On this page:

Morning tutorials run from 9:00am to 12:30pm with a break from 10:30am to 11:00am. Afternoon tutorials run from 1:30pm to 5:00pm with a break from 3:00pm to 3:30pm. Full day tutorials take in both sessions.

Lunch will be provided to delegates who attend a full day tutorial or two half day tutorials on the same day.

To register for tutorials, please fill out a Conference Registration Form.

Click here to return to the AUUG2005 conference home page.

Tutorial Timetable

Sunday, 16 October 2005

S1 - Full Day
Debugging Kernel Problems
Greg Lehey
   
S2 - Afternoon
Introduction to Network Simulator 2 (ns2)
Joel Sing
S3 - Afternoon
Installing GNU HURD from scratch, and creating a strict GPL development environment
Andrew Chalmers

Monday, 17 October 2005

M1 - Full Day
Security Technology Review
Peter Gutmann
M2 - Morning
Secure High Availability Open Source Systems and Solutions
Mark Uemura
M3 - Morning
An Introduction To SQLite
Dan Kennedy
M4 - Morning
PHP and MySQL Best Practices
Luke Welling and Laura Thomson
M5 - Afternoon
An Introduction to CVS
David Purdue
M6 - Afternoon
The Inner Workings Of SQLite
Dan Kennedy
M7 - Afternoon
Firewalling with PF
Peter N. M. Hansteen

Tuesday, 18 October 2005

T1 - Morning
Building Open Source Secure Wireless Networks for the Enterprise
Mark Uemura
T2 - Morning
A Cryptography Primer
Laurie Brown
T3 - Morning
Optimising MySQL
Arjen Lentz
T4 - Morning
Hands-on NSA Security Enhanced Linux
Russell Coker
T8 - Afternoon
Solaris 10: Dynamic Tracing (DTrace) and Containers
Bryan Cantrill
T5 - Afternoon
Security Risk Management
Laurie Brown
T6 - Afternoon
MySQL 5.0 in Depth: Stored Procedures, Views, Triggers, Cursors
Arjen Lentz
T7 - Afternoon
I'm Not Dead Yet! (Tcling For Fun And Profit)
Steve Landers





S1 - Debugging Kernel Problems

Intended Audience:
Kernel developers and experienced system adminstrators. The tutorial assumes a good working knowledge of UNIX systems administration and the C programming language. A knowledge of kernel internals will be helpful, but is not essential. Depending on prior experience, participants will learn to locate and either fix or report kernel bugs.

Description:
This tutorial will show debugging techniques on live systems. The operating system for most of the tutorial will be FreeBSD, but it will explain the (relatively small) differences in NetBSD and OpenBSD. Much of the content, including some of the kernel debugging examples, applies to Linux as well.

Topics:

Greg Lehey

Greg Lehey has been in the computer industry for 30 years, in which time he has performed most jobs, ranging from kernel development to product management, from systems programming to systems administration, from processing satellite data to programming petrol pumps, from the production of CD-ROMs of ported free software to DSP instruction set design. He is the author of ``Porting UNIX Software'' (O'Reilly and Associates, 1995) and ``The Complete FreeBSD'' (O'Reilly and Associates, 2003).


S2 - Introduction to Network Simulator 2 (ns2)

This tutorial will provide attendees with a basic introduction to Network Simulator 2 (ns2), a discrete event simulator designed for networking research.

Overview:

It is expected that attendees will have a reasonable understanding of TCP/IP and computer networking, including basic knowledge of protocol internals.

Joel Sing

Joel is one of the founders of Ionix Technology, a Bendigo based company that provides business computing solutions to small and medium enterprise. He is a highly skilled software engineer, with many years experience developing complex software systems. Joel is familiar with the installation and configuration of many operating systems, having had over eight years of industry experience in both system and network administration.

Joel graduated from La Trobe University, Bendigo in 2000 with a Bachelor of Computing with Distinction, before graduating with an Honours degree in 2001. He is currently a PhD candidate at La Trobe University, Bundoora and is undertaking research regarding the performance of TCP over long delay links.


S3 - Installing GNU HURD from scratch, and creating a strict GPL development environment

The HURD is the GNU projects UNIX replacement Operating System, it also represents a unique frontier for OS development and design. But getting HURD onto your hard drive, whether your developing, testing out new features or just curious can be a painful process. This tute intends to make it simple if not intuitive.

A far more elegant introduction to the HURD can be found here: http://www.gnu.org/software/hurd/hurd.html

Initially I will take you over the basics:

Then we will make the system worth the effort:

We will also cover HURD design decisions, new development trends and a little project history.


