2776 lines
123 KiB
Plaintext
2776 lines
123 KiB
Plaintext
![]() |
F I D O N E W S -- Vol.10 No.14 (05-Apr-1993)
|
|||
|
+----------------------------+-----------------------------------------+
|
|||
|
| A newsletter of the | |
|
|||
|
| FidoNet BBS community | Published by: |
|
|||
|
| _ | |
|
|||
|
| / \ | "FidoNews" BBS |
|
|||
|
| /|oo \ | +1-519-570-4176 1:1/23 |
|
|||
|
| (_| /_) | |
|
|||
|
| _`@/_ \ _ | Editors: |
|
|||
|
| | | \ \\ | Sylvia Maxwell 1:221/194 |
|
|||
|
| | (*) | \ )) | Donald Tees 1:221/192 |
|
|||
|
| |__U__| / \// | Tim Pozar 1:125/555 |
|
|||
|
| _//|| _\ / | |
|
|||
|
| (_/(_|(____/ | |
|
|||
|
| (jm) | Newspapers should have no friends. |
|
|||
|
| | -- JOSEPH PULITZER |
|
|||
|
+----------------------------+-----------------------------------------+
|
|||
|
| Submission address: editors 1:1/23 |
|
|||
|
+----------------------------------------------------------------------+
|
|||
|
| Internet addresses: |
|
|||
|
| |
|
|||
|
| Sylvia -- max@exlibris.tdkcs.waterloo.on.ca |
|
|||
|
| Donald -- donald@exlibris.tdkcs.waterloo.on.ca |
|
|||
|
| Tim -- pozar@kumr.lns.com |
|
|||
|
| Both Don & Sylvia (submission address) |
|
|||
|
| editor@exlibris.tdkcs.waterloo.on.ca |
|
|||
|
+----------------------------------------------------------------------+
|
|||
|
| For information, copyrights, article submissions, |
|
|||
|
| obtaining copies and other boring but important details, |
|
|||
|
| please refer to the end of this file. |
|
|||
|
+----------------------------------------------------------------------+
|
|||
|
========================================================================
|
|||
|
Table of Contents
|
|||
|
========================================================================
|
|||
|
|
|||
|
1. Editorial..................................................... 2
|
|||
|
2. Articles...................................................... 2
|
|||
|
The Cynic's Sandbox, v2.0ReallyWideAlphaForAnyOne........... 2
|
|||
|
Why Policy 4.1C deserves our serious attention.............. 4
|
|||
|
Commodore Geos Echo Available............................... 6
|
|||
|
Responce to Stanton McCandlish.............................. 6
|
|||
|
OS2 echos................................................... 9
|
|||
|
Policy Proposals: The Cart Before the Horse?................ 10
|
|||
|
Rebuttal to an Anonymous Critic............................. 14
|
|||
|
FidoNet Policy Document Version 5........................... 17
|
|||
|
3. Fidonews Information.......................................... 48
|
|||
|
FidoNews 10-14 Page: 2 05 Apr 1993
|
|||
|
|
|||
|
|
|||
|
========================================================================
|
|||
|
Editorial
|
|||
|
========================================================================
|
|||
|
We Lied.
|
|||
|
|
|||
|
There are TWO policy documents in this issue, although there
|
|||
|
won't be any more, probably.
|
|||
|
|
|||
|
We are getting bulges of requests for information about sending
|
|||
|
mail from FidoNet to Internet, and queries from exotic sounding
|
|||
|
internet addresses about how to "get on" FidoNet. For example,
|
|||
|
to whom and where should we refer someone in the Dominican
|
|||
|
Republic who wants to start a BBS? Also, during said mail bulges
|
|||
|
i managed to lose an announcement about a Chinese language
|
|||
|
e-'zine and would its sender very kindly re-send it?
|
|||
|
|
|||
|
Spring is coming easily la-de-da, cactuses between cabling on
|
|||
|
tables are sprouting little green things. I'm still waiting for
|
|||
|
my monitor to sprout. Why is it difficult to get anything
|
|||
|
started when beginnings happen so naturally in plant-life?
|
|||
|
Vine-like networks tangle around and i just watch. It is too
|
|||
|
easy to be inert and accepting unless some buttons are pushed
|
|||
|
and rewards are possible. Not much truly interesting seems to
|
|||
|
happen unless somebody tries something new simply to try
|
|||
|
something new.
|
|||
|
|
|||
|
oh...whaa...excuse me, D.T. [ET in moments such as this] in
|
|||
|
muttering something over my shoulder about how God is a computer
|
|||
|
who invented man as a bootstrap loader...
|
|||
|
|
|||
|
"man". Hrrrumph. Try wiring a net without gender changers.
|
|||
|
========================================================================
|
|||
|
Articles
|
|||
|
========================================================================
|
|||
|
The Cynic's Sandbox, v2.0ReallyWideAlphaForAnyOne
|
|||
|
R. Cynic
|
|||
|
|
|||
|
It's Spring, it must be time for a policy proposal.
|
|||
|
|
|||
|
Boy, and I was getting bored with Fight-O-Net. Now we have
|
|||
|
Pol5, Pol4.1c, caller ID, and another well-thought-out-type-
|
|||
|
III-packet-proposal-which-will-be-ignored-until-someone-writes-
|
|||
|
code. I don't think I've ever had so much fun with clothes on.
|
|||
|
|
|||
|
I'd like to take this moment, if I may, to submit the R. Cynic
|
|||
|
Pol6 Proposal, which I hope you'll all examine with a 10x
|
|||
|
magnifier.
|
|||
|
|
|||
|
Policy Six
|
|||
|
Final Version
|
|||
|
1 April 1993
|
|||
|
|
|||
|
0. Legal Stuff
|
|||
|
This document is FraggleWare. To register, sing the Fraggle
|
|||
|
FidoNews 10-14 Page: 3 05 Apr 1993
|
|||
|
|
|||
|
Rock theme. You forgot the last verse. Try Again.
|
|||
|
|
|||
|
1. Overview
|
|||
|
|
|||
|
Fight-O-Net is a whole buncha systems with little more than
|
|||
|
FTS-0001 in common, and sometimes, if they run FrontDoor, not
|
|||
|
even that.
|
|||
|
|
|||
|
2. Language
|
|||
|
|
|||
|
The official language of Fight-O-Net is english, preferably
|
|||
|
with as many fancy technical words as you can think of to
|
|||
|
confuse the hopeless newbies and teen sysops.
|
|||
|
|
|||
|
3. The Rules
|
|||
|
|
|||
|
3.1 The Boss
|
|||
|
|
|||
|
Fight-O-Net should be controlled by whoever's screaming the
|
|||
|
loudest for democracy. Anyone who wants it that badly should
|
|||
|
be allowed to go nuts trying to run it.
|
|||
|
|
|||
|
3.2 Complaints
|
|||
|
|
|||
|
Policy Complaints should be referred to node 1/1, along with
|
|||
|
all other junk mail. If you send enough, you may wind up
|
|||
|
running Fight-O-Net!
|
|||
|
|
|||
|
3.3 Echomail policy
|
|||
|
|
|||
|
Echomail, defined as mail with lots of Echos (Dupe Loops) and
|
|||
|
lots of missing mail (Caused by dupe killers) is already
|
|||
|
fascist and governed by non-democratically elected vengeful
|
|||
|
moderators who don't follow their own rules. It will be
|
|||
|
ignored by this document, except as precedent for the actions
|
|||
|
of The Boss.
|
|||
|
|
|||
|
3.3.1 Echomail renaming
|
|||
|
|
|||
|
Echomail shall be more accurately known as FlameMail.
|
|||
|
|
|||
|
3.4 Excessively Annoying Systems
|
|||
|
|
|||
|
Excessively Annoying Systems, those run by any member of the Good Old
|
|||
|
Boys network, shall be dropped from the nodelist until such time as
|
|||
|
hell freezes over.
|
|||
|
|
|||
|
3.5 Sense of proportion
|
|||
|
|
|||
|
A sense of proportion is unimportant in Fight-O-Net.
|
|||
|
|
|||
|
4. Anthem
|
|||
|
|
|||
|
The official song of Fight-O-Net is below. Sing to "America, the
|
|||
|
Beautiful", or "The Star Spangled Banner", or "We ain't gonna take
|
|||
|
FidoNews 10-14 Page: 4 05 Apr 1993
|
|||
|
|
|||
|
it" by Twisted Sister.
|
|||
|
|
|||
|
Democracy, democracy,
|
|||
|
we pin our hopes on thee,
|
|||
|
and someday soon,
|
|||
|
we hope to have,
|
|||
|
a grunt for Z1C
|
|||
|
|
|||
|
Spam, Spam, Spam, Spam,
|
|||
|
Spam, Spam, Spam, Spam,
|
|||
|
Spam, Spam, Spam, Spam,
|
|||
|
Spam, Spam, Spam, Spam.
|
|||
|
|
|||
|
5. Credits, acknowlegments, etc.
|
|||
|
|
|||
|
Fight-O and Fight-O-Net are trademarks of Fight-O software, Inc.
|
|||
|
I'd also like to thank Nets 2605 and 2606, Richard Bash (for no
|
|||
|
apparent reason), Pablo Kleinman, Tom Jennings, my mother, and
|
|||
|
that cute redhead I had a crush on in 6th grade.
|
|||
|
|
|||
|
Next time in the Cynic's Sandbox: Caller ID - For the man who has
|
|||
|
nothing to hide...
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Why Policy 4.1C deserves our serious attention
|
|||
|
|
|||
|
Why 4.1C deserves our serious attention
|
|||
|
|
|||
|
I read with great interest, two things in last week's edition (1013) of
|
|||
|
Fidonews; the article about DRAFT008 and the little article by Glen
|
|||
|
Johnson that preceded the full text of the 4.1C proposal.
|
|||
|
|
|||
|
I'm the 'anonymous' person that wrote the original comparison article a
|
|||
|
few issues ago. I'm going to remain anonymous, and I'll tell you why.
|
|||
|
|
|||
|
I've seen what has transpired in the many SYSOP-type conferences over
|
|||
|
the last three months with the policy debates. The group that developed
|
|||
|
4.1C was the first on the scene, and they and their proposal were
|
|||
|
immediately attacked by a number of people for doing so. It was VERY
|
|||
|
clear to me, at least, that the reason many people assailed their
|
|||
|
document was because of who the authors were, not what the document
|
|||
|
said.
|
|||
|
|
|||
|
Probably the most ludicrous of all the things I saw were the many
|
|||
|
utterly horrifying things said by one Bob Germer, who started calling
|
|||
|
members of Net 163 names because of their support for democratic
|
|||
|
reform in Fidonet. And this person developed a policy draft himself!
|
|||
|
|
|||
|
The reason I did my article anonymously, is because I don't want my
|
|||
|
friends and members of the net I'm in to be categorized, or pre-judged
|
|||
|
or labelled because of the things -I- say. I offered my honest
|
|||
|
interperetation of both documents, and you all can take that for
|
|||
|
what its worth.
|
|||
|
|
|||
|
FidoNews 10-14 Page: 5 05 Apr 1993
|
|||
|
|
|||
|
I called the other document BAKERPOL because it was distributed by
|
|||
|
Christopher Baker, the RC of Region 16. I don't know if he wrote it
|
|||
|
himself, nor do I care. But I called it what I did because I under-
|
|||
|
stand that he was the person that released it. I don't know
|
|||
|
Christopher Baker or the other guy, Ken Tuley, and it doesn't even
|
|||
|
matter. I didn't judge the proposals by the names attached to them,
|
|||
|
I judged them on their merits.
|
|||
|
|
|||
|
I never much cared about Fidonet policy, because I get my mail, and
|
|||
|
that's all I ever really cared about. Sure, it bothered me a little
|
|||
|
that it seemed to be an all-male, political, barb throwing contest
|
|||
|
at times, but it really wasn't THAT big of an issue with me.
|
|||
|
|
|||
|
Then 4.1C came out, and I read it. And it changed my view of things.
|
|||
|
Then I read the others that started coming out in rapid-fire
|
|||
|
succession after it. And they reinforced my new view of things.
|
|||
|
|
|||
|
The 4.1C proposal isn't perfect. But it has something very significant
|
|||
|
in it; democracy. I've heard the authors of it continually extolling
|
|||
|
the virtues of what they call the 'one sysop, one vote' concept, and
|
|||
|
I must say, that I think that's a WONDERFUL concept, and the 4.1C
|
|||
|
proposal bears that out. I'm thrilled with the idea of letting
|
|||
|
regular people vote for their coordinators.
|
|||
|
|
|||
|
Giving each sysop a vote brings us all back down to Earth; it puts
|
|||
|
us all on the same level with one another. After all, people will
|
|||
|
tend to support, and help, and cooperate, and work with coordinators
|
|||
|
that are there because we WANT them there as opposed to being PUT
|
|||
|
there, or elected by only select people (like NCs being the only
|
|||
|
people 'allowed' to vote for an RC) . Everyone pitches in, everyone
|
|||
|
has a say, and noone's vote is any 'stronger' than anyone elses. I
|
|||
|
think its a LOVELY idea.
|
|||
|
|
|||
|
I like the 4.1C proposal over anything that has come out so far
|
|||
|
because it treats Fidonet as a group of PEOPLE, each with their own
|
|||
|
equal voice. And coordinators should find it equally appealing, as
|
|||
|
it will give them the 'warm & fuzzy' feeling of knowing that there's
|
|||
|
no QUESTION that they have the support of the people they're serving.
|
|||
|
|
|||
|
We've nothing to fear from this proposed policy, I think it'd be
|
|||
|
good for us. The Regional Coordinators should allow a vote on it to
|
|||
|
take place. It's only fair. And then if it passes a vote, we'll ALL
|
|||
|
have an equal opportunity to participate in shaping Fidonet for the
|
|||
|
future.
|
|||
|
|
|||
|
Give us a chance, please?
|
|||
|
FidoNews 10-14 Page: 6 05 Apr 1993
|
|||
|
|
|||
|
|
|||
|
Commodore Geos Echo Available
|
|||
|
|
|||
|
Commodore Geos Echo Available
|
|||
|
by Steve Dressler
|
|||
|
|
|||
|
Even today there are still alot of 8 bit Commodore 64's and 128's out
|
|||
|
in the market place. Commodore has an operating system called GEOS.
|
|||
|
GEOS is the Windows environment of the Commodore Business Machines.
|
|||
|
I have started a GEOS Echo for all people interested in CBM in
|
|||
|
hopes to gain enough traffic to justify backbone status. The
|
|||
|
echo is on the E-List, but with little success to date. At the
|
|||
|
present time, there are around 25 messages a week and growing.
|
|||
|
|
|||
|
People in Zone 3 may request a feed from 3:633/162. Zone 1 may
|
|||
|
request a feed at 1:154/92 or 1:170/202 or 1:170/610. Each feed is
|
|||
|
v.32bis, and mine (170/202) is a ZyXEL 19.2k.
|
|||
|
|
|||
|
Steve Dressler is the moderator and Steven Guthrie is the
|
|||
|
co-moderator (VP of the Tulsa Area Commodore Users Group).
|
|||
|
Discussions are about, but not limited to, Commodore Geos related
|
|||
|
topics. It is suprising how serious people take their GEOS in the
|
|||
|
Commodore world.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Responce to Stanton McCandlish
|
|||
|
|
|||
|
Chris Farrar
|
|||
|
1:246/20 - Windsor, Ontario, Canada
|
|||
|
89:488/20
|
|||
|
|
|||
|
Caller ID Revisited
|
|||
|
|
|||
|
In Fidonews 10-13, Mr. McCandlish had some things to say, and I would
|
|||
|
like to take the time here to refute them. In keeping with the
|
|||
|
statement from the Editor, any future responce on Caller ID will be
|
|||
|
made in the PHONES echo, available from the Fidonet backbone, or via
|
|||
|
netmail. Netmail, whether or not it has the PVT bit set, can and may
|
|||
|
be replied to and quoted publically in the PHONES echo. Systems
|
|||
|
running in the IMEX network, can find a similar conversation in the
|
|||
|
IMEX.TELECOM echo, available from your echo feed on the IMEX (zone 89)
|
|||
|
backbone.
|
|||
|
|
|||
|
>I could be slammed harder. I did NOT say that callers should
|
|||
|
>not have to provide BBSs with correct address, name and phone
|
|||
|
>number. The last few criticisms of my letter have hinged on
|
|||
|
|
|||
|
True, you didn't say that, but how to you intend to discover if the
|
|||
|
name, number, and address (if required) _is valid_? I don't know
|
|||
|
about his system, but every week I have at least a couple of twits who
|
|||
|
like calling in, and trying to gain access to my system. If they
|
|||
|
aren't twits, then Ronald Reagan, William Clinton, and Al Gore all
|
|||
|
decided to call my BBS, one after another, at 2 in the morning. Why
|
|||
|
don't I beleive that they are the caller's real names? Then again,
|
|||
|
FidoNews 10-14 Page: 7 05 Apr 1993
|
|||
|
|
|||
|
I used to have a user, James Bond, (a real person, I saw the birth
|
|||
|
certificate), who is a real person. With CLID, discovering there is a
|
|||
|
real Bond, and a fake Reagan, Clinton, et al is a piece of cake.
|
|||
|
|
|||
|
>that there may be a problem. Again I did not say that CID is
|
|||
|
>Satan incarnate, rather that some thought should be given to its
|
|||
|
>use and that people should be patient and wait until policy has
|
|||
|
>been updated and nodelist flags defined to account for CID-only
|
|||
|
>systems. Is this so difficult to grasp? As for long distance
|
|||
|
|
|||
|
But you have yet to give a valid reason WHY people should wait for new
|
|||
|
nodelist flags. The technology is available today, why shouldn't it
|
|||
|
be used? The answer is simple, there is no reason why it shouldn't be
|
|||
|
implemented. Also, why do we need nodelist flags? CLID can keep a
|
|||
|
user from connecting with a BBS without stopping a mailer from
|
|||
|
connecting for mail sessions, and how many users download the nodelist
|
|||
|
each week for a BBS list anyway.
