1758 lines
75 KiB
Plaintext
1758 lines
75 KiB
Plaintext
![]() |
F I D O N E W S -- | Vol. 8 No. 23 (10 June 1991)
|
|||
|
The newsletter of the |
|
|||
|
FidoNet BBS community | Published by:
|
|||
|
_ |
|
|||
|
/ \ | "FidoNews" BBS
|
|||
|
/|oo \ | (415)-863-2739
|
|||
|
(_| /_) | FidoNet 1:1/1
|
|||
|
_`@/_ \ _ | Internet:
|
|||
|
| | \ \\ | fidonews@fidonews.fidonet.org
|
|||
|
| (*) | \ )) |
|
|||
|
|__U__| / \// | Editors:
|
|||
|
_//|| _\ / | Tom Jennings
|
|||
|
(_/(_|(____/ | Tim Pozar
|
|||
|
(jm) |
|
|||
|
----------------------------+---------------------------------------
|
|||
|
Published weekly by and for the Members of the FidoNet international
|
|||
|
amateur network. Copyright 1991, Fido Software. All rights reserved.
|
|||
|
Duplication and/or distribution permitted for noncommercial purposes
|
|||
|
only. For use in other circumstances, please contact FidoNews.
|
|||
|
|
|||
|
Paper price: . . . . . . . . . . . . . . . . . . . . . . . $5.00US
|
|||
|
Electronic Price: . . . . . . . . . . . . . . . . . . . . . free!
|
|||
|
|
|||
|
For more information about FidoNews refer to the end of this file.
|
|||
|
--------------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
Table of Contents
|
|||
|
1. EDITORIAL ..................................................... 1
|
|||
|
2. ARTICLES ...................................................... 3
|
|||
|
Forbidden Fruit: Real privacy for electronic communications ... 3
|
|||
|
A start towards reasonable privacy in FidoNet mail and echom .. 6
|
|||
|
Practical privacy -- Public Key encryption .................... 9
|
|||
|
Do we maybe need a "bill of rights" ........................... 14
|
|||
|
CHILD ABUSE Echo .............................................. 16
|
|||
|
Talk Me Through It, Honey ..................................... 17
|
|||
|
Policies. Who Needs Them? ..................................... 17
|
|||
|
The SKEPTIC Echo Conference ................................... 18
|
|||
|
WorldPol 2 : Give it Up! ...................................... 19
|
|||
|
A Word from the Bible - Real Christians speak in tongues ...... 20
|
|||
|
3. CLASSIFIEDS ................................................... 23
|
|||
|
4. NOTICES ....................................................... 24
|
|||
|
The Interrupt Stack ........................................... 24
|
|||
|
Exclude. *.MSG - type Killer Dog Utility ...................... 25
|
|||
|
5. LATEST VERSIONS ............................................... 28
|
|||
|
Latest Software Versions ...................................... 28
|
|||
|
FidoNews 8-23 Page 1 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
======================================================================
|
|||
|
EDITORIAL
|
|||
|
======================================================================
|
|||
|
|
|||
|
EDITORIAL
|
|||
|
by Tom Jennings
|
|||
|
|
|||
|
There's enough of my blather in this issue. This is not what I
|
|||
|
intended when I became editor. It will not become the norm in the
|
|||
|
future.
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
When putting together the articles on the PGP encryption system (else-
|
|||
|
where in this issue) I was given a length file which I excerpted, and
|
|||
|
a very interesting paper on the closely related issue of privacy
|
|||
|
and encryption on amateur radio. I hate to see these kind of things
|
|||
|
go to waste. I assume this may happen again in the future.
|
|||
|
|
|||
|
So I've just started what I hope becomes a tradition -- a parallel,
|
|||
|
associated file called NOTEvnn.LZH, which contains the full texts
|
|||
|
of source files, unedited and unformatted. (vnn is the same
|
|||
|
volume/number format as FidoNews.) Text format (plain ASCII, tabs, CRs
|
|||
|
etc) not guarenteed. There may not be a corresponding NOTEvnn.LZH file
|
|||
|
for every FidoNews. If there is, the appropriate article(s) will
|
|||
|
indicate it.
|
|||
|
|
|||
|
It would be great if readers could take these things and persue them
|
|||
|
further.
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
If you publish an electronic newsletter or some such, and are worried
|
|||
|
about ending up like PHRACK, where it was claimed that electronic
|
|||
|
publications do not have First Amendment protections, there's an easy
|
|||
|
short-term solution: turn it into a print publication, that just
|
|||
|
happens to have an electronic version. I have done this to FidoNews --
|
|||
|
for $10 per copy you can have FidoNews delivered by the U.S. Postal
|
|||
|
Service. The electronic version is (and will always be) completely
|
|||
|
free of charge. Any money received will go towards phone bills here,
|
|||
|
and if by some miracle it exceeds my bill, all above that will go to
|
|||
|
the Electronic Frontier Foundation as a general donation from "The
|
|||
|
FidoNet".
|
|||
|
|
|||
|
Speaking of which, the Electronic Frontier Foundation (EFF) now has
|
|||
|
501(c)3 status, ie. is now tax deductable. EFF Inc, 112 Second St,
|
|||
|
Cambridge MA 02142. voice (617)\dash 864\dash 0665, or
|
|||
|
eff@well.sf.ca.us If you contact EFF, please tell them you read it in
|
|||
|
FidoNews. Anyone interested in receiving the EFF-TALK echo (gated
|
|||
|
to/from it's corresponding usenet newsgroup) please contact me at
|
|||
|
1:125/111 and I'll toss it your way ...
|
|||
|
|
|||
|
FidoNews 8-23 Page 2 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 8-23 Page 3 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
======================================================================
|
|||
|
ARTICLES
|
|||
|
======================================================================
|
|||
|
|
|||
|
Forbidden Fruit: Real privacy for electronic communications
|
|||
|
by Tom Jennings
|
|||
|
|
|||
|
See also: NOTE823
|
|||
|
|
|||
|
This is not a well-researched piece, I simply haven't had the time.
|
|||
|
It's 4:00pm on FidoNews publication day. I had planned on starting a
|
|||
|
few new "departments" for FidoNews (such as reviews of other
|
|||
|
publications) but this all happened in the last few days. I hope that
|
|||
|
it gives enough information to at least ask more questions.
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
This has been an exciting weekend. I got a job -- the first "real" job
|
|||
|
I've had since 1986. With Cygnus Support, moving GNU stuff to the IBM
|
|||
|
feces world. But not too real, I mean, the job interview was kinda
|
|||
|
fun, with cool people, and I got to bring all of the stuff I do,
|
|||
|
HOMOCORE `zine, propane car book, and not have to lie or leave out
|
|||
|
stuff. Not bad! More on this later.
|
|||
|
|
|||
|
The other thing is the release of "PGP", or "Pretty Good Privacy", by
|
|||
|
Phil Zimmermann (two n's). A complete RSA public-key encryption /
|
|||
|
decryption software system. This implementation is legal, with
|
|||
|
restrictions. But some of the powers-that-be are gonna raise a stink,
|
|||
|
legally or not. Get it while you can!
|
|||
|
|
|||
|
Encryption? Why would we need something so extreme? The issue is
|
|||
|
liberty -- privacy and the right to conduct your affairs as you see
|
|||
|
fit. Is having your mail remain unopened so extreme?
|
|||
|
|
|||
|
I've said it before, between these very pages (sic) -- the government
|
|||
|
doesn't grant you rights. It recognizes that we have "certain
|
|||
|
inalienable rights" , ie. rights exist, and that it should not be
|
|||
|
allowed to take away. *That is what the U.S. Bill of Rights -- the
|
|||
|
first 10 Amendments are* -- limits on the power of government, not a
|
|||
|
laundry list of rights "granted" to you. However, bureaucrats, well
|
|||
|
meaning or not, seem to forget this in desire to make their ponderous
|
|||
|
wheels turn more efficiently -- frequently at the expense of our
|
|||
|
freedoms.
|
|||
|
|
|||
|
Privacy is just that -- private. Certain forces in the universe don't
|
|||
|
believe you have a right to keep your affairs private, and have been
|
|||
|
at work to stifle, not always legally, tools and systems that would
|
|||
|
give us privacy in our communications.
|
|||
|
|
|||
|
You have probably heard by now of "Operation Sundevil", the Steve
|
|||
|
Jackson Games illegal busts by the Secret Service (lawsuit against the
|
|||
|
SS/FBI now in place), the Craig Neidorf "911" fiasco (turned out to be
|
|||
|
a $14 brochure), and other similar events. And the Electronic Frontier
|
|||
|
Foundation's work at preserving our liberties and defending some of
|
|||
|
the people under attack. If not, SHAME ON YOU! it has a direct -- yeah
|
|||
|
you -- affect on your right and maybe soon ability to communicate
|
|||
|
FidoNews 8-23 Page 4 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
electronically. I was planning on decent mention of the EFF and other
|
|||
|
groups this week, but this PGP thing took precedence.
|
|||
|
|
|||
|
You preserve liberties by using them. The price of freedom is eternal
|
|||
|
vigilance. Etc.
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
Sen. Biden and his cohorts have recently proposed the following in the
|
|||
|
U.S. Congress:
|
|||
|
|
|||
|
'It is the sense of Congress that providers of
|
|||
|
electronic communications services and
|
|||
|
manufacturers of electronic communications service
|
|||
|
equipment shall insure that communications systems
|
|||
|
permit the Government to obtain the plain text contents
|
|||
|
of voice, data, and other communications when appro-
|
|||
|
priately authorized by law.'
|
|||
|
|
|||
|
At least they're going through legal channels this time. (No remarks
|
|||
|
needed re: 'the sense of Congress'.)
|
|||
|
|
|||
|
There is a long and unpleasant history of suppression of privacy (and
|
|||
|
other) technology. There are export controls on some encryption tools,
|
|||
|
the end result of which you'll as the "US. Version only" markings on
|
|||
|
PC-TOOLS and NORTON. (You should read the SNAKE OIL section in the PGP
|
|||
|
documentation on this sort of "encryption" -- but I'm getting ahead of
|
|||
|
myself.) I do not know the history or any details on these export
|
|||
|
controls (...and no time to look them up. Well, readers?) Computer
|
|||
|
manufacturers attempting to put encryption/privacy hardware in their
|
|||
|
machines were told they would not get export licenses for those
|
|||
|
machines, effectively quashing that technology.