M1 - Security Technology Review

Peter Gutmann presents the world's most comprehensive security technology review, the actual content of which will depend largely on the needs and interests of attendees, but drawn generally from the following:

Security threats and requirements, services and mechanisms, historical ciphers, assorted block, stream, and public-key ciphers, hash functions, and signature algorithms, key management, key distribution, the certification process, certification hierarchies, LDAP, certificate revocation, X.509 certificate structure and extensions, certificate profiles, setting up and running a CA, RA's, PGP certificates, SPKI, digital signature legislation, IPSEC, SKIP, SSL, SGC, TLS, S-HTTP, SSH, SNMP security, DNSSEC, email security mechanisms, PEM, PGP, MOSS, PGP/MIME, S/MIME and CMS, MSP, user authentiction, Unix password encryption, LANMAN, NT, and Netware 3.x and 4.x authentication, Kerberos 4 and 5, Kerberos-like systems (KryptoKnight, SESAME, DCE), authentication tokens, SecurID, S/Key, OPIE, PPP PAP/CHAP, PAP variants (SPAP, ARAP, MSCHAP), RADIUS, TACACS/XTACACS/TACACS+, biometrics, PAM, electronic payment mechanisms, (Netcash, Cybercash, book entry systems in general), Digicash, e-cheques, SET, why security is hard to get right, TEMPEST, snake oil crypto, selling security, smart cards, electronic purse standards, PKCS #11, PC/SC, JavaCard/OCF, iButtons, contactless cards, attacks on smart cards, voice encryption, GSM security and how to break it, traffic analysis, anonymity, mixes, onion routing, mixmaster, crowds, steganography, watermarking and so much more!

Peter Gutmann

Peter Gutmann is a researcher in the Department of Computer Science at the University of Auckland working on design and analysis of cryptographic security architectures. He helped write the popular PGP encryption package, has authored a number of papers and RFC's on security and encryption including the X.509 Style Guide for certificates, and is the author of the open source cryptlib security toolkit. In his spare time he pokes holes in whatever security systems and mechanisms catch his attention and grumbles about PKIs.


M2 - Secure High Availability Open Source Systems and Solutions

Today there are Open Source software and systems that rival commercial alternatives. This is especially true in the Security World. This tutorial focuses on building Secure High Availability Open Source Systems and Solutions and are great examples of Open Source at its best.

Tutorial attendees will see live demonstrations for each of the following High Availability solutions:

Learn how to implement these and other solutions for your business or organization and find out why they are now being used in one of the largest and oldest services firms in the world.

The objective of the tutorial is to give everyone the tools and how-to information that they need to build their own Secure High Availability Open Source Systems and Solutions for their company. Those attending will receive full documentation for the first two solutions and an authentic OpenBSD 3.7 CD release.


M3 - An Introduction to SQLite

SQLite is a small C library that implements a self-contained, embeddable, zero-configuration SQL database engine. It is used inside many high-profile commercial and open-source software systems and new projects are adopting it daily. SQLite offers the power and convenience of SQL data storage without the overhead and administrative burden of a tradition client/server RDBMS.

This sessions provides a detailed introduction to SQLite. Programmers who are unfamiliar with SQLite or who are have only a limited acquaintance with SQLite will come away with all the knowledge they need to assess the relative merits of SQLite and to begin using the library in their own projects.

The following are some of the topics that will be covered:


M4 - PHP and MySQL Best Practices

Many web programmers use PHP with MySQL. However, lots of hard working programmers work to tight deadlines, are self-taught, and may never have experimented with some of this combination's newer features. In this session, we will look at best practices for using MySQL from PHP, showing how common web development tasks can be made easier, more efficient, or more secure.

Welling and Thomson discuss when and how to use the following features in the web environment:

This tutorial is aimed at programmers who already use PHP and MySQL together, but want to get more out of the pairing.

Luke Welling

Luke Welling lives in Melbourne and is a Senior Software Engineer at Hitwise.com. He has been using PHP for nearly ten years. PHP and MySQL Web Development, co-authored with Laura Thomson (Sams 2004), is the best selling open source programming book of all time.

Luke has previously worked as a programmer for various companies including MySQL AB, run a freelance web development business, and taught computer science and engineering at RMIT University. He is a regular speaker at open source conferences around the world, having given tutorials, sessions, or keynotes at the O'Reilly Open Source Convention, PHPCon, LinuxTag, The MySQL Users' Conference, The International PHP Conference and the Australian Open Source Developers' Conference.

