1806 lines
82 KiB
Plaintext
1806 lines
82 KiB
Plaintext
![]() |
Volume 6, Number 51 18 December 1989
|
|||
|
+---------------------------------------------------------------+
|
|||
|
| _ |
|
|||
|
| / \ |
|
|||
|
| /|oo \ |
|
|||
|
| - FidoNews - (_| /_) |
|
|||
|
| _`@/_ \ _ |
|
|||
|
| International | | \ \\ |
|
|||
|
| FidoNet Association | (*) | \ )) |
|
|||
|
| Newsletter ______ |__U__| / \// |
|
|||
|
| / FIDO \ _//|| _\ / |
|
|||
|
| (________) (_/(_|(____/ |
|
|||
|
| (jm) |
|
|||
|
+---------------------------------------------------------------+
|
|||
|
Editor in Chief: Vince Perriello
|
|||
|
Editors Emeritii: Dale Lovell
|
|||
|
Thom Henderson
|
|||
|
Chief Procrastinator Emeritus: Tom Jennings
|
|||
|
|
|||
|
FidoNews is published weekly by the International FidoNet
|
|||
|
Association as its official newsletter. You are encouraged to
|
|||
|
submit articles for publication in FidoNews. Article submission
|
|||
|
standards are contained in the file ARTSPEC.DOC, available from
|
|||
|
node 1:1/1. 1:1/1 is a Continuous Mail system, available for
|
|||
|
network mail 24 hours a day.
|
|||
|
|
|||
|
Copyright 1989 by the International FidoNet Association. All
|
|||
|
rights reserved. Duplication and/or distribution permitted for
|
|||
|
noncommercial purposes only. For use in other circumstances,
|
|||
|
please contact IFNA at (314) 576-4067. IFNA may also be contacted
|
|||
|
at PO Box 41143, St. Louis, MO 63141.
|
|||
|
|
|||
|
Fido and FidoNet are registered trademarks of Tom Jennings of
|
|||
|
Fido Software, 164 Shipley Avenue, San Francisco, CA 94107 and
|
|||
|
are used with permission.
|
|||
|
|
|||
|
We don't necessarily agree with the contents of every article
|
|||
|
published here. Most of these materials are unsolicited. No
|
|||
|
article submitted by a FidoNet SysOp will be rejected if it is
|
|||
|
properly attributed and legally acceptable. We will publish
|
|||
|
every responsible submission received.
|
|||
|
|
|||
|
|
|||
|
Table of Contents
|
|||
|
1. ARTICLES ................................................. 1
|
|||
|
A Christmas Poem ......................................... 1
|
|||
|
Anudder Christmas Poem ................................... 3
|
|||
|
D'Bridge 1.30 Single-line / Press release ................ 4
|
|||
|
Internetwork Gateway Policy .............................. 6
|
|||
|
TosScan, The Ultimate FrontDoor Echomail Processor ....... 23
|
|||
|
Algorithm, The Personal Programming Newsletter ........... 27
|
|||
|
2. COLUMNS .................................................. 28
|
|||
|
From The Node At The End Of The Universe ................. 28
|
|||
|
3. LATEST VERSIONS .......................................... 31
|
|||
|
Latest Software Versions ................................. 31
|
|||
|
And more!
|
|||
|
FidoNews 6-51 Page 1 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
ARTICLES
|
|||
|
=================================================================
|
|||
|
|
|||
|
A Christmas Poem
|
|||
|
----------------
|
|||
|
|
|||
|
Twas the night before Christmas, and all through the shop,
|
|||
|
The computers were whirring; they never do stop.
|
|||
|
The power was on and the temperature right,
|
|||
|
In hopes that the input would feed back that night.
|
|||
|
|
|||
|
The system was ready, the program was coded,
|
|||
|
And memory drums had been carefully loaded;
|
|||
|
While adding a Christmasy glow to the scene,
|
|||
|
The lights on the console flashed red, white, and green.
|
|||
|
|
|||
|
When out in the hall there arose such a clatter,
|
|||
|
The programmer ran out to see what was the matter.
|
|||
|
Away to the hallway he flew like a flash,
|
|||
|
Forgetting his key in his curious dash.
|
|||
|
|
|||
|
He stood in the hallway and looked all about,
|
|||
|
When the door slammed behind him,and he was locked out.
|
|||
|
Then, in the computer room, what should appear,
|
|||
|
But a miniature sleigh and eight tiny reindeer;
|
|||
|
And a little old man, who with scarcely a pause, Chuckled:
|
|||
|
"My name is Santa... the last name is Claus."
|
|||
|
|
|||
|
The computer was startled, confused by the name,
|
|||
|
Then it buzzed as it heard the old fellow exclaim:
|
|||
|
"This is Dasher and Dancer and Prancer and Vixen,
|
|||
|
And Comet and Cupid and Donner and Blitzen."
|
|||
|
|
|||
|
With all these odd names, it was puzzled anew;
|
|||
|
It hummed and it clanked, and a main ciruit blew.
|
|||
|
It searched in its memory core, trying to "think";
|
|||
|
Then the multi-line printer went out on the blink.
|
|||
|
|
|||
|
Unable to do its electronic job,
|
|||
|
It said in a voice that was almost a sob:
|
|||
|
"Your eyes--how they twinkle--your dimples so merry,
|
|||
|
Your cheeks so like roses, your nose like a cherry,
|
|||
|
Your smile--all these things, I've been programmed to know,
|
|||
|
And at data-recall, I am more than so-so;
|
|||
|
But your name and your address (computers can't lie),
|
|||
|
Are things that I just cannot identify.
|
|||
|
|
|||
|
You've a jolly old face and a little round belly,
|
|||
|
That shakes when you laugh like a bowlful of jelly;
|
|||
|
My scanners can see you, but still I insist,
|
|||
|
Since you're not in my program, you cannot exist!'
|
|||
|
FidoNews 6-51 Page 2 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
Old Santa just chuckled a merry "ho,ho,"
|
|||
|
And sat down to type out a quick word or so.
|
|||
|
The keyboard clack-clattered, its sound sharp and clean,
|
|||
|
As Santa fed this "data" into the machine:
|
|||
|
"Kids everywhere know me; I come every year;
|
|||
|
The presents I bring add to everyone's cheer;
|
|||
|
But you won't get a thing-- that's plain to see;
|
|||
|
Too bad your programmers forgot about me."
|
|||
|
|
|||
|
Then he faced the machine and said with a shrug,
|
|||
|
"Happy Christmas to all," as he pulled out its plug.
|
|||
|
|
|||
|
Submitted by Phil Buonomo 1:107/583@FidoNet, 520/583@AlterNet
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 6-51 Page 3 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
THE NIGHT BEFORE BETA TEST
|
|||
|
|
|||
|
'Twas the night before beta test, and all through the house,
|
|||
|
not a program was working not even a browse.
|
|||
|
The programmers hung by their tubes in despair,
|
|||
|
with hopes that a miracle soon would be there.
|
|||
|
The users were nestled all snug in their beds,
|
|||
|
while visions of inquiries danced in their heads.
|
|||
|
When out in the machine room there arose such a clatter,
|
|||
|
I sprang from my desk to see what was the matter.
|
|||
|
And, what to my wondering eyes should appear,
|
|||
|
but a super-programmer (with a six-pack of beer.)
|
|||
|
His resume glowed with experience so rare,
|
|||
|
he turned out great code with a bit-pusher flair.
|
|||
|
More rapid than eagles, his programs they came,
|
|||
|
and he cursed and muttered and called them by name:
|
|||
|
On update On add On inquiry On delete
|
|||
|
On batch jobs On closing On functions complete.
|
|||
|
His eyes were glazed over, fingers nimble and lean,
|
|||
|
from weekends and nights in front of a screen.
|
|||
|
A wink of his eye, and a twitch of his head,
|
|||
|
soon gave me to know I had nothing to dread.
|
|||
|
He spoke not a word, but went straight to his work,
|
|||
|
turning specs into code, and then turned with a jerk.
|
|||
|
And laying his finger upon the "ENTER" key,
|
|||
|
he brought it all up and it worked perfectly.
|
|||
|
The updates updated; the deletes, they deleted;
|
|||
|
the inquiries inquired; and the closings completed.
|
|||
|
He tested each whistle, he tested each bell,
|
|||
|
with nary an a bug, all had gone well.
|
|||
|
The system was finished, the tests were concluded,
|
|||
|
the users' last changes were even included.
|
|||
|
Yet the users exclaimed with a snarl and a taunt,
|
|||
|
"It's just what we asked for but NOT what we want."
|
|||
|
|
|||
|
-- arthur bozlee
|
|||
|
|
|||
|
Submitted by Phil Buonomo 1:107/583@FidoNet, 520/583@AlterNet
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 6-51 Page 4 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
D'Bridge Software, 1:18/68
|
|||
|
|
|||
|
|
|||
|
15 December 1989
|
|||
|
|
|||
|
Fidonet EMAIL users:
|
|||
|
|
|||
|
This is just a note to let you know that the 1.30 Single-line
|
|||
|
version of D'Bridge has been released. It may be obtained via
|
|||
|
many distribution sources and is available for download or
|
|||
|
WaZOO-style file-request from 1:18/68, 1:105/3 and 1:273/905.
|
|||
|
|
|||
|
There's no sense in wasting Fidonews space with technical
|
|||
|
details. Just try it; you'll like it. It's unlike any mailer
|
|||
|
you've seen before... PLEASE KEEP IN MIND THAT D'BRIDGE IS
|
|||
|
A COMMERICIAL PRODUCT.
|
|||
|
|
|||
|
Request: DBRIDGE or DB130*.* for the full distribution package.
|
|||
|
These files total 778,678 bytes and take about 13-14
|
|||
|
minutes with an HST. (You've been warned!)