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
The following is one example of an extra-legal attempt at directing or
|
|||
|
controlling access to technologies. Nothing illegal was being done, so
|
|||
|
they had to resort to other methods. Ralph Merkle,
|
|||
|
mathematician/programmer at Xerox, was about to publish a paper titled
|
|||
|
"A Software Encryption Function", a way to effeciently implement
|
|||
|
encryption/privacy without special hardware. (The complete paper and
|
|||
|
reply message is Wazoo filerequestable from 1:1/1 as filename
|
|||
|
"NOTE823.LZH".)
|
|||
|
|
|||
|
The NSA (National Security Agency) put pressure on Xerox to suppress
|
|||
|
the paper. Xerox, with contracts ($$$) to lose, complied. Merkle,
|
|||
|
frustrated, didn't get to publish his paper.
|
|||
|
|
|||
|
John Gilmore, incensed, did. Here's a page from his story:
|
|||
|
|
|||
|
|
|||
|
FidoNews 8-23 Page 5 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
From postnews Thu Jul 13 03:10:10 1989
|
|||
|
From: toad.com!gnu (John Gilmore)
|
|||
|
Subject: Merkle's "A Software Encryption Function" now
|
|||
|
published and available
|
|||
|
Newsgroups: sci.crypt
|
|||
|
|
|||
|
Ralph Merkle called me today to let me know that Xerox
|
|||
|
was not going to let him submit his paper on a nice new
|
|||
|
set of encryption and hash functions to a journal for
|
|||
|
publication. The story is that a division of Xerox sells
|
|||
|
a lot of stuff to NSA and they threatened to pull their
|
|||
|
business if Xerox publishes it. There is no law that
|
|||
|
says NSA can stop Xerox from publishing it -- it's just a
|
|||
|
"business decision" on Xerox's part.
|
|||
|
|
|||
|
Happily, however, I do not sell anything to the NSA. And
|
|||
|
I have a copy of the paper, which was distributed for
|
|||
|
several months by Xerox, without any conditions, before NSA
|
|||
|
even heard of it. The work was not government-sponsored or
|
|||
|
classified; there is no law that lets the government
|
|||
|
suppress it.
|
|||
|
|
|||
|
As a courtesy to Xerox Corporation I could avoid publishing
|
|||
|
this paper. However, I prefer to extend the courtesy to the
|
|||
|
person who did the work, Ralph Merkle, who would like to
|
|||
|
see it released and used. I do thank Xerox for supporting
|
|||
|
his excellent work and hope that they will continue to do
|
|||
|
so. Mr. Merkle did not ask or suggest that I publish the
|
|||
|
paper, and should bear none of the blame (if any).
|
|||
|
|
|||
|
I have published and distributed a number of copies of
|
|||
|
this paper, and I hereby offer to sell a copy of this
|
|||
|
paper to anyone who sends me $10 (cash preferred, checks
|
|||
|
accepted) and a return address. Send your requests to:
|
|||
|
|
|||
|
Merkle Paper Publishing
|
|||
|
PO Box 170608
|
|||
|
San Francisco, CA, USA 94117-0608
|
|||
|
|
|||
|
Since the paper is "published and is generally available
|
|||
|
to the public through subscriptions which are available
|
|||
|
without restriction to any individual who desires to
|
|||
|
obtain or purchase the published information", it is
|
|||
|
exempt from State Department export control under 22 CFR
|
|||
|
120.18 and 22 CFR 125.1 (a), and is exportable to all
|
|||
|
destinations under Commerce Department General License
|
|||
|
GTDA under 15 CFR 379.3(a). It can therefore be sent to
|
|||
|
foreign as well as US domestic individuals.
|
|||
|
|
|||
|
I believe that the availability of fast, secure crypto-
|
|||
|
graphy to the worldwide public will enable us to build
|
|||
|
FidoNews 8-23 Page 6 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
much more secure computer systems and networks, increasing
|
|||
|
individual privacy as well as making viruses and worms
|
|||
|
much harder to write. For example, the Snefru one-way hash
|
|||
|
function described in the paper would be a good choice for
|
|||
|
validating copies of programs downloaded from BBS systems
|
|||
|
or the net, to detect virus contamination. If UUCP and
|
|||
|
TCP/IP links could be encrypted with Mr. Merkle's Khafre
|
|||
|
or Khufu ciphers, simple monitoring of phone wires or
|
|||
|
Ethernets would not yield login passwords, private mail,
|
|||
|
and other serious security violations. The technology
|
|||
|
exists; all that stands in our way is a bureacracy that has
|
|||
|
no *legal* power to restrict us, if we follow the published
|
|||
|
rules.
|
|||
|
|
|||
|
-- John Gilmore
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
Phil Zimmermann wrote PGP for his own reasons, and wasn't even aware
|
|||
|
of what went down with the Merkle paper. Two years of work, because he
|
|||
|
saw the need for someone to do this. (He says he's now totally broke
|
|||
|
because he basically blew off a lot of consulting jobs to finish this
|
|||
|
thing. Donations would probably be appreciated.) More details on PGP
|
|||
|
elsewhere in this issue of FidoNews.
|
|||
|
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
The Electronic Frontier Foundation (EFF) now has 501(c)3 status, ie.
|
|||
|
is now tax deductable. EFF Inc, 112 Second St, Cambridge MA 02142.
|
|||
|
voice (617)\dash 864\dash 0665, or eff@well.sf.ca.us If you contact
|
|||
|
EFF, please tell them you read it in FidoNews. Anyone interested in
|
|||
|
receiving the EFF-TALK echo (gated to/from it's corresponding usenet
|
|||
|
newsgroup) please contact me at 1:125/111 and I'll toss it your way
|
|||
|
...
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
A start towards reasonable privacy in FidoNet mail and echomail
|
|||
|
Tom Jennings 1:125/111
|
|||
|
|
|||
|
I propose that we immediately split off private echo-mail and casual
|
|||
|
FidoNet mail into it's own category, and leave all other uses
|
|||
|
(important private mail between people, or other pre-arranged
|
|||
|
circumstances) out of it for the moment.
|
|||
|
|
|||
|
My reasoning is three-fold: most "public" mail wants privacy rather
|
|||
|
than maximum security, and that until we have experience setting up
|
|||
|
key registries or "introducers" anything we do will be flawed by
|
|||
|
crypto standards. And not least, the fact that the high-security
|
|||
|
system requires manual intervention for every de-crypt operation,
|
|||
|
which is not workable for our automated systems.
|
|||
|
|
|||
|
FidoNews 8-23 Page 7 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
You can find out what PGP is capable of by reading the docs. Here are
|
|||
|
the limitations of my proposed low-tech system: Privacy is the goal,
|
|||
|
not military-level security. Messages are secure while in-transit;
|
|||
|
once received they become plaintext (see note below). Someone faking a
|
|||
|
node or sysop would get caught through the usual means, and in any
|
|||
|
case affect only that node/person.
|
|||
|
|
|||
|
NOTE: My proposal includes not using a pass-phrase on casual mail,
|
|||
|
simply so that the decrypt process won't require manual intervention,
|
|||
|
and so can be automated (batched). This means that your computer
|
|||
|
installation is not secure, but I don't think many of us care about
|
|||
|
that. If you do, you can simply retain the pass-phrase on the decrypt
|
|||
|
process. If that's not adequate, you shouldn't be using the casual
|
|||
|
mail system!
|
|||
|
|
|||
|
|
|||
|
So if all you do is run-of-the-mill private echo mail, and maybe a few
|
|||
|
juicy messages to your neighbors, a very casual system -- or even
|
|||
|
sloppy, by crypto standards -- will suffice. PGP's smallest key size,
|
|||
|
288 bits, is the least secure and fastest, performance-wise. If you
|
|||
|
have great need of tight security, make other arrangements until key
|
|||
|
registries/introducers are operating.
|
|||
|
|
|||
|
Within the FidoNet, the registry of keys could simply consist of a
|
|||
|
list of the public keys of the participants, without the "introducer"
|
|||
|
system. Take for example the current echomail backbone distribution --
|
|||
|
all the players know each other well enough to get the job done; most
|
|||
|
have session passwords implemented already. Anyone could simply look
|
|||
|
up a node or persons public key, and be reasonably sure that no one
|
|||
|
but the recipient could read it.
|
|||
|
|
|||
|
Another real-life example: I was just involved in an embarrassing
|
|||
|
situation of sending messages to a person in a net, and discussing
|
|||
|
someone who turned out to be the net host. The host stumbled upon the
|
|||
|
disparaging message. OOPS! If the message had been encrypted, this
|
|||
|
would not have happened.
|
|||
|
|
|||
|
|
|||
|
HOW TO DO IT:
|
|||
|
|
|||
|
The file KEYRING.PUB is your list of public keys, for everyone you
|
|||
|
want to send PGP'ed mail to. (I use the PGPPATH described in the
|
|||
|
docs.) I started with the distributed KEYRING.PUB, which contains Phil
|
|||
|
Zimmermann's key.
|
|||
|
|
|||
|
Then I made two key pairs for myself; the 288-bit 'low-security' one
|
|||
|
for casual use, and a full 992-bit super secure one, that I'll
|
|||
|
probably never use, with my personal name.
|
|||
|
|
|||
|
Consistency in naming conventions would be a big help in locating the
|
|||
|
public key for someone or some node. For FidoNet echo mail, the
|
|||
|
BBS/node name and address is a good start:
|
|||
|
|
|||
|
FidoNews 8-23 Page 8 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
Fido Software, 1:125/111 fidonet
|
|||
|
|
|||
|
System name, a comma, FidoNet address and domain. This allows a simple
|
|||
|
text search, sorting, etc.
|
|||
|
|
|||
|
|
|||
|
MAKING YOUR KEYS:
|
|||
|
|
|||
|
Run 'pgp -k' to set up your keys. The filename it asks for is for a
|
|||
|
local copy of the keys; the .PUB file is what you'll send to whoever
|
|||
|
for inclusion in the FidoNet registry. It will also ask if you want to
|
|||
|
put the keys you make in the keyring; say yes.
|
|||
|
|
|||
|
When asked for a pass phrase, DON'T ENTER ONE -- just hit the ENTER
|
|||
|
key. This will allow you to embed PGP into batch files and not require
|
|||
|
any operator intervention. (It also means that anyone who gets a copy
|
|||
|
of your .SEC file will have your private key. Oh well.)
|
|||
|
|
|||
|
|
|||
|
BATCH FILE COMMAND LINES:
|
|||
|
|
|||
|
It's now only a few hours away from the FidoNews deadline. I had hoped
|
|||
|
to be able to give some hard info on how to incorporate PGP into (for
|
|||
|
example) CONFMAIL and such, but I don't have enough time. Here is what
|
|||
|
I worked out so far.
