Show filters Hide filters

Refine your search

Publication Year
1-19 out of 19 results
Change view
  • Sort by:
55:17 Berkeley System Distribution (BSD), Andrea Ross English 2013

Subclassing in Newbus

A brief tutorial for the subclassing part of the FreeBSD configuration system (known for years as newbus). The author will present work bringing this power to legacy portions of the system, as well as suggestions for future work in this fruitful area. This lecture will present a background of the FreeBSD driver system. The subclassing part of this system is radically under-documented. A companion document for this lecture will amplify the current documentation and provide additional examples to illustrate the power of the subclassing system. The lecture will then shift to reviewing the work the author has done to use these techniques to help map items in the kernel device tree to device nodes in the devfs tree.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
1:00:41 Berkeley System Distribution (BSD), Andrea Ross English 2013

FreeBSD based Japanese Enterprise System and Tukubai Method

Unicage software development method "Tukubai" is a comprehensive development framework for the enterprise systems (sales accounting system, payroll accounting system, corporate system, CRM system, merchandising system, enterprise system self-manufacture etc) including from development philosophy to development method, tools, coding, documentation and its business model. In 2012, rapidly growing company Universal Shell Programming Laboratory, the founder of "Tukubai" method, found that FreeBSD is better choice for them. I have been working for them as a FreeBSD consultant. In light of my own experience, I'll cover: o FreeBSD situation of the corporate activity o What's the Unicage software development method "Tukubai" o How many/Which companies uses Tukubai method o What's the FreeBSD specialized feature ush and BubunFS o How to scale the FreeBSD based Tukubai system o How to build the FreeBSD based Big data processing appliance In the middle of 2012, I developed a FreeBSD based Big data processing appliance, I'll cover that story, too.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
59:03 Berkeley System Distribution (BSD), Andrea Ross English 2013

Call your NetBSD

After focusing on improving NetBSD support for tablet hardware, NetBSD enthusiast and DeforaOS developer Pierre Pronchery (khorben@) is working on running NetBSD on smartphone hardware, with the OMAP-based Nokia N900 as the main target. After a quick summary of the different steps taken, he will introduce the user interface, installation procedure and underlying specificities to this setup. If all goes well, he will even be able to give a call! NetBSD is a very portable Operating System, which supports a plethora of hardware devices based on an ARM CPU and SoC (System on a Chip). Among them is the OMAP family from Texas Instruments; popularized by the BeagleBoard demonstration board, it is well supported by a number of Open Source systems. As it happens, there is at least one smartphone built around the same platform, namely the N900 from Nokia. Being well supported by Linux already, it is an ideal candidate for introducing modern telephony support to NetBSD. The user interface used as part of this effort originates from the DeforaOS project. Its graphical environment is based on the Gtk+ visual toolkit, and has already been declined for several embedded designs, including a phone: the Openmoko Freerunner. Introduced within pkgsrc as of the 2012Q4 release, it will hopefully provide a functional telephony environment on a NetBSD-based phone by the time of the presentation.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
1:04:03 Berkeley System Distribution (BSD), Andrea Ross English 2013

A NetBSD-based Radar in a Rocket Launching Center

Busy http servers, storage appliances and toasters are some notorious success deployments of NetBSD. Unfortunately not everybody is aware of some other gaps that NetBSD has filled. Once upon a time, there was a brave small team of programmers who did dare to choose NetBSD as a platform for their R&D software engineering department inside an aerospace and defense company. This resulted in some unusual use cases for NetBSD. This talk will present (1) a NetBSD-OS based tracking radar; (2) how NetBSD-OS served as a platform for supporting the software engineering department to design and implement software systems for rocket tracking radars; (3) how NetBSD Project served as a knowledge base for modelling that department's engineering processes. Furthermore, this talk will show how the unique features of NetBSD made it the most suitable OS for building rocket launching tracking radars deployed up to 3000 Km from the software engineering R&D lab, and how it helped to address challenges such as: Real-time data acquisition and processing Advanced visualization of radar data Radar systems simulation Air defense systems simulation Radar systems tests and quality assurance We'll also show how the choice for NetBSD made by an young software engineer, became a fundamental resource to deal with several aspects of bootstrapping an R&D software engineering department from ground up. Beyond an open-source OS, the NetBSD Project has an inherent open-governance and open-engineering nature, which made it a "body of knowledge" repository we used to find references for several software engineering related subjects.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
1:01:03 Berkeley System Distribution (BSD), Andrea Ross English 2013