|
|||
|
|
|||
|
|
|||
|
DB130A.ZIP DBRIDGE0.130 D'Bridge installation control file
|
|||
|
DBRIDGE1.130 D'Bridge (1 of 7)
|
|||
|
ORDER-DB.TXT D'Bridge Order form
|
|||
|
USA-EAST.COS Example cost file
|
|||
|
MODEMS.SEL Modem default file
|
|||
|
READ.ME This document
|
|||
|
|
|||
|
DB130B.ZIP DBRIDGE2.130 D'Bridge (2 of 7)
|
|||
|
DBRIDGE3.130 D'Bridge (3 of 7)
|
|||
|
DBRIDGE4.130 D'Bridge (4 of 7)
|
|||
|
DBRIDGE5.130 D'Bridge (5 of 7)
|
|||
|
DBRIDGE6.130 D'Bridge (6 of 7)
|
|||
|
DBRIDGE7.130 D'Bridge (7 of 7)
|
|||
|
X00.SYS FOSSIL driver courtesy of Ray Gwinn
|
|||
|
X00.DOC Documentation for X00.SYS
|
|||
|
|
|||
|
DB130INS.ZIP INSTALL.EXE D'Bridge installation program
|
|||
|
INSTALL.DOC Simple instructions INSTALL.EXE
|
|||
|
|
|||
|
DB130DOC.ZIP DBRIDGE.DOC D'Bridge User's Guide
|
|||
|
DB130UPG.ZIP UPGRADE.DOC D'Bridge Upgrade Guide
|
|||
|
|
|||
|
|
|||
|
Chris Irwin, 305-232-5245 Technical support
|
|||
|
D'Bridge Software 800-762-4197 Credit card orders
|
|||
|
Suite 208 305-255-6460 FAX
|
|||
|
15321 South Dixie Highway 305-232-9365 EMAIL, 1:18/68
|
|||
|
Miami, FL 33176
|
|||
|
|
|||
|
FidoNews 6-51 Page 5 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 6-51 Page 6 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
Tim Pearson - 1:286/703
|
|||
|
-----------------------
|
|||
|
|
|||
|
Introduction
|
|||
|
============
|
|||
|
|
|||
|
I expect that many in FidoNet will view the draft of the
|
|||
|
Internetwork Gateway Policy document published in this issue with
|
|||
|
some puzzlement. Some will not have more than a cursory
|
|||
|
awareness that Other Networks even exist. Others will,
|
|||
|
initially, not understand why the current tendency of most other
|
|||
|
FidoNet Technology Networks (FTNs) to "grab a zone and go" is
|
|||
|
causing technical and administrative difficulties within FidoNet.
|
|||
|
Many may be under the quite mistaken impression that FidoNet
|
|||
|
somehow sanctions or assigns zone numbers to other FTN networks.
|
|||
|
Very few will be aware that FidoNet currently exchanges net and
|
|||
|
echomail traffic with networks whose technology and addressing
|
|||
|
scheme is not that of FidoNet. Most folks, quite rightly,
|
|||
|
believe in the old maxim: "If it ain't broke, don't fix it." In
|
|||
|
this article, I will try to explain why most current internetwork
|
|||
|
communication methods are broken and why we feel that this
|
|||
|
document will at least lay the groundwork for correcting the
|
|||
|
problems that currently exist.
|
|||
|
|
|||
|
|
|||
|
Why Zones Don't Work
|
|||
|
--------------------
|
|||
|
Those who designed the addressing scheme used within FidoNet
|
|||
|
intended that zones be used to denote large geographic areas of
|
|||
|
the world. The zonegate concept was developed to facilitate
|
|||
|
economical and flexible interzone communication.
|
|||
|
|
|||
|
Zonegates provide economy by concentrating interzone
|
|||
|
messages at the zonegate; allowing many messages to be combined
|
|||
|
and compressed before they make the expensive "jump" to the other
|
|||
|
zone.
|
|||
|
|
|||
|
Zonegates provide addressing flexibility by allowing net and
|
|||
|
node numbers to be duplicated across zones. For example, all
|
|||
|
FidoNet zones may contain a net 123 or a node 123/456. This
|
|||
|
allows each zone coordinator a substantial amount of freedom in
|
|||
|
how they set up the zone's addressing scheme.
|
|||
|
|
|||
|
Zonegate technology specifically does not, however, provide
|
|||
|
the functionality necessary to run a proper network to network
|
|||
|
gateway. The inherent design assumes too much. It assumes that
|
|||
|
the zonegate's FidoNet address will be something that it will not
|
|||
|
be in the case of a network gateway. It assumes that there is
|
|||
|
only one "zone" for any given zone number. It assumes that the
|
|||
|
"from" Zone:Net/Node of the message need not be modified. None
|
|||
|
of these things may be properly assumed in the network gateway
|
|||
|
scenario. The result of attempts to make zonegate technology
|
|||
|
serve in a network gateway role is that both FidoNet and the
|
|||
|
other network are plagued with invalid, unknown addresses. The
|
|||
|
problem is compounded when more than one other network attempts
|
|||
|
to use the same illicit zone number. Private netmail replies to
|
|||
|
FidoNews 6-51 Page 7 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
echomail messages (one of the basic tenets of FidoNet) become
|
|||
|
impossible.
|
|||
|
|
|||
|
The problem is further aggravated when users on a network to
|
|||
|
which FidoNet is properly gated (UUCP / Internet for example)
|
|||
|
attempt to reply to a message containing one of these illicit
|
|||
|
zone numbers. The message arrives at the FidoNet / Internet
|
|||
|
gate. Automatic forwarding from that point becomes impossible
|
|||
|
since the "to" address is not a valid FidoNet address. Usually,
|
|||
|
the FidoNet gateway sysop has no idea where to manually forward
|
|||
|
the message.
|
|||
|
|
|||
|
|
|||
|
What Will Work
|
|||
|
--------------
|
|||
|
The solution to this growing problem is to require that
|
|||
|
messages, while in FidoNet, contain only valid FidoNet addresses.
|
|||
|
Period. A proper gateway will make all messages emanating from
|
|||
|
it into FidoNet appear technically as if they originated from the
|
|||
|
gate's FidoNet address just as if a user on that FidoNet system
|
|||
|
had entered the message. If an "other network" address is to
|
|||
|
appear in the message, it must appear elsewhere (in a location
|
|||
|
not relied upon by FidoNet mailer software for routing, duplicate
|
|||
|
checking, etc.), such as in the message body. With that
|
|||
|
accomplished, the technical problems disappear with the sole
|
|||
|
exception being the education of the users in both networks as to
|
|||
|
how and where to place the other network's address before sending
|
|||
|
the message to the gate. Several techniques have been
|
|||
|
considered.
|
|||
|
|
|||
|
The imposition of a standard method is beyond the scope of
|
|||
|
this group's mandate. That will be left to the FTSC, and the
|
|||
|
software developers. It is our sincere hope that a standard
|
|||
|
method will be put forth in the near future. Otherwise, users
|
|||
|
will have to remember multiple methods of gateway addressing
|
|||
|
depending upon which network the message is ultimately destined
|
|||
|
for.
|
|||
|
|
|||
|
|
|||
|
Administrative Objectives
|
|||
|
-------------------------
|
|||
|
Another problem with the "grab a zone and go" method of
|
|||
|
internetwork connectivity arises when the question of
|
|||
|
accountability arises. Who is this other network whose
|
|||
|
zone:net/node addresses are now appearing in FidoNet echoes? Who
|
|||
|
does FidoNet contact in the event that technical or policy
|
|||
|
related problems occur? Who does an echo moderator contact to
|
|||
|
resolve a problem with an unruly user in the other net? Who does
|
|||
|
a FidoNet coordinator contact in the event that a policy
|
|||
|
complaint is filed upon a user or sysop in the other net? In
|
|||
|
most cases for most networks the current answer to the above
|
|||
|
questions is "I don't know."
|
|||
|
|
|||
|
FidoNews 6-51 Page 8 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
We submit that this is no way to run a railroad. It is this
|
|||
|
series of problems that the "Administrative Agreement and
|
|||
|
Registration" portion of the Gateway document was developed to
|
|||
|
address. Some person in the other net needs to come forward and
|
|||
|
say "Me. I'm the guy (or gal). Here's my address and voice /
|
|||
|
data phone numbers. If you have problems with or questions about
|
|||
|
this network or its gateways, FidoNet, call me. I'll take care
|
|||
|
of it. By the way, here are the names and numbers of a few other
|
|||
|
highly placed persons in this net. If you can't reach me, call
|
|||
|
them. They will be able to assist you too." On its part, we
|
|||
|
propose that FidoNet create the position of Internetwork
|
|||
|
Coordinator to provide just that service to other nets that may
|
|||
|
have problems with or questions of FidoNet.
|
|||
|
|
|||
|
The question of accountability can be simply and elegantly
|
|||
|
addressed if we simply choose to view each "other network" as a
|
|||
|
large "point" network under the control of the "responsible
|
|||
|
party" named in the administrative agreement with the other
|
|||
|
network. Just as the "bossnode" is responsible for the actions
|
|||
|
of his "point" systems, the "responsible party" is responsible
|
|||
|
for the actions of the sysops and users in the other network with
|
|||
|
respect to FidoNet policy compliance.
|
|||
|
|
|||
|
In the event of a problem, FidoNet can work with the
|
|||
|
"responsible party" or their authorized agent to resolve the
|
|||
|
matter. If the matter cannot be resolved in any other fashion,
|
|||
|
FidoNet reserves the right to simply cease gateway activities.
|
|||
|
FidoNet makes no attempt to dictate what policy users in any
|
|||
|
other network adopt or operate under. It simply requires that if
|
|||
|
a message is to travel into FidoNet, it will be measured by the
|
|||
|
same policy yardstick as any other FidoNet message or it will not
|
|||
|
travel here at all.
|
|||
|
|
|||
|
|
|||
|
Summary
|
|||
|
-------
|
|||
|
|
|||
|
Your comments are invited. Many individuals have spent many
|
|||
|
months in the development and refinement of the draft you see
|
|||
|
here. In that situation, we may have taken for granted something
|
|||
|
that the wording of the document really doesn't make clear. A
|
|||
|
policy is nothing unless it can be clearly understood and
|
|||
|
applied. If something seems unclear or ambiguous, please call it
|
|||
|
to our attention. It is our intention to allow 30 days for the
|
|||
|
receipt of input from the network at large. After that, the
|
|||
|
final draft will be presented to the International Coordinator
|
|||
|
for adoption. When that occurs, an article containing the final
|
|||
|
text along with information on how to contact the Internetwork
|
|||
|
Coordinator for an application will be published.
|
|||
|
|
|||
|
Members of the Gateway Policy Development Committee include:
|
|||
|
Bill Bolton, Steve Bonine, Randy Bush, David Dodell, Rick Moore,
|
|||
|
Tim Pearson, Vince Perriello, Tim Pozar, and Matt Whelan.