|
|||
|
|
|||
|
** PGP's -u option generate UUENCODE output -- every 4 binary bytes
|
|||
|
become 3 ASCII ones, with CR/LFs to make 60 column lines. This
|
|||
|
fits in a standard FidoNet message. At decrypt time, PGP will
|
|||
|
automatically UUDECODE it. (With compression, the file is still
|
|||
|
significantly smaller.)
|
|||
|
|
|||
|
** PGP does LHARC type compression, but if it finds the input file has
|
|||
|
a ZIP type header, will skip the compression. However, if the file
|
|||
|
is already compressed, PGP will still attempt to, though once it
|
|||
|
gets all the way to the end it will eventually figure it out. The
|
|||
|
author says that next release will include a command line switch
|
|||
|
to disable all compression. (Source is available...)
|
|||
|
|
|||
|
** The following command line does the dirty deed:
|
|||
|
|
|||
|
pgp -es <inputfile> TO_userid YOUR_userid <output file>
|
|||
|
|
|||
|
PGP will not allow <input file> to be the same as <output file> so
|
|||
|
arrange otherwise, or do renaming as necessary. The following
|
|||
|
command line decrypts a file no matter how it was encrypted:
|
|||
|
|
|||
|
pgp output.foo output.foo
|
|||
|
|
|||
|
** Encryption is fast; decryption is slow.
|
|||
|
|
|||
|
FidoNews 8-23 Page 9 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
** It should be easy to use 'robot' mailers to send encrypted mail
|
|||
|
without any changes. It would be nice to have a program that runs
|
|||
|
similar to an echo-mail 'export' that scans messages for a keyword
|
|||
|
or other such mechanism, invokes PGP and puts the results back into
|
|||
|
the message appropriately marked, and lets the mailer mail the
|
|||
|
messages normally. Maybe another kludge line (sigh).
|
|||
|
|
|||
|
** I don't know what ERRORLEVEL returns PGP has. These need to be
|
|||
|
explored. They might be the key to automatic detection of an
|
|||
|
encrypted vs. plaintext packet.
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Practical privacy -- Public Key encryption
|
|||
|
|
|||
|
by Tom Jennings
|
|||
|
|
|||
|
"The best way to secure liberty is to exercise it."
|
|||
|
-- John Barlow
|
|||
|
|
|||
|
TTTTT here are as many legal and ethical issues facing our computer
|
|||
|
T networks as there are technical ones, and they are changing just
|
|||
|
T as fast. We tend to focus on the techie ones, partly because
|
|||
|
they are more interesting, but also because they are under our
|
|||
|
immediate control. The other ones are soooo messy!
|
|||
|
|
|||
|
Privacy, and our right to it, is one of these other issues. Also, liability
|
|||
|
of the system operator regarding stuff flowing through their system.
|
|||
|
|
|||
|
A major component in our ability to control access to our private
|
|||
|
information is now available -- it's called PGP, or "Pretty Good Privacy",
|
|||
|
a complete RSA Public Key encryption/decryption software implementation,
|
|||
|
written by Philip Zimmerman.
|
|||
|
|
|||
|
Jim Warren calls it guerrilla cryptography.
|
|||
|
|
|||
|
You can Wazoo filerequest the software, with complete sources under
|
|||
|
the "copyleft" agreement, from FidoNet 1:125/111 as magicname "PGP".
|
|||
|
(270K in two ZIP files.)
|
|||
|
|
|||
|
I'll start off with an excerpt from the rather excellent documentation:
|
|||
|
|
|||
|
|
|||
|
Why Do You Need PGP? (from p.25, PGPGUIDE.LST)
|
|||
|
====================
|
|||
|
|
|||
|
"III t's personal. It's private. And it's no one's business but
|
|||
|
I yours. You may be planning a political campaign, discussing
|
|||
|
I your taxes, or having an illicit affair. Or you may be doing
|
|||
|
III something that shouldn't be illegal, but is. Whatever it is,
|
|||
|
you don't want your private electronic mail (E-mail) read by anyone
|
|||
|
else. There's nothing wrong with asserting your privacy. Privacy is as
|
|||
|
apple-pie as the Constitution.
|
|||
|
|
|||
|
FidoNews 8-23 Page 10 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
"Perhaps you think your E-mail is legitimate enough that encryption is
|
|||
|
unwarranted. If you really are a law-abiding citizen with nothing to
|
|||
|
hide, then why don't you always send your paper mail on postcards? Why
|
|||
|
not submit to drug testing on demand? Why require a warrant for police
|
|||
|
searches of your house? Are you trying to hide something? You must be
|
|||
|
a subversive or a drug dealer if you hide your mail inside envelopes.
|
|||
|
Or maybe a paranoid nut. Do law-abiding citizens have any need to
|
|||
|
encrypt their E-mail?
|
|||
|
|
|||
|
"What if everyone believed that law-abiding citizens should use
|
|||
|
postcards for their mail? If some brave soul tried to assert his
|
|||
|
privacy by using an envelope for his mail, it would draw suspicion.
|
|||
|
Perhaps the authorities would open his mail to see what he's hiding.
|
|||
|
Fortunately, we don't live in that kind of world. Because everyone
|
|||
|
protects most of their mail with envelopes, no one draws suspicion by
|
|||
|
asserting their privacy with an envelope. There's safety in numbers.
|
|||
|
Analogously, it would be nice if everyone routinely used encryption
|
|||
|
for all their E-mail, innocent or not, so that no one drew suspicion
|
|||
|
by asserting their E-mail privacy with encryption. Think of it as a
|
|||
|
form of solidarity.
|
|||
|
|
|||
|
"If the Government wants to violate the privacy of ordinary citizens,
|
|||
|
it has to expend a certain amount of expense and labor to intercept
|
|||
|
and steam open and read paper mail, and listen to and possibly
|
|||
|
transcribe spoken telephone conversation. This kind of labor-
|
|||
|
intensive monitoring is not practical on a large scale. This is only
|
|||
|
done in important cases when it seems worthwhile.
|
|||
|
|
|||
|
"More and more of our private communications are going to be routed
|
|||
|
through electronic channels. Electronic mail will gradually replace
|
|||
|
conventional paper mail. E-mail messages are just too easy to
|
|||
|
intercept and scan for interesting keywords. This can be done easily,
|
|||
|
routinely, automatically, and undetectably on a grand scale.
|
|||
|
International cablegrams are already scanned this way on a large scale
|
|||
|
by the NSA.
|
|||
|
|
|||
|
"We are moving toward a future when the nation will be crisscrossed
|
|||
|
with high capacity fiber optic data networks linking together all our
|
|||
|
increasingly ubiquitous personal computers. E-mail will be the norm
|
|||
|
for everyone, not the novelty it is today. Perhaps the Government will
|
|||
|
protect our E-mail with Government-designed encryption algorithms.
|
|||
|
Probably most people will trust that. But perhaps some people will
|
|||
|
prefer their own protective measures.
|
|||
|
|
|||
|
"The 17 Apr 1991 New York Times reports on an unsettling US Senate
|
|||
|
proposal that is part of a counterterrorism bill. If this nonbinding
|
|||
|
resolution became real law, it would force manufacturers of secure
|
|||
|
communications equipment to insert special 'trap doors' in their
|
|||
|
products, so that the Government can read anyone's encrypted messages.
|
|||
|
It reads: 'It is the sense of Congress that providers of electronic
|
|||
|
communications services and manufacturers of electronic communications
|
|||
|
service equipment shall insure that communications systems permit the
|
|||
|
Government to obtain the plain text contents of voice, data, and other
|
|||
|
communications when appropriately authorized by law.'
|
|||
|
|
|||
|
FidoNews 8-23 Page 11 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
"If privacy is outlawed, only outlaws will have privacy. Intelligence
|
|||
|
agencies have access to good cryptographic technology. So do the big
|
|||
|
arms and drug traffickers. So do defense contractors, oil companies,
|
|||
|
and other corporate giants. But ordinary people and grassroots
|
|||
|
political organizations mostly do not have access to affordable
|
|||
|
"military grade" public-key cryptographic technology.
|
|||
|
|
|||
|
"PGP enables people to take their privacy into their own hands.
|
|||
|
There's a growing social need for it. That's why I wrote it."
|
|||
|
|
|||
|
(Philip Zimmerman)
|
|||
|
|
|||
|
TTTTT raditional cryptographic systems use a single key to both
|
|||
|
T encrypt and decrypt a message. In order to maintain security,
|
|||
|
T you need to have worked out some way beforehand to safely get a
|
|||
|
copy of the key to the sender and receiver. Obviously you can't use a
|
|||
|
communications network! And if you work out a secure method to
|
|||
|
transmit the key, (short of a face to face meeting), why do you need
|
|||
|
cryptography?!
|
|||
|
|
|||
|
The RSA system completely avoids this problem by using two keys. One
|
|||
|
is broadcast to the world (and called the public key), the other is
|
|||
|
kept secret (the secret key). To send a secure message, all you need
|
|||
|
is one of the keys, the public one. Once encrypted, the ciphertext
|
|||
|
(encrypted text) can only be decrypted using the other key, the secret
|
|||
|
one. Not even the sender can decrypt the message so encrypted. This
|
|||
|
eliminates the need to distribute secret keys entirely.
|
|||
|
|
|||
|
Each person generates their own keys, public and secret. The secret
|
|||
|
one is kept absolutely secret. Public keys are just that -- public.
|
|||
|
You might maintain a database of public keys:
|
|||
|
|
|||
|
NAME/USER ID PUBLIC KEY
|
|||
|
Jennings, Tom; FidoNet 1:1/1 Tom_Jennings
|
|||
|
Moron, Oxie; East Overshoe AL Oxie_Moron
|
|||
|
... ...
|
|||
|
|
|||
|
The encrypted file is then transmitted to the recipient in the usual
|
|||
|
manner. (In the MSDOS implementation, you could fileattach it, or
|
|||
|
use the built-in UUENCODE which generates plain ASCII that can be put
|
|||
|
directly into a message.)
|
|||
|
|
|||
|
When the receiver decrypts the file, the RSA software looks for the
|
|||
|
secret key using the NAME attached to the file, which is presumably
|
|||
|
the receivers'.
|
|||
|
|
|||
|
There is a simple and powerful scheme to "authenticate" the sender as
|
|||
|
well -- to ensure that the "From:" person is who they say they are.
