Files
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

212 lines
18 KiB
Plaintext

Episode: 2410
Title: HPR2410: OLF 2017 Report
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr2410/hpr2410.mp3
Transcribed: 2025-10-19 02:27:38
---
This is an HBR episode 2,410 entitled OLLF 2017 Report.
It is hosted by AYUKA and is about 23 minutes long and can remain an explicit flag.
The summer is off 2017, a free and open source software conference took place on September
20, October 1, 2017.
This episode of HBR is brought to you by AnanasThost.com.
At 15% discount on all shared hosting with the offer code HBR15, that's HBR15.
Better web hosting that's honest and fair at AnanasThost.com.
Hello, this is AYUKA, welcoming you to Hacker Public Radio and another exciting episode.
What I'd like to do this time is tell you a little bit about my experience of Ohio Linux
Fest 2017, which happened over the first weekend of October or last weekend of September,
so September 29, 30 October 1.
I was there for the Friday and Saturday and had a great time, so I want to tell you about
it.
I made the trek to Columbus yet again, and I was impressed by the fact that it was really
a good event.
I took the afternoon off from work to drive down from Michigan, and that's about a three-hour
drive, and made sure to get there on time for the opening keynote on Friday evening,
which was Karen Sandler from the software freedom conservancy, who gave a talk called
the battle over our technology.
I thought there was an interesting coincidence because I was at another conference the day
before, that would be Thursday the 28th, talking to some people about internet of things and
security and stuff like that, and I made the argument that if the code was not available,
I was not going to believe they had security, and I got a lot of pushback about if we make
our code available, other people will steal our work, and this is our proprietary advantage
Yadda Yada, and I brought up Karen as an example, because she's always been very open about
sharing her experience of getting a pacemaker installed, and she, in fact, talked about
that as part of this talk, and when they were installing the pacemaker, she tried to get
a look at the code, and was, first of all, they kind of stared at her like she was a three-headed
drag and all of a sudden, and then, no, you're not going to see the code, that's our proprietary
advantage, we can't do that, and now we've seen several things since then, one I recall
was that our former Vice President Dick Cheney, who has a pacemaker, and let us just say,
we live in very polarized times, they thought, okay, we've got to take steps to make sure no
one can hack his pacemaker, interesting sign of where we are, and then really just within
the last few weeks in this country, we had a recall that, and I don't know if it was just
the United States or worldwide, it may well be worldwide, but about half a million people
had to go to their doctor's offices to get a code update because the proprietary code in
their pacemaker was very insecure. So in talking about the importance of open source, that's
something Karen brought up, but she then went on to say, there's two different things here,
there's efficiency, and I think very often when we talk about open source, we focus on the
efficiency, right? So yeah, if the code is open, more people can work on it, more eyes on it,
easier to catch bugs, things like that, but Karen took it a step further and said, no, there's
also moral and ethical issues involved, and talked about her engineering, she initially got a
degree in engineering, and was a member of an engineering society that really promoted this idea
of social responsibility, when you build something, and this engineering society would look at some
of the great engineering disasters, bridges that collapsed and things like that, and say, yeah, if
you don't do your job right, this is what can happen. So it was interesting to see that moral
dimension brought in, and that made it, I think, a really great kickoff to the whole weekend.
So after her opening keynote, we had a happy hour, sponsored by a company called Fusion Storm,
and that was in the vendor room, and that's the same as they did last year, and it worked
up very nicely, so I got to do my first pass through there, talk to a number of people in the
vendor room. EFF was there, of course, and the Free Software Foundation, and so I'm a member of
both of those, so we just kind of chatted a little bit. They weren't able to sell me on anything,
because I've already bought it. But while I was there, I got to spend some time with 5150,
who was at Ohio Linux Fest Verbal, and John Miller, and they had a nice nacho bar, and so
a nice evening, and once I was finished with that, I decided to make my way to my room for the night,
because I knew the next day was going to be busy and tiring. So Saturday, great start,
strong start, a keynote from Marion Duffy, and her talk was, who cares if the code is free,
user experience, and open source. Now Marion is a UX expert, user experience, and she's working
on the Fedora project, and what she was doing was looking into the design issues with open source,
and then talking about how to get more people involved, which I think is really important.
If your software is technically good, but it sucks to use it, what have you done, really?
If you want people to use the software, it has to be, to some degree, user friendly.
And she was making the point that open source projects, the whole open source ecosystem,
requires a lot of different skills, and to be successful, we need all of these skills.
Now there is a mindset among some people, not everyone, but I've seen it that says,
coders are the only ones that really matter. So if you write code, you get to have a say,
if you don't write code, you know, you don't count for anything. I think that is a kind of a sickness
in our ranks. Oddly enough, the people who believe that are all coders, the astonishing coincidence
that. So it was a good talk, really appreciated it. After that, they had basically four tracks
in four different rooms, going through the rest of the day. So the first one was
Siss admin and development. You could have called that two half tracks, maybe. Then one called
Dev random, and that was the kind of the miscellaneous for anything that didn't fit any other category.
