Language: EN  JA  zh-CN  zh-TW  KO

Registration Fees

  • Delegate (non-student): 10,000JPY (until February 28, 2007), 12,000JPY (after February 28, 2007)
  • Student: 3,500JPY (regardless of the above periods)

This registration fee includes name card, printed proceedings, T-shirt, subway ticket (Passnet card), and tickets of lunch and banquet during the last two days.

REGISTER ON-LINE FROM HERE!

Tutorial Fees

  • Full-day Tutorial: 10,000JPY/class (5,000JPY for students)
  • Half-day Tutorial: 6,000JPY/class (3,000JPY for students)

This tutorial fee includes printed materials.

Optional City Tours

On March 12th several optional city tours are planned by our travel agency. These are options for conference attendees from abroad and not activity related to BSD. For the detail information, see http://www.jtbgmt.com/sunrisetour/cd/.

Hotel Accommodations

You can book the following hotels via the on-line registration system as an option. For the details please check the registration form when it is ready.

Hotel NameRate (single/double occupancy, per person)Location
Tokyo Ochanomizu Hotel Juraku
(hotel's official web page in Japanese only)
7,500JPY/6,500JPYnear JR Ochanomizu station
Suidobashi Grand Hotel
(hotel's official web page in Japanese only)
8,085JPY/6,930JPYnear JR Suidobashi station
Tokyo Green Hotel Suidobashi8,700JPY/9,150JPYnear JR Suidobashi station
Tokyo Dome Hotel17,525JPY/18,480JPY (per room)near JR Suidobashi station

Please contact if you have a specific question about the accommodation.

Access to the Venue

Conference Timetable

NOTE: this page will be updated when more detailed information is available.


Day 1 (March 8, 2007) - Tutorials and Small Meetings I

Room ARoom BRoom CRoom D
AM
9:00-12:00
Tutorial T1A:
"An Introduction to the FreeBSD Open-Source Operating System"
Marshall Kirk McKusick, PhD
(full-day)
Tutorial T1B:
"Building Clusters With FreeBSD"
Brooks Davis (brooks at FreeBSD.org)
(half-day)
TBD TBD
PM
13:30-16:30
Tutorial T2B:
"FreeBSD Security Features"
Robert N M Watson (rwatson at FreeBSD.org)
(half-day)
TBD TBD

Day 2 (March 9, 2007) - Tutorials and Small Meetings II

Room ARoom BRoom CRoom D
AM
9:00-12:00
Meeting M3A: FreeBSD Developer's Summit (invited only) Tutorial T3B:
"Firewalling with OpenBSD's PF packet filter"
Peter N. M. Hansteen (peter at bgnett.no)
(half-day)
Tutorial T3C:
"Development Technique for BSD Embedded Systems" (in Japanese only)
Shozo Takeoka (take at axe-inc.co.jp)
(half-day)
TBD
PM
13:30-16:30
Tutorial T4B:
"Advanced PF Rulesets"
Ryan McBride (mcbride at openbsd.org)
(half-day)
Meeting M4C: NetBSD Discussion
Chair: Masao Uebayashi (uebayasi at gmail.com)
TBD
Evening
18:30-21:30
TBD TBD TBD Meeting M5D: FreeBSD Night
Chair: IKEGAMI Akiko (gami at hadashi.org)

Day 3 (March 10, 2007) - Paper Session I (Single Track)

09:00 - 09:10 Opening
09:10 - 10:10 P1: A NetBSD-based IPv6 NEMO Mobile Router
Jean Lorchat, Koshiro Mitsuya, Romain Kuntz (Keio University, Japan)
10:10 - 11:10 P2: Reflections on Building a High Performance Computing Cluster Using FreeBSD
Brooks Davis (The Aerospace Corporation/brooks at FreeBSD.org, USA)
11:10 - 12:10 Lunch
12:10 - 13:10 P3: Support for Radio Clocks in OpenBSD
Marc Balmer (mbalmer at openbsd.org, Switzerland)
13:10 - 14:10 P4: puffs - Pass to Userspace Framework File System
Antti Kantee (Helsinki University of Technology, Finland)
14:10 - 14:25 Coffee Break
14:25 - 15:25 P5: An ISP Perspective, jail(8) Virtual Private Servers
Isaac Levy (NYC*BUG/LESMUUG, USA)
15:25 - 16:25 P6: Nsswitch Development: Nss-modules and libc Separation and Caching
Michael A Bushkov (Southern Federal University/bushman at FreeBSD.org, Russia)
16:25 - 16:40 Coffee Break
16:40 - 17:40 P7: OpenBSD as a Development Platform
Ryan McBride (mcbride at openbsd.org, Japan)
17:40 - 18:40 P8: How the FreeBSD Project Works
Robert N M Watson (University of Cambridge/rwatson at FreeBSD.org, United Kingdom)
18:40 - 18:50 Short Break
18:50 - 19:50 Invited Talk (I1): The Internet for BSD, BSD for the Internet
Prof. Jun Murai (Keio University, Japan)
20:00 - 21:30 Banquet