|
|||
|
This is called a signature (like on a letter), and is simply a file
|
|||
|
encrypted using the secret key. A file encrypted using the secret key
|
|||
|
can be decoded only by using the public key. Therefore, I could
|
|||
|
generate an encrypted signature file, that anyone could verify by
|
|||
|
using my published public key. If it decrypts, you can be assured that
|
|||
|
the signature is mine.
|
|||
|
|
|||
|
FidoNews 8-23 Page 12 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
The keys, public and private, are kept in compact disk files. A
|
|||
|
minimal installation will contain a public 'keyring' (as a list of
|
|||
|
keys is called) and a private keyring. The public 'ring will contain
|
|||
|
public keys for everyone you want to encrypt for. The secret keyring
|
|||
|
contains only your secret key, and no other.
|
|||
|
|
|||
|
(The secret keyring file is pass-phrase detected; whenever the
|
|||
|
software needs to access your secret key, it asks for a pass phrase
|
|||
|
you specify when you initialize the pgp software. This is just an
|
|||
|
overview; please refer to the pgp docs for details.)
|
|||
|
|
|||
|
----------------------------------------------------------------
|
|||
|
|
|||
|
OOOOO K, I've written a hot, steamy letter to my friend Oxie Moron.
|
|||
|
O O Because it will be traveling over a public network, I want to
|
|||
|
OOOOO send it encrypted, with my signature so he'll know it's
|
|||
|
genuinely from me.
|
|||
|
|
|||
|
First, find Oxie's public key in the key book; he's using his full
|
|||
|
name as his public key. (A nice simple idea.) I then encrypt the file
|
|||
|
(STEAMY.LTR) using Oxie's public key, and my secret key:
|
|||
|
|
|||
|
pgp -esu STEAMY.LTR Oxie_Moron
|
|||
|
|
|||
|
[-esu means E)ncrypt S)ign U)uencode]
|
|||
|
|
|||
|
pgp prompts me for my pass phrase (since it needs to use my secret key
|
|||
|
to generate the signature), spins for a while, and produces a file
|
|||
|
STEAMY.CTX, which looks like complete gibberish if you peek at it. I
|
|||
|
file-attach this file to Oxie in the usual way. Since -u was used,
|
|||
|
STEAMY.CTX is an ASCII (gibberish) file that can be included into a
|
|||
|
normal e-mail message.
|
|||
|
|
|||
|
...
|
|||
|
|
|||
|
Eventually Oxie gets the file STEAMY.CTX. Excited, he runs pgp to
|
|||
|
decrypt the file:
|
|||
|
|
|||
|
pgp STEAMY (pgp assumed extention .CTX)
|
|||
|
|
|||
|
pgp asks Oxie for the pass phrase needed to access his secret key. It
|
|||
|
then decrypts the file STEAMY.LTR, the signature, and uu-decodes it. I
|
|||
|
won't tell you what happens when he reads it.
|
|||
|
|
|||
|
|
|||
|
TTTTT he pgp documentation is pretty good; besides covering the techie
|
|||
|
T details of operation, it gives a fair description of crypto-
|
|||
|
T graphy for the novice. I assume my knowledge of cryptography is
|
|||
|
typical; I played with "substitution ciphers" and other trivial stuff
|
|||
|
when I was a kid, and got immediately bored with the elaborate math
|
|||
|
needed for anything else. After playing with the program and a sample
|
|||
|
text file, I was able to pretty thoroughly understand the overall
|
|||
|
process in an hour or so. The documentation covers "why",
|
|||
|
vulnerabilities of cryptography, and a section on "Snake Oil", or the
|
|||
|
incredible in-security of so-called encryption systems commercially
|
|||
|
available.
|
|||
|
FidoNews 8-23 Page 13 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
Needless to say, it has far more features than I've laid out here, but
|
|||
|
the whole thing is very compact. pgp also compresses and decompresses
|
|||
|
the file using the same public-domain algorithm LHARC uses, and will
|
|||
|
detect the use of PKZIP.
|
|||
|
|
|||
|
To end this mini-review of the pgp software, I'll simply include the
|
|||
|
tail end of the PGPGUIDE.LST document:
|
|||
|
|
|||
|
"Recommended Readings
|
|||
|
====================
|
|||
|
|
|||
|
1) Dorothy Denning, "Cryptography and Data Security",
|
|||
|
Addison-Wesley, Reading, MA 1982
|
|||
|
2) Dorothy Denning, "Protecting Public Keys and Signature Keys",
|
|||
|
IEEE Computer, Feb 1983
|
|||
|
3) Philip Zimmermann, "A Proposed Standard Format for RSA
|
|||
|
Cryptosystems", IEEE Computer, Sep 1986
|
|||
|
4) Ronald Rivest, "The MD4 Message Digest Algorithm", MIT Laboratory
|
|||
|
for Computer Science, 1990
|
|||
|
|
|||
|
About the Author of PGP
|
|||
|
=======================
|
|||
|
|
|||
|
"Philip Zimmermann is a software engineer consultant with 17 years
|
|||
|
experience, specializing in embedded real-time systems, cryptography,
|
|||
|
authentication, and data communications. Experience includes design
|
|||
|
and implementation of authentication systems for financial information
|
|||
|
networks, network data security, key management protocols, embedded
|
|||
|
real-time multitasking executives, operating systems, and local area
|
|||
|
networks.
|
|||
|
|
|||
|
"He can be reached at:
|
|||
|
|
|||
|
Boulder Software Engineering
|
|||
|
3021 Eleventh Street
|
|||
|
Boulder, Colorado 80304 USA
|
|||
|
Phone 303-444-4541 (10:00am - 7:00pm Mountain Time)
|
|||
|
FAX 303-444-4541 ext 10
|
|||
|
Internet: prz@sage.cgd.ucar.edu"
|
|||
|
|
|||
|
"Phil Zimmermann has made a real contribution to communcations
|
|||
|
privacy 'Pretty Good Privacy' is a damn good idea."
|
|||
|
|
|||
|
-- Marc Rotenburg, CPSR Washington office
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Tell him you read about it in FidoNews. You can Wazoo filerequest the
|
|||
|
software, with complete sources under the "copyleft" agreement, from
|
|||
|
FidoNet 1:125/111 as magicname "PGP". 270K in two ZIP files.
|
|||
|
|
|||
|
FidoNews 8-23 Page 14 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Steve Winter
|
|||
|
FidoNet 1:151/208 209 210
|
|||
|
|
|||
|
I had a real shock the other night. All of a sudden I was
|
|||
|
notified that my echomail feed had been cut due to
|
|||
|
complaints. I was not told who the complaints were from,
|
|||
|
nor what they were about other than "my behaviour on echos".
|
|||
|
|
|||
|
I haven't been in FIDO very long, but I do know that the
|
|||
|
normal procedure in "echo problems" is that a moderator can
|
|||
|
cut anyones feed and doesn't even need to have a reason. I
|
|||
|
agree with that as I am the founder and moderator of
|
|||
|
HOLY_BIBLE. I was told that in FIDO if you don't like the
|
|||
|
way an echo is run, go start your own (which makes me wonder
|
|||
|
when I am told "we allready have a Bible conference" in
|
|||
|
response to my request to get my allready coast to coast
|
|||
|
echo on the backbone. eh?).
|
|||
|
|
|||
|
When I was advised that ALL my feeds had been cut, I
|
|||
|
(over?)reacted by sending netmail all over the place (some
|
|||
|
of which resulted in some very kind support for me). As it
|
|||
|
turned out there were a series of bad things that led to my NEC's
|
|||
|
actions. I have chatted voice with him and he immediately
|
|||
|
turned my feeds back on, he had been lied to. Here are the
|
|||
|
main parts to the events that caused my feed to be cut so
|
|||
|
abruptly.:
|
|||
|
|
|||
|
1) Netmail didn't arrive that I had sent my NEC in answer to a
|
|||
|
crackpot that had entered an echo thread with "I rebuke you Satan"
|
|||
|
and, when he was unable to prevail in the ensuing debate, filed a
|
|||
|
policy complaint that I was "excessively annoying". He was
|
|||
|
annoyed that he couldn't prove his point and I was proving mine.
|
|||
|
|
|||
|
2) There was a complaint on file against me by a dishonest
|
|||
|
moderator. I realize that he certainly had the right as
|
|||
|
moderator to simply say "bye", and that would have been
|
|||
|
fine, but he sent a "list" of complaints. Among those
|
|||
|
complaints were:
|
|||
|
|
|||
|
a) A complaint from a user that I had called him
|
|||
|
in the middle of the night and threatened his life. That
|
|||
|
person had ADMITTED in the echo that he had lied, he
|
|||
|
gets his echomail in the middle of the night and I had
|
|||
|
posted a Bible verse concerning his condemnation (it *was*
|
|||
|
supposted to be a Bible echo). The dishonest moderator had
|
|||
|
sent the "complaint" without telling my NEC that it had been
|
|||
|
proven false.
|
|||
|
|
|||
|
b) Multiple copies from various users complaining of a
|
|||
|
BBS ad that I had posted in *response* to a REQUEST from a guy
|
|||
|
that was openly requesting BBS information for a religious BBS
|
|||
|
list.
|
|||
|
|
|||
|
FidoNews 8-23 Page 15 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
3) A moderator of a general echo who had never said a word
|
|||
|
to me about religion being "off topic", even when the "on
|
|||
|
topicness" had been openly discussed, sent a complaint to
|
|||
|
my NEC. As it turned out I had allready dropped the conference
|
|||
|
without even being asked to when it was announced that the
|
|||
|
conference was to be censored. I had, in fact, joined that
|
|||
|
particular conference to "take a break" from preaching, but
|
|||
|
found a lady being bashed for her religious beliefs. It would
|
|||
|
appear that "religion" is quite "on topic" in some echos as
|
|||
|
long as the "right" group is prevailing in the debate. eh?
|
|||
|
|
|||
|
|
|||
|
These and similar things had piled up a number of
|
|||
|
frivilous complaints on my NEC's doorstep. I was left feeling
|
|||
|
*very* "wronged" and feeling that I had no place within FIDO
|
|||
|
to turn and, without reflection, and excersizing poor judgment
|
|||
|
(anger etc), threatened to pursue civil action.
|
|||
|
|
|||
|
I apologise to all for my rashness concerning threats of
|
|||
|
litigation!