|
|||
|
Netmailed comments to any of the above individuals will be shared
|
|||
|
with the entire group at your request.
|
|||
|
|
|||
|
FidoNews 6-51 Page 9 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
The Draft Internetwork Gateway Policy document follows:
|
|||
|
|
|||
|
+-----------------------------------------+
|
|||
|
| FidoNet(tm) Internetwork Gateway Policy |
|
|||
|
| |
|
|||
|
| Draft 1.8 |
|
|||
|
| |
|
|||
|
| December 14, 1989 |
|
|||
|
+-----------------------------------------+
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Section 1 - Purpose
|
|||
|
===================
|
|||
|
|
|||
|
This document sets forth the administrative policy
|
|||
|
requirements for interconnection between the FidoNet amateur
|
|||
|
international electronic mail network and other electronic mail
|
|||
|
networks.
|
|||
|
|
|||
|
As an amateur network, membership in FidoNet is open and
|
|||
|
available to any individual or group capable of meeting the
|
|||
|
technical challenge and willing to participate constructively
|
|||
|
within the technical and administrative guidelines employed
|
|||
|
within FidoNet. FidoNet desires to extend this idea, "The free
|
|||
|
exchange of information," to include other electronic mail
|
|||
|
networks. While connectivity with other networks can be
|
|||
|
beneficial to all parties involved, it cannot be expected to
|
|||
|
operate smoothly unless the parties involved understand and agree
|
|||
|
to observe technical and administrative guidelines designed to
|
|||
|
promote the orderly flow of traffic between networks and to
|
|||
|
provide a mechanism for problem resolution should problems arise.
|
|||
|
This document intends to address those points.
|
|||
|
|
|||
|
|
|||
|
Section 2 - Definitions
|
|||
|
=======================
|
|||
|
|
|||
|
|
|||
|
"FidoNet"
|
|||
|
---------
|
|||
|
An amateur electronic mail wide area network consisting of
|
|||
|
several thousand computer systems world wide. Most of these
|
|||
|
systems operate electronic bulletin board (BBS) software giving
|
|||
|
each system the capability to provide electronic mail services to
|
|||
|
up to several hundred users. Detailed information on the
|
|||
|
technical and organizational aspects of the FidoNet mail network
|
|||
|
is beyond the scope of this document. Further information can be
|
|||
|
obtained from various FidoNet publications including the FidoNet
|
|||
|
official policy document.
|
|||
|
|
|||
|
FidoNews 6-51 Page 10 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
"Other Network"
|
|||
|
---------------
|
|||
|
The term "Other Network" will be used in this document as a
|
|||
|
shorthand term referring to any other electronic mail network,
|
|||
|
whether inherently compatible with the technology employed within
|
|||
|
FidoNet or not. This term will often be used to refer
|
|||
|
specifically to the electronic mail network making application to
|
|||
|
FidoNet for a "Gateway" (defined below).
|
|||
|
|
|||
|
|
|||
|
"Gateway"
|
|||
|
---------
|
|||
|
A gateway is a system of computers equipped with the
|
|||
|
hardware and software necessary to pass electronic mail messages
|
|||
|
(possibly of various types, see below) between FidoNet and a
|
|||
|
specific Other Network. A Gateway acts as a translator, allowing
|
|||
|
messages entered on a system in the Other Network and addressed
|
|||
|
to a destination within FidoNet to be translated into a form that
|
|||
|
is technically acceptable to and compatible with FidoNet and vice
|
|||
|
versa. All messages originated in the Other Network and
|
|||
|
addressed to a destination within FidoNet are first routed to a
|
|||
|
Gateway.
|
|||
|
|
|||
|
At a Gateway, the message is made technically acceptable to
|
|||
|
and compatible with FidoNet and forwarded into FidoNet's wide
|
|||
|
area network for delivery to its final destination. A message
|
|||
|
originated within FidoNet and addressed to a destination within
|
|||
|
the Other Network is handled in a similar manner.
|
|||
|
|
|||
|
|
|||
|
"Netmail"
|
|||
|
---------
|
|||
|
The term Netmail, as used within FidoNet, refers to an
|
|||
|
electronic mail message that is addressed to a specific physical
|
|||
|
destination. Netmail messages can be addressed to a particular
|
|||
|
individual at the destination site. Public messages can be read
|
|||
|
by users other than the named addressee while private messages
|
|||
|
cannot typically be read by any user other than the named
|
|||
|
addressee and the system administrator/operator at the
|
|||
|
destination site. Further information on Netmail is available in
|
|||
|
other FidoNet technical and policy documents.
|
|||
|
|
|||
|
|
|||
|
"Conference Mail"
|
|||
|
-----------------
|
|||
|
Echomail is the term used within FidoNet to refer to
|
|||
|
electronic "Conference Mail" messages that, while possibly
|
|||
|
containing the name of a particular individual in the "To:"
|
|||
|
field, are copied and distributed to multiple (possibly several
|
|||
|
hundred) destination systems. Some Other Networks refer to their
|
|||
|
analogous capability under the terms "GroupMail" or "newsgroup".
|
|||
|
Echomail messages are segregated into "Conferences" based upon
|
|||
|
the topic being discussed. Echomail message content is usually
|
|||
|
restricted to the topic(s) for which the particular conference
|
|||
|
was created. Several hundred Echomail conferences exist within
|
|||
|
FidoNet dedicated to topics ranging from technical discussions of
|
|||
|
FidoNews 6-51 Page 11 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
various computer systems and peripherals to philosophy and
|
|||
|
religion. Further information on Echomail can be obtained by
|
|||
|
consulting other FidoNet technical and policy documents.
|
|||
|
|
|||
|
|
|||
|
"FidoNet Technology Network" (FTN)
|
|||
|
----------------------------------
|
|||
|
For the purposes of this document, a "FidoNet Technology
|
|||
|
Network" (FTN) shall be defined as an Other Network whose message
|
|||
|
format and transmission protocols strictly meet the technical
|
|||
|
requirements set forth by the FidoNet Technical Standards
|
|||
|
Committee (FTSC). FidoNet Technology Networks are inherently
|
|||
|
technically compatible with FidoNet. Connectivity options are
|
|||
|
available to FTN's that are not (for technical reasons) available
|
|||
|
to non-FTN Other Networks.
|
|||
|
|
|||
|
|
|||
|
Internetwork Coordinator (INC)
|
|||
|
------------------------------
|
|||
|
The Internetwork Coordinator is the individual within
|
|||
|
FidoNet who has the responsibility for overseeing the granting,
|
|||
|
installation, and maintenance of FidoNet to Other Network
|
|||
|
Gateways. The INC shall be designated by and act as the agent of
|
|||
|
the FidoNet International Coordinator.
|
|||
|
|
|||
|
|
|||
|
Multi-Network (MultiNet)
|
|||
|
------------------------
|
|||
|
A "multinet" is a type of "super" network whose function is
|
|||
|
to provide connectivity between many other networks and to allow
|
|||
|
bidirectional communication between these networks.
|
|||
|
|
|||
|
|
|||
|
Duplicate Message
|
|||
|
-----------------
|
|||
|
Because of the technology employed by some FidoNet
|
|||
|
Conference Mail distribution systems, improper routing
|
|||
|
information or topology can cause multiple copies of the same
|
|||
|
message text to be delivered to FidoNet systems. A duplicate
|
|||
|
message is defined as any message arriving at a FidoNet node
|
|||
|
whose message body (the text entered by the human originator of
|
|||
|
the message) is identical to the message body of a previously
|
|||
|
received message. Messages manually forwarded to another
|
|||
|
recipient are not considered duplicates for the purposes of this
|
|||
|
document.
|
|||
|
|
|||
|
|
|||
|
Section 3 - Administrative Guidelines
|
|||
|
=====================================
|
|||
|
|
|||
|
This section is intended to outline the administrative
|
|||
|
framework under which Other Networks may connect to FidoNet.
|
|||
|
FidoNet reserves the right to reject any Other Network Gateway
|
|||
|
application for any reason.
|
|||
|
|
|||
|
FidoNews 6-51 Page 12 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
3.1 - Other Network Connectivity to FidoNet Through "MultiNets"
|
|||
|
---------------------------------------------------------------
|
|||
|
FidoNet may elect to seek and obtain connectivity to various
|
|||
|
multinet host facilities for the purposes of communicating with a
|
|||
|
wide range of Other Networks. Any Other Network that desires to
|
|||
|
communicate with FidoNet may elect to facilitate such
|
|||
|
communication via the multinet. However, FidoNet reserves the
|
|||
|
right to refuse to deliver incoming message traffic arriving via
|
|||
|
such an arrangement based upon the guidelines set forth in this
|
|||
|
document.
|
|||
|
|
|||
|
|
|||
|
An Example:
|
|||
|
|
|||
|
FidoNet is now gated into Internet via UUCP. It has agreed
|
|||
|
to the terms and conditions necessary for membership in and
|
|||
|
connectivity to the Internet multi-network "umbrella". One
|
|||
|
obvious method for achieving connectivity to FidoNet (and a whole
|
|||
|
host of other wide area networks) is for the Other Network to
|
|||
|
apply to Internet for a gateway. Under this scenario, the Other
|
|||
|
Network is bound by the terms and conditions of Internet just as
|
|||
|
FidoNet is. In this peer relationship, the terms and conditions
|
|||
|
stated in this document are used by FidoNet to determine if Other
|
|||
|
Network message traffic arriving at a FidoNet/Internet gateway
|
|||
|
will be accepted into FidoNet.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
3.2 - Connectivity Only Through Mutually Recognized Gateways
|
|||
|
------------------------------------------------------------
|
|||
|
While FidoNet has no desire to inhibit experimentation or
|
|||
|
connectivity between consenting systems it must maintain the
|
|||
|
technical and administrative integrity of its network.
|
|||
|
Henceforth, FidoNet will not permit non-FidoNet addresses to
|
|||
|
appear in any addressing or routing control fields (Some current
|
|||
|
examples include: the "From" or "To" address fields, the "*
|
|||
|
Origin" lines, the "seen-by" fields, and the "^APath" fields.) of
|
|||
|
any netmail or echomail messages traveling on any portion of
|
|||
|
FidoNet's wide area network. This restriction applies to all
|
|||
|
present and future FidoNet nodes. FidoNet nodes who wish to
|
|||
|
participate in Other Networks may do so but must insure that all
|
|||
|
message traffic transmitted to other FidoNet systems contain only
|
|||
|
valid FidoNet addresses in the addressing and routing control
|
|||
|
fields. The FidoNet coordinators will enforce this requirement
|
|||
|
and are authorized by the International Coordinator to take
|
|||
|
whatever action may be necessary to prevent non-FidoNet addresses
|
|||
|
from entering Fidonet, including without limitation, referring
|
|||
|
the offending nodes to this document and to the InterNetwork
|
|||
|
Coordinator for information on how to establish proper Gateways.