Laura Thomson

Laura Thomson is the co-author of the best selling PHP and MySQL Web Development, has worked as a programmer, consultant, and lecturer. She has taught PHP to thousands of students. Laura is currently a lecturer at RMIT University, creating new open source converts every semester.


M5 - An Introduction To CVS

Change control and tracking is becoming incresingly important for technical, managerial and legal reasons.

In open source projects in particular it is important that change is monitored and controlled, while allowing geographically dispersed individual developers to be as productive as possible and just get on with their coding.

The tool of choice for achieving this is CVS - the concurrent version system.

This tutorial will give and introduction to CVS and its use, including:

David Purdue

David Purdue is the President of AUUG Inc. He has been fiddling with UNIX systems for over 20 years, and has been on the AUUG Board for over 10.

David uses CVS primarily to administer web sites and track system admin config changes - in particular on the AUUG web site.

David works for Sun Microsystems on resolving service issues for Sun's top 50 global customers.


M6 - The Inner Workings Of SQLite

This session provides a guided tour through the source code and internal workings of the SQLite embedded database engine. The aim is to make attendees comfortable enough with the SQLite code base that they will know immediately where in the code to look for answer to questions about how the database operates and can confidently make any desired customizations and enhancements.

The material is intended for the following audiences:

The following are some of the topics that will be covered:


M7 - Firewalling with PF

The OpenBSD Packet Filter (PF) offers firewalling, NAT, traffic control and bandwidth management in a single, flexible and sysadmin friendly system. Since its inital release as part of OpenBSD 3.0 in 2001, PF has been incorporated in the base systems of FreeBSD, NetBSD and DragonFlyBSD. The objective of the tutorial is to show you the tools and methods for taking control of your network traffic - keeping some of it safely inside or outside your network, directing traffic to specific hosts or services, flexible resource allocation and protection against cracking, DOSing and spamming.

Peter Hansteen

Peter N. M. Hansteen (b 1963) is Senior Consultant at Datadokumentasjon A/S in Bergen, Norway. A freenix user since the mid 1990s, he tends to networks in between documentation related tasks. Advocates freenixes via the local BLUG and national NUUG user groups, where he is a member of the core group and board member respectively. A member of the original RFC1149 implementation team.

T1 - Building Open Source Secure Wireless Networks for the Enterprise

Wireless Networks are bliss to users and the bane of Security Administrators. Most wireless networks are insecure by default and security seems to be an afterthought for the users, hardware and software vendors alike. More over, even with security features used, most Access Points use very weak encryption, little or no authentication methods and have no built-in firewall technology. So how can companies utilize wireless technology and still be able to protect confidential information from unauthorized access? This solution addresses the following security concerns: Authentication, Encryption and Firewall protection. More over, there's no lock-in, no extra hardware or software expenditures and it's very user friendly, robust and scalable.

This will be a hands-on tutorial with no time for theory. Attendees will benefit most by bringing a laptop with a wireless device (802.11b/g). This solution was designed/automated for Windows 2000/XP wireless clients but should not be limited to Windows. The Secure Wireless Access Points will be running OpenBSD but should also work for other BSD systems that use pf for the firewall, OpenSSH and that have IPsec support.

The objective of the tutorial is to give everyone the tools and how-to information that they need to build their own Secure Wireless Network at home or for their company. Those attending will receive full documentation and an authentic OpenBSD 3.7 CD release.


T2 - A Cryptography Primer

Data encryption algorithms form an important technical component in providing secure and authenticated electronic security and communications. This workshop is designed to provide attendees with a brief overview of the field of cryptography, the terms, techniques, and algorithms.

It starts by introducing the classical cryptographic techniques which form the foundations of the field. We then survey modern private key ciphers, widely used for bulk and link data encryption, from DES to the new AES encryption algorithm Rijndael. Next we consider public key encryption algorithms and signature schemes, essential for the use of cryptography in large scale, wide area communications. We conclude with a brief look at a couple of cryptographic applications, illustrating the different ways these components are combined to build a security solution.

Dr Lawrie Brown

DR LAWRIE BROWN is a senior lecturer in the School of Information Technology and Electrical Engineering, at the Australian Defence Force Academy (UNSW@ADFA) in Canberra.

His professional interests include cryptography, communications and computer systems security, and safe mobile code. His current research is in the design of safe and secure remote (mobile) code execution environments, currently focusing on the functional language Erlang. He has previously worked on the design and implementation of private key block ciphers, in particular the LOKI family of encryption algorithms.