Day 4 (March 11, 2007) - Paper Session II (Single Track)

09:00 - 10:00 P9: OpenBSD Network Randomness Injection: Further Improvements
Ryan McBride (mcbride at openbsd.org, Japan)
10:00 - 11:00 P10: SHISA: The Mobile IPv6/NEMO BS Stack Implementation Current Status
Keiichi Shima (Internet Initiative Japan Inc., Japan), Koshiro Mitsuya, Ryuji Wakikawa (Keio University, Japan), Tsuyoshi Momose (NEC Corporation, Japan), Keisuke Uehara (Keio University, Japan)
11:00 - 12:00 Lunch
12:00 - 13:00 Invited Talk (I2): A Narrative History of BSD
Marshall Kirk McKusick, PhD (USA)
13:00 - 13:10 Short Break
13:10 - 14:10 P11: Bluffs: BSD Logging Updated Fast File System
Stephan Uphoff (Yahoo!, Inc./ups at FreeBSD.org, USA)
14:10 - 15:10 P12: Implementation and Evaluation of the Dual Stack Mobile IPv6
Koshiro Mitsuya, Ryuji Wakikawa, Jun Murai (Keio University, Japan)
15:10 - 15:25 Coffee Break
15:25 - 16:25 P13: Recent Improvements in OpenBSD's IPsec Support
Mathieu Sauve-Frankel (msf at openbsd.org, Japan)
16:25 - 17:25 P14: SCTP Introduction
Randall R. Stewart (Cisco Systems)
17:25 - 17:40 Coffee Break
17:40 - 18:40 P15: Security Measures in OpenSSH
Damien Miller (djm at openbsd.org, Australia)
18:40 - 19:40 P16: Porting the ZFS File System to the FreeBSD Operating System
Pawel Jakub Dawidek (pjd at FreeBSD.org, Poland)
19:50 - 21:30 Dinner


Invited Talks


I1: The Internet for BSD, BSD for the Internet

Abstract:
(to be updated soon)
Speaker:
Prof. Jun Murai, a Professor, Faculty of Environmental Information, Keio University since April 1997, a Vice-President of Keio University since May 2005, the general chairperson of WIDE Project, chair of AI3 Project, and director of SOI Asia Project.

I2: A Narrative History of BSD

Abstract:
Learn the history of the BSD (Berkeley Software Distributions) from one of the key developers who brings the history to life complete with anecdotes and interesting footnotes to the historical narrative.
It begins with the start of the BSD community at the University of California at Berkeley in the late 1970's. It relates the triumphs and defeats of the project and its releases during its heydays in the 1980s. The Berkeley era concludes with the tumultuous lawsuit ultimately settled in Berkeley's favor which allowed the final release in 1992 of 4.4BSD-Lite, an open-source version of BSD. The talk concludes with a brief commentary on the FreeBSD, NetBSD, OpenBSD, Darwin, and Dragonfly projects that took their genesis from the release of 4.4BSD-Lite.
Speaker:
Dr. Marshall Kirk McKusick writes books and articles, consults, and teaches classes on UNIX- and BSD-related subjects. For the past ten years he has been a developer and commiter to the FreeBSD Project. His particular areas of interest are the virtual-memory system and the filesystem. While at the University of California at Berkeley, he implemented the 4.2BSD fast file system, and was the Research Computer Scientist at the Berkeley Computer Systems Research Group (CSRG) overseeing the development and release of 4.3BSD and 4.4BSD. He earned his undergraduate degree in Electrical Engineering from Cornell University, and did his graduate work at the University of California at Berkeley, where he received Masters degrees in Computer Science and Business Administration, and a doctoral degree in Computer Science. He is a past president of the Usenix Association, is on the editorial board of ACM's Queue magazine, and is a member of ACM and IEEE.