|
|||
|
|
|||
|
>callers: why verify them? What nut is going to call you long
|
|||
|
>distance, at THEIR expense to lie to you so they can get an
|
|||
|
>extra account to cheat SRE with, or whatever? It just isn't
|
|||
|
>likely.
|
|||
|
|
|||
|
Sorry. There are nuts that will call to upload their favorite trojan
|
|||
|
and virii, lord knows I've found enough that LD callers have no
|
|||
|
uploading abilities until after they have been validated. There are
|
|||
|
people who do get their kicks from uploading virii, and doing it LD
|
|||
|
makes it harder to track them down.
|
|||
|
|
|||
|
> And finally, the merits of Canadian vs US law is real
|
|||
|
>neat and all but totally irrelevant. READ the article, for
|
|||
|
|
|||
|
Hardly irrelevant. Laws in countries are different, and you cannot
|
|||
|
expect that views will be identical between different countries.
|
|||
|
Living in a border city, I have seen enough people, on both sides of
|
|||
|
the border, who don't realize that when they pass the line down the
|
|||
|
middle of the Detroit River, that they are subject to different laws,
|
|||
|
and regulations. The number of Michigan motorists that get arrested
|
|||
|
at sobriety roadblocks is proof of that, as they claim them to be
|
|||
|
unconstitutional, and then want Detroit cops to come and get them, as
|
|||
|
they don't consider Windsor police officers having any jurisdiction
|
|||
|
over them.
|
|||
|
|
|||
|
>chrissakes. And only last thing, I just want to emphasize yet
|
|||
|
>AGAIN that when I say CID harms privacy I am not refer- ring to
|
|||
|
>sysops, but rather to less savoury folks. By forcing caller ID,
|
|||
|
>sysops in effect demand that we send caller ID info to ALL
|
|||
|
>numbers. When the telcos come up with all call blocking that
|
|||
|
>can be temporarily disabled with a keypad code to dial one
|
|||
|
>number, then fine, CID your heart out. Until that time comes
|
|||
|
|
|||
|
Why should we wait to implement CLID for your convienence? If you are
|
|||
|
calling "less savoury folks", you have several options:
|
|||
|
|
|||
|
1) Install a data line, and call them off it, so if they do call
|
|||
|
FidoNews 10-14 Page: 8 05 Apr 1993
|
|||
|
|
|||
|
you back, they will never reach you.
|
|||
|
2) Call from work
|
|||
|
3) Call from a pay phone
|
|||
|
4) Petition whatever group that regulates phones in your state to
|
|||
|
allow either disabling on a per call basis, or switch to allowing
|
|||
|
blocking on a per call basis, by dialing your equivelant of *69.
|
|||
|
|
|||
|
And, not everywhere has global blocking, such as there is where you
|
|||
|
live. Here in Ontario (Canada), the only style of blocking available
|
|||
|
is the per call, dial a * code, and then make your call, the same way
|
|||
|
you would go about temporarely disabling Call Waiting to make a data
|
|||
|
call.
|
|||
|
|
|||
|
>you are doing everyone as disservice by demanding Caller ID
|
|||
|
>info. Why not USE CID if it is given, and voice verify the rest
|
|||
|
>without a hassle? Simple.
|
|||
|
|
|||
|
Why should the system operator have to take the time to do voice
|
|||
|
verifications, when there are faster, easier, and more convienent ways
|
|||
|
of validation. Voice verification creates longer delays for validation
|
|||
|
of callers, involves either calling directly, and running up the
|
|||
|
sysop's phone bill, which is generally high enough already, or calling
|
|||
|
collect, in which case the sysop's phone number appears on the user's
|
|||
|
phone bill within a month, removing the sysop's right to privacy. You
|
|||
|
can then end up having to make several calls to voice verify, if the
|
|||
|
person isn't in when you call, etc.
|
|||
|
|
|||
|
>PS: the idea that having CID blocking would make someone
|
|||
|
>prosecutable for un- authorized access is a very silly fantasy.
|
|||
|
|
|||
|
I would suggest that you take a look at Section 342.1 of the Criminal
|
|||
|
Code (Canada). It specifically spells out what is considered the
|
|||
|
offence, and the punnishment. 342.1(1) puts it simply and clearly,
|
|||
|
and very easy to read and understand, as can be seen below:
|
|||
|
|
|||
|
342.1 (1) Every one who, fraudulently and without color of right,
|
|||
|
(a) obtains, directly or indirectly, any computer service,
|
|||
|
(b) by means of an electro-magnetic, acoustic, mechanical or other
|
|||
|
device, intercepts or causes to be intercepted, directly or
|
|||
|
indirectly, any function of a computer system, or
|
|||
|
(c) uses or causes to be used, directly or indirectly, a computer
|
|||
|
system with intent to commit an offence under paragraph (a) or (b),
|
|||
|
or an offence under section 430 in relation to data or a computer
|
|||
|
system
|
|||
|
is guilty of an offence and liable to imprisonment for a term not
|
|||
|
exceeding ten years, or is guilty of an offence punishable on summary
|
|||
|
conviction.
|
|||
|
|
|||
|
(2) In this section,
|
|||
|
|
|||
|
"computer program" means data representing instructions or statements
|
|||
|
that, when executed in a computer system, causes the computer system to
|
|||
|
preform a function;
|
|||
|
|
|||
|
"computer service" includes data processing, and the storage or
|
|||
|
FidoNews 10-14 Page: 9 05 Apr 1993
|
|||
|
|
|||
|
retrieval of data;
|
|||
|
|
|||
|
"computer system" means a device that, or a group of interconnected
|
|||
|
or related devices one or more of which,
|
|||
|
(a) contains computer programs or other data, and
|
|||
|
(b) pursuant to computer programs,
|
|||
|
(i) preforms logic and control, and
|
|||
|
(ii) may preform any other function;
|
|||
|
|
|||
|
"data" means representations of information or of concepts that are
|
|||
|
being prepared or have been prepared in a form suitable for use in a
|
|||
|
computer system;
|
|||
|
|
|||
|
"electro-magnetic, acoustic, mechanical or other device" means any
|
|||
|
device or apparatus that is used or is acapable of being used to
|
|||
|
intercept any function of a computer system, but does not include a
|
|||
|
hearing aid used to correct subnormal hearing of the user to not better
|
|||
|
than normal hearing.
|
|||
|
|
|||
|
"function" includes logic, control, arithmetic, deletion, storage and
|
|||
|
communication or telecommunication to, from or within a computer system;
|
|||
|
|
|||
|
"intercept" included listen to or record a function of a computer
|
|||
|
system, or acquire the substance, meaning, or purport thereof.
|
|||
|
R.S. 1985, c27
|
|||
|
|
|||
|
Section 430, as mentioned in the above, is in regards to mischief, and
|
|||
|
mischief in relation to data, including destruction of data.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
OS2 echos
|
|||
|
From: Byron Miller (1:106/433)
|
|||
|
|
|||
|
Well, here is my first posting to fidonews, and i thought i would pass
|
|||
|
on some interesting info to my fellow OS/2 SysOps
|
|||
|
|
|||
|
As you may have seen, OS/2 has been growing, and Very Rapidly. Many SysOps
|
|||
|
Are slowly Converting there BBS over to OS/2, but i hear lots of complaints
|
|||
|
about the limited supply of OS/2 speceific BBS software. Pete Norloff
|
|||
|
has taken the stand has started the OS2BBS_DEV echo...
|
|||
|
|
|||
|
This echo is for the Discussion of OS/2 BBS programing and requests and
|
|||
|
ideas that people would like to see in a BBS System. Many OS/2 programmers
|
|||
|
are starting to find their way to the echo, and we are looking for some
|
|||
|
more talented people to jump in..
|
|||
|
|
|||
|
The following Systems carry the echo, and would happily send it to you
|
|||
|
upon request.
|
|||
|
|
|||
|
1:292/60 1:280/304
|
|||
|
1:110/535 1:289/27
|
|||
|
1:202/514 1:201/2104
|
|||
|
1:273/714
|
|||
|
|
|||
|
FidoNews 10-14 Page: 10 05 Apr 1993
|
|||
|
|
|||
|
I Hope to see some great programmers jump in, and look forward to seeing
|
|||
|
the Best BBS packages for OS/2 anytime soon..
|
|||
|
|
|||
|
And while were discussing OS/2... you might like to find out more info
|
|||
|
so here are some of the Non-Backbone Echo's that Might be of Interest
|
|||
|
to All.
|
|||
|
|
|||
|
OS2BEGIN Beginners Questions And Answers
|
|||
|
OS2BBS_DEV Developing/Programming OS/2 specific BBS software/utils
|
|||
|
OS2CDROM Using CD-ROMS with OS/2
|
|||
|
OS2COMM Communications with OS/2 via networks such as TCP/IP
|
|||
|
OS2DP Development/Use of Databases under OS/2
|
|||
|
OS2DOS Using/Configuring programs to run under OS/2 DOS box
|
|||
|
OS2GAMES Running games under OS/2, great info to get Games to work right
|
|||
|
OS2REXX Programming and using REXX under OS/2
|
|||
|
OS2VIDEO Video Drivers, hardware, and configuring options
|
|||
|
OS2WPS Using the OS/2 "W"ork "P"lace "S"hell
|
|||
|
OS2WP Word Processing under OS/2
|
|||
|
OS2_13 Using, Discussion about OS/2 1.3
|
|||
|
TEAMOS2 Users sharing ideas on use of OS/2 and its promotion.
|
|||
|
|
|||
|
These echos are available on MANY OS/2 BBS's and should be requestable from
|
|||
|
the nodes listed above.
|
|||
|
|
|||
|
Hope to see many of you in Fidonet in these echos!
|
|||
|
|
|||
|
Byron Miller
|
|||
|
SysOp of North Shore BBS (OS/2 BBS of Course)
|
|||
|
1:106/433
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Policy Proposals: The Cart Before the Horse?
|
|||
|
Jack Decker
|
|||
|
Fidonet 1:154/8
|
|||
|
|
|||
|
Policy Proposals: The Cart Before the Horse?
|
|||
|
|
|||
|
I've been reading the articles on the proposed revisions to Policy 4,
|
|||
|
and while I agree that there is a crying need to replace Policy 4, I
|
|||
|
get the feeling that both proposals are an attempt to provide better
|
|||
|
ways to put out flames without ever addressing the actual cause of the
|
|||
|
fires.
|
|||
|
|
|||
|
I just want to make a couple of comments that I wish the authors of
|
|||
|
these proposals would consider. First and most important, please let
|
|||
|
technology take care of technological problems. Fidonet policy is
|
|||
|
primarily a political document, telling us how we are supposed to
|
|||
|
interact with each other. The trouble is, it is so long that many
|
|||
|
sysops never read the whole thing, and fewer remember enough of what
|
|||
|
they read to really affect their day-to-day operations. Fidonet isn't
|
|||
|
a government, it's a hobby, so why try to make governmental type
|
|||
|
regulations?
|
|||
|
|
|||
|
Suppose we could spend less time worrying about how people in Fidonet
|
|||
|
FidoNews 10-14 Page: 11 05 Apr 1993
|
|||
|
|
|||
|
relate to each other? We'd have fewer flames, our policy document
|
|||
|
could be shorter and more concise, and everyone would lead a generally
|
|||
|
happier life (one would hope so, anyway)!
|
|||
|
|
|||
|
What are the major causes of flames and disagreements in Fidonet? No,
|
|||
|
I don't mean the APPARENT cause, I mean the ROOT cause. These are
|
|||
|
often two entirely different things. Many policies were invoked to
|
|||
|
solve specific problems that may have been known only to a few. These
|
|||
|
root problems were responsible for the creation of perhaps a whole body
|
|||
|
of policy (formal or informal) that may now be a problem in itself.
|
|||
|
|
|||
|
As an example, consider that the ever-expanding size of the Fidonet
|
|||
|
nodelist has been responsible for a whole host of proposals, the net
|
|||
|
effect of which would be to exclude some nodes from the nodelist. Many
|
|||
|
of the arguments over what status points should have could be more
|
|||
|
easily resolved if points could somehow be included in the nodelist,
|
|||
|
but at this point NO ONE wants to see the nodelist grow any larger.
|
|||
|
|
|||
|
Or consider the totally screwed up format of Fidonet echomail messages.
|
|||
|
I have yet to hear from anyone who does not agree that the current
|
|||
|
Fidonet message format leaves a lot to be desired (and is a
|
|||
|
programmer's nightmare!), but what you may not realize is that the lack
|
|||
|
of effective duplicate message control was in part responsible for some
|
|||
|
of the ridiculous geographic restrictions found in Fidonet policy (at
|
|||
|
least, that was the claim at the time the restrictions were added...
|
|||
|
more on that later).
|
|||
|
|
|||
|
How do we deal with these problems? Unfortunately, because few seem to
|
|||
|
recognize the root cause of such problems, we attempt political fixes
|
|||
|
that no one's really happy with (not even the so-called power mongers
|
|||
|
after a while, because they become targets for all the flak). I would
|
|||
|
like to suggest that any new Policy document should give us some
|
|||
|
mechanism for effecting TECHNICAL changes to Fidonet that could do far
|
|||
|
more to help us solve our problems than any amount of words on paper
|
|||
|
ever could.
|
|||
|
|
|||
|
Therefore, I'd like to make a couple of proposals for the next Policy
|
|||
|
document:
|
|||
|
|
|||
|
First, give at least the IC, and hopefully others in Fidonet the right
|
|||
|
to open discussion on technical matters in Fidonet, with the idea of
|
|||
|
setting or revising Fidonet technical standards. This should be at
|
|||
|
least a semi-orderly process and should include specific time frames
|
|||
|
for each part of the process. Here's one possible outline of the
|
|||
|
process:
|
|||
|
|
|||
|
1) Initial discussion phase: Is it broke? Do we need to fix it? What
|
|||
|
would we like to see in any new proposals? (Example: Do we need a new
|
|||
|
nodelist format? Should we stop issuing a nodelist covering all zones?
|
|||
|
What are the problems with the present format?)
|
|||
|
|
|||
|
2) Request for proposals: In this phase we ask interested groups or
|
|||
|
individuals to submit FORMAL proposals for the new standard. There
|
|||
|
should be a deadline date for this!
|
|||
|
|
|||
|
FidoNews 10-14 Page: 12 05 Apr 1993
|
|||
|
|
|||
|
3) Discussion of proposals: A time period where the proposals are made
|
|||
|
available to any interested party. Comments go back to the authors of
|
|||
|
the proposals, who basically have the freedom to modify their proposals
|
|||
|
based on user input. Consolidation of similar proposals would be
|
|||
|
encouraged.
|
|||
|
|
|||
|
4) Release of final draft of proposals: After comments have been
|
|||
|
received, the authors would release their final drafts of their
|
|||
|
proposals.
|
|||
|
|
|||
|
5) Vote on the proposals: At this point the proposals under
|
|||
|
consideration would be voted on. If no one proposal receives a clear
|
|||
|
majority, a runoff vote may be necessary. Again, a specific date
|
|||
|
should be set for the vote, lest it be put off indefinitely (it's only
|
|||
|
a hobby, so folks tend to procrastinate)!
|
|||
|
|
|||
|
6) Implementation of the proposals: This should be far enough in the
|
|||
|
future to allow software authors time to make any adjustments needed to
|
|||
|
their software.
|
|||
|
|
|||
|
Again, the above is only a possible outline. My point is that we need
|
|||
|
SOME sort of mechanism like this, clearly defined in Policy. The
|
|||
|
current system (arguing the subject in the NET_DEV echo until everyone
|
|||
|
is sick of it!) doesn't make it. If the current system worked,
|
|||
|
something would have been done about the nodelist problem years ago.
|
|||
|
As it is, we are helpless to make needed technical changes because we
|
|||
|
have no official mechanism in place to make those changes. This is
|
|||
|
something that REALLY needs to be included in the next Policy, in my
|
|||
|
opinion.
|
|||
|
|
|||
|
I mentioned the Fidonet message format earlier. Just about all the
|
|||
|
technically-minded folks agree it's a nightmare, yet I think probably
|
|||
|
thousands of person-hours of effort have gone into creating proposals
|
|||
|
for a new message format. Some were posted in NET_DEV, some were
|
|||
|
published in Fidonews, but in the end they all suffered the same fate:
|
|||
|
They were all eventually ignored! Not because the proposals were all
|
|||
|
bad, but because there's simply no process in place that allows them to
|
|||
|
be formally considered by the net as a whole.
|
|||
|
|
|||
|
Now, I personally think we should just adopt the standard message
|
|||
|
format used in the Internet (as described in Internet document RFC-1136
|
|||
|
and similar documents), possibly with some Fidonet-specific extensions
|
|||
|
(message header lines that start with "X-FTN-<keyword>:" for Fidonet
|
|||
|
specific information). This would make us far more compatible with the
|
|||
|
Internet, and avoid all the pitfalls now associated with
|
|||
|
echomail-to-newsgroup conversion (something that a growing number of
|
|||
|
sysops seem to be interested in). But in any case, something needs to
|
|||
|
be done, because many of our flame wars can be traced to the message
|
|||
|
format!