|
|||
|
The sole exception to this requirement is set forth in the
|
|||
|
following paragraph:
|
|||
|
|
|||
|
FidoNews 6-51 Page 13 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
The exchange of message traffic, on an experimental or
|
|||
|
private and closely controlled basis, between an Other Network
|
|||
|
and a system or systems that happen to be members of FidoNet is
|
|||
|
permitted and encouraged if such message traffic is confined to
|
|||
|
the consenting FidoNet systems and is not allowed to travel on or
|
|||
|
to any portion of FidoNet's wide area network that has not
|
|||
|
previously consented to carry such traffic and if such
|
|||
|
connectivity does not prohibit the FidoNet system(s) from
|
|||
|
fulfilling the technical and policy requirements necessary for
|
|||
|
membership in FidoNet. FidoNet requests that the INC be informed
|
|||
|
of such arrangements so that any unintentional "leakage" of Other
|
|||
|
Network message traffic into FidoNet's wide area network may be
|
|||
|
rapidly isolated and corrected.
|
|||
|
|
|||
|
The exchange of message traffic between any Other Network
|
|||
|
and FidoNet on any basis other than the one mentioned in the
|
|||
|
paragraph above shall only be done through mutually recognized
|
|||
|
and proper Gateways meeting the requirements set forth in this
|
|||
|
document.
|
|||
|
|
|||
|
|
|||
|
3.3 - Administrative Agreement and Registration
|
|||
|
-----------------------------------------------
|
|||
|
FidoNet requires that an Administrative agreement be
|
|||
|
executed by and between the individual(s) responsible for the
|
|||
|
administration of the Other Network and the FidoNet International
|
|||
|
Coordinator, or the IC's authorized agent. This agreement should
|
|||
|
outline, at a minimum, the following items:
|
|||
|
|
|||
|
1 - The name of the organization.
|
|||
|
|
|||
|
2 - The name, address, and voice telephone number
|
|||
|
where the administrator of the Other Network may
|
|||
|
be reached. (Administrative contact and responsi-
|
|||
|
ble party).
|
|||
|
|
|||
|
3 - A brief description of the organization.
|
|||
|
|
|||
|
4 - The name, address and voice telephone number where
|
|||
|
the individual(s) responsible for the operation of
|
|||
|
the FidoNet/Other Network Gateway(s) may be
|
|||
|
reached. (Technical Contact(s))
|
|||
|
|
|||
|
5 - A list of computer system(s) requesting Gateway
|
|||
|
status containing the following information:
|
|||
|
|
|||
|
o The name of the gateway system as it will
|
|||
|
appear in the FidoNet nodelist.
|
|||
|
|
|||
|
o The Locality, State / Province / Department /
|
|||
|
etc., and Country where the Gateway is
|
|||
|
FidoNews 6-51 Page 14 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
physically located.
|
|||
|
|
|||
|
o The name of the system administrator for the
|
|||
|
particular Gateway.
|
|||
|
|
|||
|
o The complete data telephone number for the
|
|||
|
Gateway, including country code.
|
|||
|
|
|||
|
o The maximum baud rate supported by the Gate-
|
|||
|
way and all modem standards supported.
|
|||
|
|
|||
|
o The hours during which the Gateway will
|
|||
|
support FidoNet dial up mail sessions. (*SEE
|
|||
|
NOTE BELOW*)
|
|||
|
|
|||
|
o The date the Gateway is expected to become
|
|||
|
operational.
|
|||
|
|
|||
|
o The FidoNet compatible session protocol(s)
|
|||
|
supported
|
|||
|
|
|||
|
o If the Gateway is now a member of FidoNet,
|
|||
|
the zone, net, and node number of the FidoNet
|
|||
|
system applying for Gateway status.
|
|||
|
|
|||
|
|
|||
|
NOTE: For a system to be granted Gateway status, it
|
|||
|
must at least be available for FidoNet dial
|
|||
|
up mail sessions during the FidoNet dedicated
|
|||
|
mail period for the geographic locality
|
|||
|
concerned. FidoNet calls its mandatory
|
|||
|
dedicated mail period the "Zone Mail Hour".
|
|||
|
The time for "Zone Mail Hour" varies through-
|
|||
|
out the world and can be found in Appendix A
|
|||
|
of the current FidoNet Policy Document.
|
|||
|
|
|||
|
6. A clearly worded statement indicating that the
|
|||
|
responsible party in the Other Network and Fido-
|
|||
|
Net agree to the terms and conditions set forth in
|
|||
|
the Administrative Agreement and those in this
|
|||
|
document (included by reference as a part of the
|
|||
|
agreement).
|
|||
|
|
|||
|
3.4 - Application of FidoNet Administrative Policy
|
|||
|
--------------------------------------------------
|
|||
|
For the purposes of applying FidoNet policy, FidoNet will
|
|||
|
view the entire Other Network as a single FidoNet "node" under
|
|||
|
the control of the individual named as the "Administrative
|
|||
|
Contact / Responsible Party" (or an authorized agent thereof) in
|
|||
|
the administrative agreement outlined in paragraph 3.3 above.
|
|||
|
All other systems and their users will be viewed by FidoNet as
|
|||
|
users on the "responsible party's" node for the purposes of
|
|||
|
FidoNet official policy application.
|
|||
|
|
|||
|
FidoNews 6-51 Page 15 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
FidoNet holds the operator of a FidoNet node responsible
|
|||
|
(from an administrative policy standpoint) for the actions of
|
|||
|
that node's users, subordinate "point" systems, and the "point"
|
|||
|
system's users. FidoNet views single or multiple Other Network
|
|||
|
Gateways as a single "boss" node under the control of the
|
|||
|
"responsible party" and will apply FidoNet official policy
|
|||
|
accordingly. FidoNet reserves the right to sever links to one or
|
|||
|
more of the Other Network's Gateways as its final remedy for
|
|||
|
violations of administrative policy. (see the paragraph titled
|
|||
|
"Points" in the "Overview" section and the paragraph titled
|
|||
|
"Responsible for All Traffic Entering FidoNet Via the Node" in
|
|||
|
the "Sysop Procedures" section of FidoNet's official policy
|
|||
|
document, for further information).
|
|||
|
|
|||
|
|
|||
|
3.5 - Supported Message Types
|
|||
|
-----------------------------
|
|||
|
FidoNet will grant Gateway interconnection for the purposes
|
|||
|
of exchanging messages of the type defined above as "Netmail" and
|
|||
|
optionally for the purposes of exchanging messages of the type
|
|||
|
defined above as "Echomail". FidoNet will not grant Gateway
|
|||
|
interconnection for the purposes of exchanging "Echomail" only.
|
|||
|
The ability to generate a private and personal "Netmail" reply to
|
|||
|
an "Echomail" message is one of the basic facets of FidoNet and
|
|||
|
cannot be compromised.
|
|||
|
|
|||
|
|
|||
|
3.6 - Acceptance Criteria (All Other Networks)
|
|||
|
----------------------------------------------
|
|||
|
The granting of Other Network Gateways into FidoNet is not
|
|||
|
automatic nor is it based solely on the Other Network's ability
|
|||
|
to demonstrate technical compliance with the objectives set forth
|
|||
|
in section 4 below. Some other criteria include:
|
|||
|
|
|||
|
o The Other Network should have an individual will-
|
|||
|
ing and able to carry out the role of "Responsible
|
|||
|
Party" as defined herein. The Other Network
|
|||
|
"administration" should be willing to help in
|
|||
|
assuring that technical, social, and administra-
|
|||
|
tive policy standards are consistently met in all
|
|||
|
message traffic emanating from the Gateway(s).
|
|||
|
FidoNet pledges to do likewise.
|
|||
|
|
|||
|
o The Other Network must have demonstrable stabili-
|
|||
|
ty. It should have been in operation as a free
|
|||
|
standing network for a period of time sufficient
|
|||
|
to prove its reliability. It should be able to
|
|||
|
prove that it has the technical and administrative
|
|||
|
expertise to maintain and regulate reliable Gate-
|
|||
|
ways over an extended period of time.
|
|||
|
|
|||
|
FidoNews 6-51 Page 16 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
3.7 - Other Criteria (FTN Other Networks)
|
|||
|
-----------------------------------------
|
|||
|
Software allowing nodes in FTN Other Networks to
|
|||
|
simultaneously participate directly in FidoNet as valid FidoNet
|
|||
|
nodes, isolating the Other Network's addresses from FidoNet
|
|||
|
message traffic (i.e., using only valid FidoNet addresses in
|
|||
|
FidoNet message traffic) presently exists. This "dual identity"
|
|||
|
approach is the method FidoNet expects nodes in the FTN Other
|
|||
|
Network will employ. Such an approach:
|
|||
|
|
|||
|
o Eliminates the need for any written agreement
|
|||
|
between FidoNet and the FTN Other Network since
|
|||
|
each Other Network node simply participates in
|
|||
|
FidoNet, using only valid FidoNet addresses, in a
|
|||
|
manner indistinguishable from a FidoNet node that
|
|||
|
does not belong to any Other Network.
|
|||
|
|
|||
|
o Allows for FidoNet connectivity on a node by node
|
|||
|
basis.
|
|||
|
|
|||
|
o Speeds mail transfer since message traffic can
|
|||
|
enter FidoNet's wide area network at the point of
|
|||
|
origin rather than having to first pass through a
|
|||
|
Gateway.
|
|||
|
|
|||
|
o Eliminates the costly situation where an Other
|
|||
|
Network node wanting to communicate with a FidoNet
|
|||
|
node (or vice versa) in the same local calling
|
|||
|
area must first route the message through a dis-
|
|||
|
tant Gateway, incurring unnecessary expense to
|
|||
|
himself, the Other Network and FidoNet.
|
|||
|
|
|||
|
o Gives each node contact with a nearby FidoNet
|
|||
|
coordinator to provide FidoNet services more
|
|||
|
effectively.