|
|||
|
|
|||
|
Now, at this point I sincerely hope that a suit never happens,
|
|||
|
and if it does I hope it is FAR away from me. I was however
|
|||
|
met with a feeling that there is a general concensus based
|
|||
|
upon some early on scenarios that the FIDO *C structure is
|
|||
|
immune to civil litigation. I do not believe that is a safe
|
|||
|
assumption. Let me say again "I'm on our side", but I
|
|||
|
believe that there are some points that I was forced to
|
|||
|
consider that remain valid even though my problem was
|
|||
|
resolved by the NEC (and others) being real decent people.
|
|||
|
|
|||
|
I'm not so sure that the hobby "defense" would work in a
|
|||
|
case of religious discrimination. In addition, since joining
|
|||
|
FIDO I have spent several hundred dollars on software
|
|||
|
advertised and supported on FIDO.....then, all of a sudden, a
|
|||
|
handful of people who didn't like my opinions got my access to
|
|||
|
customer support cut. We could go on and on, and who knows
|
|||
|
who would have won or lost. With litigation and violence it
|
|||
|
is more often training rather than "rightness" that prevails.
|
|||
|
More often than not the only winner$ are lawyer$.
|
|||
|
|
|||
|
What happened to me was simply some unethical people
|
|||
|
combined with a computer problem that had kept my NEC from
|
|||
|
receiving my netmail (and I never received some things cc.ed
|
|||
|
to me). This time a couple of voice conversations cleared
|
|||
|
things up and I believe I made a new friend or two.
|
|||
|
|
|||
|
What about next time? People are joining FIDO. FIDO is
|
|||
|
BIG! Goods and services are being advertised and supported
|
|||
|
in it's echos. What can be done to prevent misunderstandings,
|
|||
|
or sometimes deliberate attempts by unscrupulous people who
|
|||
|
can't prevail in an open forum?? (once again, I support any
|
|||
|
moderator's right to access of "their" conference, I am
|
|||
|
talking about general access to echomail)
|
|||
|
|
|||
|
FidoNews 8-23 Page 16 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
I SUGGEST that FIDO would do well to adopt a "bill of
|
|||
|
rights" to prevent what happened to me from happening to
|
|||
|
anyone else, OR anything similar from happening to anyone
|
|||
|
else. I believe that FIDO is built upon a foundation that
|
|||
|
includes a desire to be fair and open.
|
|||
|
|
|||
|
I like FIDO. It appeared to me to be a network where, unlike
|
|||
|
some others, a handful of dishonest people couldn't just
|
|||
|
build a case and "kick out" whoever they didn't agree with.
|
|||
|
How can a person "go start their own echo" if the powers
|
|||
|
that be can simply get all that person's echo feeds cut?
|
|||
|
|
|||
|
A good "Bill of Rights" now could prevent lawsuits later.
|
|||
|
|
|||
|
Steve Winter (moderator - HOLY_BIBLE)
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Joe Chamberlain
|
|||
|
1:150/175
|
|||
|
|
|||
|
CHILD_ABUSE Echo
|
|||
|
|
|||
|
CHILD_ABUSE was formed to discuss the entire realm of a
|
|||
|
national problem. It's main goal is to present a forum where
|
|||
|
methods of prevention, types of treatment, and available resources
|
|||
|
can be discussed.
|
|||
|
|
|||
|
You would think that the laws concerning child abuse
|
|||
|
would be clear cut, but this is not always the case. In some
|
|||
|
states even the definition of child abuse is controversial. It
|
|||
|
is the intent of this echo to discuss these situations and to
|
|||
|
bring some understanding to the issues.
|
|||
|
|
|||
|
CHILD_ABUSE can be a good companion echo for PARENTS,
|
|||
|
PLEASE, DADS and SIP_INCEST. It is not intended that this echo
|
|||
|
duplicate or replace the others, but rather to add a different
|
|||
|
dimension. It will offer the parent an opportunity to discuss
|
|||
|
what methods work best in avoiding abuse; it will offer the adult
|
|||
|
abused as a child a source of information on effective parenting
|
|||
|
techniques, and the abuser will find references on how to avoid
|
|||
|
and stop the terrible cycle.
|
|||
|
|
|||
|
Currently the echo generates about thirty-five (35) each
|
|||
|
week and is carried by about 15 BBSs. Some of the individuals
|
|||
|
currently sharing their ideas on this subject are a nurse,
|
|||
|
psychologist, a former abuser, survivors, a former teacher, and a
|
|||
|
member of a parents group.
|
|||
|
|
|||
|
CHILD_ABUSE presents a forum where it is understood
|
|||
|
that parents are not trained in child rearing, that children
|
|||
|
become victims, and the abusers want to stop thier destructive
|
|||
|
behavior.
|
|||
|
|
|||
|
FidoNews 8-23 Page 17 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
We would like to have you and your users join us in
|
|||
|
becoming more informed about a national problem. We look forward
|
|||
|
to receiving your response to this invitation and hope we can
|
|||
|
offer an important echo to your users.
|
|||
|
|
|||
|
Al Jones 106/5433 24hrs
|
|||
|
Joe Chamberlain 150/175 8pm - 6am EDT
|
|||
|
co-moderators
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Henry Clark
|
|||
|
1:124/6120
|
|||
|
|
|||
|
|
|||
|
The 4th Annual Poor Man's Fidocon and Lake Party --
|
|||
|
|
|||
|
CANCELLED because an arsonist destroyed the host's home.
|
|||
|
|
|||
|
This has so completely upset me that I hesitate to make further
|
|||
|
comment.
|
|||
|
|
|||
|
Nets 124 and 130 have scheduled a Pizza Party, June 15th, at
|
|||
|
Mr. Gattis Pizza, Walnut Hill and Marsh Lane, Dallas Texas at
|
|||
|
13:00 hours. Many will bring household items, cash and other
|
|||
|
necessities in an effort to ease the pain of this experience
|
|||
|
for John and his family.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Chris Farrar - FidoNet 1:246/20
|
|||
|
IMEX 89:488/20
|
|||
|
|
|||
|
WorldPol: A Flawed Document
|
|||
|
|
|||
|
A week or so ago I read the proposed WorldPol Version 2. Watchers of
|
|||
|
the BBC series "Yes, Minister" and "Yes, Prime Minister" would surely
|
|||
|
compliment Sir Humphry Appleby if he had presented this document to
|
|||
|
the minister for approval. Let us not forget several things, first and
|
|||
|
foremost, that FidoNet(reg tm) is a HOBBY! Not a country, not a way of
|
|||
|
life, but a hobby. Most of the people reading this electronic magazine
|
|||
|
are sysops who cannot live on the revenue that is generated by their
|
|||
|
board. Surely we can produce a simple document that can have everybody
|
|||
|
living in harmony, or at least tolerance of each other. There are
|
|||
|
serious flaws in Policy4 that need addressing, no doubt about it, but
|
|||
|
WorldPol is the wrong way to go about it. That is not to say that
|
|||
|
WorldPol didn't have it's good points.
|
|||
|
|
|||
|
What we need, is a return to basics. The rules for being in FidoNet
|
|||
|
should be simply expressed:
|
|||
|
|
|||
|
FidoNews 8-23 Page 18 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
1) You shall not be excessively annoyed.
|
|||
|
2) You shall not be excessively annoying.
|
|||
|
3) Your system, unless marked with a PVT flag, shall be up during
|
|||
|
ZMH.
|
|||
|
4) The mailer/BBS you run shall comply to at least the minimum
|
|||
|
standards, as defined by FTS-0001.
|
|||
|
.
|
|||
|
.
|
|||
|
.
|
|||
|
|
|||
|
We do not need 10 pages of quasi-legal mumbo-jumbo! When writing the
|
|||
|
new policy documents, remember the old K.I.S.S. philosophy.
|
|||
|
|
|||
|
I've said my two bits. Replies via NetMail or FN_SYSOP are welcome.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
Fredric L. Rice
|
|||
|
1:102/901.0
|
|||
|
|
|||
|
Dozens of Skeptic organizations and skeptically-oriented nodes
|
|||
|
around the United States are being linked together to form the
|
|||
|
FidoNet SKEPTIC Echo Mail Conference. All systems which are
|
|||
|
interested in participating in the conference should request a
|
|||
|
link to either of the following nodes (The list will grow as
|
|||
|
systems report in. Check the EchoList for system additions):
|
|||
|
|
|||
|
Southern California 1:102/901 1:102/851
|
|||
|
Northern California 1:125/41 1:125/27
|
|||
|
Washington DC 1:109/519
|
|||
|
|
|||
|
The skeptical examination of paranormal claims such as psychic
|
|||
|
powers, UFOs, astrology, Bigfoot, biorhythms, crystals, satanic
|
|||
|
cults, fire walking, tarot cards -- et al -- will be examined
|
|||
|
and discussed in an _intellectual_, though some times
|
|||
|
emotional, environment.
|
|||
|
|
|||
|
It may surprise you to learn that there exists a great number
|
|||
|
of non-profit organizations which examine unusual claims; some
|
|||
|
even offer a substantial reward to anyone who is demonstrably
|
|||
|
psychic!
|
|||
|
|
|||
|
The motivation is to have fun examining highly improbable
|
|||
|
claims and reviewing the claims of fringe science.
|
|||
|
|
|||
|
Various skeptical organizations will have a better method of
|
|||
|
remaining in touch with each other. The mailing addresses of
|
|||
|
such organizations and what they're up to will be provided.
|
|||
|
The conference also provides a direct link to the FidoNet and
|
|||
|
UUCP public; SysOps and Users alike.
|
|||
|
|
|||
|
FidoNews 8-23 Page 19 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
It might be interesting to hear of unexplainable events in
|
|||
|
peoples lives and then make an intellectual attempt to explain
|
|||
|
them. We may even find that we have people trained in such
|
|||
|
matters attending! Certainly there will be no lack of opinion!
|
|||
|
|
|||
|
Book reviews on fringe-science or paranormal topics will be
|
|||
|
requested and an over all discussion of all such books will be
|
|||
|
entertained. Biographies of modern-day as well as historic
|
|||
|
cult leaders will be reviewed. Along the same lines, if any
|
|||
|
participating individual finds an amusing advertisement making
|
|||
|
unusually outrageous claims, that, too, will be examined.
|
|||
|
|
|||
|
It should be great fun for all. Who knows: Perhaps even some
|
|||
|
common myths will be critically examined and discarded... or
|
|||
|
verified.
|
|||
|
|
|||
|
Fredric. 1:102/901.0
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
by Luke Kolin
|
|||
|
1:250/714@fidonet.org
|
|||
|
former NC, Net 1:250
|
|||
|
|
|||
|
Congratulations, Tom and Tim, on your appointment! Best wishes.
