[4992] in arla-drinkers
AFS & Kerberos Best Practices Workshop 2011: June 13 to 17 - Sessions
daemon@ATHENA.MIT.EDU (Jeffrey Altman)
Fri Jun 10 13:48:15 2011
From arla-drinkers-bounces@stacken.kth.se Fri Jun 10 17:48:15 2011
Return-Path: <arla-drinkers-bounces@stacken.kth.se>
Delivered-To: arla-drinkers-mtg@bloom-picayune.mit.edu
Received: (qmail 26114 invoked from network); 10 Jun 2011 17:48:15 -0000
Received: from mx1.kth.se (130.237.32.140)
by charon.mit.edu with SMTP; 10 Jun 2011 17:48:15 -0000
X-KTH-mail-from: arla-drinkers-bounces@stacken.kth.se
Received: from mailscan-1.sys.kth.se (mailscan-1.sys.kth.se [130.237.32.91])
by mx1.kth.se (Postfix) with ESMTP id 3A5D416C004;
Fri, 10 Jun 2011 19:48:13 +0200 (CEST)
X-Virus-Scanned: by amavisd-new at kth.se
Received: from mx1.kth.se ([130.237.32.140])
by mailscan-1.sys.kth.se (mailscan-1.sys.kth.se [130.237.32.91]) (amavisd-new, port 10024)
with LMTP id SRLRzm5Y+VaW; Fri, 10 Jun 2011 19:48:11 +0200 (CEST)
X-KTH-mail-from: arla-drinkers-bounces@stacken.kth.se
Received: from tapas.stacken.kth.se (tapas.stacken.kth.se [130.237.234.140])
by mx1.kth.se (Postfix) with ESMTP id 91E58FD31E;
Fri, 10 Jun 2011 19:47:51 +0200 (CEST)
Received: from tapas.stacken.kth.se (localhost [127.0.0.1])
by tapas.stacken.kth.se (Postfix) with ESMTP id 6ADAF51D5B;
Fri, 10 Jun 2011 19:47:51 +0200 (CEST)
X-Original-To: arla-drinkers@tapas.stacken.kth.se
Delivered-To: arla-drinkers@tapas.stacken.kth.se
Received: from brev.stacken.kth.se (brev.stacken.kth.se [130.237.234.84])
by tapas.stacken.kth.se (Postfix) with ESMTP id 03E2351D5B
for <arla-drinkers@tapas.stacken.kth.se>;
Fri, 10 Jun 2011 19:47:49 +0200 (CEST)
Received: from mx2.kth.se (mx2.kth.se [130.237.48.98])
by brev.stacken.kth.se (8.12.10/8.12.10) with ESMTP id p5AHlnYJ010171
for <arla-drinkers@stacken.kth.se>;
Fri, 10 Jun 2011 19:47:49 +0200 (MET DST)
X-KTH-mail-from: prvs=1142575687=jaltman@secure-endpoints.com
X-KTH-rcpt-to: arla-drinkers@stacken.kth.se
Received: from mx4.kth.se (mx4.kth.se [130.237.48.62])
by mx2.kth.se (Postfix) with ESMTP id 58902109826
for <arla-drinkers@stacken.kth.se>;
Fri, 10 Jun 2011 19:47:44 +0200 (CEST)
X-Virus-Scanned: by amavisd-new at kth.se
Received: from mx2.kth.se ([130.237.48.98])
by mx4.kth.se (mx4.kth.se [130.237.48.62]) (amavisd-new, port 10024)
with LMTP id wpRTmdVUuYao for <arla-drinkers@stacken.kth.se>;
Fri, 10 Jun 2011 19:47:43 +0200 (CEST)
X-KTH-mail-from: prvs=1142575687=jaltman@secure-endpoints.com
X-KTH-rcpt-to: arla-drinkers@stacken.kth.se
Received: from hrndva-omtalb.mail.rr.com (hrndva-omtalb.mail.rr.com
[71.74.56.122]) by mx2.kth.se (Postfix) with ESMTP id DAF26109824
