Difference between pages "Arrivals Departures" and "Internet & Network Access"

From LCA2014 Delegate Wiki
(Difference between pages)
Jump to: navigation, search
 
 
Line 1: Line 1:
'''To better co ordinate when people Arrive and Depart
+
'''
+
*All conference wireless access points will broadcast the SSID 'lca2014', and are secured with a WPA and WPA2 PSK of 'linuxconfau'. As always, it is considered best practice to consider the conference network as a "hostile" network, and secure your laptops and mobile devices appropriately. If you join the lca2014 wireless network and receive a private IP address, or an IP address that is not part of the above range, please let the network team know immediately (see below).
= Arrivals =
+
  
* Flight - Date Time - Name - City/Town
+
* The IPv4 range for delegates is <tt>182.255.120.0/22</tt> and is provided via DHCP on both the wired and wireless network.
  
Please list scheduled ''arrival'' time, and order by time of arrival.
+
* The IPv6 prefix for the delegates is <tt>2001:388:a098:120::/64</tt>, and announced via route advertisements on our edge router for stateless autoconfiguration. '''IPv6 is currently not yet working on wireless links, the network team is working on it.'''
  
== Wednesday 2014-01-01 ==
+
* With thanks to our friends at BigAir Community Wireless, cabled internet is available in most rooms in Trinity and St George's college accommodation as of Friday (3rd January) afternoon.  we've taken over their network within the ressies, and will be using this to extend the conference network into the university accommodation. Limited wireless internet access will be available within the two conference accommodation colleges Trinity and St George using the BigAir AP equipment. As delegates you will need to provide your own data cable to connect to the University accommodation network ports.
  
* 10:15 - VA0679 (from Melbourne)
+
* If you experience any issues  with the conference network, or need to contact the network team, you can email the networks team at 'network@lists.lca2014.linux.org.au' or tweet us at '@LCAnetworks'. If you can give us any extra details, including some local machine log, traffic info, room numbers, along with a contact number, that'd be great!
**Jessica Smith (@itgrrl)
+
** Sharon Harnett (@astrochicky)
+
  
== Sunday 2014-01-05 ==
+
* It's worthwhile implementing the great fix Andrew Pam pointed out last year if you're the victim of a rogue DHCP server, by adding a reject rule to /etc/dhcp/dhclient.conf (or equivalent);
  
* 10:15 - VA679 (from Melbourne)
+
<nowiki># cat /etc/dhcp/dhclient.conf
** Matthew Cengia (@mattcen)
+
  
* 11:25 - VA0555 (from sydney) 
+
##
** Jason Ball (@JasonBall)
+
#see http://lists.lca2013.linux.org.au/pipermail/chat_lists.lca2013.linux.org.au/2013-January/000428.html
** [[Christopher Neugebauer]] ([http://twitter.com/chrisjrn @chrisjrn])
+
##
  
* 13:05 - QF769 (from Melbourne)
+
reject 192.168.0.0/16;
** Sae Ra Germaine (@ms_mary_mac)
+
reject 172.16.0.0/16;
** Kathy Reid (@KathyReid)
+
reject 10.0.0.0/8;
** Mike Fabre ([http://twitter.com/mijofa1 @mijofa1], mijofa on IRC)
+
 
+
* 15:15 - JQ970 (from Melbourne)
+
** David Bell (@dtbell91)
+
 
+
* 15:45 - QF577 (from Sydney)
+
** Jethro Carr (@jethrocarr)
+
 
+
* 16:30 - QF579 (from Sydney)
+
** Ewen McNeill (ex QF162 from Wellington, NZ)
+
 
+
= Departures =
+
 
+
* Flight - Date Time - Name - City/Town
+
 
+
Please list scheduled ''departure'' time, and order by time of departure.
+
 
+
== Saturday 2014-01-11 ==
+
 
+
* 10:15 - VA0556 (to Sydney)
+
** Jessica Smith (@itgrrl)
+
** Sharon Harnett (@astrochicky)
+
** Jason Ball (@JasonBall)
+
 
+
* 12:00 - VA686 (to Melbourne)
+
** Matthew Cengia (@mattcen)
+
 
+
* 15:15 - QF566 (to Sydney)
+
** Jethro Carr (@jethrocarr)
+
 
+
* 16:45 - QF768 (to Melbourne)
+
** Hamish Coleman
+
 
+
* 22:35 - JQ973 (to Melbourne)
+
** David Bell (@dtbell91)
+
 
+
* 23:40 - QF648 (to Melbourne)
+
** Sae Ra Germaine (@ms_mary_mac)
+
** Kathy Reid (@KathyReid)
+
** Mike Fabre ([http://twitter.com/mijofa1 @mijofa1], mijofa on IRC)
+
 
+
== Sunday 2014-01-12 ==
+
 
+
* 10:15 - VA0556 (to Sydney)
+
** [[Christopher Neugebauer]] ([http://twitter.com/chrisjrn @chrisjrn])
+

Latest revision as of 19:43, 6 January 2014

  • All conference wireless access points will broadcast the SSID 'lca2014', and are secured with a WPA and WPA2 PSK of 'linuxconfau'. As always, it is considered best practice to consider the conference network as a "hostile" network, and secure your laptops and mobile devices appropriately. If you join the lca2014 wireless network and receive a private IP address, or an IP address that is not part of the above range, please let the network team know immediately (see below).
  • The IPv4 range for delegates is 182.255.120.0/22 and is provided via DHCP on both the wired and wireless network.
  • The IPv6 prefix for the delegates is 2001:388:a098:120::/64, and announced via route advertisements on our edge router for stateless autoconfiguration. IPv6 is currently not yet working on wireless links, the network team is working on it.
  • With thanks to our friends at BigAir Community Wireless, cabled internet is available in most rooms in Trinity and St George's college accommodation as of Friday (3rd January) afternoon. we've taken over their network within the ressies, and will be using this to extend the conference network into the university accommodation. Limited wireless internet access will be available within the two conference accommodation colleges Trinity and St George using the BigAir AP equipment. As delegates you will need to provide your own data cable to connect to the University accommodation network ports.
  • If you experience any issues with the conference network, or need to contact the network team, you can email the networks team at 'network@lists.lca2014.linux.org.au' or tweet us at '@LCAnetworks'. If you can give us any extra details, including some local machine log, traffic info, room numbers, along with a contact number, that'd be great!
  • It's worthwhile implementing the great fix Andrew Pam pointed out last year if you're the victim of a rogue DHCP server, by adding a reject rule to /etc/dhcp/dhclient.conf (or equivalent);
# cat /etc/dhcp/dhclient.conf

##
#see http://lists.lca2013.linux.org.au/pipermail/chat_lists.lca2013.linux.org.au/2013-January/000428.html
##

reject 192.168.0.0/16;
reject 172.16.0.0/16;
reject 10.0.0.0/8;