|
|||
|
|
|||
|
I read Chris Estep's article in FidoNews #822 with some concern, and
|
|||
|
I'd like to clarify a few things for the benefit of all of you who
|
|||
|
read this newsletter.
|
|||
|
|
|||
|
I took great offense to the intimations of a lot of the WorldPol
|
|||
|
boosters when I was an NC. Seemed to me that the sole purpose of
|
|||
|
WorldPol was to protect FidoNet from the dictatorial whims of those
|
|||
|
tyrannical Zone 1 *C's like me. Chris Estep's article only seemed to
|
|||
|
perpetuate those falsehoods.
|
|||
|
|
|||
|
I was an elected NC, the first in my Net. My successor was elected
|
|||
|
in a democratic vote two weeks ago. I firmly support all efforts to
|
|||
|
make the positions of NC and RC fully elected by *all* sysops that
|
|||
|
they serve. For Mr. Estep to claim that an appointed NC is the only
|
|||
|
way to go is to do a severe disservice to the dozens of elected NCs
|
|||
|
like up here in Region 12 who have done a superlative job.
|
|||
|
|
|||
|
Our NC election was not a popularity contest. With apologies to my
|
|||
|
successor (although Tom will readily admit it), our new NC isn't the
|
|||
|
most popular sysop in Net 250. However, he was elected by a solid
|
|||
|
majority because he held respect. Chris, respect doesn't come from
|
|||
|
power. It comes from doing an effective job. NC elections allow for
|
|||
|
new blood in the *C structure, more participation by sysops, and it
|
|||
|
serves to bring everyone together.
|
|||
|
|
|||
|
FidoNews 8-23 Page 20 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
I wish to let everyone know that the Zone 1 *C structure is firmly
|
|||
|
in favor of democracy, and that elections for NC and RC positions must
|
|||
|
be made part of any new Policy document. To this end, I have enclosed
|
|||
|
an article, "Draft *C Election Policy", which outlines my proposals
|
|||
|
for an elections policy. Perhaps this can replace the "western demo-
|
|||
|
cratic standards" in WorldPol.
|
|||
|
|
|||
|
However, Chris and I see face to face on the geographical limits
|
|||
|
issue. I believe that allowing nodes to join any net will only en-
|
|||
|
courage discriminatory actions by NCs. In addition, the WorldPol 2
|
|||
|
proposal's anti-discrimination clause troubles me. According to
|
|||
|
WorldPol 2, an NC cannot discriminate on non-technical grounds.
|
|||
|
|
|||
|
Does that mean that an NC must re-admit a node that he has
|
|||
|
recently expelled?
|
|||
|
|
|||
|
Does that mean an NC must accept a node across the country? Refusal
|
|||
|
would be based on economic, and not technical reasons, and that isn't
|
|||
|
allowed. Remember, WorldPol doesn't specify that a node must belong
|
|||
|
to the same geographical area as the net he wishes to join.
|
|||
|
|
|||
|
Let's face it, any proposed policy must include a clause limiting
|
|||
|
the geographical spread of nets. A node must be forced to join the
|
|||
|
local network, if there is one. If not, he must join the nearest net-
|
|||
|
work. This is the only way to end discrimination.
|
|||
|
|
|||
|
Guys, let's forget WorldPol. It's dead. Let's make a clean start. I
|
|||
|
don't want to see a Policy that's written against Policy4. Why don't
|
|||
|
we take Policy3, adapt it to reflect the heriarchial changes in Fido-
|
|||
|
Net (ie. points, the *EC structure), democratic election of NCs and
|
|||
|
RCs, geographical limits for networks, the multilingual nature of
|
|||
|
FidoNet while preserving English as a common language, and a formal
|
|||
|
elections policy. It should eliminate paying for FidoNet membership,
|
|||
|
and ensure that each Zone follow that Policy. Anything else is left
|
|||
|
up to the individual Zones/Regions/Nets to decide.
|
|||
|
|
|||
|
LK
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Steve Winter (moderator - HOLY_BIBLE)
|
|||
|
FidoNet 1:151/208 209 210
|
|||
|
|
|||
|
In this brief article I am pointing out some of the different
|
|||
|
cases when people were filled with the Holy Ghost. In each
|
|||
|
case speaking in tongues is implied, if not declared.
|
|||
|
|
|||
|
Here is the account when Jews first received the Holy Ghost.
|
|||
|
|
|||
|
Acts 2:4 And they were all filled with the Holy Ghost, and
|
|||
|
began to speak with other tongues, as the Spirit gave them
|
|||
|
utterance.
|
|||
|
FidoNews 8-23 Page 21 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
Here is the account when Samaritans received the Holy Ghost.
|
|||
|
|
|||
|
Acts 8:14 Now when the apostles which were at Jerusalem heard
|
|||
|
that Samaria had received the word of God, they sent unto
|
|||
|
them Peter and John:
|
|||
|
Acts 8:15 Who, when they were come down, prayed for them,
|
|||
|
that they might receive the Holy Ghost:
|
|||
|
Acts 8:16 (For as yet he was fallen upon none of them: only
|
|||
|
they were baptized in the name of the Lord Jesus.)
|
|||
|
Acts 8:17 Then laid they [their] hands on them, and they
|
|||
|
received the Holy Ghost.
|
|||
|
|
|||
|
I wonder how the apostles knew they had received the
|
|||
|
Holy Ghost? There had to be a noticible sign for the
|
|||
|
apostles to know that the Samaritans had "received".
|
|||
|
|
|||
|
Here is the account of when Gentiles first received the Holy
|
|||
|
Ghost. Notice that the sign of speaking in tongues was
|
|||
|
present.
|
|||
|
|
|||
|
Acts 10:45 And they of the circumcision which believed were
|
|||
|
astonished, as many as came with Peter, because that on the
|
|||
|
Gentiles also was poured out the gift of the Holy Ghost.
|
|||
|
Acts 10:46 For they heard them speak with tongues, and
|
|||
|
magnify God. Then answered Peter,
|
|||
|
Acts 10:47 Can any man forbid water, that these should not be
|
|||
|
baptized, which have received the Holy Ghost as well as we?
|
|||
|
Acts 10:48 And he commanded them to be baptized in the name
|
|||
|
of the Lord. Then prayed they him to tarry certain days.
|
|||
|
|
|||
|
Here we have a case where John the Baptist's disciples were
|
|||
|
RE- baptised in Jesus name and and received the Holy Ghost.
|
|||
|
Notice that they spoke in tongues just like everyone else.
|
|||
|
|
|||
|
Acts 19:2 He said unto them, Have ye received the Holy Ghost
|
|||
|
since ye believed? And they said unto him, We have not so
|
|||
|
much as heard whether there be any Holy Ghost.
|
|||
|
Acts 19:3 And he said unto them, Unto what then were ye
|
|||
|
baptized? And they said, Unto John's baptism.
|
|||
|
Acts 19:4 Then said Paul, John verily baptized with the
|
|||
|
baptism of repentance, saying unto the people, that they
|
|||
|
should believe on him which should come after him, that is,
|
|||
|
on Christ Jesus.
|
|||
|
Acts 19:5 When they heard [this], they were baptized in the
|
|||
|
name of the Lord Jesus.
|
|||
|
Acts 19:6 And when Paul had laid [his] hands upon them, the
|
|||
|
Holy Ghost came on them; and they spake with tongues, and
|
|||
|
prophesied.
|
|||
|
|
|||
|
Jews, gentiles, Samaritans; all baptised in JESUS name, all
|
|||
|
spoke in tongues when they received the Holy Ghost.
|
|||
|
FidoNews 8-23 Page 22 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
Have YOU recieved the Holy Ghost since YOU believed?
|
|||
|
Have YOU been baptised in JESUS name?
|
|||
|
Notice that the elements of WATER and SPIRIT were both
|
|||
|
present in each salvation.
|
|||
|
|
|||
|
Now, what would *ever* lead you to imagine that you could
|
|||
|
be saved without being born again of the Water and of the
|
|||
|
Spirit? (John 3:5) The verses that I have posted are the
|
|||
|
fullfilment of John 3:5.
|
|||
|
|
|||
|
When people in the Bible became Christians, they always
|
|||
|
spoke in tongues.
|
|||
|
|
|||
|
Steve Winter - [moderator HOLY_BIBLE]
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 8-23 Page 23 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
======================================================================
|
|||
|
CLASSIFIEDS
|
|||
|
======================================================================
|
|||
|
|
|||
|
ADVERTISEMENT POLICY: Submissions must be 20 lines or less each,
|
|||
|
maximum two ads per advertiser, 70 characters per line maximum. No
|
|||
|
control codes except CR and LF. (Refer to contact info at the end of
|
|||
|
this newsletter for details.)
|
|||
|
|
|||
|
Please notify us if you have any trouble with an advertiser. FidoNews
|
|||
|
does not endorse any products or services advertised here.
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 8-23 Page 24 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
======================================================================
|
|||
|
NOTICES
|
|||
|
======================================================================
|
|||
|
|
|||
|
Liz Hahn-Morin
|
|||
|
PeaceKauai 1:345/11
|
|||
|
|
|||
|
BAHAI ECHO
|
|||
|
|
|||
|
BAHAI is an international echo, with English as the official
|
|||
|
conference language. Its aim is to discuss aspects of the Baha'i
|
|||
|
Faith, and to share the activities in the Baha'i community around
|
|||
|
the world. The Echo is open to Baha'is and people interested in
|
|||
|
the Baha'i Faith and its teachings and principles.
|
|||
|
|
|||
|
I hope you will join us or ask your Sysop to request linking
|
|||
|
information via Netmail to 1:345/11.
|
|||
|
|
|||
|
Aloha!
|
|||
|
Liz Hahn-Morin
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
The Interrupt Stack
|
|||
|
|
|||
|
|
|||
|
15 Aug 1991
|
|||
|
8 Sep 1991
|
|||
|
7 Oct 1991
|
|||
|
Area code 415 fragments. Alameda and Contra Costa Counties will begin
|
|||
|
using area code 510. This includes Oakland, Concord, Berkeley and
|
|||
|
Hayward. San Francisco, San Mateo, Marin, parts of Santa Clara County,
|
|||
|
and the San Francisco Bay Islands will retain area code 415.
|
|||
|
|
|||
|
1 Nov 1991
|
|||
|
Area code 301 will split. Area code 410 will consist of the
|
|||
|
northeastern part of Maryland, as well as the eastern shore. This will
|
|||
|
include Baltimore and the surrounding area. Area 301 will include
|
|||
|
southern and western parts of the state, including the areas around
|
|||
|
Washington DC. Area 410 phones will answer to calls to area 301 until
|
|||
|
November, 1992.