for <arla-drinkers@stacken.kth.se>;
Fri, 10 Jun 2011 19:47:41 +0200 (CEST)
Received: from hrndva-omtalb.mail.rr.com ([10.128.143.51])
by hrndva-qmta02.mail.rr.com with ESMTP
id <20110610174740573.DAFL5185@hrndva-qmta02.mail.rr.com>
for <arla-drinkers@stacken.kth.se>; Fri, 10 Jun 2011 17:47:40 +0000
X-Authority-Analysis: v=1.1 cv=yMxAJ7W7nAoPh8ZdbvCArpG6pAdHwgpzIvOq8QbMesM=
c=1 sm=0 a=bV7QVttOITEA:10 a=q66PI-r8Ju0A:10 a=68oQvhTum0AA:10
a=wRRLLeHd9boA:10 a=9QncCLqqM7qT4UilGv+vfA==:17
a=4IHrTJkfAAAA:8 a=r459VypDAAAA:8 a=IP1tetXcAAAA:8
a=xoXlwcKdfdwatqPWwzgA:9 a=pgiOUGCeMYQYxTu7-YcA:7
a=QEXdDO2ut3YA:10 a=zPeEjRtY96QA:10 a=gdovh4BSuxwA:10
a=L8pVMQSfZDpgYsa7iVoA:9 a=9QncCLqqM7qT4UilGv+vfA==:117
X-Cloudmark-Score: 0
X-Originating-IP: 208.125.0.227
Received: from [208.125.0.227] ([208.125.0.227:52633]
helo=www.secure-endpoints.com)
by hrndva-oedge01.mail.rr.com (envelope-from
<prvs=1142575687=jaltman@secure-endpoints.com>)
(ecelerity 2.2.3.46 r()) with ESMTP
id 8B/E8-07441-D7852FD4; Fri, 10 Jun 2011 17:46:37 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple;
d=secure-endpoints.com; s=MDaemon; t=1307727993; x=1308332793;
q=dns/txt; h=DomainKey-Signature:Received:Message-ID:Date:From:
Reply-To:Organization:User-Agent:MIME-Version:To:Subject:
References:In-Reply-To:OpenPGP:Content-Type; bh=w7z1BAMhjeTCvmpG
JW1ZWv2m2+393NX0Ds9dWF0uk4c=; b=VepnSCMJyzFRMHg+gaennexRLxILhm9R
WzJyYkowgF/QT5fyaivKy14IMsmLiPW4G+Oj9izOeMyMtgDi5Lekp19UP5UvT/pB
OkfysQb1JH3550EAqakwkNJ7kTogqtIdAIP72Xr/IHg1y/99TQIus3SyaLDux+NC
JYJzGsaizuE=
DomainKey-Signature: a=rsa-sha1; s=MDaemon; d=secure-endpoints.com;
c=simple; q=dns; h=message-id:from;
b=hGuTw9uX8slpYRjvP1zvIgEYyPYK9QoTzYJjA2sHuNVGUl+HR2wbLgwXDNwM
joBmcEAcfsXS/sm6B762Mfnkm2LIYa5BG6DTJR2DuCL+ew62DlmzuXvX7
zuwrPn0O0y+naxNvymr0X2frMTN1I5wpdgM1gP7HzbWIhZaASCpBcI=;
X-MDAV-Processed: www.secure-endpoints.com, Fri, 10 Jun 2011 13:46:33 -0400
Received: from [10.71.4.26] by secure-endpoints.com (Cipher TLSv1:-SHA:128)
(MDaemon PRO v12.0.3) with ESMTP id md50000125561.msg
for <arla-drinkers@stacken.kth.se>; Fri, 10 Jun 2011 13:46:32 -0400
X-Spam-Processed: www.secure-endpoints.com, Fri, 10 Jun 2011 13:46:32 -0400
(not processed: message from trusted or authenticated source)
X-Authenticated-Sender: jaltman@secure-endpoints.com
X-MDRemoteIP: 12.131.214.66
X-Return-Path: prvs=1142575687=jaltman@secure-endpoints.com
X-Envelope-From: jaltman@secure-endpoints.com
X-MDaemon-Deliver-To: arla-drinkers@stacken.kth.se
Message-ID: <4DF25872.1050405@secure-endpoints.com>
Date: Fri, 10 Jun 2011 10:46:26 -0700
From: Jeffrey Altman <jaltman@secure-endpoints.com>
Organization: Secure Endpoints Inc.