He currently lectures postgraduate courses in Computer Security and Cryptography, the undergraduate second year core Computing Technology course, and the general studies "Computers in Society" course. He is also an instructor for the CISCO Regional Networking Academy at ADFA.

Additionally, Lawrie is a webmaster on the Internet Project (AUUG Canberra & PCUG) system.


T3 - Optimising MySQL

This tutorial examines the many aspects involved when optimising a MySQL application, the MySQL server, and its environment.

Contrary to popular expectations (and habits), hardware will be the absolute last item on our list. The reason for this will become apparent as we build an overall picture and take a closer look at various specific issues.

The tutorial will be highly interactive, using discussions, games, and other ways that insure maximum benefit for all participants. This method of teaching, which is the standard format of MySQL AB training courses, has proven to be much more effective than regular lectures.

Optimisation is certainly not a topic of dry knowledge. Instead it is about gaining the skills needed to analyse the big picture, and recognising the often small but important opportunities. As such, this tutorial provides a particularly valuable experience for intermediate-level MySQL users.

Arjen Lentz

Arjen Lentz (35) is originally from Amsterdam, The Netherlands. Since marrying an Aussie, he decided that Australia is a very nice place to live, so together with their black cat they now reside in Kenmore, a Western suburb of Brisbane, QLD.

Arjen started with programming, but has since branched out to writing, translating, marketing, training and consultancy. He has been working for MySQL AB (the Swedish company that owns, develops and supports the MySQL database software, www.mysql.com) since 2001, primarily as technical writer for MySQL Documentation Team.

In addition, Arjen teaches MySQL training courses, and maintains contacts with the MySQL community and other organisations in Australia. Arjen co-founded and is actively involved with OSIA, Open Source Industry Australia, Incorporated (www.osia.net.au) and also helps on the press team of Linux Australia (www.linux.org.au).

Arjen is always keen to be involved in open discussions with interested parties about MySQL and the possibilities for Open Source.


T4 - Hands-on NSA Security Enhanced Linux

This hands-on tutorial will cover using SE Linux on a Red Hat platform. Attendees will learn the basic SE Linux administration commands and tasks, including:

The SE Linux applications interface with the kernel (which is useful for debugging problems) will be introduced, along with a methodology for writing custom policy for daemons for which there is no policy written.

Russell Coker

Russell Coker has been working on SE Linux since mid 2001. He works for Red Hat on the SE Linux support in Fedora and RHEL. Prior to working for Red Hat he worked as a sysadmin for various ISPs.

T5 - Security Risk Management

This tutorial will present an overview of security risk management, including the critical risk assessment process. This aims to identify threats to, impacts on and vulnerabilities of information and information processing facilities and the likelihood of their occurence, in order that these threats may be controlled and minimised at an acceptable cost. Unfortunately, this process is often not managed well. An overview of relevant international and national standards will be presented which provide guidance on this process. The latter part of the tutorial will be a "simplified case-study", walking through an example risk assessment for a hypothetical (though based on actual) organisation, using the process outlined in the recently revised DSD ACSI 33. This standard is mandated for commonwealth government use, but provides good guidance for any who need to undertake such a process.

Dr Lawrie Brown

DR LAWRIE BROWN is a senior lecturer in the School of Information Technology and Electrical Engineering, at the Australian Defence Force Academy (UNSW@ADFA) in Canberra.

His professional interests include cryptography, communications and computer systems security, and safe mobile code. His current research is in the design of safe and secure remote (mobile) code execution environments, currently focusing on the functional language Erlang. He has previously worked on the design and implementation of private key block ciphers, in particular the LOKI family of encryption algorithms.

He currently lectures postgraduate courses in Computer Security and Cryptography, the undergraduate second year core Computing Technology course, and the general studies "Computers in Society" course. He is also an instructor for the CISCO Regional Networking Academy at ADFA.

Additionally, Lawrie is a webmaster on the Internet Project (AUUG Canberra & PCUG) system.


T6 - MySQL 5.0 in Depth: Stored Procedures, Views, Triggers, Cursors

An in-depth look at MySQL 5.0, now available in production.

Views, stored procedures and triggers have long been considered a basic requirement of an enterprise-ready DBMS. Now, MySQL 5.0 introduces support for these flagship features, as well as for a standard SQL-compliant INFORMATION_SCHEMA data dictionary, bringing the popular open-source DBMS several steps closer to matching all the capabilities of the competition.