|
|||
|
|
|||
|
1 Feb 1992
|
|||
|
Area code 213 fragments. Western, coastal, southern and eastern
|
|||
|
portions of Los Angeles County will begin using area code 310. This
|
|||
|
includes Los Angeles International Airport, West Los Angeles, San
|
|||
|
Pedro and Whittier. Downtown Los Angeles and surrounding communities
|
|||
|
(such as Hollywood and Montebello) will retain area code 213.
|
|||
|
|
|||
|
1 Dec 1993
|
|||
|
Tenth anniversary of Fido Version 1 release.
|
|||
|
|
|||
|
FidoNews 8-23 Page 25 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
5 Jun 1997
|
|||
|
David Dodell's 40th Birthday
|
|||
|
|
|||
|
|
|||
|
If you have something which you would like to see on this calendar,
|
|||
|
please send a message to FidoNet node 1:1/1.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
Fredric L. Rice, 1:102/901.0
|
|||
|
|
|||
|
o What is Exclude
|
|||
|
|
|||
|
The Exclude program is used to erase inbound messages
|
|||
|
received from systems you don't want to receive mail from.
|
|||
|
The exclusion process is based upon keywords contained
|
|||
|
within the systems name, as defined in the Nodelist, and by
|
|||
|
the Nodelist Flags for that system. Known systems are usually
|
|||
|
entered into the exclusion list immediately when you receive
|
|||
|
an undesirable message or when a twit is discovered and then
|
|||
|
discussed in your local Network Echo Conference.
|
|||
|
|
|||
|
o Why is Exclude
|
|||
|
|
|||
|
As FidoNet standardizes and grows in both complexity and in
|
|||
|
scope, the need to exclude inbound mail from undesirable
|
|||
|
systems will also grow. The standardization of the Nodelist
|
|||
|
Flags makes this exclusion possible as an automated process.
|
|||
|
By invoking Exclude automatically when your system receives
|
|||
|
mail, your system can erase the undesired messages before you
|
|||
|
have to look at them.
|
|||
|
|
|||
|
o How does it work
|
|||
|
|
|||
|
You maintain a configuration file which contains keywords
|
|||
|
to look for and known system addresses to exclude. The
|
|||
|
configuration file also contains the directory names of
|
|||
|
message areas you want Exclude to look through. As an option
|
|||
|
in the configuration file, your system can generate an
|
|||
|
immediate reply to the excluded system offering a short note
|
|||
|
that the message was intercepted and erased. A log is kept of
|
|||
|
erased message files detailing who the message was from, why
|
|||
|
it was excluded, and the subject of the message.
|
|||
|
|
|||
|
o The Distribution File
|
|||
|
|
|||
|
EXCLUDE.ZIP (10K file) contains the following files:
|
|||
|
|
|||
|
o EXCLUDE.EXE - The executable file
|
|||
|
o EXCLUDE.C - Turbo C 2.0 source code
|
|||
|
FidoNews 8-23 Page 26 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
o EXCLUDE.CFG - Sample configuration file
|
|||
|
o EXCLUDE.DOC - This document file
|
|||
|
|
|||
|
For the latest version of the program, the magic name
|
|||
|
'EXCLUDE' can be requested from the authors system at address
|
|||
|
1:102/901.0, in California. It is distributed freely, is not
|
|||
|
to be sold, and the author assumes no liability for its use
|
|||
|
or misuse.
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
ICDM HQ
|
|||
|
1:352/777
|
|||
|
77:1/0
|
|||
|
|
|||
|
INVITATION TO CARRY ICDM NETWORK
|
|||
|
|
|||
|
There has begun a new, auxiliary network, which has as a purpose
|
|||
|
the linking of persons interested in religion. This is a
|
|||
|
specialized Network, aimed at bridging cultures, and enlightening
|
|||
|
participants on the faiths of others. It is "Christian" in the
|
|||
|
sense that it adheres to the Bible. But, it deviates from some of
|
|||
|
the stereo-type religious expectations and traditions.
|
|||
|
|
|||
|
It is open to any board that is FidoNet compatible. It is
|
|||
|
compiled as a separate Zone (77), so your software must be Zone
|
|||
|
aware. It is open to any faith, any person, regardless of sex,
|
|||
|
creed, color, etc. etc.
|
|||
|
|
|||
|
The HOST is Tomas Hood, 1:352/777, the Zone 77 Co-ordinator.
|
|||
|
There may be connections close to you, and as we grow, there will
|
|||
|
surely be!
|
|||
|
|
|||
|
For more information, netmail via 1:352/777, and request ICDM,
|
|||
|
which will forward an information packet to you.
|
|||
|
|
|||
|
Thanks for your interest and we look forward to hearing from you.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Liz Hahn-Morin
|
|||
|
PeaceKauai 1:345/11
|
|||
|
|
|||
|
PEACE FORUM INTERNATIONAL ECHO
|
|||
|
|
|||
|
PEACE_FO.RUM is an echo allowing the exchange of opinions among
|
|||
|
the peoples of the world in order to find ways and means of
|
|||
|
promoting Harmony and World Peace. It is international in scope
|
|||
|
and in distribution.
|
|||
|
|
|||
|
FidoNews 8-23 Page 27 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
Moderated by J.K.A. Singh, Antwerp (Belgium), information is
|
|||
|
available from 1:345/11.
|
|||
|
|
|||
|
I hope you will join us or ask your Sysop to request linking
|
|||
|
information via Netmail to 1:345/11.
|
|||
|
|
|||
|
Aloha!
|
|||
|
Liz Hahn-Morin
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Tomas Hood
|
|||
|
FidoNet 1:352/777
|
|||
|
ICDM Network 77:77/1
|
|||
|
|
|||
|
HERBAL ECHO NOW AVAILABLE!
|
|||
|
|
|||
|
HERBS-N-SUCH is a conference for anyone who enjoys growing,
|
|||
|
buying, and using herbs. Covering any legal herb, this
|
|||
|
conference allows the discussion of medicinal, culinary,
|
|||
|
aromatic, and aesthetic usage of herbs. If you are a user only,
|
|||
|
or a gardener, you are welcome. Do you make your own tea blends,
|
|||
|
hair rinses, or salads? Join in!
|
|||
|
|
|||
|
It is, at present, a non-backbone Echo Hosted and Moderated by
|
|||
|
Tomas Hood [1:352/777]. Initial links will be provided from this
|
|||
|
system to any and all who request same. However, it is about to
|
|||
|
become part of Region 17's available echoes. If there is enough
|
|||
|
of a demand, it can possibly be negotiated onto the backbone.
|
|||
|
|
|||
|
The Echo is open to anyone who desires to discuss the topic of
|
|||
|
herbs.
|
|||
|
|
|||
|
A sample of the first few messages and the statement of purpose
|
|||
|
of the Echo is available as HERBS (majyk name for HERBS.ARJ)
|
|||
|
from this system anytime. The ARJ archive utility is also
|
|||
|
available as "ARJ," if you wish to get an idea of whether to
|
|||
|
commit disk space to the Echo.
|
|||
|
|
|||
|
I hope you will join us or ask your Sysop to request a link
|
|||
|
via Netmail to 1:352/777.
|
|||
|
|
|||
|
Cheers!