Mozilla on OpenBSD

Maintaining the port of Firefox to OpenBSD is an interesting challenge, since the web & its related technologies are evolving faster and faster, and third-party OS are struggling more and more to keep up the pace with a fast-moving target such as Mozilla. I'll explain how i got caught into this by accident in the beginning of 2010, what are the key things to know about Mozilla development when coming from another big OSS project, how to properly cooperate with upstream, and how i managed to wrap up a workflow that eases the port updates at each new Mozilla release. Firefox (and thunderbird !) have been ported to OpenBSD around 2004, and since then there's been a constant work to keep them working fine, and up-to-date. Especially since the switch to a fast release schedule, you need to track very closely what happens upstream to ensure nothing breaks on third party operating systems at each new release, since Mozilla only considers Windows, Linux and MacOSX as tier-1 platforms. More and more code (often depending on os-specific code) is dumped into mozilla's source tree, and you also need to make sure that code also work on your os, or then has to be made optional. You also need to take special care to push back your fixes upstream for two reasons : making maintainance a breeze over time, and letting upstream know that you exist and that there are quite some users on other platforms. The developments in the next web APIs are making it crucial to have a fully functional browser on your favorite OS, so we'll also see what's needed for that.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
53:27 Berkeley System Distribution (BSD), Andrea Ross English 2013

An Overview of Security in the FreeBSD Kernel

The FreeBSD security model has been developed over thirty years of evolving consumer needs. Many of the key developments have come from the contributions of an active security research community. This talk describes the underlying model and its practical implementation, from its origins in the UNIX process model and file permissions, to more recent additions: the Capsicum capability model, lightweight Jail virtualization, Mandatory Access Control, and security event auditing. These elements combine to meet the requirements of diverse systems ranging across hand-held computing devices, network devices, storage appliances, and Internet service-provider's large-scale hosting environments.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
1:00:09 Berkeley System Distribution (BSD), Andrea Ross English 2013

Introduction to pkgsrc

Introduction to the Pkgsrc third-party software packaging framework. This lecture will introduce the significant differences and interesting features offered by Pkgsrc. This is the portable package system maintained by NetBSD and used also for DragonFly, SmartOS, MINIX, and various other operating systems.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
1:24:27 Berkeley System Distribution (BSD), Andrea Ross English 2013

The FreeBSD.org cluster refit

A way to do project infrastructure, and a way not to; or the FreeBSD.org cluster before and now. The FreeBSD project is rather old and as such has had the infrastructure for running the project, such as CVS, Mail, and web servers, for a long time. The basic setup had been the same for more or less 10 years with the result that it was very complicated, had many inter-dependencies and of course no documentation on how it was set up. Security wise the old setup was out of date with current practices. In 2012 we had to move from one datacenter to another, and in the process it was decided to redo the setup more or less from scratch with the goals of making the setup simpler, more robust, segregated, secure and basically something which didn't cause the administration team to lose sleep over. The presentation will, for historic reference, present the old setup as an example of how not to have a cluster set up in 2012, and how we decided to set up the new one to meet our goals. The design of the new setup with heavy partitioning of network and hosts, using of FreeBSD for everything where possible including routers running FreeBSD 10-CURRENT. The impact of the 2012 November FreeBSD.org compromise on the infrastructure will also be discussed and what was learned from that.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
58:33 Berkeley System Distribution (BSD), Andrea Ross English 2013

Multipath TCP for FreeBSD

Come with me on a journey to learn about the Multipath TCP (MPTCP) protocol and the first publicly released FreeBSD implementation. This talk will examine MPTCP's 'wire' characteristics, the architecture of the modified FreeBSD TCP stack, observations from the development process and results of both performance analysis and empirical research conducted using the stack. Multipath TCP (MPTCP) transparently retrofits multi-pathing capabilities to regular TCP and is a work in progress Internet Draft being developed within the IETF. The Cisco University Research Program funded the Centre for Advanced Internet Architectures to develop an interoperable implementation of MPTCP for FreeBSD as part of a research project to study mixing loss-based and delay-based congestion control in a multipath context. As a researcher on the funded project and lead author of the FreeBSD MPTCP implementation, I've data and insights to share with you about the process of going from stock FreeBSD and an IETF Draft to an interoperable MPTCP implementation that is being used in ongoing research programmes.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
56:55 Berkeley System Distribution (BSD), Andrea Ross English 2013