|
|||
|
|
|||
|
Why?!?, I hear you ask. Well, consider that the insane geographic
|
|||
|
restrictions found in Policy 4 were only added in that document... that
|
|||
|
is to say, there were no such restrictions in Policy 3 and earlier
|
|||
|
documents. And the important thing to keep in mind is that the
|
|||
|
justification for adding these restrictions was almost entirely based
|
|||
|
FidoNews 10-14 Page: 13 05 Apr 1993
|
|||
|
|
|||
|
on on the existence of dupe loops in echomail. Now, some of us may
|
|||
|
believe that wasn't the REAL reason (in fact, one report that came to
|
|||
|
me was that the restrictions were added at the request of ONE RC who
|
|||
|
didn't like the idea that nodes could "opt out" of being in HIS region)
|
|||
|
but it doesn't really matter; the point is that the (POLITICAL)
|
|||
|
restrictions were justified due to the (TECHNICAL) problems of echomail
|
|||
|
dupes! As it turned out, the restrictions didn't fix the problem (in
|
|||
|
fact, the greatest advances in duplicate message elimination have come
|
|||
|
about because of improved software that catches and rejects dupes) but
|
|||
|
we have to live with them.
|
|||
|
|
|||
|
And, of course, the geographic restrictions remove the option of
|
|||
|
"voting with your feet" (in a figurative sense) if you can't get along
|
|||
|
with the NC or RC above you. I don't mean to sound provincial, but it
|
|||
|
surprises me especially that North American sysops who would scream
|
|||
|
bloody murder if told they could only shop at one particular
|
|||
|
supermarket or eat at one particular restaurant (based solely on where
|
|||
|
they live) will so easily accept the notion that they can participate
|
|||
|
in their hobby via only one point of contact based on their geographic
|
|||
|
location.
|
|||
|
|
|||
|
Many of the disputes we have in Fidonet could be resolved rather
|
|||
|
painlessly (for all concerned) if folks who just plain don't like each
|
|||
|
other weren't forced to interact with each other. Consider all the
|
|||
|
messages you've read were someone didn't get along with their NC or
|
|||
|
RC... wouldn't it save us all a lot of anguish if that person could
|
|||
|
simply find another net to join? Yeah, I know that for some reason
|
|||
|
that concept is considered heresy in Fidonet, but I don't understand
|
|||
|
why. The Internet, and many other nets work quite well without
|
|||
|
imposing such stupid restrictions (although the Internet has what might
|
|||
|
be considered an opposite problem... because folks there AREN'T
|
|||
|
required to associate with each other, it sometimes happens that
|
|||
|
someone who wants a feed can't get one locally, because none of the
|
|||
|
local folks already connected to the Internet want to give a feed to
|
|||
|
the new person. I'm NOT saying we should go to that extreme... sysops
|
|||
|
should be ALLOWED to join their local net, but not REQUIRED to).
|
|||
|
|
|||
|
So, along with some mechanism for getting technical changes implemented
|
|||
|
in Fidonet, I'd like to see the removal of sections of Policy that
|
|||
|
attempt to compensate for technical shortcomings with political
|
|||
|
solutions. The ridiculous geographic restrictions are a prime example,
|
|||
|
but there are other such things buried in there. Maybe we could even
|
|||
|
shorten Policy enough so that folks would READ it!
|
|||
|
|
|||
|
Anyway, please give this some consideration, and please remember that
|
|||
|
Fidonet Policy affects all sysops in all zones, and we should not
|
|||
|
lightly add things to Policy just to resolve some specific local
|
|||
|
conflict. But above all, don't put the "cart before the horse" by just
|
|||
|
adding new regulations without giving us some way to fix the underlying
|
|||
|
technical problems. Let's start finding technical solutions to those
|
|||
|
problems!
|
|||
|
FidoNews 10-14 Page: 14 05 Apr 1993
|
|||
|
|
|||
|
|
|||
|
Rebuttal to an Anonymous Critic
|
|||
|
|
|||
|
A Non-Anonymous Reply on Policy Draft Differences
|
|||
|
Ken Tuley, 1:374/98
|
|||
|
|
|||
|
Having openly asked for comments and suggestions in every
|
|||
|
echomail and netmail contact in which I have discussed ideas for
|
|||
|
future Policy, I was a little disappointed to see the level of
|
|||
|
disinformation included in the article in FNEWSA12 by an
|
|||
|
anonymous "analyst". Hopefully, those who went on to read the
|
|||
|
draft itself could see through the smoke and mirrors of selective
|
|||
|
quoting and recombination of statements, but I feel compelled to
|
|||
|
respond for the sake of clarity. Also for clarity, I have taken
|
|||
|
the liberty of replacing references to the draft with its name as
|
|||
|
distributed [DRAFT008].
|
|||
|
|
|||
|
> [DRAFT008] 4.1C
|
|||
|
> NC,RC selection not specific, each net Democratic
|
|||
|
> has its own method elections
|
|||
|
> one sysop
|
|||
|
one
|
|||
|
> vote. Term
|
|||
|
is
|
|||
|
> No term two years
|
|||
|
|
|||
|
These are specifically designated as being determined by local
|
|||
|
policies developed by the SYSOPS of those nets/regions.
|
|||
|
|
|||
|
> (Policy 4.1C requires a 2/3 majority of the Zone Coordinators
|
|||
|
to
|
|||
|
> elect an Internation Coordinator. [DRAFT008] requires just a
|
|||
|
> majority of the ZCs and give control of the election to the RCs
|
|||
|
if
|
|||
|
> the ZCs can't seem to come up with a winner.)
|
|||
|
|
|||
|
Given the difficulty 10 zone 1 RCs had deciding on a ZC, it
|
|||
|
seemed reasonable to allow a fall-back selection process that
|
|||
|
involved a larger voting pool. The difference between "majority"
|
|||
|
and "2/3" is a single person.
|
|||
|
|
|||
|
> Replacement of By RC,ZC regardless 20% below can
|
|||
|
call > NC,RC of sysops a sysop
|
|||
|
election.
|
|||
|
> wishes. to
|
|||
|
replace,limited
|
|||
|
|
|||
|
The interesting distinction here is that 4.1c continues to make
|
|||
|
the RC responsible for the NCs (and ZC for RCs), but provides no
|
|||
|
authority to act. DRAFT008 provides for the TEMPORARY
|
|||
|
replacement of an RC or NC sho is not performing his duties only
|
|||
|
until the local policy can be invoked to select a replacement.
|
|||
|
The *C is obligated to support the wishes of the majority of
|
|||
|
sysops in the affected net/region.
|
|||
|
|
|||
|
FidoNews 10-14 Page: 15 05 Apr 1993
|
|||
|
|
|||
|
> The Policy 4.1C proposal gives SYSOPS the authority to recall
|
|||
|
or
|
|||
|
> replace coordinators whom they feel are not performing.
|
|||
|
|
|||
|
What about the *C above who is responsible for his actions??
|
|||
|
|
|||
|
> [DRAFT008] on the other hand, gives unlimited authority to the
|
|||
|
RCs
|
|||
|
> to replace an NC, and unlimited authority to the ZC to replace
|
|||
|
an
|
|||
|
> RC.
|
|||
|
|
|||
|
Not unlimited... The RC may remove an NC for failure to perform
|
|||
|
the duties listed in Fidonet Policy and HAVE THE NET MEMBERSHIP
|
|||
|
SELECT A REPLACEMENT. The same applies to the ZC for an RC.
|
|||
|
|
|||
|
Under [DRAFT008], all 2000 sysops in a Region could object to
|
|||
|
the
|
|||
|
removal of their RC, yet the ZC would still have the authority to
|
|||
|
do
|
|||
|
so.)
|
|||
|
|
|||
|
> Local policies
|
|||
|
|
|||
|
> The 4.1C proposal keeps a unified Fidonet under one basic set
|
|||
|
of
|
|||
|
> guidelines. It also provides for the implementation of local
|
|||
|
> policies provided that they are not more RESTRICTIVE than 4.1C
|
|||
|
> itself.
|
|||
|
|
|||
|
This is essentially the same in both drafts, except that DRAFT008
|
|||
|
gives an example of one thing that might "ordinarily" be in a
|
|||
|
local policy.
|
|||
|
|
|||
|
> [DRAFT008] allows for local definition of what should be
|
|||
|
net-wide.
|
|||
|
> Like what "excessively annoying" is.)
|
|||
|
|
|||
|
Wrong! DRAFT008 refers to "Fidonet Policy" for the definition of
|
|||
|
excessively annoying. It simply requires that applicants for
|
|||
|
node numbers familiarize themselves with applicable local
|
|||
|
policies as well.
|
|||
|
|
|||
|
> Points Access can be refused no change
|
|||
|
from
|
|||
|
> existing
|
|||
|
|
|||
|
Since any sysop may refuse access to any user, neither of these
|
|||
|
is a change from existing policy. DRAFT008 simply reinforces the
|
|||
|
fact than running a mailer as a point does not automatically
|
|||
|
grant you access to all systems.
|
|||
|
|
|||
|
> Excommunications Notice to next level no change
|
|||
|
from
|
|||
|
> required existing
|
|||
|
FidoNews 10-14 Page: 16 05 Apr 1993
|
|||
|
|
|||
|
|
|||
|
No argument here. I would expect most excommunications to be
|
|||
|
appealed, so I believe it reasonable to notify the *C above if
|
|||
|
you have done so. It just prevents surprises.
|
|||
|
|
|||
|
> Policy Ratification Can be selectively Whole
|
|||
|
document
|
|||
|
> changed by section. must be
|
|||
|
presented
|
|||
|
|
|||
|
> (Fidonet has always adopted entire policy documents, not
|
|||
|
amendments
|
|||
|
> by section. The reasons why are even stated in current policy.
|
|||
|
|
|||
|
The reason stated is "to simplify the process". I think the
|
|||
|
sysops of Fidonet are capable of dealing with sectional
|
|||
|
amendments, and allowing them helps to focus attention on the
|
|||
|
specific changes offered. Besides, "always" is a misdirected
|
|||
|
term, since provisions for adoption of new policies didn't even
|
|||
|
exist prior to the current policy.
|
|||
|
|
|||
|
> (A significant change in 4.1C over current policy is that it
|
|||
|
moves
|
|||
|
> the level of approval of policy referendums DOWN a notch to the
|
|||
|
NC
|
|||
|
> level. [DRAFT008] still gives complete control over policy
|
|||
|
> referendums to the RCs)
|
|||
|
|
|||
|
I have already stated in public discussions that I would support
|
|||
|
addition of a threshold for NCs to trigger a referendum, but the
|
|||
|
4.1c proposal of 5% is absurd (that's 29 NCs at the present
|
|||
|
time). There are more nets than that in the state of Florida
|
|||
|
alone! Something like 50% of the RCs 'or' 20% of the NCs would
|
|||
|
be more reasonable (IMO).
|
|||
|
|
|||
|
> How local policy comes into existence is not specified in
|
|||
|
> [DRAFT008], yet the *C structure is required to abide by it
|
|||
|
when
|
|||
|
> judging "excessively annoying".
|
|||
|
|
|||
|
I don't know where this came from. The *C structure is required
|
|||
|
to abide by local policies in recognizing the *C selected under
|
|||
|
it, but the section on resolution of disputes that talks about
|
|||
|
excessively annoying behavior makes no reference to local
|
|||
|
policies.
|
|||
|
|
|||
|
> [DRAFT008] introduces more uncertainty into Fidonet as there
|
|||
|
can be
|
|||
|
> as many "policies" on a local level as there are
|
|||
|
nets+regions+zones
|
|||
|
> and they may CONFLICT with each other.
|
|||
|
Granted, but they may not conflict with any policy above them.
|
|||
|
This is already the case. Some nets have policies on cost
|
|||
|
recovery, outbound netmail routing, hub responsibilities and
|
|||
|
other procedures that vary from one net to another. I don't see
|
|||
|
FidoNews 10-14 Page: 17 05 Apr 1993
|
|||
|
|
|||
|
this as a problem.
|
|||
|
|
|||
|
The biggest difference between DRAFT008 and 4.1c is in where the
|
|||
|
responsibility lies to make the democratic process work.
|
|||
|
DRAFT008 puts it in the hands of the local sysops through
|
|||
|
encouragement of local policies consistent with Fidonet Policy.
|
|||
|
4.1c puts it in the hands of the IC to develop some unknown
|
|||
|
future procedure for accomplishing its goals.
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
FidoNet Policy Document Version 5
|
|||
|
FidoNet Policy Document
|
|||
|
|
|||
|
Version 5
|
|||
|
Draft 008
|
|||
|
03/12/93
|
|||
|
|
|||
|
1 Overview
|
|||
|
|
|||
|
This document establishes the policy for sysops who are members
|
|||
|
of the FidoNet organization of electronic mail systems. FidoNet
|
|||
|
is defined by a NodeList issued weekly by the International
|
|||
|
Coordinator.
|
|||
|
|
|||
|
Separate policy documents may be issued at the zone, region, or
|
|||
|
net level to provide additional detail on local procedures.
|
|||
|
Ordinarily, these lower- level policies may not contradict this
|
|||
|
policy, but will add procedural information specific to those
|
|||
|
areas, such as methods of coordinator selection. However, with
|
|||
|
the approval of the International Coordinator, local policy can
|
|||
|
be used to implement differences required due to local
|
|||
|
conditions. These local policies may not place additional
|
|||
|
restrictions on membership in FidoNet beyond those included in
|
|||
|
this document, other than enforcement of local mail periods.
|
|||
|
|
|||
|
1.0 Language
|
|||
|
|
|||
|
To facilitate the largest possible readership, all international
|
|||
|
Fidonet documents will be written in English. Translation into
|
|||
|
other languages is encouraged.
|
|||
|
|
|||
|
1.1 Introduction
|
|||
|
|
|||
|
FidoNet is an amateur electronic mail system. As such, all of
|
|||
|
its participants and operators are unpaid volunteers. From its
|
|||
|
early beginning as a few friends swapping messages back and
|
|||
|
forth (1984), it now (1993) includes over 20,000 systems on six
|
|||
|
continents.
|
|||
|
|
|||
|
FidoNet is not a common carrier or a value-added service network
|
|||
|
and is a public network only in as much as the independent,
|
|||
|
constituent nodes may individually provide public access to the
|
|||
|
network through their systems.
|
|||
|
FidoNews 10-14 Page: 18 05 Apr 1993
|
|||
|
|
|||
|
|
|||
|
FidoNet is large enough that it would quickly fall apart of its
|
|||
|
own weight unless some sort of structure and control were
|
|||
|
imposed on it. Multi-net operation provides the structure.
|
|||
|
Decentralized management provides the control. This document
|
|||
|
describes the procedures which have been developed to manage the
|
|||
|
network.
|
|||
|
|
|||
|
1.2 Organization
|
|||
|
|
|||
|
FidoNet systems are grouped on several levels, and
|
|||
|
administration is decentralized to correspond to these
|
|||
|
groupings. This overview provides a summary of the structure;
|
|||
|
specific duties of the coordinator positions are given later in
|
|||
|
the document.
|
|||
|
|
|||
|
1.2.1 Individual Systems and System Operators
|
|||
|
|
|||
|
The smallest subdivision of FidoNet is the individual system,
|
|||
|
corresponding to a single entry in the nodelist. The system
|
|||
|
operator (sysop) formulates a policy for running the board and
|
|||
|
dealing with users if the sysop provides access to others
|
|||
|
through that node. The sysop must mesh with the rest of the
|
|||
|
FidoNet system to send and receive mail, and the local policy
|
|||
|
must be consistent with other levels of FidoNet. BBS operation
|
|||
|
is not required to be a Fidonet sysop.
|
|||
|
|
|||
|
1.2.1.1 Users
|
|||
|
|
|||
|
The sysop is responsible for the actions of any user when they
|
|||
|
affect the rest of FidoNet. (If a user is annoying, the sysop
|
|||
|
is annoying.) Any traffic entering FidoNet via a given node, if
|
|||
|
not from the sysop, is considered to be from a user and is the
|
|||
|
responsibility of the sysop. (See section 2.1.3.)
|
|||
|
|
|||
|
1.2.1.2 Points
|
|||
|
|
|||
|
A point is a FidoNet-compatible system that is not in the
|
|||
|
nodelist, but communicates with FidoNet through a node referred
|
|||
|
to as a bossnode. A point is generally regarded in the same
|
|||
|
manner as a user, for example, the bossnode is responsible for
|
|||
|
mail from the point. (See section 2.1.3.) Points are addressed
|
|||
|
by using the bossnode's nodelist address; for example, a point
|
|||
|
system with a bossnode of 114/15 might be known as 114/15.12.
|
|||
|
Mail destined for the point is sent to the bossnode, which then
|
|||
|
routes it to the point.
|
|||
|
|
|||
|
In supporting points, the bossnode may make use of a private net
|
|||
|
number which should not be generally visible outside of the
|
|||
|
bossnode-point relationship. Unfortunately, should the point
|
|||
|
call another system directly (to do a file request, for
|
|||
|
example), the private network number will appear as the caller's
|
|||
|
address. In this way, points are different from users, since
|
|||
|
they operate FidoNet-compatible mailers which are capable of
|
|||
|
contacting systems other than the bossnode. Outside the local
|
|||
|
FidoNews 10-14 Page: 19 05 Apr 1993
|
|||
|
|
|||
|
bossnode, a point may be refused access to other Fidonet systems
|
|||
|
since points are considered users and sysops have full control
|
|||
|
over users' access to their systems.
|
|||
|
|
|||
|
1.2.2 Networks and Network Coordinators
|
|||
|
|
|||
|
A network is a collection of nodes in a local geographic area,
|
|||
|
usually defined by an area of convenient telephone calling.
|
|||
|
Networks coordinate their mail activity to decrease cost.
|
|||
|
|
|||
|
The Network Coordinator is responsible for maintaining the list
|
|||
|
of nodes for the network, and for forwarding netmail sent to
|
|||
|
members of the network from other FidoNet nodes. The Network
|
|||
|
Coordinator may make arrangements to handle outgoing netmail,
|
|||
|
but is not required to do so.
|
|||
|
|
|||
|
The Network Coordinator is selected by the nodes of that net.
