- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
212 lines
18 KiB
Plaintext
212 lines
18 KiB
Plaintext
Episode: 2410
|
|
Title: HPR2410: OLF 2017 Report
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr2410/hpr2410.mp3
|
|
Transcribed: 2025-10-19 02:27:38
|
|
|
|
---
|
|
|
|
This is an HBR episode 2,410 entitled OLLF 2017 Report.
|
|
It is hosted by AYUKA and is about 23 minutes long and can remain an explicit flag.
|
|
The summer is off 2017, a free and open source software conference took place on September
|
|
20, October 1, 2017.
|
|
This episode of HBR is brought to you by AnanasThost.com.
|
|
At 15% discount on all shared hosting with the offer code HBR15, that's HBR15.
|
|
Better web hosting that's honest and fair at AnanasThost.com.
|
|
Hello, this is AYUKA, welcoming you to Hacker Public Radio and another exciting episode.
|
|
What I'd like to do this time is tell you a little bit about my experience of Ohio Linux
|
|
Fest 2017, which happened over the first weekend of October or last weekend of September,
|
|
so September 29, 30 October 1.
|
|
I was there for the Friday and Saturday and had a great time, so I want to tell you about
|
|
it.
|
|
I made the trek to Columbus yet again, and I was impressed by the fact that it was really
|
|
a good event.
|
|
I took the afternoon off from work to drive down from Michigan, and that's about a three-hour
|
|
drive, and made sure to get there on time for the opening keynote on Friday evening,
|
|
which was Karen Sandler from the software freedom conservancy, who gave a talk called
|
|
the battle over our technology.
|
|
I thought there was an interesting coincidence because I was at another conference the day
|
|
before, that would be Thursday the 28th, talking to some people about internet of things and
|
|
security and stuff like that, and I made the argument that if the code was not available,
|
|
I was not going to believe they had security, and I got a lot of pushback about if we make
|
|
our code available, other people will steal our work, and this is our proprietary advantage
|
|
Yadda Yada, and I brought up Karen as an example, because she's always been very open about
|
|
sharing her experience of getting a pacemaker installed, and she, in fact, talked about
|
|
that as part of this talk, and when they were installing the pacemaker, she tried to get
|
|
a look at the code, and was, first of all, they kind of stared at her like she was a three-headed
|
|
drag and all of a sudden, and then, no, you're not going to see the code, that's our proprietary
|
|
advantage, we can't do that, and now we've seen several things since then, one I recall
|
|
was that our former Vice President Dick Cheney, who has a pacemaker, and let us just say,
|
|
we live in very polarized times, they thought, okay, we've got to take steps to make sure no
|
|
one can hack his pacemaker, interesting sign of where we are, and then really just within
|
|
the last few weeks in this country, we had a recall that, and I don't know if it was just
|
|
the United States or worldwide, it may well be worldwide, but about half a million people
|
|
had to go to their doctor's offices to get a code update because the proprietary code in
|
|
their pacemaker was very insecure. So in talking about the importance of open source, that's
|
|
something Karen brought up, but she then went on to say, there's two different things here,
|
|
there's efficiency, and I think very often when we talk about open source, we focus on the
|
|
efficiency, right? So yeah, if the code is open, more people can work on it, more eyes on it,
|
|
easier to catch bugs, things like that, but Karen took it a step further and said, no, there's
|
|
also moral and ethical issues involved, and talked about her engineering, she initially got a
|
|
degree in engineering, and was a member of an engineering society that really promoted this idea
|
|
of social responsibility, when you build something, and this engineering society would look at some
|
|
of the great engineering disasters, bridges that collapsed and things like that, and say, yeah, if
|
|
you don't do your job right, this is what can happen. So it was interesting to see that moral
|
|
dimension brought in, and that made it, I think, a really great kickoff to the whole weekend.
