SwiNOG - Swiss Network Operators Group

24th May 2018


· Home
· Charter
· Meetings
· Mailing list
· Press
· Resources
· Search
· Supporter
· Contact

· Twitter
· Facebook
· LinkedIn

Twitter Facebook
Linkedin XING

Online mailing list archive  




AGENDA - SwiNOG 24 - 10. May 2012, Bern

  • 8h15
    Registration, Coffee & Gipfeli
  • 9h15
    Welcome and Agenda
    by Pascal Gloor, SwiNOG Organisation
  • 9h20
    High Density - High Efficiency - High Temperature in the Data Center
    by Olivier Honold, e-shelter
    e-shelter - High Efficiency Data Center Containment Solutions
  • 9h45
    Extopus - The Monitoring Aggregator and other new open source tools
    by Tobi Oetiker, Oetiker & Partner
    Extopus is an aggregating frontend to monitoring systems. Its plug-in architecture provides an easy route to integrating output from a wide array of monitoring systems into a single instance of Extopus.
    Integration can range from simple iframe-ing a particular page from another monitoring system to accessing data from another system using rpc calls and displaying the results in a custom presentation plugin inside the Extopus frontend.
    The Extopus backend is written in Perl (using Mojolicious) and the frontend is written in javascript (with Qooxdoo). This architecture provides a high level of implementation flexibility and allowed us to create a highly interactive end user experience.
    Whether you have a small setup with a few hundred or a large one with millions of items, Extopus will provide a user friendly interface to accessing your monitoring data.
  • 10h45
    Morning Break
  • 11h15
    MAP technical deep dive
    by Mark Townsley, Cisco
    MAP stands for Mapping of Address and Port and is a standard for *stateless* NAT to address IPv4 exhaustion, converging initiatives like dIVI, 4RD and other NAT mapping technics.
  • 11h40
    Sunrise Ethernet Products - Technical Challenges
    by Roelof Speekenbrink, Sunrise
  • 12h10
  • 13h30
    Voice applications and open-source tools
    by Stanislav Sinyagin, K-Open
    Use Case 1: Hotline vPBX. Build or buy?
    Use Case 2: Conference Bridge
    Use Case 3: fight the roaming costs
    Use Case 4: Call center callback
  • 13h45
    Prolexic Anti-DDoS Solutions
    by Matt Payne (Vice President, Sales - EMEA Prolexic Technologies)
    Level3 Sponsored Presentation
  • 14h10
    RIPE policy update / RIPE NCC Measurements
    by Vesna Manojlovic, RIPE NCC
  • 14h55
    SwissIX Update
    by Basile Bluntschli, SwissIX
  • 15h10
    Afternoon break
  • 15h40
    100G Ethernet - an early expirience report
    by Arien Vijn, AMS-IX
  • 16h10
    IPv6 Council Purpose and Activities
    by Roger Wipf, IPv6 Council
  • 16h25
    Spoofed IP Traffic and DDoS
    by Dr. Serge Droz, SWITCH
    Today the most powerful denial of service attacks are so called reflector attacks. Bandwidth in the order of several dozens of Bbits/s are easily achieved. To get this working two ingredients are needed:
    A vulnerable protocol and the access to systems which allow sending spoofed IP packet.
    Mitigation could involve fixing one protocol at a time often at the price of reduce functionality, or the global implementation of spoofing filters. The later is easy, but does not seem to happen.
    After an overview of the problem we would like to start a discussion among the participants on why we are failing to implement such filters.
    Do you have an idea how this would best be achieved? Maybe someone without spoofing filter want's to speak to?
  • 16h40
    IPv6 Security
    by Sina Herbert & Christoph Weber
    Part 1: IPv6 and DNS Security Problems
    - DNS Brute Force
    - mDNS within the local network and wireless
    - Reverse Lookup Problem
    - possible attacks
    (- Live Demo)

    Part 2: Problems with IPv6 and Routing Security
    - Example: OSPFv3 and IPSec
    - Important notes to other routing protocols
  • 17h10
    Firewall Rule Modelling and Review
    by Marc Ruef, SCIP
    The talk is discussing the basic problem of insecure firewall rulesets. Missing, insecure and inefficient firewall rules decrease the advantages of firewall systems. We're going to present our methodology of modelling rules and analysis of rule attributes to determine potential and existing weaknesses.
  • 17h40
    Social Event
  © 2002 Bytix AG