|
|||
|
Nets are encouraged to formulate policies regarding the
|
|||
|
mechanism for accomplishing this.
|
|||
|
|
|||
|
1.2.2.1 Network Routing Hubs
|
|||
|
|
|||
|
Network Routing Hubs exist only in some networks. They may be
|
|||
|
appointed by the Network Coordinator, in order to assist in the
|
|||
|
management of a large network. The exact duties and procedures
|
|||
|
are a matter for the Network Coordinator and local policy to
|
|||
|
arrange, and will not be discussed here, except that a network
|
|||
|
coordinator may not delegate responsibility to mediate disputes.
|
|||
|
|
|||
|
1.2.3 Regions and Regional Coordinators
|
|||
|
|
|||
|
A region is a well-defined geographic area containing nodes
|
|||
|
which may or may not be combined into networks. A typical
|
|||
|
region will contain many nodes in networks, and a few
|
|||
|
independent nodes which are not a part of any network.
|
|||
|
|
|||
|
The Regional Coordinator maintains the list of independent nodes
|
|||
|
in the region and accepts nodelist segments from the Network
|
|||
|
Coordinators in the region. These are compiled to create a
|
|||
|
regional nodelist, which is then sent to the Zone Coordinator.
|
|||
|
A Regional Coordinator does not perform message-forwarding
|
|||
|
services for any nodes in the region. The Regional Coordinator
|
|||
|
may participate in netmail routing between the coordinator
|
|||
|
levels, but is not required to do so.
|
|||
|
|
|||
|
Regional Coordinators are selected by the nodes of that region.
|
|||
|
Regions are encouraged to formulate policies regarding the
|
|||
|
mechanism for accomplishing this.
|
|||
|
|
|||
|
1.2.4 Zones and Zone Coordinators
|
|||
|
|
|||
|
A zone is a large geographic area containing many regions,
|
|||
|
covering one or more countries and/or continents.
|
|||
|
|
|||
|
The Zone Coordinator compiles the nodelist segments from all of
|
|||
|
FidoNews 10-14 Page: 20 05 Apr 1993
|
|||
|
|
|||
|
the regions in the zone, and creates the master nodelist and
|
|||
|
difference file, which is then distributed over FidoNet in the
|
|||
|
zone. A Zone Coordinator does not perform message-forwarding
|
|||
|
services for any nodes in the zone. The Zone Coordinator may
|
|||
|
participate in netmail routing among the coordinator levels, but
|
|||
|
is not required to do so.
|
|||
|
|
|||
|
Zone Coordinators are selected by the Net and Regional
|
|||
|
Coordinators in that zone as representatives of the nodes to
|
|||
|
whom they provide service (see section 8.3).
|
|||
|
|
|||
|
1.2.5 Zone Coordinator Council
|
|||
|
|
|||
|
In certain cases, the Zone Coordinators work as a council to
|
|||
|
provide advice to the International Coordinator. The
|
|||
|
arrangement is similar to that between a president and advisors.
|
|||
|
In particular, this council considers inter-zone issues. This
|
|||
|
includes, but is not limited to: working out the details of
|
|||
|
nodelist production, mediating inter-zone disputes, and such
|
|||
|
issues not addressed at a lower level of FidoNet.
|
|||
|
|
|||
|
1.2.6 International Coordinator
|
|||
|
|
|||
|
The International Coordinator coordinates the joint production
|
|||
|
of the master nodelist by the Zone Coordinators.
|
|||
|
|
|||
|
The International Coordinator acts as the chair of the Zone
|
|||
|
Coordinator Council and as the overseer of Fidonet-wide
|
|||
|
elections -- arranging the announcement of referenda, the
|
|||
|
collection and counting of the ballots, and announcing the
|
|||
|
results for those issues that affect FidoNet as a whole.
|
|||
|
|
|||
|
The International Coordinator is selected by the Zone
|
|||
|
Coordinators. See section 7.2.
|
|||
|
|
|||
|
1.2.7 Top-down Organization. Checks and Balances.
|
|||
|
|
|||
|
These levels act to distribute the administration and control of
|
|||
|
FidoNet to the lowest possible level, while still allowing for
|
|||
|
coordinated action over the entire mail system. Administration
|
|||
|
is made possible by operating in a top-down manner. That is, a
|
|||
|
person at any given level is responsible to the level above, and
|
|||
|
responsible for the level below.
|
|||
|
|
|||
|
For example, a Regional Coordinator is responsible to the Zone
|
|||
|
Coordinator for anything that happens in the region. From the
|
|||
|
point of view of the Zone Coordinator, the Regional Coordinator
|
|||
|
is completely responsible for the smooth operation of the
|
|||
|
region. Likewise, from the point of view of the Regional
|
|||
|
Coordinator, the Network Coordinator is completely responsible
|
|||
|
for the smooth operation of the network.
|
|||
|
|
|||
|
If a person at any level above sysop is unable to properly
|
|||
|
perform their duties, the coordinator at the next level may
|
|||
|
replace them. For example, a Regional Coordinator who fails to
|
|||
|
FidoNews 10-14 Page: 21 05 Apr 1993
|
|||
|
|
|||
|
perform may be replaced by the Zone Coordinator. Interim
|
|||
|
replacements will be appointed until such time as a formal
|
|||
|
replacement can be selected under the local or regional
|
|||
|
policies. Such appointments will be considered final in the
|
|||
|
absence of such policies.
|
|||
|
|
|||
|
To provide for checks and balances at the highest level of
|
|||
|
FidoNet, there is an exception to this top-down organization.
|
|||
|
The International Coordinator is selected by a majority vote of
|
|||
|
the coordinators of the Zone Coordinators (see section 7.2).
|
|||
|
Similarly, decisions made by the International Coordinator can
|
|||
|
be reversed by the Zone Coordinator Council. Decisions made by
|
|||
|
other coordinators are not subject to reversal by a vote of the
|
|||
|
lower level, but instead are subject to the appeal process
|
|||
|
described in section 9.5.
|
|||
|
|
|||
|
1.3 Definitions
|
|||
|
|
|||
|
1.3.1 FidoNews
|
|||
|
|
|||
|
FidoNews is a weekly newsletter distributed in electronic form
|
|||
|
throughout the network. It is an important medium by which
|
|||
|
FidoNet sysops communicate with each other. FidoNews provides a
|
|||
|
sense of being a community of people with common interests.
|
|||
|
Accordingly, sysops and users are encouraged to contribute to
|
|||
|
FidoNews. Contributions are submitted to the node listed in
|
|||
|
Fidonews and in the nodelist for that purpose; a file describing
|
|||
|
the format to be used is available from that and many other
|
|||
|
systems.
|
|||
|
|
|||
|
1.3.2 Geography
|
|||
|
|
|||
|
Each level of FidoNet is geographically contained by the level
|
|||
|
immediately above it. A given geographic location is covered by
|
|||
|
one zone and one region within that zone, and is either in one
|
|||
|
network or not in a network. There are never two zones, two
|
|||
|
regions, or two networks which cover the same geographic area.
|
|||
|
|
|||
|
If a node is in the area of a network, it should be listed in
|
|||
|
that network, not as an independent in the region. (The primary
|
|||
|
exception to this is a node receiving inordinate amounts of
|
|||
|
host-routed mail; see section 4.2). Network boundaries are based
|
|||
|
on calling areas as defined by the local telephone company.
|
|||
|
Even in the case of areas where node density is so great that
|
|||
|
more than one network is needed to serve one local calling area,
|
|||
|
a geographic guideline is used to decide which nodes belong to
|
|||
|
what network. Network membership is based on geographic or other
|
|||
|
purely technical rationale. It is not based on personal or
|
|||
|
social factors.
|
|||
|
|
|||
|
There are cases in which the local calling areas lead to
|
|||
|
situations where logic dictates that a node physically in one
|
|||
|
FidoNet Region should be assigned to another. In those cases,
|
|||
|
with the agreement of the Regional Coordinators and Zone
|
|||
|
Coordinator involved, exemptions may be granted. Such exemptions
|
|||
|
FidoNews 10-14 Page: 22 05 Apr 1993
|
|||
|
|
|||
|
are described in section 5.6.
|
|||
|
|
|||
|
1.3.3 Zone Mail Hour
|
|||
|
|
|||
|
Zone Mail Hour (ZMH) is a defined time during which all nodes in
|
|||
|
a zone are required to be able to accept netmail. Each Fidonet
|
|||
|
zone defines a ZMH and publishes the time of its ZMH to all
|
|||
|
other Fidonet zones. See sections 2.1.8 and Appendix 1.
|
|||
|
|
|||
|
1.3.4 Nodelist
|
|||
|
|
|||
|
The nodelist is a file updated weekly which contains the
|
|||
|
addresses of all recognized FidoNet nodes. This file is
|
|||
|
currently made available by the Zone Coordinator not later than
|
|||
|
Zone Mail Hour each Friday, and is available electronically for
|
|||
|
download or file request at no charge. To be included in the
|
|||
|
nodelist, a system must meet the requirements defined by this
|
|||
|
document. No other requirements may be imposed.
|
|||
|
|
|||
|
Partial nodelists (single-zone, for example) may be made
|
|||
|
available at different levels in FidoNet. The full list as
|
|||
|
published by the International Coordinator is regarded as the
|
|||
|
official FidoNet nodelist, and is used in circumstances such as
|
|||
|
determination of eligibility for voting. All parts that make up
|
|||
|
the full nodelist are available on each Zone Coordinator's and
|
|||
|
each Regional Coordinator's system.
|
|||
|
|
|||
|
1.3.5 Excessively Annoying Behavior
|
|||
|
|
|||
|
There are references throughout this policy to "excessively
|
|||
|
annoying behavior", especially in section 9 (Resolution of
|
|||
|
Disputes). It is difficult to define this term, as it is based
|
|||
|
upon the judgement of the coordinator structure. Generally
|
|||
|
speaking, annoying behavior irritates, bothers, or causes harm
|
|||
|
to some other person. It is not necessary to break a law to be
|
|||
|
annoying.
|
|||
|
|
|||
|
There is a distinction between excessively annoying behavior and
|
|||
|
(simply) annoying behavior. For example, there is a learning
|
|||
|
curve that each new sysop must climb, both in the technical
|
|||
|
issues of how to set up the software and the social issues of
|
|||
|
how to interact with FidoNet. It is a rare sysop who, at some
|
|||
|
point in this journey, does not manage to annoy others. Only
|
|||
|
when such behavior persists, after being pointed out to the
|
|||
|
sysop, does it becomes excessively annoying. This does not
|
|||
|
imply that it is not possible to be excessively annoying without
|
|||
|
repetition (for example, deliberate falsification of mail would
|
|||
|
likely be excessively annoying on the very first try), but
|
|||
|
simply illustrates that a certain amount of tolerance is
|
|||
|
extended.
|
|||
|
|
|||
|
See section 9 for more information.
|
|||
|
|
|||
|
1.3.6 Commercial Use
|
|||
|
|
|||
|
FidoNews 10-14 Page: 23 05 Apr 1993
|
|||
|
|
|||
|
FidoNet is an amateur network. Participants spend their own
|
|||
|
time and money to make it work for the good of all the users.
|
|||
|
It is not appropriate for a commercial enterprise to take
|
|||
|
advantage of these volunteer efforts to further their own
|
|||
|
business interests. On the other hand, FidoNet provides a
|
|||
|
convenient and effective means for companies and users to
|
|||
|
exchange information, to the mutual benefit of all.
|
|||
|
|
|||
|
Network Coordinators could be forced to subsidize commercial
|
|||
|
operations by forwarding host-routed netmail, and could even
|
|||
|
find themselves involved in a lawsuit if any guarantee was
|
|||
|
suggested for mail delivery. It is therefore FidoNet policy
|
|||
|
that commercial mail is not to be routed. "Commercial mail"
|
|||
|
includes mail which furthers specific business interests without
|
|||
|
being of benefit to the net as a whole. Examples include
|
|||
|
company- internal mail, inter-corporate mail, specific product
|
|||
|
inquiries (price quotes, for instance), orders and their
|
|||
|
follow-ups, and all other subjects specifically related to
|
|||
|
business.
|
|||
|
|
|||
|
2 Sysop Procedures
|
|||
|
|
|||
|
2.1 General
|
|||
|
|
|||
|
2.1.1 The Basics
|
|||
|
|
|||
|
As the sysop of an individual node, you can generally do as you
|
|||
|
please, as long as you operate a mailer compatible with FTS-0001
|
|||
|
specifications, observe mail events, are not excessively
|
|||
|
annoying to other nodes in FidoNet, and do not promote or
|
|||
|
participate in the distribution of pirated copyrighted software
|
|||
|
or other illegal behavior via FidoNet.
|
|||
|
|
|||
|
2.1.2 Familiarity with Policy
|
|||
|
|
|||
|
In order to understand the meaning of "excessively annoying", it
|
|||
|
is incumbent upon all sysops to occasionally re-read FidoNet
|
|||
|
policy. New sysops must familiarize themselves with this policy
|
|||
|
and any applicable local, regional or zone policies before
|
|||
|
requesting a node number.
|
|||
|
|
|||
|
2.1.3 Responsible for All Traffic Entering FidoNet Via the Node
|
|||
|
|
|||
|
The sysop listed in the nodelist entry is responsible for all
|
|||
|
traffic entering FidoNet via that system. This includes (but is
|
|||
|
not limited to) traffic entered by users, points, and any other
|
|||
|
networks for which the system might act as a gateway. If a
|
|||
|
sysop allows "outside" messages to enter FidoNet via the system,
|
|||
|
the gateway system must be clearly identified by FidoNet node
|
|||
|
number as the point of origin of that message, and it must act
|
|||
|
as a gateway in the reverse direction. Should such traffic
|
|||
|
result in a violation of Policy, the sysop must rectify the
|
|||
|
situation as soon as notified.
|
|||
|
|
|||
|
2.1.4 Encryption and Review of Mail
|
|||
|
FidoNews 10-14 Page: 24 05 Apr 1993
|
|||
|
|
|||
|
|
|||
|
FidoNet is an amateur system. Our technology is such that the
|
|||
|
privacy of messages cannot be guaranteed. As a sysop, you have
|
|||
|
the right to review traffic flowing through your system, if for
|
|||
|
no other reason than to ensure that the system is not being used
|
|||
|
for illegal or commercial purposes. Encryption obviously makes
|
|||
|
this review impossible. Therefore, encrypted and/or commercial
|
|||
|
traffic that is routed without the express permission of all the
|
|||
|
links in the delivery path constitutes annoying behavior. See
|
|||
|
section 1.3.6 for a definition of commercial traffic.
|
|||
|
|
|||
|
2.1.5 No Alteration of Routed Mail
|
|||
|
|
|||
|
You may not modify, other than as required for routing or other
|
|||
|
technical purposes, any message, netmail or echomail, passing
|
|||
|
through the system from one FidoNet node to another. If you are
|
|||
|
offended by the content of a message, the procedure described in
|
|||
|
section 2.1.7 must be used.
|
|||
|
|
|||
|
2.1.6 Private Netmail
|
|||
|
|
|||
|
The word "private" should be used with great care, especially
|
|||
|
with users of a BBS. Some countries have laws which deal with
|
|||
|
"private mail", and it should be made clear that the word
|
|||
|
"private" does not imply that no person other than the recipient
|
|||
|
can read messages. Sysops who cannot provide this distinction
|
|||
|
should consider not offering users the option of "private mail".
|
|||
|
|
|||
|
If a user sends a "private message", the user has no control
|
|||
|
over the number of intermediate systems through which that
|
|||
|
message is routed. A sysop who sends a message to another sysop
|
|||
|
can control this aspect by sending the message direct to the
|
|||
|
recipient's system, thus guaranteeing that only the recipient or
|
|||
|
another individual to whom that sysop has given authorization
|
|||
|
can read the message. Thus, a sysop may have different
|
|||
|
expectations than a casual user.
|
|||
|
|
|||
|
2.1.6.1 No Disclosure of in-transit mail
|
|||
|
|
|||
|
Disclosing or in any way using information contained in private
|
|||
|
netmail traffic not addressed to you or written by you is
|
|||
|
considered annoying behavior, unless the traffic has been
|
|||
|
released by the author or the recipient or is a part of a formal
|
|||
|
policy complaint. This does not apply to echomail which is by
|
|||
|
definition a broadcast medium, and where private mail is often
|
|||
|
used to keep a sysop-only area restricted.
|
|||
|
|
|||
|
2.1.6.2 Private mail addressed to you
|
|||
|
|
|||
|
The issue of private mail which is addressed to you is more
|
|||
|
difficult than the in-transit question treated in the previous
|
|||
|
section. A common legal opinion holds that when you receive a
|
|||
|
message it becomes your property and you have a legal right to
|
|||
|
do with it what you wish. Your legal right does not excuse you
|
|||
|
from annoying others.
|
|||
|
FidoNews 10-14 Page: 25 05 Apr 1993
|
|||
|
|
|||
|
|
|||
|
In general, sensitive material should not be sent using FidoNet.
|
|||
|
This ideal is often compromised, as FidoNet is our primary mode
|
|||
|
of communication. In general, if the sender of a message
|
|||
|
specifically requests in the text of the message that the
|
|||
|
contents be kept confidential, release of the message into a
|
|||
|
public forum may be considered annoying.
|
|||
|
|
|||
|
There are exceptions. If someone is saying one thing in public
|
|||
|
and saying the opposite in private mail, the recipient of the
|
|||
|
private mail should not be subjected to harassment simply
|
|||
|
because the sender requests that the message not be released.
|
|||
|
Judgement and common sense should be used in this area as in all
|
|||
|
other aspects of FidoNet behavior.
