We, meaning my two colleagues Søren, Klavs and I, arrived in Delft at Hotel de Koophandel on tuesday evening. I had been sick the whole week before, and had just barely felt OK for work that monday, so I was exhausted from 12 hours of non-stop work and travel and went to bed early.
Wednesday was our Advanced Cfengine tutorial. It wasn't as exciting as we had hoped, but we did learn some new things. We also met Henrik and Flemming at the conference, and later some more of the usual suspects. Then we went out for beer.
Thursday and friday was the normal conference days. Thursdays programme for me:
- Freedom to Tinker by Ed
You can see what Ed thought about it and the slides.
- UNIX on my mind by
Rants sbout what's cool about UNIX and what's not. Entertaining.
- DNSSEC Deployment —
The path forward by Steve Crocker.
DNSSEC is a good idea, but a bad implementation, and a nightmare to roll out. That was what I got out of this talk.
and hard security by Tim Panton.
A very cool software phone as a Java applet. Neat.
Provision of Internet Services via a Reflectively Load-Sharing
Architecture by Kostas Zorbadelos.
FreeBSD, PF and CARP + some Python. Very cool.
Friday morning Søren dislocated his left shoulder by sneezing! No, really. He's that kind of guy with that kind of shoulder and that kind of luck. We called an ambulance and they could fix the shoulder right away without involving the ER, which was excellent. We missed the first talk, but I made it to these:
measurement: what have we learned in the last ten years? by KC
She's a fast and good speaker with some really good points. Like: “noone is earning money moving packets.”
Management with Subversion, YAML and Perl Template Toolkit by Ray
The software he was talking about: users.ox.ac.uk/~raym/software/configuration-management (including slides). Interesting.
How to keep it when you want it and lose it when you want it gone by
A grand scheme. Sounded extremely nice, but noone has ever implemented it. Radia is a very entertaining speaker, and she really knows what she's talking about.
Entropy Winning? — Drowning in The Data Tsunami by Lee
With huge disks you don't need to ever delete anything, but how do you find a 5 year old document? And do you have software that can read it?
Hash Functions: Recent Results on Cryptanalysis and their Implications on
System Security by Ruediger Weis.
MD5 collisions can be found on a modern laptop in 17 minutes. What to do about it. Ruediger is a total crypto and math geek, a little too much for a talk like this.
- RFID Security
for Sysadmins by Melanie Rieback.
Amusing and interesting. I never knew quines could be used in such intersting ways.
Author M. G. Liebach
LastMod 2016-05-01 (9fc4632)