************************************************
SANS II
The 1993 World Conference On
System Administration, Networking, and Security
Detailed Technical Conference Program
Washington, D.C.
April 18-23, 1993
Courses: April 18-20
Technical Conference: April 21-23
301-229-1062
S...@FEDUNIX.ORG
Sponsors:
The USENIX Association
SAGE (The System Administrators Guild)
FedUNIX
The Open Systems Conference Board
*************************************************
SANS is designed to provide practical guidance that can be put to
work immediately upon your return to the office. The invited and
submitted papers shown below were designed to maximize the value
of every minute you spend at the conference.
Registration information is attached at the end of this message.
===============================================================
Wednesday, April 21 - Track I.
8:30 a.m. to 5:00 p.m.
Part 1. Management and Ask The Experts (Morning)
"The Manager's Perspective: Looking At System Administrators
Through The Site Manager's Eyes and Managing The Manager"
Bill Howell, University Of North Carolina (90 Minutes)
The manager's job is to manage, motivate, and lead
system administrators. What makes that job especially
difficult? What have experienced managers learned?
And what can the system administrator do to manage the
manager so that the team works together effectively.
Ask The Experts - I - "System Administration"
Rob Kolstad, BSDI, Bjorn Satdeva, sys/admin, and Elizabeth
Zwicky, SRI
(90 minutes)
An opportunity to get your system administration
questions answered, to learn from questions and answers
asked by others. Most questions will be gathered in
advance of the conference by polling all who register,
but there will also be time for some questions asked at
the session. This will be a fast-paced session aimed
at providing answers that will have wide applicability.
Part 2. System Administration
"Three Great PERL Tools" Tom Christiansen
(60 minutes)
Covering PERL tools that have not been previously
published. Probably plum, c2ph, and possibly pxref or
ssl.
"Implementing a Redundant, Centralized Mail Server", Michael E.
Winslett, Systems Programmer/Administrator, Department Of
Computer Science, University of North Carolina
(30 minutes)
The benefits of centralized mail services are well
known, particularly the ability to read from any
machine, but there are also drawbacks. This paper
shows how one organization managed to provide the
advantages while addressing some of the most serious
disadvantages. It shows how to modify sendmail and
create the necessary infrastructure.
"The Newest Version Of fdist"
Bjorn Satdeva /sys/admin, inc.
(45 minutes)
The fdist program has undergone a major cleanup and new
features have been added. Hear about what it can do
now from the author.
Part 3: Microsoft
"Microsoft Windows/NT: Systems Management Innovations" Mark
Ryland, Senior Architectural Engineer, Microsoft,
(75 minutes)
As PC operating systems evolve to run sophisticated
servers and symmetric multi-processor machines, today's
UNIX system administrator is likely to be called on to
manage those systems in addition to the ones they now
administer. This session provides an early look inside
Windows/NT, the operating system many believe will be a
tough competitor to UNIX.
=================================================================
Wednesday, April 21, Track II
Part 1. Security In Large Systems
"Guarding The Fortress: Efficient Methods To Monitor Security On
300+ Systems", Michele D. Crabb, Computer Science Corp., NASA
Ames Research Center
(45 minutes)
Keeping a watchful eye on several hundred workstations
of differing architectures can be a security
administrator's never-ending nightmare. This paper
presents an overview of how system security is
currently maintained on a 300+ system at NASA
supporting over 1500 users on 6 different
architectures. It covers the policies, the training,
and the monitoring and checking tools. The tools are
freely available to other sites.
"Designing Network Security for an Open Research Environment: The
3 Level Approach of NASA Lewis Research Center" Tony Facca
(45 minutes)
This paper shows how one organization balanced the
competing forces of research users who wanted and
needed easy access and the requirements for security
and integrity required in an organization like NASA.
The approach was one of evolution covering three
levels: (1) using existing tools for a multi-vendor
environment, (2) authentication and authorization, and
(3) real-time compliance.