|
|
So after her opening keynote, we had a happy hour, sponsored by a company called Fusion Storm,
|
|
and that was in the vendor room, and that's the same as they did last year, and it worked
|
|
up very nicely, so I got to do my first pass through there, talk to a number of people in the
|
|
vendor room. EFF was there, of course, and the Free Software Foundation, and so I'm a member of
|
|
both of those, so we just kind of chatted a little bit. They weren't able to sell me on anything,
|
|
because I've already bought it. But while I was there, I got to spend some time with 5150,
|
|
who was at Ohio Linux Fest Verbal, and John Miller, and they had a nice nacho bar, and so
|
|
a nice evening, and once I was finished with that, I decided to make my way to my room for the night,
|
|
because I knew the next day was going to be busy and tiring. So Saturday, great start,
|
|
strong start, a keynote from Marion Duffy, and her talk was, who cares if the code is free,
|
|
user experience, and open source. Now Marion is a UX expert, user experience, and she's working
|
|
on the Fedora project, and what she was doing was looking into the design issues with open source,
|
|
and then talking about how to get more people involved, which I think is really important.
|
|
If your software is technically good, but it sucks to use it, what have you done, really?
|
|
If you want people to use the software, it has to be, to some degree, user friendly.
|
|
And she was making the point that open source projects, the whole open source ecosystem,
|
|
requires a lot of different skills, and to be successful, we need all of these skills.
|
|
Now there is a mindset among some people, not everyone, but I've seen it that says,
|
|
coders are the only ones that really matter. So if you write code, you get to have a say,
|
|
if you don't write code, you know, you don't count for anything. I think that is a kind of a sickness
|
|
in our ranks. Oddly enough, the people who believe that are all coders, the astonishing coincidence
|
|
that. So it was a good talk, really appreciated it. After that, they had basically four tracks
|
|
in four different rooms, going through the rest of the day. So the first one was
|
|
Siss admin and development. You could have called that two half tracks, maybe. Then one called
|
|
Dev random, and that was the kind of the miscellaneous for anything that didn't fit any other category.
|
|
Then there's one called career track, and that's something OALF has been doing for a number of
|
|
years now, and it still is very popular. And then finally, one on security. If you followed any of
|
|
the things that I've done on Hacker Public Radio, it probably won't surprise you terribly much to
|
|
find that the security track got most of my attention. So I'm going to be talking about what I saw.
|
|
If someone else wants to maybe 51-50 wants to do something, his experience would be very different
|
|
from mine. I don't recall being in one of those rooms with him off the top of my head. He probably
|
|
saw things very differently. Within the security track, I really liked the speakers. I was impressed.
|
|
It really seemed to be a pretty high quality to the average talk that we saw there.
|
|
To kick it off was a fellow named Kent Adams from a company called SIP.us and talking about voice
|
|
over IP security basics. This is a useful thing to take a look at that people often don't think of,
|
|
because, oh, it's just telephone. What does telephone have to do with security? Well, IP, right?
|
|
So basically, your telephone service is coming in via internet protocol. That's what VEO over IP means.
|
|
So you have all of those security issues that come with the fact that you're connected to the internet.
|
|
You're sending and receiving packets. So we got to start thinking about, well, how is your
|
|
firewall configured? Who is it sending packets your way? Is your software patched and up to date?
|
|
So listening to what Kent said, if you came in there with the mindset of network security,
|
|
it would have sounded very much like a network security talk, because essentially that's
|
|
what it was. You have all of the same issues. It was a really good talk. Kent was a very engaging speaker.
|
|
So I really enjoyed that. I would certainly go to another talk by Kent.
|
|
Then after that, there was a fellow named Tom Kopchak. I hope I'm pronouncing all these names
|
|
right from a company called Hurricane Labs. He had a talk called building a malware analysis lab
|
|
with open source software. Now, in the course of that, he talked about open source tools like
|
|
squid, snort, surakata, PF sense, et cetera, and then tying them together with some scripting
|
|
and how you can use that to start analyzing some of the malware. That's an important thing. You
|
|
need to be monitoring what's going on on your network and these tools are very good for that.
|
|
After that, it was the lunch break. So I wandered over to Subway to get a salad and then came back
|
|
and the first talk after lunch was a fellow named Roberto Sanchez. I remembered him from last year
|
|
because I was at his talk last year. He did a wonderful talk about how he prepares his computer
|
|
science students. He's a professor at a local university. Instead of just getting them the right,
|
|
the 1 millionth hello world print script, he was getting them involved in the tools and practices
|
|
of actual software development, like getting GitHub accounts, making pull requests, things like that.
|
|
And what he found in doing that was that he was really giving his students a leg up when it
|
|
came time to hit the market because when they went interviewing for a position, it wasn't just,
|
|
yeah, I have a degree. Here's what my grades look like, but they could go into the interview and
|
|
saying, oh, yeah, I've done GitHub. I've done pull requests. I've done all of these things.
