From: Uri Guttman <[EMAIL PROTECTED]>
Date: Sat, 12 Jul 2008 14:53:46 -0400
good question. given how hard/easy it is to get on the local net, i
would expect most to have an AP/router. i have seen them at several yapc
hackathons as there is always a few carried by hackers.
At Chicago, the hackathons used the IIT net, which worked fairly
reliably. (The Parrot hackathon on Saturday moved four times, which
caused problems, but that's a different story). The Houston network
kept overloading, and blocked some key ports (like SSH), so our hosts
had to set up a parallel wireless network during the conference; I
wasn't there for the hackathons afterwards, but I assume it was the same
situation.
Conclusion: Favor YAPC bids hosted at geeky schools over ones hosted
at well-rounded schools. ;-}
why don't you ask the mit office we use for the room. if we need a bunch
of wireless on in one room, would bringing a wifi router be a bad thing?
it isn't evading security but ensuring more of us would be online.
We are well aware that they limit guest access. Routing traffic from an
independent router defeats that limitation. Wanna bet whether that's
permitted by their AUP?
i note that several regular attendees bring laptops. how many of you
connect easily to the mit net?
thanx,
uri
Haven't tried.
But if I were in charge of MIT networking security, I would probably
freeze out any node that was also in communication with an unauthorized
wifi hub, on suspicion of routing. It might be safest to bring a wifi
box but assume that we might need to be self-sufficient, i.e. by having
a shared repository on one of the laptops. (Or also bring a small
switch, and everybody BYO cable, with one laptop designated as MIT
gateway, just in case. But also in violation of their AUP.)
And that, I think, is why hackathons are typically scheduled for a
full day: It sometimes takes a while to ensure that everybody can get
to the network and access the repository. Since most of us are
unfamiliar with the project, and don't already have commit access to a
repository, it will probably take longer. So I wonder how much of those
three hours will be left for hacking.
If we could find another topic for this month, but still bring all
the gear, then all interested parties could set up their laptops for an
Ackathon, testing some of these theories in the process, and then get a
quick start on actual hacking next month . . .
(But, FTR, I still haven't decided whether to go.)
-- Bob Rogers
http://rgrjr.dyndns.org/
_______________________________________________
Boston-pm mailing list
[email protected]
http://mail.pm.org/mailman/listinfo/boston-pm