|
|||
|
|
|||
|
2.1.7 Not Routing Mail
|
|||
|
|
|||
|
You are not required to route traffic if you have not agreed to
|
|||
|
do so. You are not obligated to route traffic for all if you
|
|||
|
route it for any, except as required of a Net Coordinator if you
|
|||
|
hold that position. Routing traffic through a node not
|
|||
|
obligated to perform routing without the permission of that node
|
|||
|
may be annoying behavior. This includes unsolicited echomail.
|
|||
|
|
|||
|
If you do not forward a message when you previously agreed to
|
|||
|
perform such routing, the message must be returned to the sysop
|
|||
|
of the node at which it entered FidoNet with an explanation of
|
|||
|
why it was not forwarded. (It is not necessary to return
|
|||
|
messages which are addressed to a node which is not in the
|
|||
|
current nodelist.) Intentionally stopping an in-transit message
|
|||
|
without following this procedure constitutes annoying behavior.
|
|||
|
In the case of a failure to forward traffic due to a technical
|
|||
|
problem, it does not become annoying unless it persists after
|
|||
|
being pointed out to the sysop.
|
|||
|
|
|||
|
2.1.8 Exclusivity of Zone Mail Hour
|
|||
|
|
|||
|
Zone Mail Hour is the heart of FidoNet, as this is when network
|
|||
|
mail is passed between systems. Any system which wishes to be a
|
|||
|
part of FidoNet must be able to receive mail during this time
|
|||
|
using the protocol defined in the current FidoNet Technical
|
|||
|
Standards Committee publication (FTS-0001 at 2this writing). It
|
|||
|
is permissible to have greater capability (for example, to
|
|||
|
support additional protocols or extended mail hours), but the
|
|||
|
minimum requirement is FTS-0001 capability during this one hour
|
|||
|
of the day.
|
|||
|
|
|||
|
This time is exclusively reserved for netmail. Many phone
|
|||
|
systems charge on a per-call basis, regardless of whether a
|
|||
|
connect, no connect, or busy signal is encountered. For this
|
|||
|
reason, any activity other than normal network mail processing
|
|||
|
that ties up a system during ZMH is considered annoying
|
|||
|
behavior. Echomail should not be transferred during ZMH. User
|
|||
|
(BBS) access to a system is prohibited during ZMH. File
|
|||
|
requests should not be honored during ZMH.
|
|||
|
FidoNews 10-14 Page: 26 05 Apr 1993
|
|||
|
|
|||
|
|
|||
|
A system which is a member of a local network may also be
|
|||
|
required to observe additional mail events, as defined by the
|
|||
|
Network Coordinator. Access restrictions during local network
|
|||
|
periods are left to the discretion of the Network Coordinator as
|
|||
|
defined in local policy.
|
|||
|
|
|||
|
2.1.9 Private Nodes
|
|||
|
|
|||
|
The rare exception to ZMH compliance is private nodes. Persons
|
|||
|
requesting private nodes should be supported as points if
|
|||
|
possible. A private listing is justified when the system must
|
|||
|
interface with many others, such as an echomail distributor. In
|
|||
|
these cases, the exact manner and timing of mail delivery is
|
|||
|
arranged between the private node and other systems. Such an
|
|||
|
agreement between a private system and a hub is not binding on
|
|||
|
any replacement for that hub. A private node must be a part of
|
|||
|
a network (they cannot be independents in the region.)
|
|||
|
|
|||
|
Private listings affect each member of FidoNet, since they take
|
|||
|
up space in everyone's nodelist. Private listings which are for
|
|||
|
the convenience of one sysop (at the expense of every other
|
|||
|
sysop in FidoNet) are a luxury which is no longer possible.
|
|||
|
Non-essential redundant listings (more than one listing for the
|
|||
|
same telephone number, except as mandated by FTSC standards)
|
|||
|
also fall into this category. Sysops requesting private or
|
|||
|
redundant listings must justify them with a statement explaining
|
|||
|
how they benefit the local net or FidoNet as a whole. The
|
|||
|
Network Coordinator or Regional Coordinator may review this
|
|||
|
statement at any time and listings which are not justified will
|
|||
|
be removed.
|
|||
|
|
|||
|
2.1.10 Observing Mail Events
|
|||
|
|
|||
|
Failure to observe the proper mail events is grounds for any
|
|||
|
node to be dropped from FidoNet without notice (since notice is
|
|||
|
generally given by netmail).
|
|||
|
|
|||
|
2.1.11 Use of Current Nodelist
|
|||
|
|
|||
|
Network mail systems generally operate unattended, and place
|
|||
|
calls at odd hours of the night. If a system tries to call an
|
|||
|
incorrect or out-of-date number, it could cause some poor
|
|||
|
citizen's phone to ring in the wee hours of the morning, much to
|
|||
|
the annoyance of innocent bystanders and civil authorities. For
|
|||
|
this reason, a sysop who sends mail is obligated to obtain and
|
|||
|
use the most recent edition of the nodelist as is practical.
|
|||
|
|
|||
|
2.1.12 Excommunication
|
|||
|
|
|||
|
A system which has been dropped from the network is said to be
|
|||
|
excommunicated (i.e. denied communication). If you find that
|
|||
|
you have been excommunicated without warning, your coordinator
|
|||
|
was unable to contact you. You should rectify the problem and
|
|||
|
contact your coordinator.
|
|||
|
FidoNews 10-14 Page: 27 05 Apr 1993
|
|||
|
|
|||
|
|
|||
|
Systems may also be dropped from the nodelist for cause. See
|
|||
|
sections 4.3, 5.2, and 9.
|
|||
|
|
|||
|
It is considered annoying behavior to assist a system which was
|
|||
|
excommunicated in circumventing that removal from the nodelist.
|
|||
|
For example, if you decide to provide an echomail feed to your
|
|||
|
friend who has been excommunicated, it is likely that your
|
|||
|
listing will also be removed.
|
|||
|
|
|||
|
2.1.13 Timing of Zone Mail Hour
|
|||
|
|
|||
|
The exact timing of Zone Mail Hour for each zone is set by the
|
|||
|
Zone Coordinator. See Appendix 1.
|
|||
|
|
|||
|
2.1.14 Non-observance of Daylight Savings Time
|
|||
|
|
|||
|
FidoNet does not observe daylight savings time. In areas which
|
|||
|
observe daylight savings time the FidoNet mail schedules must be
|
|||
|
adjusted in the same direction as the clock change.
|
|||
|
Alternatively, you can simply leave your system on standard time.
|
|||
|
|
|||
|
2.2 How to obtain a node number
|
|||
|
|
|||
|
You must first obtain a current nodelist so that you can send
|
|||
|
mail. You do not need a node number to send mail, but you must
|
|||
|
have one in order for others to send mail to you.
|
|||
|
|
|||
|
The first step in obtaining a current nodelist is to locate a
|
|||
|
FidoNet bulletin board. Most bulletin board lists include at
|
|||
|
least a few FidoNet systems, and usually identify them as such.
|
|||
|
Use a local source to obtain documents because many networks
|
|||
|
have detailed information available which explains the coverage
|
|||
|
area of the network and any special requirements or procedures.
|
|||
|
|
|||
|
Once you have a nodelist, you must determine which network or
|
|||
|
region covers your area. Regions are numbered 10-99; network
|
|||
|
numbers are greater than 99. Networks are more restricted in
|
|||
|
area than regions, but are preferred since they improve the flow
|
|||
|
of mail and provide more services to their members. If you
|
|||
|
cannot find a network which covers your area, then pick the
|
|||
|
region which does.
|
|||
|
|
|||
|
Once you have located the network or region in your area, send a
|
|||
|
message containing a request for a node number to node zero of
|
|||
|
that network or region. The request must be sent by netmail, as
|
|||
|
this indicates that your system has FidoNet capability.
|
|||
|
|
|||
|
You must set up your software so that the from-address in your
|
|||
|
message does not cause problems for the coordinator who receives
|
|||
|
it. If you pick the address of an existing system, this will
|
|||
|
cause obvious problems. If your software is capable of using
|
|||
|
address -1/-1, this is the traditional address used by potential
|
|||
|
sysops. Otherwise use net/9999 (e.g. if you are applying to net
|
|||
|
123, set your system up as 123/9999). Many nets have specific
|
|||
|
FidoNews 10-14 Page: 28 05 Apr 1993
|
|||
|
|
|||
|
instructions available to potential sysops and these procedures
|
|||
|
may indicate a preference for the from-address.
|
|||
|
|
|||
|
The message you send must include at least the following
|
|||
|
information:
|
|||
|
|
|||
|
1) Your name.
|
|||
|
2) The phone number to be used when calling your system.
|
|||
|
3) The name of your system.
|
|||
|
4) The city and state where your system is located.
|
|||
|
5) Your voice phone number.
|
|||
|
6) Your hours of netmail operation.
|
|||
|
7) The maximum baud rate you can support.
|
|||
|
8) The type of mailer software and modem you are using.
|
|||
|
|
|||
|
Your coordinator may contact you for additional information.
|
|||
|
All information submitted will be kept confidential and will not
|
|||
|
be supplied to anyone except the person who assumes the
|
|||
|
coordinator position at the resignation of the current
|
|||
|
coordinator.
|
|||
|
|
|||
|
You must indicate that you have read, and agree to abide by,
|
|||
|
this document and all the current policies of FidoNet.
|
|||
|
|
|||
|
Please allow at least two weeks for a node number request to be
|
|||
|
processed. If you send your request to a Regional Coordinator,
|
|||
|
it may forwarded to the appropriate Network Coordinator.
|
|||
|
|
|||
|
2.3 If You are Going Down
|
|||
|
|
|||
|
If your node will be down for an extended period (more than a
|
|||
|
day or two), inform your coordinator as soon as possible. It is
|
|||
|
not your coordinator's responsibility to chase you down for a
|
|||
|
status report, and if your system stops accepting mail it will
|
|||
|
be removed from the nodelist.
|
|||
|
|
|||
|
Never put an answering machine or any other device which answers
|
|||
|
the phone on your phone line while you are down. If you do,
|
|||
|
calling systems will get the machine repeatedly, producing large
|
|||
|
phone bills, which is very annoying. In short, the only thing
|
|||
|
which should ever answer the telephone during periods when the
|
|||
|
nodelist indicates that your node will accept mail is
|
|||
|
FidoNet-compatible software which accepts mail.
|
|||
|
|
|||
|
If you will be leaving your system unattended for an extended
|
|||
|
period of time (such as while you are on vacation), you should
|
|||
|
notify your coordinator. Systems have a tendency to "crash" now
|
|||
|
and then, so you will probably want your coordinator to know
|
|||
|
that it is a temporary condition if it happens while you are
|
|||
|
away.
|
|||
|
|
|||
|
2.4 How to Form a Network
|
|||
|
|
|||
|
If there are several nodes in your area, but no network, a new
|
|||
|
network can be formed. This has advantages to both you and to
|
|||
|
FidoNews 10-14 Page: 29 05 Apr 1993
|
|||
|
|
|||
|
the rest of FidoNet. You receive better availability of nodelist
|
|||
|
difference files and FidoNews, and everyone else can take
|
|||
|
advantage of host-routing netmail to the new network.
|
|||
|
|
|||
|
The first step is to contact the other sysops in your area. You
|
|||
|
must decide which nodes will comprise the network, and which of
|
|||
|
those nodes you would like to be the Network Coordinator. Then
|
|||
|
consult your Regional Coordinator. You must send the following
|
|||
|
information:
|
|||
|
|
|||
|
1) The region number(s), or network number(s) if a network is
|
|||
|
splitting up, that are affected by the formation of your
|
|||
|
network. The Regional Coordinator will inform the Zone
|
|||
|
Coordinator and the coordinators of any affected networks that a
|
|||
|
new network is in formation.
|
|||
|
|
|||
|
2) A copy of the proposed network's nodelist segment. This file
|
|||
|
should be attached to the message of application for a network
|
|||
|
number, and should use the nodelist format described in the
|
|||
|
current version of the appropriate FTSC publication. Please
|
|||
|
elect a name that relates to your grouping, for example SoCalNet
|
|||
|
for nodes in the Southern California Area and MassNet West for
|
|||
|
the Western Massachusetts Area. Remember if you call yourself
|
|||
|
DOGNET it doesn't identify your area.
|
|||
|
|
|||
|
Granting a network number is not automatic. Even if the request
|
|||
|
is granted, the network might not be structured exactly as you
|
|||
|
request. Your Regional Coordinator will review your application
|
|||
|
and inform you of the decision.
|
|||
|
|
|||
|
Do not send a network number request to the Zone Coordinator.
|
|||
|
All network number requests must be processed by the Regional
|
|||
|
Coordinator.
|
|||
|
|
|||
|
3 General Procedures for All Coordinators
|
|||
|
|
|||
|
3.1 Make Available Difference Files and FidoNews
|
|||
|
|
|||
|
Each Coordinator is responsible for obtaining and making
|
|||
|
available, on a weekly basis, nodelist difference files and
|
|||
|
FidoNews.
|
|||
|
|
|||
|
3.2 Processing Nodelist Changes and Passing Them Upstream
|
|||
|
|
|||
|
Each coordinator is responsible for obtaining nodelist
|
|||
|
information from the level below, processing it, and passing the
|
|||
|
results to the level above. The timing of this process is
|
|||
|
determined by the requirements imposed by the level above.
|
|||
|
|
|||
|
3.3 Ensure the Latest Policy is Available
|
|||
|
|
|||
|
A Coordinator is responsible to make the current version of this
|
|||
|
document available to the level below, and to encourage
|
|||
|
familiarity with it.
|
|||
|
|
|||
|
FidoNews 10-14 Page: 30 05 Apr 1993
|
|||
|
|
|||
|
In addition, a coordinator is required to forward any local
|
|||
|
policies received to the level above, and to review such
|
|||
|
policies. Although not required, common courtesy dictates that
|
|||
|
when formulating a local policy, the participation of the level
|
|||
|
above should be solicited.
|
|||
|
|
|||
|
3.4 Minimize the Number of Hats Worn
|
|||
|
|
|||
|
Coordinators are encouraged to limit the number of FidoNet
|
|||
|
functions they perform. A coordinator who holds two different
|
|||
|
positions compromises the appeal process. For example, if the
|
|||
|
Network Coordinator is also the Regional Coordinator, sysops in
|
|||
|
that network are denied one level of appeal.
|
|||
|
|
|||
|
Coordinators are discouraged from acting as echomail and
|
|||
|
software- distribution hubs. If they do so, they should handle
|
|||
|
echomail (or other volume distribution) on a system other than
|
|||
|
the administrative system. A coordinator's system should be
|
|||
|
readily available to the levels immediately above and below.
|
|||
|
|
|||
|
Another reason to discourage multiple hats is the difficulty of
|
|||
|
replacing services if someone leaves the network. For example,
|
|||
|
if a coordinator is the echomail hub and the
|
|||
|
software-distribution hub, those services will be difficult to
|
|||
|
restore when that person resigns.
|
|||
|
|
|||
|
3.5 Be a Member of the Area Administered
|
|||
|
|
|||
|
A coordinator must be a member of the area administered. That
|
|||
|
is, a Network Coordinator must be a member of that network by
|
|||
|
virtue of geography. A Regional Coordinator must be either a
|
|||
|
member of a network in the region or an independent in the
|
|||
|
region. A Zone Coordinator must be either a member of a network
|
|||
|
in the zone or a regional independent in the zone. The
|
|||
|
International Coordinator must be a Fidonet sysop.
|
|||
|
|
|||
|
3.6 Encourage New Sysops to Enter FidoNet
|
|||
|
|
|||
|
A coordinator is encouraged to operate a public bulletin board
|
|||
|
system which is freely available for the purpose of distributing
|
|||
|
Policy, FidoNews, and Nodelists to potential new sysops.
|
|||
|
Dissemination of this information to persons who are potential
|
|||
|
FidoNet sysops is important to the growth of FidoNet, and
|
|||
|
coordinators should encourage development of new systems.
|
|||
|
|
|||
|
3.7 Tradition and Precedent
|
|||
|
|
|||
|
A coordinator is not bound by the practices of predecessor or
|
|||
|
peers beyond the scope of this document and other applicable
|
|||
|
net, region or zone policies.
|
|||
|
|
|||
|
In addition, a new coordinator has the right to review any
|
|||
|
decision made by predecessors for compliance with Policy, and
|
|||
|
take whatever actions may be necessary to rectify any situations
|
|||
|
not in compliance.
|
|||
|
FidoNews 10-14 Page: 31 05 Apr 1993
|
|||
|
|
|||
|
|
|||
|
3.8 Technical Management
|
|||
|
|
|||
|
The primary responsibility of any coordinator is technical
|
|||
|
management of network operations. Decisions must be made on
|
|||
|
technical grounds.
|
|||
|
|
|||
|
3.9 Review and Acceptance of Lower Policies
|
|||
|
|
|||
|
Individual regions and nets are encouraged to formulate policies
|
|||
|
to deal with local issues not specifically covered in this
|
|||
|
document. It is the responsibility of coordinators to review
|
|||
|
policies submitted from lower levels for compliance with higher
|
|||
|
policies, and to support those policies whenever possible in
|
|||
|
deciding matters related to those areas.
|
|||
|
|
|||
|
In the absence of procedures determined by local/regional
|
|||
|
policies, the coordinator should attempt to act in accordance
|
|||
|
with the interests and wishes of the majority of nodes in the
|
|||
|
affected area.
|
|||
|
|
|||
|
4 Network Coordinator Procedures
|
|||
|
|
|||
|
4.1 Responsibilities
|
|||
|
|
|||
|
A Network Coordinator has the following responsibilities:
|
|||
|
|
|||
|
1) To receive incoming mail for nodes in the network, and
|
|||
|
arrange delivery to its recipients.
|
|||
|
|
|||
|
2) To assign node numbers to nodes in the network.
|
|||
|
|
|||
|
3) To maintain the nodelist segment for the network, and to send
|
|||
|
a copy of it to the Regional Coordinator whenever it changes.