|
|||
|
|
|||
|
o Greatly reduces the effort involved to connect
|
|||
|
into FidoNet. Each node simply sends a Netmail
|
|||
|
message to the nearest FidoNet coordinator listing
|
|||
|
the pertinent information for the system and
|
|||
|
requesting that a FidoNet node number be granted.
|
|||
|
|
|||
|
o Eliminates any possible administrative policy
|
|||
|
conflicts between the FTN Other Network and Fido-
|
|||
|
Net. The node simply adheres to FidoNet policy in
|
|||
|
FidoNet message traffic and to Other Network
|
|||
|
policy in Other Network message traffic.
|
|||
|
|
|||
|
Given the above advantages, the FTN Other Network must
|
|||
|
provide evidence of overriding technical or social
|
|||
|
considerations, must show cause why these considerations justify
|
|||
|
the establishment of a Gateway instead of merely allowing its
|
|||
|
individual nodes to use the "dual identity" approach, and must
|
|||
|
satisfy FidoNet that such an arrangement will be mutually
|
|||
|
beneficial.
|
|||
|
|
|||
|
FidoNews 6-51 Page 17 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
3.8 - Shared Echomail Conferences
|
|||
|
---------------------------------
|
|||
|
Echomail conferences shared between networks must be
|
|||
|
registered with the appropriate FidoNet echomail coordinator. It
|
|||
|
is the responsibility of the Other Network and its Echomail
|
|||
|
source(s) within FidoNet to insure that proper topology is
|
|||
|
observed between the FidoNet / Other Network Gateway(s) and that
|
|||
|
duplicate echomail messages do not enter FidoNet. It cannot be
|
|||
|
overemphasized that all message traffic emanating from a Gateway
|
|||
|
must contain only valid FidoNet addresses in the message's
|
|||
|
addressing and routing fields. Current examples include, without
|
|||
|
limitation, the "from" and "to" addresses in the message header,
|
|||
|
the *ORIGIN line address, the SEEN BY addresses and the ^APath
|
|||
|
addresses.
|
|||
|
|
|||
|
|
|||
|
3.9 - Network Integrity
|
|||
|
-----------------------
|
|||
|
In the event that FidoNet determines that significant harm
|
|||
|
is being caused to the technical or social integrity of its
|
|||
|
network, it may immediately sever links between the Other Network
|
|||
|
Gateway(s) and FidoNet. FidoNet will make all reasonable
|
|||
|
attempts to contact the "Responsible Party" as soon as possible
|
|||
|
(before the severing of links if possible) to inform the Other
|
|||
|
Network of the problem and to work toward its resolution.
|
|||
|
|
|||
|
|
|||
|
Section 4 - Technical Objectives
|
|||
|
================================
|
|||
|
|
|||
|
At this time, FidoNet has not published a detailed technical
|
|||
|
standard for Gateways. FidoNet reserves the right to develop,
|
|||
|
implement, and require adherence to such a standard at a future
|
|||
|
date. In the mean time, the following general guidelines are set
|
|||
|
forth for Other Networks that desire to communicate with FidoNet.
|
|||
|
|
|||
|
|
|||
|
4.1 - Technical Standards within FidoNet
|
|||
|
----------------------------------------
|
|||
|
The FidoNet Technical Standards Committee (FTSC) has
|
|||
|
developed and published technical standards for message packets
|
|||
|
and mailer-to-mailer protocols. The Gateway system(s) must be
|
|||
|
able to assemble and transmit FidoNet standard message packets
|
|||
|
using FidoNet standard session protocol. A gateway must also be
|
|||
|
able to receive and disassemble FidoNet standard message packets
|
|||
|
using FidoNet standard session protocol. Translation from the
|
|||
|
Other Network's internal message format to FidoNet standard
|
|||
|
packets and vice versa is the responsibility of the Gateway.
|
|||
|
|
|||
|
|
|||
|
4.2 - Logical Other Network Address
|
|||
|
-----------------------------------
|
|||
|
FidoNews 6-51 Page 18 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
Software at a Gateway shall modify each message entering
|
|||
|
FidoNet (whether Netmail or Echomail) such that FidoNet software
|
|||
|
will interpret the logical address of origin of the message as
|
|||
|
the Gateway's FidoNet address.
|
|||
|
|
|||
|
|
|||
|
4.3 - Physical Other Network Address
|
|||
|
------------------------------------
|
|||
|
Software at a Gateway shall embed the Other Network address
|
|||
|
(physical point of origin), in human readable form, at a
|
|||
|
predictable location in the message body immediately preceded by
|
|||
|
a predictable identifier such that software designed to
|
|||
|
facilitate the automatic inclusion of this information in FidoNet
|
|||
|
replies to Other Network messages will be able to glean this
|
|||
|
information from the other text in the body of the message
|
|||
|
reliably. This requirement applies to Other Network messages
|
|||
|
entering FidoNet, both Netmail and Echomail.
|
|||
|
|
|||
|
|
|||
|
4.4 - FidoNet to Other Network Addressing (Netmail)
|
|||
|
---------------------------------------------------
|
|||
|
FidoNet users must be provided with a procedure for routing
|
|||
|
what FidoNet defines as "Netmail" to Other Network users via a
|
|||
|
Gateway. FidoNet users will be instructed to address netmail to
|
|||
|
Other Network users to the FidoNet Zone:Net/Node address for an
|
|||
|
Other Network Gateway.
|
|||
|
|
|||
|
The exact method by which these messages are forwarded to
|
|||
|
their final destination within the Other Network is left to the
|
|||
|
discretion of the Other Network. One obvious method is to have
|
|||
|
the FidoNet user enter the "physical Other Network address" in
|
|||
|
the proper location preceded by the proper identifier as outlined
|
|||
|
in paragraph 4.4 above. FidoNet will help the Other Network in
|
|||
|
educating FidoNet users on the proper form and location of the
|
|||
|
additional address information necessary to route a FidoNet to
|
|||
|
Other Network message to its final destination automatically via
|
|||
|
a Gateway. FidoNet netmail arriving at a Gateway with improper
|
|||
|
Other Network addressing information must either be corrected and
|
|||
|
forwarded to the proper Other Network address or returned to the
|
|||
|
FidoNet sender with text inserted notifying the sender that the
|
|||
|
message was undeliverable.
|
|||
|
|
|||
|
|
|||
|
4.5 - Echomail Standards
|
|||
|
------------------------
|
|||
|
Echomail entering FidoNet shall conform to FidoNet (FTSC)
|
|||
|
standard format. FidoNet control, routing, and addressing
|
|||
|
information in each message shall show that it originated from
|
|||
|
the Gateway's FidoNet address. Internal Other Network routing
|
|||
|
information (if any) attached to echomail messages must be
|
|||
|
removed at the Gateway with the exception being the "Physical
|
|||
|
Other Network Address" as defined in paragraph 4.3 above.
|
|||
|
|
|||
|
FidoNews 6-51 Page 19 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
Section 5 - Network Policy Implications
|
|||
|
=======================================
|
|||
|
|
|||
|
|
|||
|
5.1 - Interpretation
|
|||
|
--------------------
|
|||
|
FidoNet retains the exclusive right to interpret the terms
|
|||
|
and conditions stated herein based upon its representatives' best
|
|||
|
understanding of those terms and conditions and upon its
|
|||
|
knowledge of the original intent of the authors.
|
|||
|
|
|||
|
|
|||
|
Draft Administrative Agreement
|
|||
|
|
|||
|
|
|||
|
This agreement made this ________ day of _________,
|
|||
|
__________ between "FidoNet" and
|
|||
|
__________________________________________________, hereinafter
|
|||
|
referred to as "Other Network", shall be mutually exclusive and
|
|||
|
binding upon the parties herein until rescinded or revised by
|
|||
|
agreements of the parties, as defined and stated herein.
|
|||
|
|
|||
|
|
|||
|
Article 1.
|
|||
|
----------
|
|||
|
Other Network and FidoNet desire to exchange electronic mail
|
|||
|
between their respective networks. The parties do therefore
|
|||
|
mutually covenant and agree as follows:
|
|||
|
|
|||
|
|
|||
|
Article 2.
|
|||
|
----------
|
|||
|
The parties hereto agree that the FidoNet document titled
|
|||
|
"Internetwork Gateway Policy" shall be controlling and is
|
|||
|
incorporated as if referenced and set out in full.
|
|||
|
|
|||
|
|
|||
|
Paragraph 2.1 - Internetwork Gateway Policy
|
|||
|
-------------------------------------------
|
|||
|
Other Network and FidoNet agree to be bound by the terms and
|
|||
|
conditions set forth in the FidoNet document titled "Internetwork
|
|||
|
Gateway Policy" included by reference in Article 1 above.
|
|||
|
|
|||
|
|
|||
|
Paragraph 2.2 - Gateway Certification
|
|||
|
-------------------------------------
|
|||
|
FidoNet and Other Network agree not to exchange or attempt
|
|||
|
to exchange electronic mail via the proposed Gateway system(s)
|
|||
|
other than on a limited and mutually agreed "test" basis until
|
|||
|
both parties certify that the Gateway(s) are open for general
|
|||
|
message traffic.
|
|||
|
|
|||
|
FidoNews 6-51 Page 20 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
Paragraph 2.3 - Registration Information
|
|||
|
----------------------------------------
|
|||
|
|
|||
|
Other Network agrees to provide FidoNet with complete and
|
|||
|
accurate information as requested in Articles 3 and 4 below and
|
|||
|
with any other information FidoNet may deem necessary as a prior
|
|||
|
condition for the certification of any FidoNet/Other Network
|
|||
|
gateways.
|
|||
|
|
|||
|
|
|||
|
Article 3 - General Information.