Tutorials


T1A: An Introduction to the FreeBSD Open-Source Operating System

Abstract:
This course will provide a firm background in the FreeBSD kernel. The course will cover basic kernel services, process structure, the FreeBSD jail facility for hosting virtual machines, scheduling, signal handling, and virtual and physical memory management. The kernel I/O structure will be described showing how I/O is multiplexed, special devices are handled, and the filesystem buffers are managed. The implementation of the filesystem and its capabilities including soft updates and snapshots will be described. The filesystem interface will then be generalized to show how to support multiple filesystem types. The course will also cover the FreeBSD socket-based network architecture, layering and implementation. The socket communications primitives and internal layering will be discussed, with emphasis on the interfaces between the layers. A discussion of routing issues will be included. The presentations will emphasize code organization, data structure navigation, and algorithms. It will not cover the machine specific parts of the system such as device drivers.

Course Text: Marshall Kirk McKusick and George V. Neville-Neil, ``The Designand Implementation of the FreeBSD Operating System'', Addison-Wesley Publishing Company, Reading, Massachusetts, 2005, 720 pages.
Instructor:
Dr. Marshall Kirk McKusick writes books and articles, consults, and teaches classes on UNIX- and BSD-related subjects. For the past ten years he has been a developer and commiter to the FreeBSD Project. His particular areas of interest are the virtual-memory system and the filesystem. While at the University of California at Berkeley, he implemented the 4.2BSD fast file system, and was the Research Computer Scientist at the Berkeley Computer Systems Research Group (CSRG) overseeing the development and release of 4.3BSD and 4.4BSD. He earned his undergraduate degree in Electrical Engineering from Cornell University, and did his graduate work at the University of California at Berkeley, where he received Masters degrees in Computer Science and Business Administration, and a doctoral degree in Computer Science. He is a past president of the Usenix Association, is on the editorial board of ACM's Queue magazine, and is a member of ACM and IEEE.

T1B: Building Clusters With FreeBSD

Abstract:
This tutorial will be composed of two somewhat intertwined parts. The first part will be a updated and extended version of the talk on cluster architecture considerations I gave at BSDCon 2003 based on several more years of experience. The idea is to hit the major design points cluster builders need to address. This part is platform neutral.
The second part will be a detailed overview of the FreeBSD features I've used to build and manage my cluster. In particular diskless booting, useful ports, and some specifics of configuring Sun Grid Engine and Ganglia.
Instructor:
Brooks Davis is a Senior Member of Technical Staff in the High Performance Computing Section if the Computer Systems Research Department at The Aerospace Corporation. He has been a FreeBSD user since 1994, a FreeBSD committer since 2001, and a core team member since 2006. He earned a Bachelors Degree in Computer Science from Harvey Mudd College in 1998. His computing interests include high performance computing, networking, security, mobility, and, of course, finding ways to use FreeBSD in all these areas. When not computing, he enjoys reading, cooking, brewing and pounding on red-hot iron in his garage blacksmith shop.

T2B: FreeBSD Security Features

Abstract:
FreeBSD system administrators are familiar with the UNIX security model: users, groups, and file permissions. However, security for UNIX systems has been one of the most active areas of OS research and development over the last ten years, leading to dozens of new features in FreeBSD between FreeBSD 4.x and FreeBSD 6.x. This tutorial will provide a tour of some of the new FreeBSD security features, describing where they may be useful and how to use them. Topics covered include Access Control Lists (ACLs), Security Event Auditing, and several system hardening techniques based on the TrustedBSD MAC Framework. The presenter offers a unique perspective as the designer or implementor of several of these features.
Instructor:
Robert N M Watson is a researcher at the University of Cambridge Computer Laboratory investinging operating system and network security. Prior to joining the Computer Laboratory to work on a PhD, he was Senior Principal Scientist at McAfee Research, now SPARTA ISSO, a leading security research and development organization, directing government and commercial research contracts for customers that include DARPA, the US Navy, and Apple Computer. His research interests include operating system security, network stack structure and performance, and windowing system structure. He is also a member of the FreeBSD Core Team and president of the FreeBSD Foundation.