|
|
So, you know, it was a wonderful way to look at it. So I had a high opinion of Roberto going in.
|
|
He did not disappoint. So this year his talk was on the Secure Cloud, Linode with full disk
|
|
encryption. Now, Linode is a provider that offers inexpensive Linux virtual servers. It's not
|
|
the only company out there, but it was one of the vendors at Ohio Linux Fest and they seem to
|
|
offer pretty decent inexpensive service if you want a virtual server. Roberto took us through how
|
|
to do this securely by showing how you could set up your virtual server in an encrypted manner.
|
|
Now, probably 90% of what he talked about would apply anytime you're setting up the server.
|
|
But taking us through the process step by step was valuable and seeing that, yeah, you know, even if
|
|
even if you're on a virtual server that is being controlled by an outside company, you can still
|
|
bring in these kinds of security issues. And I think that's great. After that, I made my one break
|
|
from following the security track to go here, my old friend Drew Levine talked about the new
|
|
features in FreeNAS 11. Drew and I have talked at a variety of conferences over the years,
|
|
including one year having breakfast together at Indiana Linux Fest. So I usually make time to
|
|
find out what she's been up to. FreeNAS 11 is an interesting product and she just kind of walked
|
|
through current state of the product. And of course, anytime you're looking at things involving
|
|
BSD, which is the root of FreeNAS, you're probably going to find Drew involved somewhere. She's one
|
|
of the big BSD gurus. But after that, I did go back to the security track for an excellent talk
|
|
called Top 10 Easy Cybersecurity Wins for Linux Environments. By following a Michael Contino,
|
|
an excellent talk, very knowledgeable speaker. Some of his tips were things I was aware of.
|
|
But he also brought up some things that were new to me and I want to follow up on those some time.
|
|
So it really was a lot of just little quick wins. Easy wins was the whole thing. If you just do
|
|
this thing, I mentioned some of the things I knew of, for instance, lock down your temp
|
|
directory. Don't allow executables. We all know that, but do we always take the time to do it?
|
|
So after that, I got up to stretch my legs and ran into Joel McLaughlin and Alan Metzler of the
|
|
Linux link tech show for a little hallway conversation. And in fact, Joel was about getting ready
|
|
to leave at that point and did another pass through the vendor room. Then got into a hallway
|
|
conversation with Michael Contino, the speaker of the 10 Easy Cybersecurity Wins and a couple of the
|
|
other folks that were in his talk. Then my final security track talk was by Cody Hofstadter from
|
|
a company called Sovereign Cyber Industries, called getting hit by an 18-wheeler, privacy and
|
|
anonymity in the modern age. I can't say that he told me a whole lot. I didn't already know,
|
|
but he was a very engaging speaker. I was glad to be there. And I would, again, it's one of those
|
|
people and this is true pretty much most of the people of the security track. I would go to see them
|
|
again. So if they're at Ohio Linux next year, I would probably go to see them.
|
|
After that, we had the final keynote. And that was Terrace Baylog of the Open NMS Group,
|
|
who gave us the history of how he came to be the CEO of a successful company that sells pretty
|
|
software and the lessons he learned along the way. Now, I first met Terrace when he gave the very
|
|
first keynote at Indiana Linux Fest some years back. And since then, I've seen him at Ohio Linux
|
|
Fest in similar events. He's a great speaker and a great free software advocate. His talk was
|
|
wonderful. A great way to round out the talks for the day. And, you know, he had a lot of useful
|
|
lessons. You know, if you're, if you want to set up a company and that was one of the things is
|
|
that he wanted to establish a company and he wanted it to be in free software. And obviously,
|
|
there are some challenges. Now, it is possible to do that. Red Hat has been very successful doing it.
|
|
And I hope they continue to be because I own a few shares. And Terrace's Open NMS Group
|
|
is doing very well. So, good talk. After that, we had the after party, which was in one of the
|
|
ballrooms. And unexpected finish for me was the fact that I won the raffle for a 3D printer.