|
|||
|
--------------------------------
|
|||
|
|
|||
|
Organization name :
|
|||
|
|
|||
|
_________________________________________
|
|||
|
|
|||
|
|
|||
|
Administrative Contact/Responsible Party:
|
|||
|
|
|||
|
Name:___________________________________
|
|||
|
|
|||
|
Address:___________________________________
|
|||
|
|
|||
|
City:___________________________________
|
|||
|
|
|||
|
State/Province:___________________________________
|
|||
|
|
|||
|
Country:___________________________________
|
|||
|
|
|||
|
Voice Telephone:___________________________________
|
|||
|
|
|||
|
Other Network Address:___________________________________
|
|||
|
|
|||
|
|
|||
|
Technical Contact:
|
|||
|
|
|||
|
Name:___________________________________
|
|||
|
|
|||
|
Address:___________________________________
|
|||
|
|
|||
|
City:___________________________________
|
|||
|
|
|||
|
State/Province:___________________________________
|
|||
|
|
|||
|
Country:___________________________________
|
|||
|
|
|||
|
Voice Telephone:___________________________________
|
|||
|
|
|||
|
Other Network Address:___________________________________
|
|||
|
|
|||
|
FidoNews 6-51 Page 21 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
Brief Description of the Other Network Organization:
|
|||
|
|
|||
|
_______________________________________________________________
|
|||
|
|
|||
|
_______________________________________________________________
|
|||
|
|
|||
|
_______________________________________________________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Article 4 - Gateway Specific Information (duplicate if needed)
|
|||
|
--------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
Gateway name as it is to appear in FidoNet nodelist:
|
|||
|
|
|||
|
____________________________________________________
|
|||
|
|
|||
|
|
|||
|
Gateway System Administrator:
|
|||
|
|
|||
|
____________________________________________________
|
|||
|
|
|||
|
|
|||
|
Physical Gateway Location:
|
|||
|
|
|||
|
|
|||
|
Address:___________________________________
|
|||
|
|
|||
|
City:___________________________________
|
|||
|
|
|||
|
State/Province:___________________________________
|
|||
|
|
|||
|
Country:___________________________________
|
|||
|
|
|||
|
Voice Telephone:___________________________________
|
|||
|
|
|||
|
|
|||
|
Gateway dial-up telephone number: _____________________________
|
|||
|
|
|||
|
|
|||
|
Maximum asynchronous baud rate: ________________
|
|||
|
|
|||
|
|
|||
|
Hours FidoNet dial-up mail sessions are supported (GMT):_______
|
|||
|
|
|||
|
|
|||
|
Anticipated operational date: ____/____/____
|
|||
|
|
|||
|
|
|||
|
FidoNet session protocols supported: __________________________
|
|||
|
|
|||
|
FidoNews 6-51 Page 22 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
Is this system at present a FidoNet node? ___Yes ___No
|
|||
|
|
|||
|
If yes, Zone:_____ Net:______ Node:______
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Article 5 - Termination
|
|||
|
-----------------------
|
|||
|
This agreement shall be terminated _______ days after the
|
|||
|
giving of notice by either party at which point all Gateway
|
|||
|
activities will cease.
|
|||
|
|
|||
|
|
|||
|
Article 6 - Sole and Exclusive Agreement
|
|||
|
----------------------------------------
|
|||
|
|
|||
|
This agreement is the sole and exclusive agreement between
|
|||
|
the parties.
|
|||
|
|
|||
|
|
|||
|
Article 7 - Remedies
|
|||
|
--------------------
|
|||
|
|
|||
|
Both parties agree that their sole and exclusive remedy for
|
|||
|
non compliance with the Internetwork Gateway Policy shall be to
|
|||
|
terminate gateway activities.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
For FidoNet:
|
|||
|
|
|||
|
By:___________________________________________
|
|||
|
|
|||
|
Title:___________________________________________
|
|||
|
|
|||
|
Date: ___________________
|
|||
|
|
|||
|
|
|||
|
For Other Network:
|
|||
|
|
|||
|
By:___________________________________________
|
|||
|
|
|||
|
Title:___________________________________________
|
|||
|
|
|||
|
Date:____________________
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 6-51 Page 23 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
Mike Janke
|
|||
|
1:135/4
|
|||
|
|
|||
|
TosScan - THE Echomail processor
|
|||
|
|
|||
|
|
|||
|
Introduction:
|
|||
|
-------------
|
|||
|
|
|||
|
The day many of you have been waiting for, and some thought would
|
|||
|
never come, has finally arrived. Yes TosScan, the most awesome
|
|||
|
echomail processor to ever hit the network, is finally available!
|
|||
|
|
|||
|
Let me just say that when one is coding such a full-featured pro-
|
|||
|
gram, and when the integrity of billons of bytes of echomail is
|
|||
|
at stake, it's best to make sure it is right rather than rush a
|
|||
|
questionable version out the door.
|
|||
|
|
|||
|
As part of the beta test team, I can say that TosScan is rock
|
|||
|
solid and ready to roll.
|
|||
|
|
|||
|
|
|||
|
What it is
|
|||
|
----------
|
|||
|
Of course TosScan has all the usual features you'd expect of any
|
|||
|
echomail toss/scan program, but there is much more!
|
|||
|
|
|||
|
o Full-screen, window-based setup/configuration program.
|
|||
|
o Echo Area manager.
|
|||
|
o Node manager.
|
|||
|
o AreaMgr (similiar to AreaFix)
|
|||
|
o Full point support.
|
|||
|
o Full zone support.
|
|||
|
o Message base utilities.
|
|||
|
|
|||
|
You'll never have to load your text editor to modify a areas file
|
|||
|
or other control file every time a node or area is added to your
|
|||
|
system. And, you won't have to keep that dog-eared copy of docs
|
|||
|
nearby just to mutter... "Hmmmm, lets see, what was that command
|
|||
|
line switch again?" as is often done with other processors.
|
|||
|
|
|||
|
Tsetup, the TosScan setup/configuration program, will make your
|
|||
|
life much easier whether you are the last link or a major NEC.
|
|||
|
All aspects of echomail areas/nodes and message base maintenance
|
|||
|
are handled according to parameters defined in Tsetup.
|
|||
|
|
|||
|
I'd like to describe each individual feature, but to do so would
|
|||
|
swell FidoNews to unmanageable proportions.
|
|||
|
|
|||
|
Flexibility is the keyword. ARCmail in all flavors, variable net
|
|||
|
node number usage and ARCmail filenaming conventions just to name
|
|||
|
a few. The list goes on and on, but as I said, there is just too
|
|||
|
much for this article.
|
|||
|
|
|||
|
FidoNews 6-51 Page 24 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
Reliability is one of TosScan's strong points. It can handle the
|
|||
|
worst junk that programs such as Qecho can throw at it. TosScan
|
|||
|
processes mangled packets and grunged archives with unbelievable
|
|||
|
ease; I have yet to see it stumble over a single bundle.
|
|||
|
|
|||
|
I hear you saying "But is it fast?". Speed, of course, depends
|
|||
|
on whether you have a screamer 386 or lowly 8088 with 80ms hard
|
|||
|
drive. Here's an idea of what you can expect. Your times may be
|
|||
|
slightly different.
|
|||
|
|
|||
|
System: 386/20, 28ms 1:1 drive, Dos 3.30 w/2MB disk cache.
|
|||
|
Arcmail: 710 KB / 1999 messages, 6 down-link systems.
|
|||
|
Time: 21 minutes
|
|||
|
|
|||
|
System: 386/20, 2 MB RAM running in page interleave, DOS 4.01,
|
|||
|
28ms hard drive.
|
|||
|
Arcmail: 377 KB *.pkt. About 1/2 of the conferences run in
|
|||
|
passthrough, averaging of 2.5 links per conference.
|
|||
|
Time: 1 minute, 40 seconds.
|
|||
|
|
|||
|
System: 6MHZ AT/286 Clone, 1 x Miniscribe 6085 72 meg voice
|
|||
|
coil 28 ms, DOS 4.01, 1 meg RAM drive, 1 meg cache.
|
|||
|
Arcmail: 1,273,367 bytes (.PKT), 9 down-link systems.
|
|||
|
Time: 26 minutes
|
|||
|
|
|||
|
|
|||
|
External utilities
|
|||
|
------------------
|
|||
|
TosScan comes with two external utility programs to help maintain
|
|||
|
your message base. Reply chain linking, killing old messages or
|
|||
|
keeping an area within a certain number of messages, renumbering,
|
|||
|
and for QuickBBS systems, the fastest pack and reindex you have
|
|||
|
seen.
|
|||
|
|
|||
|
|
|||
|
Availability
|
|||
|
------------
|
|||
|
By now I hope you're saying "Ok ok, enough! Where do I get it?".
|
|||
|
TosScan, as you may or may not know, is a commercial product. It
|
|||
|
will not be available for download or file request. It can only
|
|||
|
be purchased from the author.
|
|||
|
|
|||
|
The current special price, valid for 30 days from initial release
|
|||
|
is:
|
|||
|
|
|||
|
$20.00 - for users of the commercial version of FrontDoor.
|
|||
|
$30.00 - for users of the noncommercial version of FrontDoor.
|
|||
|
|
|||
|
Add $6.00 shipping and handling for all orders within the United
|
|||
|
States, $10.00 for overseas orders.
|
|||
|
|
|||
|
FidoNews 6-51 Page 25 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
Send your orders to:
|
|||
|
|
|||
|
InterZone Software, Inc.
|
|||
|
161 Madeira Avenue, Suite 57
|
|||
|
Coral Gables FL 33134
|
|||
|
|
|||
|
Please specify whether you want the QuickBBS version or MSG
|
|||
|
version. If you need the opposite version at a later date, you
|
|||
|
may obtain it for a minimal fee.
|
|||
|
|
|||
|
In closing
|
|||
|
----------
|
|||
|
TosScan is THE ultimate echomail processor for FrontDoor systems
|
|||
|
and I'm 100% sure you'll be glad you waited. It works quite well
|
|||
|
and has been filled with features suggested by dozens of beta
|
|||
|
testers like myself.
|
|||
|
|
|||
|
Here's what a few of my fellow Beta testers have to say about
|
|||
|
TosScan:
|
|||
|
|
|||
|
|
|||
|
"FrontDoor and TosScan fit together seamlessly...They are sim-
|
|||
|
ply the best network mailer and echomail processor available
|
|||
|
today... FrontDoor and TosScan are also the software of choice
|
|||
|
for point operation..."
|
|||
|
--- Bob Beilstein, 1:260/335
|
|||
|
|
|||
|
"I used to run Binkley/Confmail/Opus, but I long lusted after the
|
|||
|
flexibility of QuickBBS. But as an NEC and defacto MacList star
|
|||
|
I needed a fast, reliable echomail processor. TosScanQ/286 lets
|
|||
|
me run QuickBBS."
|
|||
|
--- Eric Larson, 1:260/330
|
|||
|
|
|||
|
" ...TosScan has taken the `worry' out of processing a great
|
|||
|
deal of mail. Easy to install, easy to maintain, but most im-
|
|||
|
portant, it is the most *ACCURATE* mail processor I have seen."