"Computer Security Stories: Lessons to Learn" Matt Bishop,
Professor, Dartmouth
(45 minutes)
An introduction to the security challenges often faced
by UNIX managers. These anecdotes illustrate common
security problems and how they happened. Also some
techniques to use to avoid them. Includes the famous
Internet Worm.
"Post Mortem Of An Intruder Incident" and "An Introduction To The
Guide for Writing Site Security Policy - RFC 1244" Randy
Marchany, Virginia Tech Computing Center
(45 minutes)
In December 1991, a direct intruder attack was
discovered. Fifteen machines in three departments were
compromised. This paper chronicles the event and
provides recommendations for future prevention. It
also includes a brief introduction to "The Guide for
Writing Site Security Policy" which is a product of the
Internet Engineering Task Force covering issues,
procedures, and recommendations for incident handling.
It is not, however, a cookbook.
Part 2. Security Techniques
"Internet Firewalls: An Overview" Marcus Ranum, Senior Scientist,
Trusted Information Systems
(60 minutes)
Increasing numbers of companies are connecting to the
Internet, with "firewalls" between their private
networks for protection against system crackers and
industrial spies. Many of these firewalls are ad hoc
constructions developed locally, while others are
commercial or consulting products. This paper describes
and categorizes some of the types of firewalls in use,
and provides an overview of the risks and benefits of
various approaches to Internet security.
"Questing For Network Security Nirvana in a Not-So-Secure World"
Ken Zolot, Principal, Geer Zolot Associates
(30 minutes)
Trends and challenges facing financial service
organizations that need authentication. Sample topics:
Co-evolution of technological and political issues, how
to simultaneously increase openness and security of a
network, graceful scaling-up of security systems, plus
several more.
"UNIX Security vs. Mainframe Security: What's Missing?", Carla
Fitzgerald, Director Of Open Systems Programs, Computer
Associates, Int'l.
(45 minutes)
UNIX computers are being selected by more than 70 per
cent of large companies for downsizing some of their
important applications. But information systems
managers often delay the move because of concerns about
UNIX security. This paper provides a close look at
what mainframe security managers need to see in UNIX
security in order to feel comfortable, and shows one
way the major UNIX systems vendors, led by HP and Sun,
are meeting the needs.
Part 3: Ask The Experts
Ask the Experts - II - "Networking and Security", Rob Kolstad,
Bjorn Satdeva, Matt Bishop
(60 minutes)
An opportunity to get your networking and security
questions answered, to learn from questions and answers
asked by others. Most questions will be gathered in
advance of the conference by polling all who register,
but there will also be time for some questions asked at
the session. This will be a fast-paced session aimed
at providing answers that will have wide applicability.
=================================================================
Wednesday Birds Of A Feather Sessions
6:00 to 10:00 P.M.
(Preliminary List. If you would like to suggest other BOFs,
please email us at S...@FEDUNIX.ORG)
"My User Stories Are Better Than Your User Stories"
"Horror Stories"
"Government Users BOF"
=================================================================
Thursday, April 22
8:30 a.m. to 5:00 p.m.
Track I
Part 1. Network Management and Related Issues
"Homebrew Network Monitoring: A Prelude To Network Management",
Mike Schulze, Curtin University of Technology, Perth, West
Australia
(45 minutes)
Few network management tools have achieved satisfactory
price/performance for organizations with small budgets.
This paper looks at network monitoring as a lead-up to
the management scenario. It describes tools that allow
examination and visualization of network communication
through an intuitive graphical user interface.
"Administration Of Large Distributed UNIX LANs with BONES"
J. Schonwalder and H. Langendorfer, Institute for Operating
Systems and Computer Networks, TU Braunschweig, Germany
(30 Minutes)
BONES provides a central storage of administrative
information about large UNIX LANs. Configuration files are
generated and distributed to the hosts using the SNMP
protocol. The paper presents the architecture of BONES,
discusses the object-oriented data model used and compares
BONES with related work.
"INED: An Application-Independent Network Editor"
J. Schonwalder and H. Langendorfer, Institute for Operating
Systems and Computer Networks, TU Braunschweig, Germany
(30 Minutes)
An application-independent network editor that can be used
both to document networks
...
read more »