|
|||
|
Tomas Hood
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 8-23 Page 28 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
======================================================================
|
|||
|
LATEST VERSIONS
|
|||
|
======================================================================
|
|||
|
|
|||
|
Latest Software Versions
|
|||
|
|
|||
|
MS-DOS Systems
|
|||
|
--------------
|
|||
|
|
|||
|
Bulletin Board Software
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
DMG 2.93 Phoenix 1.3 TAG 2.5g
|
|||
|
Fido 12t+ QuickBBS 2.66 TBBS 2.1
|
|||
|
GSBBS 3.02 RBBS 17.3B TComm/TCommNet 3.4
|
|||
|
Lynx 1.30 RBBSmail 17.3B Telegard 2.5
|
|||
|
Kitten 2.16 RemoteAccess 1.01* TPBoard 6.1
|
|||
|
Maximus 1.02 SLBBS 1.77A Wildcat! 2.55
|
|||
|
Opus 1.14+ Socrates 1.10 WWIV 4.12
|
|||
|
PCBoard 14.5a SuperBBS 1.10 XBBS 1.17
|
|||
|
|
|||
|
Network Node List Other
|
|||
|
Mailers Version Utilities Version Utilities Version
|
|||
|
|
|||
|
BinkleyTerm 2.40 EditNL 4.00 ARC 7.0
|
|||
|
D'Bridge 1.30 MakeNL 2.31 ARCAsim 2.30
|
|||
|
Dutchie 2.90C ParseList 1.30 ARCmail 2.07
|
|||
|
FrontDoor 2.00 Prune 1.40 ConfMail 4.00
|
|||
|
InterMail 2.01* SysNL 3.14 Crossnet v1.5
|
|||
|
PRENM 1.47 XlatList 2.90 DOMAIN 1.42
|
|||
|
SEAdog 4.60* XlaxDiff 2.40* EMM 2.02
|
|||
|
TIMS 1.0(Mod8) XlaxNode 2.40* 4Dog/4DMatrix 1.18
|
|||
|
Gmail 2.05
|
|||
|
GROUP 2.16
|
|||
|
GUS 1.30
|
|||
|
HeadEdit 1.18
|
|||
|
IMAIL 1.10
|
|||
|
InterPCB 1.31
|
|||
|
LHARC 1.13
|
|||
|
MSG 4.1
|
|||
|
MSGED 2.06
|
|||
|
MSGTOSS 1.3
|
|||
|
Oliver 1.0a
|
|||
|
PK[UN]ZIP 1.10
|
|||
|
PolyXarc 2.1a*
|
|||
|
QM 1.0
|
|||
|
QSORT 4.03
|
|||
|
ScanToss 1.28
|
|||
|
Sirius 1.0x
|
|||
|
SLMAIL 1.36
|
|||
|
StarLink 1.01
|
|||
|
FidoNews 8-23 Page 29 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
TagMail 2.41
|
|||
|
TCOMMail 2.2
|
|||
|
Telemail 1.27
|
|||
|
TMail 1.21
|
|||
|
TPBNetEd 3.2
|
|||
|
TosScan 1.00
|
|||
|
UFGATE 1.03
|
|||
|
XRS 4.50*
|
|||
|
XST 2.3e
|
|||
|
ZmailH 1.14
|
|||
|
|
|||
|
|
|||
|
OS/2 Systems
|
|||
|
------------
|
|||
|
|
|||
|
Bulletin Board Software Network Mailers Other Utilities
|
|||
|
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
Maximus-CBCS 1.02 BinkleyTerm 2.40 Parselst 1.32
|
|||
|
ConfMail 4.00
|
|||
|
EchoStat 6.0
|
|||
|
oMMM 1.52
|
|||
|
Omail 3.1
|
|||
|
MsgEd 2.06
|
|||
|
MsgLink 1.0C
|
|||
|
MsgNum 4.14
|
|||
|
LH2 0.50
|
|||
|
PK[UN]ZIP 1.02
|
|||
|
ARC2 6.00
|
|||
|
PolyXarc 2.1a*
|
|||
|
Qsort 2.1
|
|||
|
Raid 1.0
|
|||
|
Remapper 1.2
|
|||
|
Tick 2.0
|
|||
|
VPurge 2.07
|
|||
|
|
|||
|
|
|||
|
Xenix/Unix 386
|
|||
|
--------------
|
|||
|
|
|||
|
BBS Software Mailers Other Utilities
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
BinkleyTerm 2.32B Unzip 3.10
|
|||
|
ARC 5.21
|
|||
|
ParseLst 1.32
|
|||
|
Vpurge 4.08
|
|||
|
[Contact: Jon Hogan-Duran 3:711/909, Ommm 1.42
|
|||
|
Willy Paine 1:343/15, Eddy van Loo Msged 2.06
|
|||
|
2:285/406] Zoo 2.01
|
|||
|
FidoNews 8-23 Page 30 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
C-Lharc 1.00
|
|||
|
Omail 1.00
|
|||
|
MSGREN
|
|||
|
MSGLNK 1.01
|
|||
|
|
|||
|
|
|||
|
Apple II
|
|||
|
----------
|
|||
|
|
|||
|
Bulletin Board Software Network Mailers Other Utilities
|
|||
|
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
GBBS Pro 2.1 Fruity Dog 2.0* ShrinkIt 3.23
|
|||
|
DDBBS + 7.4* ShrinkIt GS 1.04
|
|||
|
deARC2e 2.1
|
|||
|
ProSel 8.69*
|
|||
|
|
|||
|
|
|||
|
Apple CP/M
|
|||
|
----------
|
|||
|
|
|||
|
Bulletin Board Software Network Mailers Other Utilities
|
|||
|
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
Daisy v2j Daisy Mailer 0.38 Nodecomp 0.37
|
|||
|
MsgUtil 2.5
|
|||
|
PackUser v4
|
|||
|
Filer v2-D
|
|||
|
UNARC.COM 1.20
|
|||
|
|
|||
|
|
|||
|
Macintosh
|
|||
|
---------
|
|||
|
|
|||
|
Bulletin Board Software Network Mailers Other Utilities
|
|||
|
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
Red Ryder Host 2.1 Tabby 2.2 MacArc 0.04
|
|||
|
Mansion 7.15 Copernicus 1.0 ArcMac 1.3
|
|||
|
WWIV (Mac) 3.0 LHArc 0.41
|
|||
|
Hermes 1.5 StuffIt Classic 1.6
|
|||
|
FBBS 0.91 Compact Pro 1.30
|
|||
|
Precision Systems 0.95b* TImport 1.92
|
|||
|
TeleFinder Host 2.12T10 TExport 1.92
|
|||
|
Timestamp 1.6
|
|||
|
Tset 1.3
|
|||
|
Import 3.2
|
|||
|
Export 3.21
|
|||
|
Point System Software Sundial 3.2
|
|||
|
FidoNews 8-23 Page 31 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
PreStamp 3.2
|
|||
|
Name Version OriginatorII 2.0
|
|||
|
AreaFix 1.6
|
|||
|
Copernicus 1.0 Mantissa 3.21
|
|||
|
CounterPoint 1.09 Zenith 1.5
|
|||
|
Eventmeister 1.0
|
|||
|
TSort 1.0
|
|||
|
Mehitable 2.0
|
|||
|
UNZIP 1.02c
|
|||
|
Zip Extract 0.10
|
|||
|
|
|||
|
Amiga
|
|||
|
-----
|
|||
|
|
|||
|
Bulletin Board Software Network Mailers Other Utilities
|
|||
|
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
Falcon CBBS 0.45 BinkleyTerm 1.00 AmigArc 0.23
|
|||
|
Paragon 2.082+ TrapDoor 1.50 AReceipt 1.5
|
|||
|
TransAmiga 1.07 WelMat 0.44 booz 1.01
|
|||
|
ConfMail 1.12
|
|||
|
ChameleonEdit 0.10
|
|||
|
ElectricHerald1.66
|
|||
|
Lharc 1.30
|
|||
|
Login 0.18
|
|||
|
MessageFilter 1.52
|
|||
|
oMMM 1.49b
|
|||
|
ParseLst 1.64
|
|||
|
PkAX 1.00
|
|||
|
PolyxAmy 2.02
|
|||
|
RMB 1.30
|
|||
|
Roof 44.03
|
|||
|
RoboWriter 1.02
|
|||
|
Rsh 4.06
|
|||
|
Skyparse 2.30
|
|||
|
Tick 0.75
|
|||
|
TrapList 1.12
|
|||
|
UNZIP 1.31
|
|||
|
Yuck! 1.61
|
|||
|
Zippy (Unzip) 1.25
|
|||
|
Zoo 2.01
|
|||
|
|
|||
|
Atari ST/TT
|
|||
|
-----------
|
|||
|
|
|||
|
Bulletin Board Network Node List
|
|||
|
Software Version Mailer Version Utilities Version
|
|||
|
|
|||
|
FIDOdoor/ST 2.2.3* BinkleyTerm 2.40l ParseList 1.30
|
|||
|
QuickBBS/ST 1.02 The BOX 1.20 Xlist 1.12
|
|||
|
Pandora BBS 2.41c EchoFix 1.20
|
|||
|
GS Point 0.61 sTICK/Hatch 5.50*
|
|||
|
LED ST 1.00
|
|||
|
MSGED 1.96S
|
|||
|
|
|||
|
FidoNews 8-23 Page 32 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
Archiver Msg Format Other
|
|||
|
Utilities Version Converters Version Utilities Version
|
|||
|
|
|||
|
LHARC 0.60 TB2BINK 1.00 ConfMail 4.03
|
|||
|
LHARC2 3.18* BINK2TB 1.00 ComScan 1.02
|
|||
|
ARC 6.02 FiFo 2.1m* Import 1.14
|
|||
|
PKUNZIP 1.10 OMMM 1.40
|
|||
|
Pack 1.00
|
|||
|
FastPack 1.20
|
|||
|
FDrenum 2.2.7*
|
|||
|
Trenum 0.10
|
|||
|
|
|||
|
|
|||
|
Archimedes
|
|||
|
----------
|
|||
|
|
|||
|
BBS Software Mailers Utilities
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
ARCbbs 1.44 BinkleyTerm 2.03 Unzip 2.1TH
|
|||
|
ARC 1.03
|
|||
|
!Spark 2.00d
|
|||
|
|
|||
|
ParseLst 1.30
|
|||
|
BatchPacker 1.00
|
|||
|
|
|||
|
|
|||
|
+ Netmail capable (does not require additional mailer software)
|
|||
|
* Recently changed
|
|||
|
|
|||
|
Utility authors: Please help keep this list up to date by
|
|||
|
reporting new versions to 1:1/1. It is not our intent to list
|
|||
|
all utilities here, only those which verge on necessity.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 8-23 Page 33 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
------- FIDONEWS MASTHEAD AND CONTACT INFORMATION ----------------
|
|||
|
|
|||
|
Editors: Tom Jennings, Tim Pozar
|
|||
|
Editors Emeritii: Thom Henderson, Dale Lovell, Vince Periello
|
|||
|
Special thanks to Ken Kaplan, 1:100/22, aka Fido #22
|
|||
|
|
|||
|
"FidoNews" BBS
|
|||
|
FidoNet 1:1/1
|
|||
|
Internet fidonews@fidonews.fidonet.org
|
|||
|
BBS (415)-863-2739 (9600 HST/V32)
|
|||
|
|
|||
|
(Postal Service mailing address)
|
|||
|
FidoNews
|
|||
|
Box 77731
|
|||
|
San Francisco
|
|||
|
CA 94107 USA
|
|||
|
|
|||
|
Published weekly by and for the Members of the FidoNet international
|
|||
|
amateur electronic mail system. It is a compilation of individual
|
|||
|
articles contributed by their authors or their authorized agents. The
|
|||
|
contribution of articles to this compilation does not diminish the
|
|||
|
rights of the authors. Opinions expressed in these articles are those
|
|||
|
of the authors and not necessarily those of FidoNews.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FidoNews is copyright 1991 Fido Software. All rights reserved.
|
|||
|
Duplication and/or distribution permitted for noncommercial purposes
|
|||
|
only. For use in other circumstances, please contact FidoNews (we're
|
|||
|
easy).
|
|||
|
|
|||
|
|
|||
|
|
|||
|
OBTAINING COPIES: FidoNews in electronic form may be obtained from
|
|||
|
the FidoNews BBS via manual download or Wazoo FileRequest, or from
|
|||
|
various sites in the FidoNet and via uucp. PRINTED COPIES mailed
|
|||
|
may be obtained from Fido Software for $5.00US each PostPaid First
|
|||
|
Class within North America, or $7.00US elsewhere, mailed Air Mail.
|
|||
|
(US funds drawn upon a US bank only.)
|
|||
|
|
|||
|
Periodic subscriptions are not available at this time; if enough
|
|||
|
people request it I will implement it.
|
|||
|
|
|||
|
|
|||
|
SUBMISSIONS: You are encouraged to submit articles for publication in
|
|||
|
FidoNews. Article submission requirements are contained in the file
|
|||
|
ARTSPEC.DOC, available from the FidoNews BBS, or Wazoo filerequestable
|
|||
|
from 1:1/1 as file "ARTSPEC.DOC".
|
|||
|
|
|||
|
|
|||
|
FidoNews 8-23 Page 34 10 Jun 1991
|
|||
|
|
|||
|
|
|||
|
"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
|
|||
|
trademarks of Tom Jennings of Fido Software, Box 77731, San Francisco
|
|||
|
CA 94107, USA and are used with permission.
|
|||
|
|
|||
|
-- END
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
|