|
|
Now, I thought about it. I don't really, I tried to imagine if I had a 3D printer what it would
|
|
do. And I figured I would probably play around with it for a week or two and then it would gather
|
|
dust. And I thought, well, that's really stupid. And I remembered that we had a charity at
|
|
Penguin, a couple of years back called Enable, which uses 3D printers to make hands for children
|
|
who are missing them. And I thought, that's a much better. So, I'm waiting to hear back, but I did
|
|
contact someone involved with that organization to say, hey, you know, I'd like to donate a 3D
|
|
printer to you guys. So, we'll, we'll see how that works. But that's, that's my thinking. And I
|
|
talked to her over with my wife and she agreed that it was probably the best way to go. Overall,
|
|
great conference. I really enjoyed the speakers. There is a problem. And the problem is diversity.
|
|
Outside of the, we had two women doing keynotes. And outside of that, the only woman I could see
|
|
presenting was Drew Levine. I did not see any people of color. And based on my experience
|
|
programming for Penguin Con in the last four years, this is probably because they just waited
|
|
to see what proposals happened to come in. Now, my experience is, if that happens, you will,
|
|
you know, you get a lot of white guys. For a variety of reasons, you need to pursue people. And I
|
|
think there's, there's this, you may have heard of something called imposter syndrome. And I think
|
|
that has something to do with it. That, you know, a lot of people who could give awesome talks
|
|
don't have the self-confidence about, you know, oh, what I'm doing isn't that significant or
|
|
important. But for whatever reason, I found I had it, you know, actively pursue. So for instance,
|
|
last this past spring, I had a great presentation to a packed room by a woman named Connie C,
|
|
who created scientific Linux. Now, what people might not have known is that I was looking for her
|
|
over a two-year period before I found her. I mean, I knew her name. I knew what she had done.
|
|
And I'm doing Google searches and, you know, sending emails. And nothing happened because she
|
|
had retired. And the old addresses were not valid anymore. And so I mean, eventually I did track
|
|
her down, but it took some effort. I was really glad I did, because it was a great presentation.
|
|
You know, another example, someone that I, you know, when I was at Penguin Con, I would contact
|
|
every year was Ruth C. Lee from Red Hat. Now, Ruth was a keynote at Ohio Linux Fest a few years ago.
|
|
But, you know, I would just, as a matter of course, would, would contact her every year to say,
|
|
hey, you know, I want you to do a presentation for me. You know, I almost didn't care what it was,
|
|
because I know Ruth well enough to know that any presentation she does, it's going to be awesome.
|
|
So, you know, I didn't worry about that. And there were other people, okay.
|
|
You know, I went to companies. You know, there were companies that were interested in being
|
|
represented. And I could go to them and say, okay, you know, what do you got? You know,
|
|
and I would, you know, say, give me a list of speakers. And I could go through and, you know,
|
|
try and pick some people that I thought would help round out the speaker pool.
|
|
So, that's just, that's my observation. And, you know, maybe on entirely off base, but this is how I
|
|
approach it. I did talk to the person that Ohio Linux Fest will be booking speakers for the coming
|
|
year and said, hey, you know, I'm happy to share my contacts with you. And, you know, gave him the
|
|
advice that, yeah, you know, you need to be active. I mean, at Penguin Con, if I just waited to see
|
|
who happened to submit proposals, I would have had exactly that same outcome. I know that.
|
|
I would have had a whole lot of white guys. And I just, I didn't want that. I wanted something
|
|
that, you know, I wanted the speakers to more or less represent the community. And that's
|
|
important. Ohio Linux Fest is community, Penguin Con is community. So, you want to have that
|
|
representation. So, that's my report on this year's Ohio Linux Fest. This is Huka signing off
|
|
and reminding you as always to support free software. Bye-bye.
|
|
You've been listening to Hacker Public Radio at Hacker Public Radio. We are a community podcast
|
|
network that releases shows every weekday Monday through Friday. Today's show, like all our shows,
|
|
was contributed by an HPR listener like yourself. If you ever thought of recording a podcast,
|
|
then click on our contribute link to find out how easy it really is. Hacker Public Radio was
|
|
founded by the digital dog pound and the infonomicum computer club. And it's part of the binary
|
|
revolution at binrev.com. If you have comments on today's show, please email the host directly,
|
|
leave a comment on the website or record a follow-up episode yourself. Unless otherwise status,
|
|
today's show is released under creative comments, attribution, share a light 3.0 license.
|