|
|||
|
|
|||
|
4) To make available to nodes in the network new nodelist
|
|||
|
difference files, new issues of FidoNews, and new revisions of
|
|||
|
Network Policy Documents as they are received, and to
|
|||
|
periodically check to insure that nodes use up to date nodelists.
|
|||
|
|
|||
|
5) To make available to nodes in the network information
|
|||
|
regarding Fidonet elections and referenda, to solicit input from
|
|||
|
those nodes and to act as a representative of those nodes in
|
|||
|
such elections when appropriate.
|
|||
|
|
|||
|
4.2 Routing Inbound Mail
|
|||
|
|
|||
|
It is your responsibility as Network Coordinator to coordinate
|
|||
|
the receipt and forwarding of host-routed inbound netmail for
|
|||
|
nodes in your network. The best way to accomplish this is left
|
|||
|
to your discretion.
|
|||
|
|
|||
|
If a node in your network is receiving large volumes of mail you
|
|||
|
can request that the sysop contact the systems which are sending
|
|||
|
this mail and request that they not host-route it. If the
|
|||
|
FidoNews 10-14 Page: 32 05 Apr 1993
|
|||
|
|
|||
|
problem persists, you can request your Regional Coordinator to
|
|||
|
assign the node a number as an independent and drop the system
|
|||
|
from your network.
|
|||
|
|
|||
|
Occasionally a node will make a "bombing run" (sending one
|
|||
|
message to a great many nodes). If a node in another network is
|
|||
|
making bombing runs on your nodes and routing them through your
|
|||
|
inbound host, then you can complain to the network coordinator
|
|||
|
of the offending node. (If the node is an independent, complain
|
|||
|
to the regional coordinator.) Bombing runs are considered to be
|
|||
|
annoying.
|
|||
|
|
|||
|
Another source of routing overload is echomail. Echomail cannot
|
|||
|
be allowed to degrade the ability of FidoNet to handle normal
|
|||
|
message traffic. If a node in your network is routing large
|
|||
|
volumes of echomail, you can ask the sysop to either limit the
|
|||
|
amount of echomail or to stop routing echomail.
|
|||
|
|
|||
|
You are not required to forward encrypted, commercial, or
|
|||
|
illegal mail. However, you must follow the procedures described
|
|||
|
in section 2.1.7 if you do not forward the mail.
|
|||
|
|
|||
|
4.3 Assigning Node Numbers
|
|||
|
|
|||
|
It is your responsibility to assign node numbers to new nodes in
|
|||
|
your network. You may also change the numbers of existing nodes
|
|||
|
in your network, though you should check with your member nodes
|
|||
|
before doing so. You may assign any numbers you wish, so long as
|
|||
|
each node has a unique number within your network.
|
|||
|
|
|||
|
You must not assign a node number to any system until you have
|
|||
|
received a formal request from that system by FidoNet mail.
|
|||
|
This will ensure that the system is minimally operational. The
|
|||
|
strict maintenance of this policy has been one of the great
|
|||
|
strengths of FidoNet.
|
|||
|
|
|||
|
You may not assign a node number to a node in an area covered by
|
|||
|
an existing network. Further, if you have nodes in an area
|
|||
|
covered by a network in formation, those nodes must be
|
|||
|
transferred to the new network.
|
|||
|
|
|||
|
You should use network mail to inform a new sysop of the node
|
|||
|
number, as this helps to insure that the system is capable of
|
|||
|
receiving network mail.
|
|||
|
|
|||
|
If a node in your network is acting in a sufficiently annoying
|
|||
|
manner, you can take whatever action you deem appropriate,
|
|||
|
according to the circumstances of the case and due process.
|
|||
|
Notification must be given to the Regional Coordinator if that
|
|||
|
action taken is excommunication of a node.
|
|||
|
|
|||
|
4.4 Maintaining the Nodelist
|
|||
|
|
|||
|
You should implement name changes, phone number changes, and so
|
|||
|
forth in your segment of the nodelist as soon as possible after
|
|||
|
FidoNews 10-14 Page: 33 05 Apr 1993
|
|||
|
|
|||
|
the information is received from the affected node. You should
|
|||
|
also on occasion send a message to every node in your network to
|
|||
|
ensure that they are operational. If a node turns out to be "off
|
|||
|
the air" with no prior warning, you can either mark the node
|
|||
|
down or remove it from the nodelist. (Nodes are to be marked
|
|||
|
DOWN for a maximum of two weeks, after which the line should be
|
|||
|
removed from the nodelist segment.)
|
|||
|
|
|||
|
At your discretion, you may distribute a portion of this
|
|||
|
workload to routing hubs. In this case, you should receive the
|
|||
|
nodelist segments from the these hubs within your network. You
|
|||
|
will need to maintain a set of nodelist segments for each hub
|
|||
|
within your network, since you cannot count on getting an update
|
|||
|
from each hub every week. You should assemble a master nodelist
|
|||
|
segment for your network every week and send it to your Regional
|
|||
|
Coordinator by the day and time designated. It is suggested
|
|||
|
that you do this as late as is practical, so as to accommodate
|
|||
|
any late changes, balanced with the risk of missing the
|
|||
|
connection with your Regional Coordinator and thus losing a week.
|
|||
|
|
|||
|
4.5 Making Available Policies, Nodelists and FidoNews
|
|||
|
|
|||
|
As a Network Coordinator you should obtain a new issue of
|
|||
|
FidoNews and a new nodelist difference file every week from your
|
|||
|
Regional Coordinator. The nodelist difference file is currently
|
|||
|
made available each Friday, and FidoNews is published each
|
|||
|
Monday. You must make these files available to all nodes in the
|
|||
|
network, and you are encouraged to make them available to the
|
|||
|
general public for download.
|
|||
|
|
|||
|
You should also obtain the most recent versions of the Policy
|
|||
|
documents that bind the members of your network, and make those
|
|||
|
available to the nodes in your network. Policies are released
|
|||
|
at sporadic intervals, so you should also inform the nodes in
|
|||
|
your network when such events occur, and ensure the nodes are
|
|||
|
generally familiar with the changes.
|
|||
|
|
|||
|
Policy, FidoNews, and the nodelist are the glue that holds us
|
|||
|
together. Without them, we would cease to be a community, and
|
|||
|
become just another random collection of bulletin boards.
|
|||
|
|
|||
|
5 Regional Coordinator Procedures
|
|||
|
|
|||
|
5.1 Responsibilities
|
|||
|
|
|||
|
A Regional Coordinator has the following responsibilities:
|
|||
|
|
|||
|
1) To assign node numbers to independent nodes in the region.
|
|||
|
|
|||
|
2) To encourage independent nodes in the region to join existing
|
|||
|
networks, or to form new networks.
|
|||
|
|
|||
|
3) To assign network numbers to networks in the region and
|
|||
|
define their boundaries.
|
|||
|
|
|||
|
FidoNews 10-14 Page: 34 05 Apr 1993
|
|||
|
|
|||
|
4) To compile a nodelist of all of the networks and independents
|
|||
|
in the region, and to send a copy of it to the Zone Coordinator
|
|||
|
whenever it changes.
|
|||
|
|
|||
|
5) To ensure the smooth operation of networks within the region.
|
|||
|
|
|||
|
6) To make new nodelist difference files, Policies, and issues
|
|||
|
of FidoNews available to the Network Coordinators in the region
|
|||
|
as soon as is practical.
|
|||
|
|
|||
|
7) To make available to Net Coordinators and independent nodes
|
|||
|
in the region information regarding Fidonet elections and
|
|||
|
referenda, to solicit input from the independent nodes and to
|
|||
|
act as a representative of those nodes in such elections when
|
|||
|
appropriate.
|
|||
|
|
|||
|
5.2 Assigning Node Numbers
|
|||
|
|
|||
|
It is your responsibility to assign node numbers to independent
|
|||
|
nodes in your region. You may also change the numbers of
|
|||
|
existing nodes in your region, though you should check with the
|
|||
|
respective nodes before doing so. You may assign any numbers you
|
|||
|
wish, so long as each node has a unique number within your
|
|||
|
region.
|
|||
|
|
|||
|
You should not assign a node number to any system until you have
|
|||
|
received a formal request from that system by FidoNet mail.
|
|||
|
This will ensure that the system is minimally operational. The
|
|||
|
strict maintenance of this policy has been one of the great
|
|||
|
strengths of FidoNet.
|
|||
|
|
|||
|
You should use network mail to inform a new sysop of the node
|
|||
|
number, as this helps to insure that the system is capable of
|
|||
|
receiving network mail.
|
|||
|
|
|||
|
If a node in your region is acting in a sufficiently annoying
|
|||
|
manner, you can take whatever action you deem appropriate,
|
|||
|
according to the circumstances of the case and due process.
|
|||
|
Notification must be given to the Zone Coordinator if the action
|
|||
|
taken is the excommunication of a node.
|
|||
|
|
|||
|
If you receive a node number request from outside your region,
|
|||
|
you must forward it to the Regional Coordinator of the
|
|||
|
applicant's region. If you receive a node number request from a
|
|||
|
new node that is in an area covered by an existing network, then
|
|||
|
you must forward the request to the Coordinator of that network
|
|||
|
instead of assigning a number yourself.
|
|||
|
|
|||
|
If a network forms in an area for which you have independent
|
|||
|
nodes, those nodes will be transferred to the local network as
|
|||
|
soon as is practical, unless those independent node assignments
|
|||
|
were made for reasons of high volume or commercial traffic.
|
|||
|
|
|||
|
5.3 Encouraging the Formation and Growth of Networks
|
|||
|
|
|||
|
FidoNews 10-14 Page: 35 05 Apr 1993
|
|||
|
|
|||
|
One of your main duties as a Regional Coordinator is to promote
|
|||
|
the growth of networks in your region.
|
|||
|
|
|||
|
You should avoid having independent nodes in your region which
|
|||
|
are within the coverage area of a network. There are, however,
|
|||
|
certain cases where a node should not be a member of a network,
|
|||
|
such as a system with a large amount of inbound netmail. See
|
|||
|
section 4.2.
|
|||
|
|
|||
|
If several independent nodes in your region are in a local area
|
|||
|
you should encourage them to form a network, and if necessary
|
|||
|
you may require them to form a network. See section 2.4.
|
|||
|
|
|||
|
5.4 Assigning Network Numbers
|
|||
|
|
|||
|
It is your responsibility to assign network numbers to new
|
|||
|
networks forming within your region. You are assigned a pool of
|
|||
|
network numbers to use for this purpose by your Zone
|
|||
|
Coordinator. As a part of this function, it is the
|
|||
|
responsibility of the Regional Coordinator to define the
|
|||
|
boundaries of the networks in the region.
|
|||
|
|
|||
|
5.5 Maintaining the Nodelist
|
|||
|
|
|||
|
As a Regional Coordinator, you have a dual role in maintaining
|
|||
|
the nodelist segment for your region.
|
|||
|
|
|||
|
First, you must maintain the list of independent nodes in your
|
|||
|
region. You should attempt to implement name changes, phone
|
|||
|
number changes, and so forth in this nodelist segment as soon as
|
|||
|
possible. You should also on occasion send a message to every
|
|||
|
independent node in your region to ensure that they are
|
|||
|
operational. If a node turns out to be "off the air" with no
|
|||
|
prior warning, you can either mark the node down or remove it
|
|||
|
from the nodelist segment. (Nodes are to marked DOWN for a
|
|||
|
maximum of two weeks, after which the line should be removed
|
|||
|
from the nodelist segment.)
|
|||
|
|
|||
|
Second, you must receive the nodelist segments from the Network
|
|||
|
Coordinators within your region. You will need to maintain a
|
|||
|
set of nodelist segments for each network within your region,
|
|||
|
since you cannot count on getting an update from each Network
|
|||
|
Coordinator every week. You should assemble a master nodelist
|
|||
|
segment for your region every week and send it to your Zone
|
|||
|
Coordinator by the day and time designated. It is suggested
|
|||
|
that you do this as late as practical, so as to accommodate late
|
|||
|
changes, balanced with the risk of missing the connection with
|
|||
|
your Zone Coordinator and thus losing a week.
|
|||
|
|
|||
|
5.6 Geographic Exemptions
|
|||
|
|
|||
|
There are cases where local calling geography does not follow
|
|||
|
FidoNet regions. In exceptional cases, exemptions to normal
|
|||
|
geographic guidelines are agreed upon by the Regional
|
|||
|
Coordinators and Zone Coordinator involved. Such an exemption is
|
|||
|
FidoNews 10-14 Page: 36 05 Apr 1993
|
|||
|
|
|||
|
not a right, and is not permanent. When a network is formed in
|
|||
|
the proper region that would provide local calling access to the
|
|||
|
exempted node, it is no longer exempt. An exemption may be
|
|||
|
reviewed and revoked at any time by any of the coordinators
|
|||
|
involved.
|
|||
|
|
|||
|
5.7 Overseeing Network Operations
|
|||
|
|
|||
|
It is your responsibility as Regional Coordinator to ensure that
|
|||
|
the networks within your region are operating in an acceptable
|
|||
|
manner. This does not mean that you are required to operate
|
|||
|
those networks; that is the responsibility of the Network
|
|||
|
Coordinators. It means that you are responsible for assuring
|
|||
|
that the Network Coordinators within your region are acting
|
|||
|
responsibly.
|
|||
|
|
|||
|
If you find that a Network Coordinator within your region is not
|
|||
|
properly performing the duties outlined in Section 4, you should
|
|||
|
take whatever action you deem necessary to correct the
|
|||
|
situation, up to and including removing the Net Coordinator from
|
|||
|
that position and having the net membership select a replacement.
|
|||
|
|
|||
|
If a network grows so large that it cannot reasonably
|
|||
|
accommodate traffic flow during the Zone Mail Hour, the Regional
|
|||
|
Coordinator can direct the creation of one or more new networks
|
|||
|
from that network. These new networks, although they may be
|
|||
|
within a single local-calling area, must still conform to a
|
|||
|
geographical basis for determining membership.
|
|||
|
|
|||
|
It is your obligation as Regional Coordinator to maintain direct
|
|||
|
and reasonably frequent contact with the networks in your
|
|||
|
region. The exact method of accomplishing this is left to your
|
|||
|
discretion.
|
|||
|
|
|||
|
5.8 Making Available Nodelists, Policies, and FidoNews
|
|||
|
|
|||
|
As a Regional Coordinator, it is your responsibility to obtain
|
|||
|
the latest nodelist difference file, network policies, and the
|
|||
|
latest issues of FidoNews as they are published, and to make
|
|||
|
them available to the Network Coordinators within your region.
|
|||
|
The nodelist is posted weekly on Friday by the Zone Coordinator,
|
|||
|
and FidoNews is published weekly on Monday by the node indicated
|
|||
|
in the Fidonews and nodelist. Contact them for more details on
|
|||
|
how to obtain the latest copies each week.
|
|||
|
|
|||
|
It is your responsibility to make these available to all Network
|
|||
|
Coordinators and independent nodes in your region as soon as is
|
|||
|
practical after you receive them. The method of distribution is
|
|||
|
left to your discretion. You are encouraged to make all these
|
|||
|
documents available for downloading by the general public.
|
|||
|
|
|||
|
6 Zone Coordinator Procedures
|
|||
|
|
|||
|
6.1 General
|
|||
|
|
|||
|
FidoNews 10-14 Page: 37 05 Apr 1993
|
|||
|
|
|||
|
A Zone Coordinator for FidoNet has the primary task of
|
|||
|
maintaining the nodelist for the Zone, sharing it with the other
|
|||
|
Zone Coordinators, and ensuring the distribution of the master
|
|||
|
nodelist (or difference file) to the Regions in the Zone. The
|
|||
|
Zone Coordinator is also responsible for coordinating the
|
|||
|
distribution of Fidonet Policy documents and FidoNews to the
|
|||
|
Regional Coordinators in the zone.
|
|||
|
|
|||
|
The Zone Coordinator is responsible for the maintenance of the
|
|||
|
nodelist for the administrative region. The Administrative
|
|||
|
Region has the same number as the zone, and consists of nodes
|
|||
|
assigned for administrative purposes not related to the sending
|
|||
|
and receiving of normal network mail.
|
|||
|
|
|||
|
A Zone Coordinator is charged with the task of ensuring the
|
|||
|
smooth operation of the Zone.
|
|||
|
|
|||
|
If a Zone Coordinator determines that a Regional Coordinator is
|
|||
|
not properly performing the duties outlined in section 5,
|
|||
|
whatever action deemed necessary may be taken, up to and
|
|||
|
including removing the Regional Coordinator from that position
|
|||
|
and having the nodes of the region select a replacement.
|
|||
|
|
|||
|
The Zone Coordinator defines the geographic boundaries of the
|
|||
|
regions within the zone and sets the time for the Zone Mail Hour.
|
|||
|
|
|||
|
The Zone Coordinator is responsible for creating new regions
|
|||
|
within the zone when regions become too large for efficient
|
|||
|
coordination by a single Regional Coordinator.
|
|||
|
|
|||
|
The Zone Coordinator is responsible for reviewing and approving
|
|||
|
any geographic exemptions as described in section 5.6.
|
|||
|
|
|||
|
The Zone Coordinator is responsible for insuring the smooth
|
|||
|
operation of gates between that zone and all other zones for the
|
|||
|
transfer of interzone mail.
|
|||
|
|
|||
|
The Zone Coordinators are responsible for the selection of the
|
|||
|
International Coordinator.
|
|||
|
|
|||
|
6.2 Selection
|
|||
|
|
|||
|
The Zone Coordinator is selected by a majority vote of the Net
|
|||
|
and Regional Coordinators within the zone, voting as
|
|||
|
representatives of their nodes (see section 8.3).
