2280 lines
97 KiB
Plaintext
2280 lines
97 KiB
Plaintext
|
F I D O N E W S -- Volume 14, Number 25 23 June 1997
|
|||
|
+----------------------------+-----------------------------------------+
|
|||
|
| The newsletter of the | ISSN 1198-4589 Published by: |
|
|||
|
| FidoNet community | "FidoNews" |
|
|||
|
| _ | 1-904-409-7040 [1:1/23] |
|
|||
|
| / \ | |
|
|||
|
| /|oo \ | |
|
|||
|
| (_| /_) | |
|
|||
|
| _`@/_ \ _ | |
|
|||
|
| | | \ \\ | Editor: |
|
|||
|
| | (*) | \ )) | Christopher Baker 1:18/14 |
|
|||
|
| |__U__| / \// | |
|
|||
|
| _//|| _\ / | |
|
|||
|
| (_/(_|(____/ | |
|
|||
|
| (jm) | Newspapers should have no friends. |
|
|||
|
| | -- JOSEPH PULITZER |
|
|||
|
+----------------------------+-----------------------------------------+
|
|||
|
| Submission address: FidoNews Editor 1:1/23 |
|
|||
|
+----------------------------------------------------------------------+
|
|||
|
| MORE addresses: |
|
|||
|
| |
|
|||
|
| submissions=> cbaker84@digital.net |
|
|||
|
+----------------------------------------------------------------------+
|
|||
|
| For information, copyrights, article submissions, |
|
|||
|
| obtaining copies of FidoNews or the internet gateway FAQ |
|
|||
|
| please refer to the end of this file. |
|
|||
|
+----------------------------------------------------------------------+
|
|||
|
|
|||
|
|
|||
|
HELP STAMP OUT OSMOSIS!
|
|||
|
|
|||
|
|
|||
|
Table of Contents
|
|||
|
1. EDITORIAL ................................................ 1
|
|||
|
Are we getting out? ...................................... 1
|
|||
|
2. LETTERS TO THE EDITOR .................................... 2
|
|||
|
Take the First Amendment Pledge .......................... 2
|
|||
|
Internet Regulations ruled Unconstitutional .............. 6
|
|||
|
BWE - Blue Wave mail reader for Windows95/NT4 ............ 10
|
|||
|
3. ARTICLES ................................................. 11
|
|||
|
CRC and the Nodelist ..................................... 11
|
|||
|
4. COLUMNS .................................................. 15
|
|||
|
Lock and Load: Guerilla Marketing for BBSes .............. 15
|
|||
|
5. GETTING TECHNICAL ........................................ 17
|
|||
|
FSC-0085 - NOZIP and ERX flags ........................... 17
|
|||
|
FSC-0086 - Standard Request Information File proposal .... 18
|
|||
|
FSC-0087 - File Forwarding in FTNs ....................... 21
|
|||
|
FSC-0088 - Compatibility for EMSI Sessions ............... 27
|
|||
|
6. ADVERTISE YOUR FREE SERVICE/EVENT ........................ 33
|
|||
|
Announcing the WRESTLING_CHAT Echo ....................... 33
|
|||
|
7. NOTICES .................................................. 34
|
|||
|
New Area Codes in North FLorida are coming ............... 34
|
|||
|
Future History ........................................... 35
|
|||
|
8. FIDONEWS PUBLIC-KEY ...................................... 36
|
|||
|
FidoNews PGP public-key listing .......................... 36
|
|||
|
9. FIDONET BY INTERNET ...................................... 37
|
|||
|
10. FIDONEWS INFORMATION .................................... 39
|
|||
|
FIDONEWS 14-25 Page 1 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
EDITORIAL
|
|||
|
=================================================================
|
|||
|
|
|||
|
|
|||
|
Yet another email from Zone 2 telling me they've either:
|
|||
|
|
|||
|
1. never heard of FidoNews;
|
|||
|
|
|||
|
or
|
|||
|
|
|||
|
2. don't get FidoNews in their Net/Region.
|
|||
|
|
|||
|
Isolated incidents? Probably, since the reports are not at flood level
|
|||
|
so far. But, of course, if FidoNews is unknown out there, who is going
|
|||
|
to know to comment or complain? The last reporter only found FidoNews
|
|||
|
during an Infoseek search on the Internet.
|
|||
|
|
|||
|
I know it gets to ZC2 but what about you Zone 2 RCs? Are you moving
|
|||
|
FidoNews out there? Zone 2 NCs? YooHoo.
|
|||
|
|
|||
|
P4 sez FidoNews is part of the glue that holds us together but glue
|
|||
|
doesn't work unless you spread it on all the parts you want to stick.
|
|||
|
|
|||
|
ZCs, RCs, and NCs can send Netmail to me at 1:18/14 or 1:1/23 or email
|
|||
|
to cbaker84@digital.net and let me know how many times they send out
|
|||
|
FidoNews to their constituents, if they'd like to help sort out the
|
|||
|
black holes of FidoNews distribution.