Then there's one called career track, and that's something OALF has been doing for a number of
years now, and it still is very popular. And then finally, one on security. If you followed any of
the things that I've done on Hacker Public Radio, it probably won't surprise you terribly much to
find that the security track got most of my attention. So I'm going to be talking about what I saw.
If someone else wants to maybe 51-50 wants to do something, his experience would be very different
from mine. I don't recall being in one of those rooms with him off the top of my head. He probably
saw things very differently. Within the security track, I really liked the speakers. I was impressed.
It really seemed to be a pretty high quality to the average talk that we saw there.
To kick it off was a fellow named Kent Adams from a company called SIP.us and talking about voice
over IP security basics. This is a useful thing to take a look at that people often don't think of,
because, oh, it's just telephone. What does telephone have to do with security? Well, IP, right?
So basically, your telephone service is coming in via internet protocol. That's what VEO over IP means.
So you have all of those security issues that come with the fact that you're connected to the internet.
You're sending and receiving packets. So we got to start thinking about, well, how is your
firewall configured? Who is it sending packets your way? Is your software patched and up to date?
So listening to what Kent said, if you came in there with the mindset of network security,
it would have sounded very much like a network security talk, because essentially that's
what it was. You have all of the same issues. It was a really good talk. Kent was a very engaging speaker.
So I really enjoyed that. I would certainly go to another talk by Kent.
Then after that, there was a fellow named Tom Kopchak. I hope I'm pronouncing all these names
right from a company called Hurricane Labs. He had a talk called building a malware analysis lab
with open source software. Now, in the course of that, he talked about open source tools like
squid, snort, surakata, PF sense, et cetera, and then tying them together with some scripting
and how you can use that to start analyzing some of the malware. That's an important thing. You
need to be monitoring what's going on on your network and these tools are very good for that.
After that, it was the lunch break. So I wandered over to Subway to get a salad and then came back
and the first talk after lunch was a fellow named Roberto Sanchez. I remembered him from last year
because I was at his talk last year. He did a wonderful talk about how he prepares his computer
science students. He's a professor at a local university. Instead of just getting them the right,
the 1 millionth hello world print script, he was getting them involved in the tools and practices
of actual software development, like getting GitHub accounts, making pull requests, things like that.
And what he found in doing that was that he was really giving his students a leg up when it
came time to hit the market because when they went interviewing for a position, it wasn't just,
yeah, I have a degree. Here's what my grades look like, but they could go into the interview and
saying, oh, yeah, I've done GitHub. I've done pull requests. I've done all of these things.
So, you know, it was a wonderful way to look at it. So I had a high opinion of Roberto going in.
He did not disappoint. So this year his talk was on the Secure Cloud, Linode with full disk
encryption. Now, Linode is a provider that offers inexpensive Linux virtual servers. It's not
the only company out there, but it was one of the vendors at Ohio Linux Fest and they seem to
offer pretty decent inexpensive service if you want a virtual server. Roberto took us through how
to do this securely by showing how you could set up your virtual server in an encrypted manner.
Now, probably 90% of what he talked about would apply anytime you're setting up the server.
But taking us through the process step by step was valuable and seeing that, yeah, you know, even if
even if you're on a virtual server that is being controlled by an outside company, you can still
bring in these kinds of security issues. And I think that's great. After that, I made my one break
from following the security track to go here, my old friend Drew Levine talked about the new
features in FreeNAS 11. Drew and I have talked at a variety of conferences over the years,
including one year having breakfast together at Indiana Linux Fest. So I usually make time to
find out what she's been up to. FreeNAS 11 is an interesting product and she just kind of walked
through current state of the product. And of course, anytime you're looking at things involving
BSD, which is the root of FreeNAS, you're probably going to find Drew involved somewhere. She's one
of the big BSD gurus. But after that, I did go back to the security track for an excellent talk
called Top 10 Easy Cybersecurity Wins for Linux Environments. By following a Michael Contino,
an excellent talk, very knowledgeable speaker. Some of his tips were things I was aware of.
But he also brought up some things that were new to me and I want to follow up on those some time.
So it really was a lot of just little quick wins. Easy wins was the whole thing. If you just do
this thing, I mentioned some of the things I knew of, for instance, lock down your temp
directory. Don't allow executables. We all know that, but do we always take the time to do it?
So after that, I got up to stretch my legs and ran into Joel McLaughlin and Alan Metzler of the
Linux link tech show for a little hallway conversation. And in fact, Joel was about getting ready
to leave at that point and did another pass through the vendor room. Then got into a hallway
conversation with Michael Contino, the speaker of the 10 Easy Cybersecurity Wins and a couple of the
other folks that were in his talk. Then my final security track talk was by Cody Hofstadter from
a company called Sovereign Cyber Industries, called getting hit by an 18-wheeler, privacy and
anonymity in the modern age. I can't say that he told me a whole lot. I didn't already know,
but he was a very engaging speaker. I was glad to be there. And I would, again, it's one of those
people and this is true pretty much most of the people of the security track. I would go to see them
again. So if they're at Ohio Linux next year, I would probably go to see them.