|
|||
|
|
|||
|
7 International Coordinator Procedures
|
|||
|
|
|||
|
7.1 General
|
|||
|
|
|||
|
The International Coordinator has the primary task of
|
|||
|
coordinating the creation of the master nodelist by managing the
|
|||
|
distribution between the Zones of the Zone nodelists. The
|
|||
|
International Coordinator is responsible for definition of new
|
|||
|
zones and for negotiation of agreements for communication with
|
|||
|
FidoNews 10-14 Page: 38 05 Apr 1993
|
|||
|
|
|||
|
other networks. ("Other network" in this context means other
|
|||
|
networks with which FidoNet communicates as peer-to-peer, not
|
|||
|
"network" in the sense of the FidoNet organizational level.)
|
|||
|
|
|||
|
The International Coordinator is also responsible for
|
|||
|
coordinating the distribution of Network Policies and FidoNews
|
|||
|
to the Zone Coordinators.
|
|||
|
|
|||
|
The International Coordinator is responsible for coordinating
|
|||
|
the activities of the Zone Coordinator Council. The
|
|||
|
International Coordinator acts as the spokesman for the Zone
|
|||
|
Coordinator Council.
|
|||
|
|
|||
|
In cases not specifically covered by this document, the
|
|||
|
International Coordinator may issue specific interpretations or
|
|||
|
extensions to this policy. The Zone Coordinator Council may
|
|||
|
reverse such rulings by a majority vote. These extensions are
|
|||
|
valid until such time as a policy referendum may be held to
|
|||
|
ratify or reject such extensions.
|
|||
|
|
|||
|
7.2 Selection
|
|||
|
|
|||
|
The International Coordinator is selected (or removed) by an
|
|||
|
absolute majority vote of the Zone Coordinators with input from
|
|||
|
the Regional Coordinators. In the event that the Zone
|
|||
|
Coordinators are unable to select an International Coordinator
|
|||
|
by absolute majority, the International Coordinator will be
|
|||
|
selected by a majority of the Regional Coordinators.
|
|||
|
|
|||
|
8 Referenda
|
|||
|
|
|||
|
The procedures described in this section are used to ratify a
|
|||
|
new version of FidoNet policy, which is the mechanism by which
|
|||
|
policy is changed. This procedure is also used to impeach a
|
|||
|
Zone Coordinator.
|
|||
|
|
|||
|
8.1 Initiation
|
|||
|
|
|||
|
A referendum on policy modification is invoked when a majority
|
|||
|
of the FidoNet Regional Coordinators inform the International
|
|||
|
Coordinator that they wish to consider a proposed new version of
|
|||
|
Policy.
|
|||
|
|
|||
|
8.2 Announcement and Results Notification
|
|||
|
|
|||
|
Proposed changes to Policy are distributed using the same
|
|||
|
structure which is used to distribute nodelist difference files
|
|||
|
and FidoNews. Results and announcements related to the
|
|||
|
referendum are distributed by the coordinator structure as a
|
|||
|
part of the weekly nodelist difference file. The International
|
|||
|
Coordinator provides copies to the editor of FidoNews for
|
|||
|
inclusion there, although the official announcement and voting
|
|||
|
dates are tied to nodelist distributions.
|
|||
|
|
|||
|
If it is adopted, the International Coordinator sets the
|
|||
|
FidoNews 10-14 Page: 39 05 Apr 1993
|
|||
|
|
|||
|
effective date for a new policy through announcement in the
|
|||
|
weekly nodelist difference file and Fidonews. The effective
|
|||
|
date will be not more than one month after the close of
|
|||
|
balloting.
|
|||
|
|
|||
|
8.3 Eligibility to Vote
|
|||
|
|
|||
|
Each member of the FidoNet coordinator structure at and above
|
|||
|
Network Coordinator is entitled to one vote. In the case of the
|
|||
|
position changing hands during the balloting process, either the
|
|||
|
incumbent or the new coordinator may vote, but not both. If a
|
|||
|
person holds more than one coordinator position, they still
|
|||
|
receive only one vote.
|
|||
|
|
|||
|
Network Coordinators are expected to assess the opinions of the
|
|||
|
members of their network, and to vote accordingly. A formal
|
|||
|
election is not necessary, but the Network Coordinator must
|
|||
|
inform the net of the issues and solicit input. The Network
|
|||
|
Coordinator functions as the representative of the rank and file
|
|||
|
members of FidoNet. Regional Coordinators will fulfill this
|
|||
|
responsibility with regard to independent nodes in their regions.
|
|||
|
|
|||
|
8.4 Voting Mechanism
|
|||
|
|
|||
|
The actual voting mechanism, including whether the ballot is
|
|||
|
secret and how the ballots are to be collected, verified, and
|
|||
|
counted, is left to the discretion of the International
|
|||
|
Coordinator. Ideally, ballot collection should be by some
|
|||
|
secure message system, conducted over FidoNet itself.
|
|||
|
|
|||
|
In order to provide a discussion period, the announcement of any
|
|||
|
ballot must be made at least two weeks before the date of voting
|
|||
|
commencement. The balloting period must be at least two weeks.
|
|||
|
|
|||
|
8.5 Voting on a whole Policy Document or Amendments
|
|||
|
|
|||
|
Policy may be changed as a whole document or by section as
|
|||
|
required. Sections changed must include all cross-references
|
|||
|
affected and the corresponding changes to those sections.
|
|||
|
|
|||
|
Policy changes voted on as whole documents and approved will be
|
|||
|
incremented to the next whole number from the previous version
|
|||
|
number. Sectional changes (including multiple sectional changes
|
|||
|
approved in the same referendum) will increment the policy
|
|||
|
number to the next tenth of the current version number until
|
|||
|
nine tenths is reached. Sectional changes that would go beyond
|
|||
|
nine tenths will increment to the next whole number from the
|
|||
|
previous version number.
|
|||
|
|
|||
|
8.6 Decision of vote
|
|||
|
|
|||
|
A Policy amendment is considered in force if, at the end of the
|
|||
|
balloting period, it has received a majority of the votes cast.
|
|||
|
For example, if there were 350 eligible voters, 100 of which
|
|||
|
cast a vote, then at least 51 affirmative votes would be
|
|||
|
FidoNews 10-14 Page: 40 05 Apr 1993
|
|||
|
|
|||
|
required to declare the amendment in force.
|
|||
|
|
|||
|
In the case of multiple policy changes which are considered on
|
|||
|
the same ballot, a version must receive more than 50% of the
|
|||
|
votes cast to be considered ratified.
|
|||
|
|
|||
|
8.7 Impeachment of a Zone Coordinator
|
|||
|
|
|||
|
8.7.1 Initiation
|
|||
|
|
|||
|
In extreme cases, a Zone Coordinator may be impeached by
|
|||
|
referendum. Impeachment of a Zone Coordinator does not require a
|
|||
|
Policy violation. An impeachment proceeding is invoked when a
|
|||
|
majority of the Regional Coordinators in a zone request the
|
|||
|
International Coordinator to institute it.
|
|||
|
|
|||
|
8.7.2 Procedure as in Policy Referendum
|
|||
|
|
|||
|
The provisions of sections 8.2 and 8.3 apply to impeachment
|
|||
|
referenda.
|
|||
|
|
|||
|
The definition of "majority" in section 8.6 applies. Only
|
|||
|
coordinators in the affected zone vote.
|
|||
|
|
|||
|
8.7.3 Voting Mechanism
|
|||
|
|
|||
|
The balloting procedures are set, the votes are collected, and
|
|||
|
the results are announced by a Regional Coordinator chosen by
|
|||
|
the International Coordinator. The removal of the Zone
|
|||
|
Coordinator is effective two weeks after the end of balloting if
|
|||
|
the impeachment carries.
|
|||
|
|
|||
|
8.7.4 Limited to once per year
|
|||
|
|
|||
|
The removal of a Zone Coordinator is primarily intended to be a
|
|||
|
mechanism by which the zone as a whole expresses displeasure
|
|||
|
with the way Policy is being interpreted. At one time or
|
|||
|
another, everyone is unhappy with the way policy is interpreted.
|
|||
|
In order to keep the Zone Coordinators interpreting policy as
|
|||
|
opposed to defending themselves, at least one full calendar year
|
|||
|
must elapse between impeachment referenda (regardless of how
|
|||
|
many people hold the position of Zone Coordinator during that
|
|||
|
year.)
|
|||
|
|
|||
|
Should a Zone Coordinator resign during an impeachment process,
|
|||
|
the process is considered null and void, and does not consume
|
|||
|
the "once per year quota".
|
|||
|
|
|||
|
9 Resolution of Disputes
|
|||
|
|
|||
|
9.1 General
|
|||
|
|
|||
|
The FidoNet judicial philosophy can be summed up in two rules:
|
|||
|
|
|||
|
1) Thou shalt not excessively annoy others.
|
|||
|
FidoNews 10-14 Page: 41 05 Apr 1993
|
|||
|
|
|||
|
|
|||
|
2) Thou shalt not be too easily annoyed.
|
|||
|
|
|||
|
In other words, there are no hard and fast rules of conduct, but
|
|||
|
reasonably polite behavior is expected. Also, in any dispute
|
|||
|
both sides are examined, and action could be taken against
|
|||
|
either or both parties. ("Judge not, lest ye be judged!"). It
|
|||
|
must be noted that it is someone's "behavior" (action) that is
|
|||
|
subject to this policy. The content of a person's words or
|
|||
|
opinions is not necessarily sufficient to be considered annoying
|
|||
|
in this context.
|
|||
|
|
|||
|
Actions that would be considered excessively annoying behavior
|
|||
|
include activities that willfully disrupt the operations of one
|
|||
|
or more Fidonet systems; using non-existent or falsified node
|
|||
|
numbers with the intent of disguising the origin of mail traffic
|
|||
|
or of intercepting mail intended for the rightful owner of that
|
|||
|
node number; willfully compromising the integrity of an echomail
|
|||
|
conference after having direct links to that conference severed
|
|||
|
by the conference moderator; or illegal activities that involve,
|
|||
|
pertain to or utilize Fidonet as part of those activities.
|
|||
|
|
|||
|
The first step in any dispute between sysops is for the sysops
|
|||
|
to attempt to communicate directly. Any complaint made that has
|
|||
|
skipped this most basic communication step will be rejected.
|
|||
|
|
|||
|
Filing a formal complaint is not an action which should be taken
|
|||
|
lightly. Investigation and response to complaints requires time
|
|||
|
which coordinators would prefer to spend doing more constructive
|
|||
|
activities. Persons who persist in filing trivial policy
|
|||
|
complaints may find themselves on the wrong side of an
|
|||
|
excessively-annoying complaint. Complaints must be accompanied
|
|||
|
with verifiable evidence, generally copies of messages; a simple
|
|||
|
word-of-mouth complaint will be dismissed out of hand.
|
|||
|
|
|||
|
Failure to follow the procedures herein described (in
|
|||
|
particular, by skipping a coordinator, or involving a
|
|||
|
coordinator not in the appeal chain) is in and of itself
|
|||
|
annoying behavior.
|
|||
|
|
|||
|
9.2 Problems with Another Sysop
|
|||
|
|
|||
|
If you are having problems with another sysop, you should first
|
|||
|
try to work it out directly with the other sysop.
|
|||
|
|
|||
|
If this fails to resolve the problem, you should complain to
|
|||
|
other sysop's Network Coordinator. If that sysop is not in a
|
|||
|
network, then complain to the appropriate Regional Coordinator.
|
|||
|
Should this fail to provide satisfaction, you have the right to
|
|||
|
follow the appeal process described in section 9.5.
|
|||
|
|
|||
|
9.3 Problems with your Network Coordinator
|
|||
|
|
|||
|
If you are having problems with your Network Coordinator and
|
|||
|
feel that you are not being treated properly, you are entitled
|
|||
|
FidoNews 10-14 Page: 42 05 Apr 1993
|
|||
|
|
|||
|
to a review of your situation. As with all disputes, the first
|
|||
|
step is to communicate directly to attempt to resolve the
|
|||
|
problem.
|
|||
|
|
|||
|
The next step is to contact your Regional Coordinator. If your
|
|||
|
case has merit, there are several possible courses of action,
|
|||
|
including a change of Network Coordinators or even the
|
|||
|
disbanding of your network. If you have been excommunicated by
|
|||
|
your Network Coordinator, that judgement may be reversed, at
|
|||
|
which point you will be reinstated into your net.
|
|||
|
|
|||
|
If you fail to obtain relief from your Regional Coordinator, you
|
|||
|
have the right to follow the appeal process described in section
|
|||
|
9.5.
|
|||
|
|
|||
|
9.4 Problems with Other Coordinators
|
|||
|
|
|||
|
Complaints concerning annoying behavior on the part of any
|
|||
|
coordinator are treated as in section 9.2 and should be filed
|
|||
|
with the next level of coordinator. For example, if you feel
|
|||
|
that your Regional Coordinator is guilty of annoying behavior
|
|||
|
(as opposed to a failure to perform duties as a coordinator) you
|
|||
|
should file your complaint with the Zone Coordinator.
|
|||
|
|
|||
|
Complaints concerning the performance of a coordinator in
|
|||
|
carrying out the duties mandated by policy are accepted only
|
|||
|
from the level immediately below. For example, complaints
|
|||
|
concerning the performance of Regional Coordinators would be
|
|||
|
accepted from Network Coordinators and independents in that
|
|||
|
region. Such complaints should be addressed to the Zone
|
|||
|
Coordinator after an appropriate attempt to work them out by
|
|||
|
direct communications.
|
|||
|
|
|||
|
9.5 Appeal Process
|
|||
|
|
|||
|
A decision made by a coordinator may be appealed to the next
|
|||
|
level. Appeals must be made within two weeks of the decision
|
|||
|
which is being appealed. All appeals must follow the chain of
|
|||
|
command; if levels are skipped the appeal will be dismissed out
|
|||
|
of hand.
|
|||
|
|
|||
|
An appeal will not result in a full investigation, but will be
|
|||
|
based upon the documentation supplied by the parties at the
|
|||
|
lower level. For example, an appeal of a Network Coordinator's
|
|||
|
decision will be decided by the Regional Coordinator based upon
|
|||
|
information provided by the coordinator and the sysop involved;
|
|||
|
the Regional Coordinator is not expected to make an independent
|
|||
|
attempt to gather information.
|
|||
|
|
|||
|
The appeal structure is as follows:
|
|||
|
|
|||
|
Network Coordinator decisions may be appealed to the appropriate
|
|||
|
Regional Coordinator.
|
|||
|
|
|||
|
Regional Coordinator decisions may be appealed to the
|
|||
|
FidoNews 10-14 Page: 43 05 Apr 1993
|
|||
|
|
|||
|
appropriate Zone Coordinator. At this point, the Zone
|
|||
|
Coordinator will make a decision and communicate it to all
|
|||
|
affected parties.
|
|||
|
|
|||
|
Zone Coordinator decisions may be appealed to the International
|
|||
|
Coordinator. The International Coordinator will make a decision
|
|||
|
and communicate it to all affected parties. Decisions of the
|
|||
|
International Coordinator may be reversed by a majority of the
|
|||
|
Zone Coordinators.
|
|||
|
|
|||
|
If your problem is with a Zone Coordinator per se, that is, a
|
|||
|
Zone Coordinator has committed a Policy violation against you,
|
|||
|
your complaint should be filed with the International
|
|||
|
Coordinator, who will make a decision and submit it to the Zone
|
|||
|
Coordinator Council for possible reversal, as described above.
|
|||
|
|
|||
|
A sample process is described in Appendix 3.
|
|||
|
|
|||
|
9.6 Statute of Limitations
|
|||
|
|
|||
|
A complaint may not be filed more than 60 days after the date of
|
|||
|
discovery of the source of the infraction, either by admission
|
|||
|
or technical evidence. Complaints may not be filed more than 120
|
|||
|
days after the incident unless they involve explicitly illegal
|
|||
|
behavior.
|
|||
|
|
|||
|
9.7 Right to a Speedy Decision
|
|||
|
|
|||
|
A coordinator is required to render a final decision and notify
|
|||
|
the parties involved within 30 days of the receipt of the
|
|||
|
complaint or appeal.
|
|||
|
|
|||
|
9.8 Return to Original Network
|
|||
|
|
|||
|
Once a policy dispute is resolved, any nodes reinstated on
|
|||
|
appeal are re- turned to the local network or region to which
|
|||
|
they geographically or technically belong.
|
|||
|
|
|||
|
9.9 Echomail
|
|||
|
|
|||
|
Echomail is one of many uses of Fidonet. Echomail is treated as
|
|||
|
a use of Fidonet structure and is covered by Policy only to the
|
|||
|
extent that this use affects primary Fidonet operations. By its
|
|||
|
nature, echomail places unique technical and social demands on
|
|||
|
the net over and above those covered by this Policy. It should
|
|||
|
be noted that echomail distribution is a separate voluntary
|
|||
|
arrangement between consenting nodes and is distinctly different
|
|||
|
from the routing of netmail. In recognition of this, an
|
|||
|
echomail policy which extends (and does not contradict) general
|
|||
|
Policy, maintained by the Echomail Coordinators, and ratified by
|
|||
|
a process similar to that of this document, is recognized by the
|
|||
|
FidoNet Coordinators as a valid structure for dispute resolution
|
|||
|
on matters pertaining to echomail.
|
|||
|
|
|||
|
9.10 Case Histories
|
|||
|
FidoNews 10-14 Page: 44 05 Apr 1993
|
|||
|
|
|||
|
|
|||
|
Some of FidoNet Policy is interpretive in nature. No one can
|
|||
|
see what is to come in our rapidly changing environment. While
|
|||
|
the history of previous complaints and decisions may be useful
|
|||
|
as guidance, each case must be decided on its own merits in the
|
|||
|
time and circumstances under which it occurs.