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US;
rv:1.9.2.17) Gecko/20110414 Lightning/1.0b3pre Thunderbird/3.1.10
MIME-Version: 1.0
To: arla-drinkers@stacken.kth.se,
"heimdal-discuss@sics.se" <heimdal-discuss@sics.se>,
"arla-announce@stacken.kth.se" <arla-announce@stacken.kth.se>,
"info-afs@grand.central.org" <info-afs@grand.central.org>,
"kerberos@mit.edu" <kerberos@mit.edu>,
OpenAFS-info <openafs-info@openafs.org>,
"openafs-announce@openafs.org" <openafs-announce@openafs.org>,
openafs-devel <OpenAFS-devel@openafs.org>
Subject: AFS & Kerberos Best Practices Workshop 2011: June 13 to 17 - Sessions
will be recorded
References: <AANLkTikpmOkuB79aKJA4ZUT7odyjnnE0sgkzGPF-wQ2=@mail.gmail.com>
In-Reply-To: <AANLkTikpmOkuB79aKJA4ZUT7odyjnnE0sgkzGPF-wQ2=@mail.gmail.com>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://pgp.mit.edu
X-BeenThere: arla-drinkers@stacken.kth.se
X-Mailman-Version: 2.1.6
Precedence: list
List-Id: Arla discussions <arla-drinkers.stacken.kth.se>
List-Unsubscribe: <https://lists.stacken.kth.se/mailman/listinfo/arla-drinkers>,
<mailto:arla-drinkers-request@stacken.kth.se?subject=unsubscribe>
List-Archive: <http://lists.stacken.kth.se/pipermail/arla-drinkers>
List-Post: <mailto:arla-drinkers@stacken.kth.se>
List-Help: <mailto:arla-drinkers-request@stacken.kth.se?subject=help>
List-Subscribe: <https://lists.stacken.kth.se/mailman/listinfo/arla-drinkers>,
<mailto:arla-drinkers-request@stacken.kth.se?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0165767907=="
Sender: arla-drinkers-bounces@stacken.kth.se
Errors-To: arla-drinkers-bounces@stacken.kth.se
This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============0165767907==
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature";
boundary="------------enig32CBB25DE990EB5845D551C5"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig32CBB25DE990EB5845D551C5
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
http://workshop.openafs.org/afsbpw11/
The AFS and Kerberos Best Practices Workshop Committee is happy to
announce that the 2011 AFS and Kerberos Best Practices
Tutorials and Workshop sessions will be recorded and made available to
attendees for 48 hours. This will permit attendees to revisit important
talks and view those that might be missed due to scheduling conflicts.
This year we have two new tutorial instructors with significantly
updated course materials. We welcome Kim Kimball as our new AFS
instructor and Simon Wilkinson as our new Kerberos instructor. Kim's
experience as an AFS trainer dates back to his days with IBM/Transarc
and Simon has been enabling application protocols to authenticate with
Kerberos and GSS-API for nearly a decade. Both have given numerous
informational and entertaining talks at past workshops.
http://workshop.openafs.org/afsbpw11/afstut.html
http://workshop.openafs.org/afsbpw11/kerbtut.html
Each tutorial is priced at US$100.00.
The workshop sessions will include many of our most popular speakers:
Russ Allbery
Jeffrey Altman
Matt Benjamin
Derrick Brashear
Andrew Deason
Asanka Herath
Love Hornquist Astrand
Henry Hotz
Tom Keiser
Mike Meffie
Simon Wilkinson
and will be hosted by Kim Kimball and Marshall Vale. Topics include:
A History of AFS
AFS and Kerberos Project Status Reports
Obtaining AFS Credentials at login on MacOS X
Web Authentication
KX509 extensions
A practical guide to upgrading AFS from rxkad to rxgk security
Performance Benefits of the AFS Extended Callback model
Deploying the Demand Attach File Server (DAFS) - [New in OpenAFS 1.6]
AFS RX Performance
Analyzing AFS Statistics
OpenAFS Futures
and our two most popular panels will return:
Live Troubleshooting
- submit real world problems for live analysis
Stump the Experts
- ask anything related to Kerberos or AFS, get an answer
Finally, the workshop would not be complete without the annual site
reports in which attendees tell each other how Kerberos and AFS have
been successfully deployed within their organizations.
The price for the three days of workshop sessions is US$60.00.
The AFS and Kerberos Best Practices Workshop is appropriate for anyone
that is responsible for deploying or curious about real world
distributed computing environments.
The 2011 AFS and Kerberos Best Practices Workshop is sponsored by Your
File System, Inc. (http://www.your-file-system.com) and Secure
Endpoints, Inc. (http://www.secure-endpoints.com).
Registration will be open until the start of each day's events.
Jeffrey Altman
for the workshop organizers
--------------enig32CBB25DE990EB5845D551C5
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
iQEcBAEBAgAGBQJN8lh0AAoJENxm1CNJffh4uP8H/jNaw/ZEc7P5WG7fF319F98d
5TzxK3UE/KOz9XfMFNhPdSQ69R516DSZL01d0uSH+3PqVLubR6USr3CSu0Sntk+R
FrvzgSukrpE33E4ev841pOOy3B2dG3F0m4xmHxB0kYanANdBudjF/9UORPMAccyn
vqaGecaGB7zXeBNYpBpvEPTBYqZIe63Rhy928MJVux4I4OqL3OdPo86XTucIaTxl
LtastoPK3dF0HUqxacbNV6T45vk1PXMWB/SvBLayVyQM4oVlg4Ai7g5xKotfz0Z5
lNhAjb2PIulYcKgmcLclWhV4faftmBPnivqt/cuh8oAZA5JfPVaWhJ2f2n5VFvM=
=oJHT
-----END PGP SIGNATURE-----
--------------enig32CBB25DE990EB5845D551C5--
--===============0165767907==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
Arla-drinkers mailing list
Arla-drinkers@stacken.kth.se
https://lists.stacken.kth.se/mailman/listinfo/arla-drinkers
--===============0165767907==--