamentals

❏ T1 Internet Security, UNIX & Linux❏ T2 Perl for SysAdmin❏ T3 Advanced CGI Using Perl❏ T4 UNIX Network Programming❏ T5 Cryptography Decrypted

❏ T6 Network Design, High Availability❏ T7 Advanced Solaris SysAdmin❏ T8 Forensic Computer Investigations❏ T9 Basic Management Techniques❏ T10 Wireless IP Security

❏ W1 Running Web Servers Securely❏ W2 Hacking Exposed: LIVE!❏ W3 Inside the Linux Kernel❏ W4 Network Programming w/Perl❏ W5 Cryptographic Algorithms

❏ W6 System & Network Tuning❏ W7 Samba Servers❏ W8 Computer Crime❏ W9 Solaris Internals❏ W10 Panning for Gold: Syslogs

PLEASE COMPLETE THIS FORM AND RETURN IT, ALONG WITH FULL PAYMENT, TO:

You may fax your registration form to 1.805.654.1676 if paying by creditcard. To avoid duplicate billing, please do not mail an additional copy.