T3B: Firewalling with OpenBSD's PF packet filter

Abstract:
This tutorial is for aspiring or seasoned network professionals with at least a basic knowledge of networking in general and TCP/IP particular. Aims at teaching tools and techniques to make sure your network works the way it's supposed to, keeping you in charge. Central to the toolbox is the OpenBSD PF packet filter. Whether you are a greybeard looking for ways to optimize your setups or a greenhorn just starting out, this session will give you valuable pointers to how you build the network you need. The session will also offer some insight in the subtle but important changes to be introduced to PF in the upcoming OpenBSD 4.1 version.
Instructor:
Peter N. M. Hansteen is a consultant, writer and sysadmin based in Bergen, Norway. He has been tinkering with computers since the mid 1980s, mainly while working to document how the systems work and why they don't, in English as well as his native Norwegian. In 1991 he co-founded Datadokumentasjon AS, a documentation and localization company where he is still chairman and senior consultant. Peter rediscovered Unixes about the time 386BSD appeared. After a few years on Linux, which included participation in the RFC1149 implementation (2001), he eventually migrated all important bits to FreeBSD and OpenBSD. A long time freenix advocate, he is a member of the BLUG (Bergen (BSD and) Linux User Group) core group and current vice president of NUUG (the Norwegian Unix User Group). During recent years a frequent lecturer and tutor with emphasis on FreeBSD and OpenBSD topics, he is now working on a book on building the network you need using free tools, mainly BSD ones.

T3C: Development Technique for BSD Embedded Systems" (in Japanese only)

Abstract:
This tutorial will provide various technique for embedded BSD systems. The talk consists of two parts: the first half covers hardware requirements, configuration tips, HDD-less BSD, and basic procedure of porting BSD to a not-yet-supported CPU architecture. The another half convers the instractor's real-life experiences on porting BSD and developing embedded systems such as issues on non-x86 systems and how to make it without documentation. The talk itself will not be BSD flavor specific, but most of the examples are based on NetBSD.
Note that this tutorial will be in Japanese only.
Instructor:
Shozo Takeoka is the president of AXE, Inc. He worked on development of Wnn (Kana-Kanji conversion software) and X Window terminals in 1980s as well as operating system design for X Window terminals and TCP/IP protocol software, and then worked on LSI hardware and software design of 1024PE-class parallel computer. In 1992 he founded AXE, Inc. and developed a embedded-system-friendly microkernel called XTAL. XTAL has been adopted by Zaurus series (PDA by Sharp Corporation), digital cameras by Olympus Corporation, and 6Mbps IP communication system for satellite. He is now working on BSD/Linux embedded system and real-time system along with his company's management. AXE, Inc.'s anchor products are middleware for cellular phones, embedded BSD, embedded Linux, and so on, and it provides them to vendors of network equipment, home electric appliance, and digital camera.

T4B: Advanced PF Rulesets

Abstract:
(to be updated soon)
Instructor:
Ryan McBride (mcbride at openbsd.org)

Small Meeting


M4C: NetBSD Discussion

Abstract:
Talk about NetBSD and related topics.
Chair:
Masao Uebayashi (uebayasi at gmail.com)

M5D: FreeBSD Night

Abstract:
This is a small meeting to talk turkey about FreeBSD among FreeBSD users in Japanese and English. No specific agenda planned but enjoy cozy gathering!
Chair:
IKEGAMI Akiko (gami at hadashi.org)

Papers


P1: A NetBSD-based IPv6 NEMO Mobile Router

Authors:
Jean Lorchat, Koshiro Mitsuya, Romain Kuntz (Keio University, Japan)
Abstract:
This paper defines the problem statement of vehicle-embedded networking in order to communicate with the infrastructure (the Internet) as well as with other cars. Based on this problem statement, we explain the steps that allowed us to build a mobile router addressing this problem by using state of the art software. This software includes the NetBSD-current kernel and networking code developed by the Japan-based WIDE project working groups: the KAME IPv6 stack with SHISA extensions for Mobile IPv6 (MIPv6) and Network Mobility (NEMO) support, and the Zebra-based OLSR daemon with IPv6 extensions allowing for a Mobile Ad Hoc Networks (MANET) and NThis paper defines the problem statement of vehicle-embedded networking in order to communicate with the infrastructure (the Internet) as well as with other cars. Based on this problem statement, we explain the steps that allowed us to build a mobile router addressing this problem by using state of the art software. This software includes the NetBSD-current kernel and networking code developed by the Japan-based WIDE project working groups: the KAME IPv6 stack with SHISA extensions for Mobile IPv6 (MIPv6) and Network Mobility (NEMO) support, and the Zebra-based OLSR daemon with IPv6 extensions allowing for a Mobile Ad Hoc Networks (MANET) and NEMO cooperation, also known as MANEMO.