OpenIKED

This talk introduces the OpenIKED project, the latest portable subproject of OpenBSD. OpenIKED is a FREE implementation of the most advanced Internet security "Internet Key Exchange version 2 (IKEv2)" Virtual Private Network (VPN) protocol using the strongest security, authentication and encryption techniques. The project was born in need of a modern Internet Protocol Security (IPsec) implementation for OpenBSD, but also for interoperability with the integrated IKEv2 client since Windows 7 and to provide a compliant solution for the US Government IPv6 (USGv6) standard. The project is still under active development; it was started by Reyk Floeter as "iked" for OpenBSD in 2010 but ported to other platforms including Linux, FreeBSD and NetBSD in late 2012 using the "OpenIKED" project name.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
28:30 Berkeley System Distribution (BSD), Andrea Ross English 2013

Automating the deployment of FreeBSD & PC-BSD systems

In PC-BSD 9.x every installation is fully-scripted, due to the the pc-sysinstall backend. This backend can also be used to quickly automate the deployment of FreeBSD servers and PC-BSD desktops using a PXE boot environment. In PC-BSD & TrueOS
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
22:01 Berkeley System Distribution (BSD), Andrea Ross English 2013

Runtime Process Infection (part 1)

This presentation will instruct participants on how to inject arbitrary code into a process during runtime. Writing malware on Linux isn't an easy task. Anonymously injecting shared objects has been a frightful task that no one has publicly implemented. This presentation will show how and why malware authors can inject shared objects anonymously in 32bit and 64bit linux and 64bit FreeBSD. The presenter will be releasing a new version of a tool called libhijack. libhijack aims to make injection of arbitrary code and shared objects extremely easy. There will be a live demo injecting a root shell backdoor into multiple programs during runtime.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
04:27 Berkeley System Distribution (BSD), Andrea Ross English 2013

Runtime Process Infection (part 2)

This presentation will instruct participants on how to inject arbitrary code into a process during runtime. Writing malware on Linux isn't an easy task. Anonymously injecting shared objects has been a frightful task that no one has publicly implemented. This presentation will show how and why malware authors can inject shared objects anonymously in 32bit and 64bit linux and 64bit FreeBSD. The presenter will be releasing a new version of a tool called libhijack. libhijack aims to make injection of arbitrary code and shared objects extremely easy. There will be a live demo injecting a root shell backdoor into multiple programs during runtime.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
41:53 Berkeley System Distribution (BSD), Andrea Ross English 2013

Open Source Meets the Commercial World

Bambi Meets Godzilla: They Elope The world of open source and the world of commercial software intersect in profound and sometimes surprising ways. In some sense the two are like oil and water, but in other ways they can build on each other. This talk describes some of those differences — and ways they can enhance one another — using the sendmail open source mail transfer agent and Sendmail, Inc. as a case study.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
43:41 Berkeley System Distribution (BSD), Andrea Ross English 2013

The Hail Mary Cloud And The Lessons Learned

There was a time when brute force attacks were all rapid-fire and easily blackholed on sight. That changed during the late 2000s: The low intensity, widely distributed password guessing botnet dubbed "The Hail Mary Cloud" that made its debut in 2007 was remarkable for three things: - the service it targeted was SSH, an almost exclusively Unixish-based phenomenon - the glacial pace of attack from each of the participants - the apparent stay-below-the-radar profile Against ridiculous odds and eventually even some media focus, the botnet apparently thrived for several years. This session presents the known facts as seen by an early observer, proceeds to an analysis of the patterns observed during the various encounters with the phenomenon, with conclusions that may have implications for current detection and prevention stratgies and points to remember when formulating future approaches to network security.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
48:45 Berkeley System Distribution (BSD), Andrea Ross English 2013

