[52242] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

To late to add a Sunday Tutorial, base on MERIT data. Re: Wireless insecurity at NANOG meetings

daemon@ATHENA.MIT.EDU (John M. Brown)
Sun Sep 22 17:54:45 2002

Date: Sun, 22 Sep 2002 14:54:10 -0700
From: "John M. Brown" <john@chagresventures.com>
To: nanog@merit.edu
In-Reply-To: <Pine.GSO.4.40.0209221641250.23761-100000@clifden.donelan.com>; from sean@donelan.com on Sun, Sep 22, 2002 at 05:06:27PM -0400
Errors-To: owner-nanog-outgoing@merit.edu


Based on information at MERIT's website, its tolate to submit
a resentation.  In addition such presentations must be finalized
and the slides approved by Merit  no later than 30-Sep.

Its important to note that the second requirement isn't publicly
stated.  I did receive email from Dr. Harris, that my two approved
presentations

Flotsam and Jetsam of the Net, a study at junk on the net. 

and

IANA Running a IRR for IANA-Reserved space
  (a presentation supported by the IANA)

have now been canceled because of this unknown 30-Sep requirement.

I've appealed to Dr. Harris's management  on the issue.  They
should have published the schedules better.  I should know more
soon.


Merit handles NANOG meetings, like it handles network security.




On Sun, Sep 22, 2002 at 05:06:27PM -0400, Sean Donelan wrote:
> 
> On Sun, 22 Sep 2002, Randy Bush wrote:
> >     - the users need to be told how to operate more safely, use
> >       end-to-end authentication and privacy, etc.  it's a matter of
> >       education.  and the education will stand them in good stead
> >       when they use 802.11 at starbucks, airports, etc.  we do this
> >       at ietf, but it is not allowed at nanog.
> 
> Sunday afternoon is full of tutorials on lots of different subjects.
> Has anyone volunteed to conduct a Sunday tutorial on wireless security
> for users of "public" wireless networks?
> 
> Although I think it is a mistake to think a wireless network security
> is different than using any other network you don't control.  Most
> wireless security tutorials tend to concentrate on "securing" the
> wireless network instead of how to communicate over an untrusted
> network.
> 
> 

home help back first fref pref prev next nref lref last post