|
|||
|
|
|||
|
10. Credits, acknowledgments, etc.
|
|||
|
|
|||
|
Fido and FidoNet are registered trademarks of Fido Software, Inc.
|
|||
|
|
|||
|
Appendix --------
|
|||
|
|
|||
|
The Appendices of this document are exceptions to the normal
|
|||
|
ratification process and are included for information purposes.
|
|||
|
Appendix 1 may be changed by the appropriate Zone Coordinator,
|
|||
|
and other sections may be added or changed as needed by the
|
|||
|
International Coordinator.
|
|||
|
|
|||
|
Appendix 1: Timing of Zone Mail Hour
|
|||
|
|
|||
|
Zone Mail Hour is observed each day, including weekends and
|
|||
|
holidays. The time is based upon Universal Coordinated Time
|
|||
|
(UTC), also known as Greenwich Mean time (GMT). In areas which
|
|||
|
observe Daylight Savings Time during part of the year, the local
|
|||
|
time of zone mail hour will change because FidoNet does not
|
|||
|
observe Daylight Savings Time. The exact timing of Zone Mail
|
|||
|
Hour is set for each zone by the Zone Coordinator.
|
|||
|
|
|||
|
In FidoNet Zone 1, Zone Mail Hour is observed from 0900 to 1000
|
|||
|
UTC. In each of the time zones, this is:
|
|||
|
|
|||
|
Eastern Standard Time (GMT -5) 4:00 AM to 5:00 AM
|
|||
|
Central Standard Time (GMT -6) 3:00 AM to 4:00 AM
|
|||
|
Mountain Standard Time (GMT -7) 2:00 AM to 3:00 AM
|
|||
|
Pacific Standard Time (GMT -8) 1:00 AM to 2:00 AM
|
|||
|
Hawaii Standard Time (GMT -10) 11:00 PM to Midnight
|
|||
|
|
|||
|
In FidoNet Zone 2, Zone Mail Hour is observed from 0230 to 0330
|
|||
|
UTC.
|
|||
|
|
|||
|
In Fidonet Zone 3, Zone Mail Hour is observed from 1800 to 1900
|
|||
|
UTC. In each of the time Zones involved this is:
|
|||
|
|
|||
|
GMT +12 Zone 6:00 AM to 7:00 AM
|
|||
|
(New Zealand)
|
|||
|
GMT +10 Zone 4:00 AM to 5:00 AM
|
|||
|
(East Australia, Papua New Guinea, Micronesia)
|
|||
|
GMT +9.5 Zone 3:30 AM to 4:30 AM
|
|||
|
(Central Australia)
|
|||
|
GMT +8 Zone 2:00 AM to 3:00 AM
|
|||
|
(Western Australia)
|
|||
|
|
|||
|
In Fidonet Zone 4, Zone Mail Hour is observed from 0800 to 0900 UTC.
|
|||
|
|
|||
|
FidoNews 10-14 Page: 45 05 Apr 1993
|
|||
|
|
|||
|
GMT -3 Zone 5:00 AM to 6:00 AM
|
|||
|
GMT -4 Zone 4:00 AM to 5:00 AM
|
|||
|
GMT -5 Zone 3:00 AM to 4:00 AM
|
|||
|
|
|||
|
In Fidonet Zone 5, Zone Mail Hour is observed from 0100 to 0200 UTC.
|
|||
|
|
|||
|
GMT +0 Zone 1:00 AM to 2:00 AM
|
|||
|
GMT +1 Zone 2:00 AM to 3:00 AM
|
|||
|
GMT +2 Zone 3:00 AM to 4:00 AM
|
|||
|
GMT +3 Zone 4:00 AM to 5:00 AM
|
|||
|
|
|||
|
In Fidonet Zone 6, Zone Mail Hour is observed from 2000 to 2100 UTC. In
|
|||
|
each of the time zones involved this is:
|
|||
|
|
|||
|
GMT +9 Zone 5:00 AM to 6:00 AM
|
|||
|
(Japan, Korea, Eastern Indonesia)
|
|||
|
GMT +8 Zone 4:00 AM to 5:00 AM
|
|||
|
(Hong Kong, Taiwan, Central Indonesia, Philippines)
|
|||
|
GMT +7 Zone 3:00 AM to 4:00 AM
|
|||
|
(Malaysia, Singapore, Thailand, Western Indonesia)
|
|||
|
|
|||
|
Appendix 2: Sample Election Procedure
|
|||
|
|
|||
|
1. Qualifications and Terms
|
|||
|
|
|||
|
The Coordinator serves a term of one year and may serve any
|
|||
|
number of consecutive terms. Any sysop listed in the
|
|||
|
appropriate segment of the Fidonet Nodelist at the time
|
|||
|
nominations are opened is eligible to run. A simple majority
|
|||
|
(50% + 1) of votes cast is required to elect a Coordinator. In
|
|||
|
the event that no candidate received a majority of votes, a run
|
|||
|
off election will be held between the two candidates with the
|
|||
|
greatest number of votes.
|
|||
|
|
|||
|
2. Nominations
|
|||
|
|
|||
|
Nominations may be made either in a designated echo or by
|
|||
|
netmail to the election coordinator. Any netmail nominations
|
|||
|
received by the election coordinator will be cross-posted into
|
|||
|
the designated echo. Any sysop listed in the appropriate
|
|||
|
segment of the Fidonet nodelist may nominate any other eligible
|
|||
|
sysop for the position of Coordinator.
|
|||
|
|
|||
|
Nominees must announce their consent to serve in order to be
|
|||
|
considered candidates in the election, and are encouraged to be
|
|||
|
available for discussion during the election process.
|
|||
|
|
|||
|
A minimum of two weeks will be allotted for the nominating
|
|||
|
process.
|
|||
|
|
|||
|
3. Election Coordinator
|
|||
|
|
|||
|
At the start of the election process, the appropriate
|
|||
|
Coordinator will appoint a non-candidate sysop as Election
|
|||
|
Coordinator. This sysop will have several responsibilities:
|
|||
|
FidoNews 10-14 Page: 46 05 Apr 1993
|
|||
|
|
|||
|
|
|||
|
Collecting nominations, seconds and statements of consent to
|
|||
|
serve from netmail and the designated echo and finalizing the
|
|||
|
election slate.
|
|||
|
|
|||
|
Posting the slate of candidates and the voting format
|
|||
|
instructions in the designated echo at the close of nominations.
|
|||
|
|
|||
|
Submitting the slate of candidates and the voting format
|
|||
|
instructions to the Coordinator for distribution via netmail to
|
|||
|
all Net and/or Regional Coordinators.
|
|||
|
|
|||
|
Collecting and tabulating votes submitted.
|
|||
|
|
|||
|
Notifying the Coordinator of the election results and posting
|
|||
|
the election results in the designated echo.
|
|||
|
|
|||
|
4. Discussion Period
|
|||
|
|
|||
|
Following the close of nominations and presentation of the slate
|
|||
|
of candidates, a minimum of two weeks will be allotted for
|
|||
|
discussion before voting begins.
|
|||
|
|
|||
|
5. Voting Procedures
|
|||
|
|
|||
|
Net Coordinators in each net will distribute the slate of
|
|||
|
candidates, voting instructions and voting schedule to all
|
|||
|
members of their nets via netmail.
|
|||
|
|
|||
|
Votes must be cast by the node sysops via netmail to the
|
|||
|
Election Coordinator. Due to changing technology, the exact
|
|||
|
format and mechanism of placing these votes will be determined
|
|||
|
by the Election Coordinator at the time of each election. Once
|
|||
|
a vote has been received and validated, it may not be changed.
|
|||
|
|
|||
|
The Election Coordinator will announce the final counts within
|
|||
|
seven days of the close of voting.
|
|||
|
|
|||
|
Challenges to the accuracy or completeness of the announced
|
|||
|
results must be placed via netmail to the Election Coordinator
|
|||
|
within seven days of the announcement of the results. A
|
|||
|
successful challenge will necessitate a new election to be
|
|||
|
initiated.
|
|||
|
|
|||
|
6. Installation of New Coordinator
|
|||
|
|
|||
|
The newly elected Coordinator will be installed in the nodelist
|
|||
|
as soon as the transfer of control files and other necessary
|
|||
|
information can be coordinated between the incoming and outgoing
|
|||
|
Coordinators, but not later than two weeks from the announcement
|
|||
|
of final election results.
|
|||
|
|
|||
|
Appendix 3: Sample Process for Resolution and Appeal of
|
|||
|
Complaints
|
|||
|
|
|||
|
FidoNews 10-14 Page: 47 05 Apr 1993
|
|||
|
|
|||
|
The process of complaint and appeal available to all Fidonet
|
|||
|
members, as delineated in sections 9.1 through 9.8, follows a
|
|||
|
step by step procedure from the point at which a complaint has
|
|||
|
been filed.
|
|||
|
|
|||
|
1. Offender does something to warrant removal from Fidonet.
|
|||
|
|
|||
|
2. The Net Coordinator points out this activity to the offender
|
|||
|
and offers the opportunity to refrain.
|
|||
|
|
|||
|
3. The Net Coordinator records the response of the offender.
|
|||
|
|
|||
|
4. If the offender desists, the case is over. Otherwise;
|
|||
|
|
|||
|
5. The Net Coordinator issues a final warning to the offender
|
|||
|
stating that the nodelist entry will be removed permanently
|
|||
|
unless immediate cessation of the offense(s) follows this final
|
|||
|
warning. Repeating at a later date an offense for which a
|
|||
|
warning was previously given may be considered refusal to comply.
|
|||
|
|
|||
|
6. If the offender desists, the case is over. Otherwise;
|
|||
|
|
|||
|
7. The Net Coordinator notifies the offender of removal from the
|
|||
|
nodelist.
|
|||
|
|
|||
|
8. Net Coordinator records offender's final response (if any)
|
|||
|
and removes offender's node number from the nodelist if no new
|
|||
|
information is received.
|
|||
|
|
|||
|
9. Net Coordinator advises Regional Coordinator of complete
|
|||
|
chronology with documentation and the case is closed, or;
|
|||
|
|
|||
|
10. The offender appeals to the Regional Coordinator and offers
|
|||
|
other information contrary to the Net Coordinator's account and
|
|||
|
requests intervention and/or investigation.
|
|||
|
|
|||
|
11. If the Regional Coordinator refuses the appeal, the case is
|
|||
|
over. Otherwise;
|
|||
|
|
|||
|
12. The Regional Coordinator agrees to consider the appeal and
|
|||
|
advises the Net Coordinator to refrain from removal pending
|
|||
|
investigation of the appeal.
|
|||
|
|
|||
|
13. The Regional Coordinator finds appeal has no merit, advises
|
|||
|
Net Coordinator to proceed with node removal, and advises
|
|||
|
offender of finding and of the option to appeal to the Zone
|
|||
|
Coordinator, or;
|
|||
|
|
|||
|
14. The Regional Coordinator finds appeal has merit and advises
|
|||
|
Net Coordinator to retain the node's number and to appeal to the
|
|||
|
Zone Coordinator if unsatisfied.
|
|||
|
|
|||
|
15. Steps 10 through 14 may be repeated at the Zone Coordinator
|
|||
|
and International Coordinator levels if necessary.
|
|||
|
|
|||
|
FidoNews 10-14 Page: 48 05 Apr 1993
|
|||
|
|
|||
|
Appendix 4: Fidonet Technical Standards
|
|||
|
|
|||
|
The Fidonet Technical Standards Committee (FTSC) is a
|
|||
|
deliberative body charged with developing and maintaining
|
|||
|
technical standards for operations in a Fidonet Technology
|
|||
|
Network (FTN). All software used in Fidonet communications must
|
|||
|
be in compliance with the appropriate standards, which include:
|
|||
|
|
|||
|
FTS-0001 A basic Fidonet technical standard, R Bush
|
|||
|
FTS-0002 (superseded by FTS-0005)
|
|||
|
FTS-0003 (superseded by FTS-0006)
|
|||
|
FTS-0004 Echomail specifications, B Hartman
|
|||
|
FTS-0005 The distribution nodelist, B Baker, R Moore
|
|||
|
FTS-0006 YOOHOO and YOOHOO/2U2, V Periello
|
|||
|
FTS-0007 SEAlink protocol extension, P Becker
|
|||
|
FTS-0008 Bark file-request protocol extension, P Becker
|
|||
|
FTS-0009 Message identification and reply linkage, j nutt
|
|||
|
|
|||
|
Appendix 5: File Name Conventions
|
|||
|
|
|||
|
For those systems accepting file requests via Fidonet, it is
|
|||
|
generally accepted practice that certain types of information
|
|||
|
will be available under commonly known alias names. The
|
|||
|
following are common file aliases:
|
|||
|
|
|||
|
FILES List of files available for file request
|
|||
|
ABOUT Information about the individual system
|
|||
|
NODELIST Current full Fidonet nodelist
|
|||
|
NODEDIFF Current weekly Fidonet nodelist difference file
|
|||
|
FIDONEWS Current weekly issue of Fidonews
|
|||
|
POLICY Fidonet policy documents
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
========================================================================
|
|||
|
Fidonews Information
|
|||
|
========================================================================
|
|||
|
|
|||
|
------- FIDONEWS MASTHEAD AND CONTACT INFORMATION ----------------
|
|||
|
|
|||
|
Editors: Sylvia Maxwell, Donald Tees, Tim Pozar
|
|||
|
Editors Emeritii: Thom Henderson, Dale Lovell, Vince Perriello,
|
|||
|
Tom Jennings
|
|||
|
|
|||
|
IMPORTANT NOTE: The FidoNet address of the FidoNews BBS has been
|
|||
|
changed!!! Please make a note of this.
|
|||
|
|
|||
|
"FidoNews" BBS
|
|||
|
FidoNet 1:1/23 <---- NEW ADDRESS!!!!
|
|||
|
BBS +1-519-570-4176, 300/1200/2400/14200/V.32bis/HST(DS)
|
|||
|
Internet addresses:
|
|||
|
Don & Sylvia (submission address)
|
|||
|
editor@exlibris.tdkcs.waterloo.on.ca
|
|||
|
|
|||
|
Sylvia -- max@exlibris.tdkcs.waterloo.on.ca
|
|||
|
FidoNews 10-14 Page: 49 05 Apr 1993
|
|||
|
|
|||
|
Donald -- donald@exlibris.tdkcs.waterloo.on.ca
|
|||
|
Tim -- pozar@kumr.lns.com
|
|||
|
|
|||
|
(Postal Service mailing address) (have extreme patience)
|
|||
|
FidoNews
|
|||
|
172 Duke St. E.
|
|||
|
Kitchener, Ontario
|
|||
|
Canada
|
|||
|
N2H 1A7
|
|||
|
|
|||
|
Published weekly by and for the members of the FidoNet international
|
|||
|
amateur electronic mail system. It is a compilation of individual
|
|||
|
articles contributed by their authors or their authorized agents. The
|
|||
|
contribution of articles to this compilation does not diminish the
|
|||
|
rights of the authors. Opinions expressed in these articles are those
|
|||
|
of the authors and not necessarily those of FidoNews.
|
|||
|
|
|||
|
Authors retain copyright on individual works; otherwise FidoNews is
|
|||
|
copyright 1993 Sylvia Maxwell. All rights reserved. Duplication and/or
|
|||
|
distribution permitted for noncommercial purposes only. For use in
|
|||
|
other circumstances, please contact the original authors, or FidoNews
|
|||
|
(we're easy).
|
|||
|
|
|||
|
|
|||
|
OBTAINING COPIES: The-most-recent-issue-ONLY of FidoNews in electronic
|
|||
|
form may be obtained from the FidoNews BBS via manual download or
|
|||
|
Wazoo FileRequest, or from various sites in the FidoNet and Internet.
|
|||
|
PRINTED COPIES may be obtained from Fido Software for $10.00US each
|
|||
|
PostPaid First Class within North America, or $13.00US elsewhere,
|
|||
|
mailed Air Mail. (US funds drawn upon a US bank only.)
|
|||
|
|
|||
|
BACK ISSUES: Available from FidoNet nodes 1:102/138, 1:216/21,
|
|||
|
1:125/1212, (and probably others), via filerequest or download
|
|||
|
(consult a recent nodelist for phone numbers).
|
|||
|
|
|||
|
A very nice index to the Tables of Contents to all FidoNews volumes
|
|||
|
can be filerequested from 1:396/1 or 1:216/21. The name(s) to request
|
|||
|
are FNEWSxTC.ZIP, where 'x' is the volume number; 1=1984, 2=1985...
|
|||
|
through 8=1991.
|
|||
|
|
|||
|
INTERNET USERS: FidoNews is available via FTP from ftp.ieee.org, in
|
|||
|
directory ~ftp/pub/fidonet/fidonews. If you have questions regarding
|
|||
|
FidoNet, please direct them to deitch@gisatl.fidonet.org, not the
|
|||
|
FidoNews BBS. (Be kind and patient; David Deitch is generously
|
|||
|
volunteering to handle FidoNet/Internet questions.)
|
|||
|
|
|||
|
SUBMISSIONS: You are encouraged to submit articles for publication in
|
|||
|
FidoNews. Article submission requirements are contained in the file
|
|||
|
ARTSPEC.DOC, available from the FidoNews BBS, or Wazoo filerequestable
|
|||
|
from 1:1/23 as file "ARTSPEC.DOC". Please read it.
|
|||
|
|
|||
|
"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
|
|||
|
trademarks of Tom Jennings, Box 77731, San Francisco CA 94107, USA and
|
|||
|
are used with permission.
|
|||
|
|
|||
|
FidoNews 10-14 Page: 50 05 Apr 1993
|
|||
|
|
|||
|
Asked what he thought of Western civilization,
|
|||
|
M.K. Gandhi said, "I think it would be an excellent idea".
|
|||
|
-- END
|
|||
|
----------------------------------------------------------------------
|
|||
|
|