The surprising complexity of checksums in TCP/IP

The well-known IP and TCP/UDP (and less well known, ICMP) checksums seem pretty much straighforward. Digging into the network stack reveals a surprising complexity dealing with them and updating. The rise of hardware checksum offloading didn't exactly make things easier. It goes so far that the old "pseudo header checksum" hack where parts of the checksum are precaclucated on the template PCBs and updated on the way out made its way into some of the hardware offloading engines. The talk explains how IP and protocol (UDP/TCP and ICMP) checksums are handled in the OpenBSD network stack and pf, both traditionally and after redesigning. This includes a closer view on performance impact - while the IP checksum only covers the header, the protocol checksums cover the entire payload, which makes them comparably expensive to verify recalculate. While the actual math is dirt cheap, the data access is not, and for forwarded packets we would not access the payload otherwise. Several different output pathes like the regular IP output, the bridging case and various tunneling/encapsulation mechanisms make things harder. The redesigned checksumming mechanism pretty much centralizes the checksum handling instead of having it all over the place, making dealing with the checksums in the rest of the stack much easier. It also allows us to benefit a little more from the NICs' offloading capabilities and fixes a long-standing bug which prevented us from enabling protocol checksum offloading on the RX side on many chipsets.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
42:01 Berkeley System Distribution (BSD), Andrea Ross English 2013

FreeBSD, Capsicum, GELI and ZFS as key components of a security appliance

I use to talk at various BSD conferences about projects I was/am working on (GEOM, GELI, ZFS, Capsicum, HAST, auditdistd and others). This time I'd like to talk about the meeting point of reality and some of those technologies: a security appliance I was working on for the last year. The talk will demonstrate practical use of various technologies available in FreeBSD (Capsicum, GELI, ZFS and others). The appliance needs to process and store very sensitive data at high speeds, so strong sandboxing provided by Capsicum and strong encryption provided by GELI were a must. The talk will also provide practical hints how to build and manage appliance, eg. how to create installation image with all dependencies from source, how to implement secure and reliable upgrades with an option to downgrade, how to monitor health of hardware components and how to cluster multiple nodes together.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
58:00 Berkeley System Distribution (BSD), Andrea Ross English 2013

Case Study: Switching from Linux to FreeBSD

This talk will outline the strategy used to migrate a small Canadian software company's Linux-based server infrastructure to FreeBSD. Part advocacy-strategy and part best-practices, the hope is that you'll come away with some extra tools to promote implementation of FreeBSD in your workplace. ExperiencePoint is a small (20 person) Canadian company that creates training simulations as web applications. The business is wholly dependent on its web server infrastructure for delivering its product. In 2011, I started working for ExperiencePoint and began the process of replacing its aging collection of Linux servers with a more robust FreeBSD server infrastructure. The Linux servers in question had been set up in a hurry, and the skilled software engineers who had set them up were not professional systems administrators. Linux was selected as the server operating system, but there were great opportunities for improvement and change. This talk is the story of that change. In addition to addressing the management concerns of replacing a "known" (Linux) with an "unknown" (FreeBSD), we'll explore the kinds of opportunities you should recognize in Linux environments you may come across. If you can improve reliability, reduce risk and improve performance, that's even better job security than switching to an operating system that nobody else knows.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
57:54 Berkeley System Distribution (BSD), Andrea Ross English 2013

The future of wireless networking - mobile, gigabit and beyond

This presentation will cover the current state of wireless technologies in BSD (at least focusing on 802.11 and Bluetooth) and how well (or not) each is implemented and supported by the various BSDs. This includes the classic operating modes (hostap and station modes) as well as newer developments (TDMA, 802.11s, P2P/TLDS, Bluetooth/802.11 PHY sharing.) It will then cover upcoming technologies - 802.11ac, 802.11ad, hybrid operating modes, aggressive mobile power saving technologies - with the technical, architectural and structural changes required to make these technologies a reality.
  • Published: 2013
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
out of 1 pages
Loading...
Feedback

Timings

  152 ms - page object
  117 ms - search
    5 ms - highlighting
    1 ms - highlighting/19176
    4 ms - highlighting/19164
    3 ms - highlighting/19168
    3 ms - highlighting/19181
    4 ms - highlighting/19161
    4 ms - highlighting/19171
    4 ms - highlighting/19163
    5 ms - highlighting/19169
    3 ms - highlighting/19162
    3 ms - highlighting/19165
    4 ms - highlighting/19178
    2 ms - highlighting/19177
    3 ms - highlighting/19185
    3 ms - highlighting/19175
    1 ms - highlighting/19186
    4 ms - highlighting/19174
    5 ms - highlighting/19182
    4 ms - highlighting/19183
    2 ms - highlighting/19184

Version

AV-Portal 3.8.0 (dec2fe8b0ce2e718d55d6f23ab68f0b2424a1f3f)