When We Virtualize the Whole Internet

Speaker: Sam Hartman

Track: Systems administration, automation and orchestration

Type: Long talk (45 minutes)

Room: Talks

Time: Aug 28 (Fri): 20:00

Duration: 0:45

Cyber Defense training depends on setting up a training environment isolated from the rest of the network. We need to avoid training attacks and exercises actually impacting real systems. In some cases it is also important to make sure that real attackers do not learn techniques and procedures used to defend cyber assets. To facilitate this we’ve been virtualizing and simulating ever more resources from the Internet to build more realistic training exercises. In this environment, Debian fits into an ecosystem alongside containers (such as Docker images), language specific repositories, distributions, and third-party repositories. When we add proprietary software, Open Virtual Appliances and other channels join the mix. We use all of these; in the process we’ve learned about the strengths and weaknesses of various software distribution channels and how they relate to Debian. We will present our thoughts about how Debian fits into this larger community. By understanding these trade offs, we can better explain to our users how Debian fits into this diverse ecosystem and continue to develop Debian to provide solutions where it is the best alternative.