P2: Reflections on Building a High Performance Computing Cluster Using FreeBSD

Author:
Brooks Davis (The Aerospace Corporation/brooks at FreeBSD.org, USA)
Abstract:
Since late 2000 we have developed and maintained a general purpose technical and scientific computing cluster running the FreeBSD operating system. In that time we have grown from a cluster of 8 dual Intel Pentium III systems to our current mix of 64 dual Intel Xeon and 289 dual AMD Opteron systems. This paper looks back on the system architecture as documented in our BSDCon 2003 paper "Building a High-performance Computing Cluster Using FreeBSD" and our changes since that time. After a brief overview of the current cluster we revisit the architectural decisions in that paper and reflect on their long term success. We then discuss lessons learned in the process. Finally, we conclude with thoughts on future cluster expansion and designs.

P3: Support for Radio Clocks in OpenBSD

Author:
Marc Balmer (mbalmer at openbsd.org, Switzerland)
Abstract:
Every computer is equipped with at least a clock chip or a general purpose device to provide a timer function. While these timers are certainly precise enough for measuring relatively short periods of time, they are not well suited for keeping the correct time and date over a longer period, since almost every chip drifts by a few seconds per day. Even so called real-time clocks only approximately meet the real time.
External time sources can be used to synchronize the local clock with a much more precise time information. Time signals are disseminated over various systems, the best known are the US american GPS (Global Positioning System) and time signal stations. Time signal stations are available in many countries, they transmit time information over long-wave radio signals; while the coding schemes vary from time signal station to time signal station, the decoding principles are similar.
This paper is a detailed description of my work over the last twelve months to add support for both, GPS and time signal stations, to OpenBSD in a novel way and how these new time related drivers interact with the operating system and applications like OpenNTPD that make use of external time sources.
The paper outlines the general problems of setting a computers clock at runtime, then gives an overview about time signal stations, how they work and what codes they use (detailing the German DCF77 and the Swiss HBG station, and also the Japanese time signal stations); it will then outline how GPS systems can deliver time information to a computer and which precision can be expected. It will then discuss how time is handled in OpenBSD (which is different to most other operating systems) and describe the OpenBSDs own NTP implementation OpenNTPD.
The functionality of the new time related drivers in OpenBSD, udcf(4), nmea(4) and mbg(4) and how they interact with the system is explained. Implementation details of the new drivers are given espcially how time signal stations can be decoded with relatively simple receivers using an elegant algorithm.

P4: puffs - Pass to Userspace Framework File System

Author:
Antti Kantee (Helsinki University of Technology, Finland)
Abstract:
Fault tolerant and secure operating systems are a worthwhile goal. A known method for accomplishing fault tolerance and security is isolation. This means running separate operating system services in separate protection domains so that they cannot interfere with each other, and can communicate only via well-defined messaging interfaces. Isolation and message passing brings inherent overhead when compared to services doing communication by accessing each others memory directly. To address this, the ultimate goal would be to be able to run the kernel subsystems in separate domains during development and testing, but have a drop-in availability to make them run in kernel mode for performance critical application scenarios. Still today, most operating systems are written purely with C and some assembly using the monolithic kernel approach, where all operating system code runs within a single protection domain. A single error in any subsystem can bring the whole operating system down. This work presents puffs?- the Pass-to-Userspace Framework File System - shipped with the NetBSD Operating System. It is a framework for implementing file systems outside of the kernel in a separate protection domain in a user process. The implementation is discussed in-depth for a kernel programmer audience. The benefits in implementation simplicity and increased security and fault tolerance are argued to outweigh the measured overhead when compared with a classic in-kernel file system. A concrete result of the work is a completely BSD-licensed sshfs implementation.