|
|||
|
|
|||
|
--- Bruce Bodger, NEC Net-170
|
|||
|
|
|||
|
"TosScan has made it easy being a Hub by it's shear speed and
|
|||
|
power...It's everything you ever wanted in a mail processor, all
|
|||
|
rolled up in one powerful package."
|
|||
|
|
|||
|
--- Kelly Drown, 170/403
|
|||
|
|
|||
|
"All I can say about TosScan is that it's the _slickest_
|
|||
|
tosser/scanner I've ever seen in my entire life. ...TosScan
|
|||
|
was the best $30 investment I made, and may the IC strike me down
|
|||
|
with excommunication if I don't tell the truth.."
|
|||
|
|
|||
|
--- Felix Kasza, 2:310/11
|
|||
|
|
|||
|
FidoNews 6-51 Page 26 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
"I have found TosScan to be a professionally conceived, executed,
|
|||
|
and supported product. It has provided me with a low cost and
|
|||
|
simple solution to all of my echomail needs, with a high degree
|
|||
|
of performance."
|
|||
|
--- Mark Howard, 1:260/340
|
|||
|
|
|||
|
|
|||
|
Every feature has been tried, misused, abused and mangled during
|
|||
|
the long months of testing. The result is a top notch product by
|
|||
|
an author that supports his products and is readily available to
|
|||
|
answer his users' questions.
|
|||
|
|
|||
|
Try it. I know you will be glad you did.
|
|||
|
|
|||
|
Mike Janke, 1:135/4
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 6-51 Page 27 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
Algorithm, The Personal Programming Newsletter
|
|||
|
by A.K. Dewdney
|
|||
|
London, Ontario, Canada
|
|||
|
|
|||
|
A.K. Dewdney, Computer Recreations columnist with Scientific
|
|||
|
American magazine, has launched a personal programming
|
|||
|
newsletter, Algorithm. The new publications is aimed at amateur
|
|||
|
and professional programmers alike. It extends the Computer
|
|||
|
Recreations tradition of recreational and educational
|
|||
|
programming projects: the Mandelbrot set, cellular automata,
|
|||
|
chaos and dynamics, wierd machines, stellar simulation, puzzles
|
|||
|
and many other topics.
|
|||
|
|
|||
|
The new publication carries seven features and will expand to
|
|||
|
include more columns. Currently, it includes Algoletter, advice
|
|||
|
from professionals; Easy Pieces, fascinating projects for
|
|||
|
beginning programmers by Michael Ecker of Creative Computing
|
|||
|
fame; Personal Programs, exercises for more advanced programmers
|
|||
|
by Cliff Pickover, IBM's computer graphics wizard; Algopuzzles,
|
|||
|
computer mid-benders by Dennis Shasha, author of The Puzzling
|
|||
|
Adventures of Dr. Ecco; Algofact and Algofiction, invited
|
|||
|
articles and stories from well-known scientists and authors. A
|
|||
|
Bulletin Board advertises hosts of recreational products by
|
|||
|
individuals and small companies.
|
|||
|
|
|||
|
Algorithm puts the "personal" back in "personal computing" by
|
|||
|
encouraging you to develop your programming skills while
|
|||
|
pursuing high adventure on the frontiers of science and
|
|||
|
computing. Order a free exmination copy by writing Algorithm at
|
|||
|
P.O. Box 29237, Westmount Postal Outlet, 785 Wonderland Road,
|
|||
|
London, Ontario, Canada N6K 1M6.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 6-51 Page 28 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
COLUMNS
|
|||
|
=================================================================
|
|||
|
|
|||
|
|
|||
|
The Node At the End Of The Universe
|
|||
|
2:256/117
|
|||
|
By Steve Townsley
|
|||
|
|
|||
|
Forget about uninterruptable power supplies this week the PSU
|
|||
|
went bang on an AT in the office. Luckly we know a good
|
|||
|
maintenance firm that happily trails the 170 miles from London
|
|||
|
just to fix problems like exploding computers.
|
|||
|
|
|||
|
Now, like everyone else in the office, I thought that the AT
|
|||
|
power supply had blown. Apparently I was wrong. Our peculiar
|
|||
|
beast was not true blue and therefore didn't have an AT power
|
|||
|
supply but a '286 power supply.
|
|||
|
|
|||
|
The intelligent amongst you may well ask, as I did, why a '286 is
|
|||
|
different from an AT. Well it isn't really. It's some of the odd
|
|||
|
bits that go into a 286 that are different from an AT. So while
|
|||
|
we are all proud of the fact that we have a small footprint AT be
|
|||
|
aware that a full AT power supply probably isn't in there.
|
|||
|
|
|||
|
So as well as blowing the fuse, fusing the network, and generally
|
|||
|
destroying a computer we now have to wait for our maintenance man
|
|||
|
to come back with a '286 power supply. A perfect fit for the
|
|||
|
slimer AT!
|
|||
|
|
|||
|
When your AT blows up, which I hope it never will, you can save
|
|||
|
yourself the error of ordering the wrong part by finding out
|
|||
|
whether you have a '286 or a real AT power supply.
|
|||
|
|
|||
|
|
|||
|
Graphics
|
|||
|
|
|||
|
One of the subjects that occasionally crosses my mind is
|
|||
|
graphics. Not because I am some kind of expert but simply because
|
|||
|
the various formats are beginning to gain my interest.
|
|||
|
|
|||
|
Like or not we are all heading towards graphics environments. The
|
|||
|
happy existance of 7 bit ASCII is on its way out. In place we may
|
|||
|
get variations of the Mac or something like Presentation Manager.
|
|||
|
|
|||
|
I know quite a few Swedes, Danes, Germans and so on that will be
|
|||
|
pleased to see the end of 7 bit ASCII. In graphics mode all
|
|||
|
foreign language character sets, symbols, mathematics and so on
|
|||
|
become straightforward and unrestricted by the rather narrow
|
|||
|
ASCII set. Even the British would like to see the pound sign
|
|||
|
become more standardised across hardware and software.
|
|||
|
|
|||
|
FidoNews 6-51 Page 29 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
On my Epson printer at work a pound sign is ASCII 35 - I
|
|||
|
therefore lose the hash symbol. On my IBM proprinter the pound
|
|||
|
sign is ASCII 156 which carefully sits in the middle of Epson's
|
|||
|
italic character set. Finally there is yet another standard for
|
|||
|
Hewlett Packard LaserJets.... ASCII 175 (a double chevron).
|
|||
|
Daisy-wheel printers differ depending on which wheel you choose.
|
|||
|
|
|||
|
In Britain we are only trying to print one character outside the
|
|||
|
American standard set. In Europe multiply the problem many times
|
|||
|
over.
|
|||
|
|
|||
|
So in reality the acceptance of new graphics environments,
|
|||
|
whether PC, Amiga or ST should be good news.
|
|||
|
|
|||
|
However I have to admit that something about these graphics
|
|||
|
environments throws me. Not only do they seem so much slower than
|
|||
|
my trusty, text based, PC-Write they also leave me with a feeling
|
|||
|
of 'do not touch'. I cannot quite explain it but when I finish
|
|||
|
this file I can type it to screen from a DOS prompt, copy it to a
|
|||
|
printer, even send it down a telephone line. Something about a
|
|||
|
graphics environment says that I will remove the simplicity of
|
|||
|
the command line to be replaced by a corporate designed
|
|||
|
leviathan.
|
|||
|
|
|||
|
Already the TLA's (Three Letter Abreviations) indicate that
|
|||
|
graphics 'experts' are far worse than comms junkies. Who can tell
|
|||
|
what a TIF, GIF or PCX file really is. How do I explain a user
|
|||
|
friendly icon based environment in terms that the average citizen
|
|||
|
might be enthusiastic about. Do I really have to buy a 386, 8
|
|||
|
megabytes of memory, OS/2 Presentation Manager, Pagemaker and a
|
|||
|
laser printer just to create a letterhead on my continuous
|
|||
|
stationery.
|
|||
|
|
|||
|
I have to confess to being partly a technological rebel. If
|
|||
|
someone could show how to include a letterhead from PC-Write on
|
|||
|
my trusty dot-matrix printer I would be inclined to feel that
|
|||
|
graphics have some place in my day to day computing. Wrestling
|
|||
|
with Ventura to send out a designed invoice on continuous
|
|||
|
stationery is hard work.
|
|||
|
|
|||
|
Having to create 3 separate printer drivers for 3 different
|
|||
|
printers just to print a pound sign does not make me confident
|
|||
|
that graphics will help. Abandoning 7 bit ASCII should help all
|
|||
|
PC owners be more creative and help us foreigners with a
|
|||
|
universal standard character set. However I have this suspicion
|
|||
|
that maybe software developers are not going to make it that
|
|||
|
easy.
|
|||
|
|
|||
|
|
|||
|
Finally if you have a comment to make on anything I ramble on
|
|||
|
about address it to 'The Node At The End Of Universe somewhere in
|
|||
|
Zone 2' or shorthand 2:256/117. Yes I do have a Compuserve
|
|||
|
address - but it's far to expensive to use from this corner of
|
|||
|
the Galaxy.