In this tutorial, each of these features are discussed in-depth, with practical examples. Interesting for all users at intermediate and advanced levels, but particularly useful for existing MySQL users who may not be familiar with these features from other databases.

Arjen Lentz

Arjen Lentz (35) is originally from Amsterdam, The Netherlands. Since marrying an Aussie, he decided that Australia is a very nice place to live, so together with their black cat they now reside in Kenmore, a Western suburb of Brisbane, QLD.

Arjen started with programming, but has since branched out to writing, translating, marketing, training and consultancy. He has been working for MySQL AB (the Swedish company that owns, develops and supports the MySQL database software, www.mysql.com) since 2001, primarily as technical writer for MySQL Documentation Team.

In addition, Arjen teaches MySQL training courses, and maintains contacts with the MySQL community and other organisations in Australia. Arjen co-founded and is actively involved with OSIA, Open Source Industry Australia, Incorporated (www.osia.net.au) and also helps on the press team of Linux Australia (www.linux.org.au).

Arjen is always keen to be involved in open discussions with interested parties about MySQL and the possibilities for Open Source.


T7 - I'm Not Dead Yet! (Tcling For Fun And Profit)

Want to develop in a scripting language that is web enabled, portable, object oriented, extensible, supports rapid GUI development, is fully internationalised and localised, byte-compiled, threaded, supports single file deployment, an embedable web server, supports easy network programming, is fully event driven, has a security model that supports sandboxes, is open source ... and was described by Eric Raymond as "Radically simple"?

No - not Java .... Tcl!

Contrary to the rumours, Tcl isn't dead but is alive and thriving. Sure it doesn't get the publicity and mindset of more "trendy" languages, but has a large, growing and devoted following - especially in some industry segments like telecommunications, automation and electronic design.

This tutorial will take you through the fundamentals of Tcl and Tk (its GUI extension). In addition the tutorial will cover a broad range of resources available to the Tcl developer - including various extensions, development tools and deployment options.

The tutorial assumes a knowledge of programming languages and principles, an open mind and a willingness to have fun when building software.

Steve Landers

Steve Landers is the Senior Consultant at Digital Smarties. He is active within the Tcl/Tk community, where he regularly contributes both software and expertise. He has a particular interest in the development of cross-platform scripted applications, and is a leading proponent of Tclkit, Starkit, Starpacks and Metakit for developing complex and robust cross-platform applications.

Steve regularly speaks at conferences, both in Australia and internationally. He has spoken at a number of SAGE-AU and AUUG annual conferences, and was a speaker at the Tcl2001 And Tcl2002 conferences.


T8 - Solaris 10: Dynamic Tracing (DTrace) and Containers

Solaris 10 is garnering rave reviews from the industry. Typical of these reviews are the comments from Illuminata analyst Gordan Haff, who claims that Solaris 10 has “more features that are both visible and meaningful to users than any other recent Unix release.”

This tutorial is a deep-dive and demonstration of two of the most visible and meaningful features in Solaris 10: Dynamic Tracing (DTrace) and Containers. Come see for yourself the technologies that eWeek called “compelling” and “impressive”, respectfully.

Dynamic Tracing

Solaris Containers

Bryan Cantrill

Bryan Cantrill is a Senior Staff Engineer in the Solaris Kernel Development Group at Sun Microsystems. His interests include dynamic software instrumentation, postmortem diagnosability, real-time kernel implementation and microprocessor architecture.

Over his career, Bryan has done work in many kernel subsystems; most recently, he (with two colleagues) designed, implemented, and shipped DTrace, a facility for systemic dynamic instrumentation of Solaris that won the Sun 2004 Chairman's Award for Innovation, the InfoWorld 2005 Innovators Award, and the high praise of SysAdmin magazine, which hailed DTrace as a “brilliant piece of work.”

In September 2005 Bryan was selected to the Technology Review 35 (TR35), for his work on the Solaris(TM) 10 Operating System (OS). The selection by Technology Review, MIT's magazine of innovation, honors Cantrill as one of thirty-five young innovators under 35 years old who exemplify the spirit of contemporary innovation in technology and have the potential to profoundly impact the world.

Bryan received the ScB magna cum laude with honors in Computer Science from Brown University.



Information Disclaimer

The information on this page is accurate as at the time of posting. Updates to this page will be made if necessary due to changed circumstances.

AUUG reserves the right to alter this timetable or to cancel tutorials. If this happens, AUUG will contact delegates registered for affected tutorials to arrange for an alternative tutorial or a refund.