P5: An ISP Perspective, jail(8) Virtual Private Servers

Author:
Isaac Levy (NYC*BUG/LESMUUG, USA)
Abstract:
The jail(8) subsystem in FreeBSD is well known to be the most secure and durable option for Virtualized UNIX systems for users, building on the timeless methodology which defines UNIX itself. This presentation aims to share real-world experiences running massively jailed systems, from a ISP perspective.
This material is divided into three major components:
1) Real-world threat models, mutually untrusted users - Social concerns, establishing user expectations
2) Applying trusted technologies to meet user expectations - Examples of timeless methodolgy in computing
3) Scaling: deployment and long-term management practice, practical successes and failures

P6: Nsswitch Development: Nss-modules and libc Separation and Caching

Author:
Michael A Bushkov (Southern Federal University/bushman at FreeBSD.org, Russia)
Abstract:
The work, described in this paper, was made during and after the Google Summer Of Code 2006, which I was lucky to participate in. It is not yet committed to the -CURRENT, but I hope it to be finally reviewed and committed in the nearest future.
Nss-modules and libc separation. The idea of nss-modules and libc separation is quite straight-forward: we should make several dynamic libraries (nss_files, nss_dns, nss_compat, nss_nis) and move appropriate code from libc to them.

P7: OpenBSD as a Development Platform

Author:
Ryan McBride (mcbride at openbsd.org, Japan)
Abstract:
OpenBSD is well known for it's "Secure by Default" policy, but the OpenBSD project's official goals centre more around the concerns of developers. Providing correct code, tools, and documentation is the true goal of the project, and it's security approach is a result of this pursuit of quality. Created for and by developers, OpenBSD provides an ideal environment for developing and testing 3rd party applications, even when OpenBSD is not the end-target platform.
This paper provides an overview of these technologies, including the toolchain modifications that can help identify potential problems during the coding process, and runtime environment modifications that help to identify issues during testing. It will also touch on the some of the other developper-friendly aspects of OpenBSD, including the clean, minimal base environment, uncompromising source code licensing policy, and clear, comprehensive documentation. Finally, it will cover issues around porting software to and from OpenBSD.

P8: How the FreeBSD Project Works

Author:
Robert N M Watson (University of Cambridge/rwatson at FreeBSD.org, United Kingdom)
Abstract:
The FreeBSD Project is one of the oldest and most successful open source operating system projects, seeing wide deployment across the IT industry. From the root name servers, to top tier ISPs, to core router operating systems, to firewalls, to embedded appliances, you can't use a networked computer for ten minutes without using FreeBSD dozens of times. Part of FreeBSD's reputation fo r quality and reliability comes from the nature of its development organization-driven by a hundreds of highly skilled volunteers, from high school students to university professors. And unlike most open source projects, the FreeBSD Project has developers who have been working on the same source base for over twenty years. But how does this organization work? Who pays the bandwidth bills, runs the web servers, writes the documentation, writes the code, and calls the shots? And how can developers in a dozen time zones reach agreement on the time of day, let alone a kernel architecture? This presentation will attempt to provide, in 45 minutes, a brief if entertaining snapshot into what makes FreeBSD run.

P9: OpenBSD Network Randomness Injection: Further Improvements

Author:
Ryan McBride (mcbride at openbsd.org, Japan)
Abstract:
Poorly specified or poorly implemented protocols often contain fields for which the value is essentially arbitrary, but can be guessed by an attacker in order to perform a spoofing attack, or leak information about the system which provided the data. By using random or strong pseudo-random data for these fields, many protocol attacks can be prevented or made impractical, and information leakage can be minimised.
The OpenBSD project has been very aggressive in its use of pseudo-random data in its network code; as a policy pseudo-random data is used in protocol fields wherever possible, in many cases in a way not envisioned by the protocol designers. Randomness used within protocols explicitly for security purposes (such as randomness in IPSec, ssh, kerberos, etc) is not discussed - the interest is in randomness which is not intended by the protocol designers.
Building on previous work, this paper outlines the reasons for this approach, discusses how and where it is implemented in OpenBSD, and provides examples of attacks which this approach has mitigated. Active development of routing daemons in OpenBSD has highlighted some issues with the OSPF and RIP MD5 authentication mechanisms, OpenBSD's approach to dealing with these protocols will be discussed in detail; The paper also addresses issues that aggressive inclusion of rseudo-random data causes in certain corner cases, and discusses the work that is being done to mitigate the problem without sacrificing the security benefits.

P10: SHISA: The Mobile IPv6/NEMO BS Stack Implementation Current Status

Author:
Keiichi Shima (Internet Initiative Japan Inc., Japan), Koshiro Mitsuya, Ryuji Wakikawa (Keio University, Japan), Tsuyoshi Momose (NEC Corporation, Japan), Keisuke Uehara (Keio University, Japan)
Abstract:
Mobile IPv6 and Network Mobility Basic Support (NEMO BS) are the IETF standard mobility protocols for IPv6. We implemented the protocol stack `SHISA' that provides these protocol functions. The protocol stack supports most of the described features in these mobility protocol specifications and has high level interoperability. We are now focusing to adapt the developed code to fit the latest BSD source tree. In this paper we explain the detailed implementation design of the stack and current status of the porting work.