After that, we had the final keynote. And that was Terrace Baylog of the Open NMS Group,
who gave us the history of how he came to be the CEO of a successful company that sells pretty
software and the lessons he learned along the way. Now, I first met Terrace when he gave the very
first keynote at Indiana Linux Fest some years back. And since then, I've seen him at Ohio Linux
Fest in similar events. He's a great speaker and a great free software advocate. His talk was
wonderful. A great way to round out the talks for the day. And, you know, he had a lot of useful
lessons. You know, if you're, if you want to set up a company and that was one of the things is
that he wanted to establish a company and he wanted it to be in free software. And obviously,
there are some challenges. Now, it is possible to do that. Red Hat has been very successful doing it.
And I hope they continue to be because I own a few shares. And Terrace's Open NMS Group
is doing very well. So, good talk. After that, we had the after party, which was in one of the
ballrooms. And unexpected finish for me was the fact that I won the raffle for a 3D printer.
Now, I thought about it. I don't really, I tried to imagine if I had a 3D printer what it would
do. And I figured I would probably play around with it for a week or two and then it would gather
dust. And I thought, well, that's really stupid. And I remembered that we had a charity at
Penguin, a couple of years back called Enable, which uses 3D printers to make hands for children
who are missing them. And I thought, that's a much better. So, I'm waiting to hear back, but I did
contact someone involved with that organization to say, hey, you know, I'd like to donate a 3D
printer to you guys. So, we'll, we'll see how that works. But that's, that's my thinking. And I
talked to her over with my wife and she agreed that it was probably the best way to go. Overall,
great conference. I really enjoyed the speakers. There is a problem. And the problem is diversity.
Outside of the, we had two women doing keynotes. And outside of that, the only woman I could see
presenting was Drew Levine. I did not see any people of color. And based on my experience
programming for Penguin Con in the last four years, this is probably because they just waited
to see what proposals happened to come in. Now, my experience is, if that happens, you will,
you know, you get a lot of white guys. For a variety of reasons, you need to pursue people. And I
think there's, there's this, you may have heard of something called imposter syndrome. And I think
that has something to do with it. That, you know, a lot of people who could give awesome talks
don't have the self-confidence about, you know, oh, what I'm doing isn't that significant or
important. But for whatever reason, I found I had it, you know, actively pursue. So for instance,
last this past spring, I had a great presentation to a packed room by a woman named Connie C,
who created scientific Linux. Now, what people might not have known is that I was looking for her
over a two-year period before I found her. I mean, I knew her name. I knew what she had done.
And I'm doing Google searches and, you know, sending emails. And nothing happened because she
had retired. And the old addresses were not valid anymore. And so I mean, eventually I did track
her down, but it took some effort. I was really glad I did, because it was a great presentation.
You know, another example, someone that I, you know, when I was at Penguin Con, I would contact
every year was Ruth C. Lee from Red Hat. Now, Ruth was a keynote at Ohio Linux Fest a few years ago.
But, you know, I would just, as a matter of course, would, would contact her every year to say,
hey, you know, I want you to do a presentation for me. You know, I almost didn't care what it was,
because I know Ruth well enough to know that any presentation she does, it's going to be awesome.
So, you know, I didn't worry about that. And there were other people, okay.
You know, I went to companies. You know, there were companies that were interested in being
represented. And I could go to them and say, okay, you know, what do you got? You know,
and I would, you know, say, give me a list of speakers. And I could go through and, you know,
try and pick some people that I thought would help round out the speaker pool.
So, that's just, that's my observation. And, you know, maybe on entirely off base, but this is how I
approach it. I did talk to the person that Ohio Linux Fest will be booking speakers for the coming
year and said, hey, you know, I'm happy to share my contacts with you. And, you know, gave him the
advice that, yeah, you know, you need to be active. I mean, at Penguin Con, if I just waited to see
who happened to submit proposals, I would have had exactly that same outcome. I know that.
I would have had a whole lot of white guys. And I just, I didn't want that. I wanted something
that, you know, I wanted the speakers to more or less represent the community. And that's
important. Ohio Linux Fest is community, Penguin Con is community. So, you want to have that
representation. So, that's my report on this year's Ohio Linux Fest. This is Huka signing off
and reminding you as always to support free software. Bye-bye.
You've been listening to Hacker Public Radio at Hacker Public Radio. We are a community podcast
network that releases shows every weekday Monday through Friday. Today's show, like all our shows,
was contributed by an HPR listener like yourself. If you ever thought of recording a podcast,
then click on our contribute link to find out how easy it really is. Hacker Public Radio was
founded by the digital dog pound and the infonomicum computer club. And it's part of the binary
revolution at binrev.com. If you have comments on today's show, please email the host directly,
leave a comment on the website or record a follow-up episode yourself. Unless otherwise status,
today's show is released under creative comments, attribution, share a light 3.0 license.