|
|||
|
|
|||
|
FidoNews 6-51 Page 30 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
VIA 0:0/0 <grin>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 6-51 Page 31 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
LATEST VERSIONS
|
|||
|
=================================================================
|
|||
|
|
|||
|
Latest Software Versions
|
|||
|
|
|||
|
MS-DOS Systems
|
|||
|
--------------
|
|||
|
|
|||
|
Bulletin Board Software
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
Fido 12q+ Phoenix 1.3 TBBS 2.1
|
|||
|
Lynx 1.30 QuickBBS 2.61* TComm/TCommNet 3.4
|
|||
|
Kitten 2.16 RBBS 17.2B TPBoard 6.0
|
|||
|
Opus 1.03b+ RBBSmail 17.2 Wildcat! 2.10*
|
|||
|
|
|||
|
|
|||
|
Network Node List Other
|
|||
|
Mailers Version Utilities Version Utilities Version
|
|||
|
|
|||
|
BinkleyTerm 2.30 EditNL 4.00 ARC 6.02
|
|||
|
D'Bridge 1.30* MakeNL 2.20 ARCA05 2.01
|
|||
|
Dutchie 2.90C ParseList 1.30 ARCmail 2.0
|
|||
|
FrontDoor 2.0 Prune 1.40 ConfMail 4.00
|
|||
|
PRENM 1.47 SysNL 3.01* EMM 2.02
|
|||
|
SEAdog 4.51b XlatList 2.90 Gmail 2.01
|
|||
|
XlaxDiff 2.32 GROUP 2.16
|
|||
|
XlaxNode 2.32 GUS 1.20M
|
|||
|
LHARC 1.13
|
|||
|
MSG 4.0
|
|||
|
MSGED 1.99
|
|||
|
PK[UN]ZIP 1.02*
|
|||
|
QM 1.0
|
|||
|
QSORT 4.03
|
|||
|
StarLink 1.01
|
|||
|
TCOMMail 2.2
|
|||
|
TMail 1.12
|
|||
|
TPBNetEd 3.2
|
|||
|
UFGATE 1.03
|
|||
|
XRS 3.0
|
|||
|
ZmailQ 1.09
|
|||
|
|
|||
|
Macintosh
|
|||
|
---------
|
|||
|
|
|||
|
Bulletin Board Software Network Mailers Other Utilities
|
|||
|
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
Red Ryder Host v2.1b3 Macpoint 0.91* MacArc 0.04
|
|||
|
Mansion 7.12 Tabby 2.1 ArcMac 1.3
|
|||
|
WWIV (Mac) 3.0 StuffIt 1.51
|
|||
|
FidoNews 6-51 Page 32 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
TImport 1.331
|
|||
|
TExport 1.32
|
|||
|
Timestamp 1.6
|
|||
|
Tset 1.3
|
|||
|
Timestart 1.1
|
|||
|
Tally 1.1
|
|||
|
Mehitabel 1.2
|
|||
|
Archie 1.60
|
|||
|
Jennifer 0.25b2g
|
|||
|
Numberizer 1.5c
|
|||
|
MessageEdit 1.0
|
|||
|
Mantissa 1.0
|
|||
|
PreStamp 2.01
|
|||
|
R.PreStamp 2.01
|
|||
|
Saphire 2.1t
|
|||
|
Epistle II 1.01
|
|||
|
Import 2.52
|
|||
|
Export 2.54
|
|||
|
Sundial 2.1
|
|||
|
AreaFix 1.1
|
|||
|
Probe 0.052
|
|||
|
Terminator 1.1
|
|||
|
TMM 4.0b
|
|||
|
UNZIP 1.01*
|
|||
|
Amiga
|
|||
|
-----
|
|||
|
|
|||
|
Bulletin Board Software Network Mailers Other Utilities
|
|||
|
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
Paragon 2.00+* BinkleyTerm 1.00 AmigArc 0.23
|
|||
|
TrapDoor 1.11 booz 1.01
|
|||
|
WelMat 0.35* ConfMail 1.10
|
|||
|
ChameleonEdit 0.10
|
|||
|
Lharc 1.00*
|
|||
|
ParseLst 1.30
|
|||
|
PkAX 1.00
|
|||
|
RMB 1.30
|
|||
|
UNzip 0.86
|
|||
|
Zoo 2.00
|
|||
|
|
|||
|
|
|||
|
Atari ST
|
|||
|
--------
|
|||
|
|
|||
|
Bulletin Board Software Network Mailer Other Utilities
|
|||
|
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
FIDO/FoReM Door 1.1* BinkleyTerm 1.03g ConfMail 1.00
|
|||
|
Pandora BBS 2.41c* The BOX 1.10* ParseList 1.30
|
|||
|
QuickBBS/ST 0.40* ARC 5.21
|
|||
|
GS Point 0.61 TurboArc 1.1
|
|||
|
FidoNews 6-51 Page 33 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
LHARC 0.40
|
|||
|
PKUNZIP 1.00
|
|||
|
MSGED 1.96S
|
|||
|
SRENUM 6.2
|
|||
|
OMMM 1.40*
|
|||
|
Timestop 1.00
|
|||
|
|
|||
|
|
|||
|
+ Netmail capable (does not require additional mailer software)
|
|||
|
* Recently changed
|
|||
|
|
|||
|
Utility authors: Please help keep this list up to date by
|
|||
|
reporting new versions to 1:1/1. It is not our intent to list
|
|||
|
all utilities here, only those which verge on necessity.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 6-51 Page 34 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
NOTICES
|
|||
|
=================================================================
|
|||
|
|
|||
|
The Interrupt Stack
|
|||
|
|
|||
|
|
|||
|
22 Dec 1989
|
|||
|
IFNA plebiscite results posted in NODELIST.356
|
|||
|
|
|||
|
30 Dec 1989
|
|||
|
Telephone area codes (5, 3 and 0) are abolished in Hong Kong
|
|||
|
|
|||
|
1 Feb 1990
|
|||
|
Deadline for IFNA Policy and Bylaws election
|
|||
|
|
|||
|
5 Jun 1990
|
|||
|
David Dodell's 33rd Birthday
|
|||
|
|
|||
|
5 Oct 1990
|
|||
|
21st Anniversary of "Monty Python's Flying Circus"
|
|||
|
|
|||
|
|
|||
|
If you have something which you would like to see on this
|
|||
|
calendar, please send a message to FidoNet node 1:1/1.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 6-51 Page 35 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
OFFICERS OF THE INTERNATIONAL FIDONET ASSOCIATION
|
|||
|
|
|||
|
Thom Henderson 1:107/528 Chairman of the Board
|
|||
|
Les Kooyman 1:204/501 President
|
|||
|
Fabian Gordon 1:107/323 Vice President
|
|||
|
Bill Bolton 3:3/0 Vice President-Technical Coordinator
|
|||
|
Kris Veitch 1:147/30 Secretary
|
|||
|
Kris Veitch 1:147/30 Treasurer
|
|||
|
|
|||
|
|
|||
|
IFNA COMMITTEE AND BOARD CHAIRS
|
|||
|
|
|||
|
Administration and Finance *
|
|||
|
By-laws and Rules John Roberts 1:385/49
|
|||
|
Executive Committee (Pres) Les Kooyman 1:204/501
|
|||
|
International Affairs *
|
|||
|
Membership Services Jim Vaughan 1:226/300
|
|||
|
Nominations and Elections Steve Bonine 1:1/0
|
|||
|
Public Affairs David Drexler 1:147/30.20
|
|||
|
Publications Irene Henderson 1:107/9
|
|||
|
Technical Standards Rick Moore 1:115/333
|
|||
|
Ethics *
|
|||
|
Security and Privacy *
|
|||
|
Grievances *
|
|||
|
|
|||
|
* Position in abeyance pending reorganization
|
|||
|
|
|||
|
|
|||
|
IFNA BOARD OF DIRECTORS
|
|||
|
|
|||
|
DIVISION AT-LARGE
|
|||
|
10 Courtney Harris 1:102/732 Don Daniels 1:107/210
|
|||
|
11 John Rafuse 1:12/900 Phil Buonomo 1:107/583
|
|||
|
12 Bill Bolton 3:711/403 Mark Hawthorne 1:107/238
|
|||
|
13 Fabian Gordon 1:107/323 Tom Jennings 1:125/111
|
|||
|
14 Ken Kaplan 1:100/22 Irene Henderson 1:107/509
|
|||
|
15 Kevin McNeil 1:128/45 Steve Jordan 1:206/2871
|
|||
|
16 Ivan Schaffel 1:141/390 Robert Rudolph 1:261/628
|
|||
|
17 Kathi Crockett 1:134/30 Dave Melnik 1:107/233
|
|||
|
18 Andrew Adler 1:135/47 Jim Hruby 1:107/536
|
|||
|
19 Kris Veitch 1:147/30 Burt Juda 1:107/528
|
|||
|
2 Henk Wevers 2:500/1 Karl Schinke 1:107/516
|
|||
|
3 Matt Whelan 3:54/99 John Roberts 1:147/14
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 6-51 Page 36 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
__
|
|||
|
The World's First / \
|
|||
|
BBS Network /|oo \
|
|||
|
* FidoNet * (_| /_)
|
|||
|
_`@/_ \ _
|
|||
|
| | \ \\
|
|||
|
| (*) | \ ))
|
|||
|
______ |__U__| / \//
|
|||
|
/ Fido \ _//|| _\ /
|
|||
|
(________) (_/(_|(____/ (tm)
|
|||
|
|
|||
|
Membership for the International FidoNet Association
|
|||
|
|
|||
|
Membership in IFNA is open to any individual or organization that
|
|||
|
pays a specified annual membership fee. IFNA serves the
|
|||
|
international FidoNet-compatible electronic mail community to
|
|||
|
increase worldwide communications.
|
|||
|
|
|||
|
Member Name _______________________________ Date _______________
|
|||
|
Address _________________________________________________________
|
|||
|
City ____________________________________________________________
|
|||
|
State ________________________________ Zip _____________________
|
|||
|
Country _________________________________________________________
|
|||
|
Home Phone (Voice) ______________________________________________
|
|||
|
Work Phone (Voice) ______________________________________________
|
|||
|
|
|||
|
Zone:Net/Node Number ____________________________________________
|
|||
|
BBS Name ________________________________________________________
|
|||
|
BBS Phone Number ________________________________________________
|
|||
|
Baud Rates Supported ____________________________________________
|
|||
|
Board Restrictions ______________________________________________
|
|||
|
|
|||
|
Your Special Interests __________________________________________
|
|||
|
_________________________________________________________________
|
|||
|
_________________________________________________________________
|
|||
|
In what areas would you be willing to help in FidoNet? __________
|
|||
|
_________________________________________________________________
|
|||
|
_________________________________________________________________
|
|||
|
Send this membership form and a check or money order for $25 in
|
|||
|
US Funds to:
|
|||
|
International FidoNet Association
|
|||
|
PO Box 41143
|
|||
|
St Louis, Missouri 63141
|
|||
|
USA
|
|||
|
|
|||
|
Thank you for your membership! Your participation will help to
|
|||
|
insure the future of FidoNet.
|
|||
|
|
|||
|
Please NOTE that IFNA is a general not-for-profit organization
|
|||
|
and Articles of Association and By-Laws were adopted by the
|
|||
|
membership in January 1987. The second elected Board of Directors
|
|||
|
was filled in August 1988. The IFNA Echomail Conference has been
|
|||
|
established on FidoNet to assist the Board. We welcome your
|
|||
|
input to this Conference.
|
|||
|
|
|||
|
FidoNews 6-51 Page 37 18 Dec 1989
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|