P11: Bluffs: BSD Logging Updated Fast File System

Author:
Stephan Uphoff (Yahoo!, Inc./ups at FreeBSD.org, USA)
Abstract:
This paper introduces Bluffs, a journaling file system that is mostly compatible with the Fast File System (FFS) on disk structure. The FFS has been successfully used for a long time. However increased disk capacities have made the classic crash recovery using a file system checker (fsck) a prohibitively time expensive operation. Soft Updates [4] and background fsck were introduced to combat the problem but added code complexity to FFS. Bluffs goal is to replace FFS by providing the same functionality as FFS with better error recovery and a fresh simple code structure. Allowing bidirectional migration of file systems between FFS and Bluffs format should make transitioning easier, provides file system checker tools to Bluffs and allows booting with the standard bootstrap loaders.

P12: Implementation and Evaluation of the Dual Stack Mobile IPv6

Authors:
Koshiro Mitsuya, Ryuji Wakikawa, Jun Murai (Keio University, Japan)
Abstract:
The IETF Dual Stack Mobile IPv6 (DSMIPv6) specification extends Mobile IPv6 capabilities to support IPv4 care-of address and to carry IPv4 traffic via bi-directional tunnels between mobile nodes and their home agents. Using DSMIPv6, mobile nodes only need the Mobile IPv6 protocol to manage mobility while moving within both the IPv4 and IPv6 Internet. This is the important feature for IPv6 mobility during its deployment phase. This paper describes the DSMIPv6 implementation on BSD operating systems.

P13: Recent Improvements in OpenBSD's IPsec Support

Author:
Mathieu Sauve-Frankel (msf at openbsd.org, Japan)
Abstract:
During the last two years there has been a renewed interest in improving the IPsec tools shipped with OpenBSD. This paper provides an overview of newly implemented features and tools as well as expand on ongoing work and future directions.

P14: SCTP Introduction

Author:
Randall R. Stewart (Cisco Systems)
Abstract:
Stream Control Transmission Protocol (SCTP) is an innovative new transport protocol standardized by the IETF in October, 2000. It has recently been added to FreeBSD Current and is available for MAC OSX and NetBSD as well. This talk will first introduce the attendee to some of the unique features of SCTP, contrasting it with TCP. The second half of the talk will discuss the socket API and how it can be used to interact with SCTP.
Two distinct socket models can be used with SCTP depending upon application needs. We will discuss these models as well as socket API extensions that have been defined to ease access to some of SCTPs extended features.

P15: Security Measures in OpenSSH

Author:
Damien Miller (djm at openbsd.org, Australia)
Abstract:
This paper examines several security measures that have been implemented in OpenSSH. OpenSSH's popularity, and the necessity for the server to wield root privileges, have made it a high-value target for attack. Despite initial and ongoing code audits, OpenSSH has suffered from a number of security vulnerabilities over its 7.5 year life. This has prompted the developers to implement several defensive measures, intended to reduce both the likelihood of exploitable errors and the consequences of exploitation should they occur. This paper examines these defensive measures; each measure is described and assessed for implementation effort, attack surface reduction, effectiveness in preventing or mitigating attacks, applicability to other network software and possible improvements.

P16: Porting the ZFS File System to the FreeBSD Operating System

Author:
Pawel Jakub Dawidek (pjd at FreeBSD.org, Poland)
Abstract:
The ZFS file system makes a revolutionary (as opposed to evolutionary) step forward in file system design. ZFS authors claim that they throw away 20 years of obsolute assumptions and designed an integrated system from scratch.
The ZFS file system was developed by Sun Microsystems, Inc. and was first available in Solaris 10 operating system. Although we cover some of the key features of the ZFS file system, the primary focus of this paper is to cover how ZFS was ported to the FreeBSD operating system.
FreeBSD is an advanced, secure, stable and scalable UNIX-like operating system, which is widely deployed for various internet functions. Some argue that one of the largest challenges facing FreeBSD is the lack of a robust file system. Porting ZFS to FreeBSD attempts to address these short comings.