|
|||
|
|
|||
|
Otherwise, the news continues. [grin]
|
|||
|
|
|||
|
C.B.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FIDONEWS 14-25 Page 2 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
LETTERS TO THE EDITOR
|
|||
|
=================================================================
|
|||
|
|
|||
|
|
|||
|
--- Following message extracted from FIDONEWS @ 1:18/14 ---
|
|||
|
By Christopher Baker on Sun Jun 22 14:43:12 1997
|
|||
|
|
|||
|
From: Mike Bilow
|
|||
|
To: Christopher Baker
|
|||
|
Date: 20 Jun 97 16:55:06
|
|||
|
Subj: ACLU Cyber-Liberties Update, June 19, 1997
|
|||
|
|
|||
|
* Forwarded (from: Netmail) by Mike Bilow using BilowMail0.2.
|
|||
|
* Original dated: Jun 19 '97, 21:33
|
|||
|
|
|||
|
From: "ACLU Cyber-Liberties Update Owner"@newmedium.com
|
|||
|
To: cyber-liberties@aclu.org
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
ACLU Cyber-Liberties Update
|
|||
|
Thursday, June 19, 1997
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
http://www.firstamendment.org/
|
|||
|
A new ACLU/EPIC website
|
|||
|
|
|||
|
Take the First Amendment Pledge
|
|||
|
|
|||
|
|
|||
|
As we all await a Supreme Court decision on the future of free speech
|
|||
|
on the Internet, the American Civil Liberties Union and the Electronic
|
|||
|
Privacy Information Center launched www.firstamendment.org, a website
|
|||
|
dedicated to upholding the First Amendment in cyberspace.
|
|||
|
|
|||
|
The groups called on President Clinton and members of Congress to be
|
|||
|
among the first to "Take the First Amendment Pledge" and cease any
|
|||
|
further attempts to draft legislation to censor the Internet in the
|
|||
|
event the Supreme Court upholds a lower court decision striking down
|
|||
|
government regulation of the Internet as unconstitutional.
|
|||
|
|
|||
|
The launch of the website comes as Clinton Administration officials
|
|||
|
have begun publicly discussing a shift in policy on Internet
|
|||
|
regulation, saying that "industry self-regulation" -- not laws
|
|||
|
criminalizing certain Internet communications -- is the solution to
|
|||
|
shielding minors from online "indecency."
|
|||
|
|
|||
|
"Attempts to censor the Net will not end with the Supreme Court
|
|||
|
decision," said David Sobel, legal counsel for EPIC and co-counsel in
|
|||
|
Reno v. ACLU. "Proponents of Internet content regulation have already
|
|||
|
indicated their desire to take a 'second bite of the apple' if the
|
|||
|
Communications Decency Act is struck down."
|
|||
|
|
|||
|
In anticipation of such new attempts at online censorship, visitors to
|
|||
|
FIDONEWS 14-25 Page 3 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
www.firstamendment.org are invited to "Take the First Amendment
|
|||
|
Pledge," which reads: "I pledge to support free speech and free
|
|||
|
expression for all Americans and to urge Congress to uphold the First
|
|||
|
Amendment to the United States Constitution and pass no law abridging
|
|||
|
our freedom of speech."
|
|||
|
|
|||
|
People taking the pledge are encouraged to place the "First Amendment
|
|||
|
Pledge" GIF their own websites.
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Day of Decision Events
|
|||
|
|
|||
|
As the countdown continues to a Supreme Court ruling in Reno v. ACLU,
|
|||
|
the first-ever case to look at how free speech principles are applied
|
|||
|
to the Internet, the American Civil Liberties Union is preparing to go
|
|||
|
live on the World Wide Web with a cybercast news conference on the
|
|||
|
day a decision is reached.
|
|||
|
|
|||
|
Day of Decision Schedule
|
|||
|
|
|||
|
1:00 p.m.(E.D.T.) Press Conference and Cybercast
|
|||
|
|
|||
|
At the ACLU's new national offices at 125 Broad Street in lower
|
|||
|
Manhattan. Reno v. ACLU attorneys, co-counsel and plaintiffs will
|
|||
|
participate. The live cybercast can be accessed through the ACLU's
|
|||
|
website, http://www.aclu.org, and directly through Pathfinder's Netly
|
|||
|
News at http://www.pathfinder.com/news/netdecency.
|
|||
|
|
|||
|
7:00 p.m. (E.D.T.) Live Chat with ACLU Attorneys
|
|||
|
|
|||
|
A one-hour chat with ACLU attorneys is planned on ECHO.
|
|||
|
|
|||
|
Instructions:
|
|||
|
ECHO chats are open to anyone with Internet access.
|
|||
|
Telnet to echonyc.com, or dial 212-292-0910 with your modem.
|
|||
|
Login as echolive, and communicate directly with the Attorneys.
|
|||
|
|
|||
|
Reno v. ACLU challenges censorship provisions of the Communications
|
|||
|
Decency Act aimed at protecting minors by criminalizing so-called
|
|||
|
"indecency" on the Internet. The government appealed the case to the
|
|||
|
Supreme Court after a federal three-judge panel ruled unanimously last
|
|||
|
June that the law unconstitutionally restricts free speech. The ACLU
|
|||
|
filed a challenge to the law the day it was enacted.
|
|||
|
|
|||
|
Show your support for the ACLU's challenge to the Communications
|
|||
|
Decency in any -- or all -- of the following ways:
|
|||
|
|
|||
|
1) To be notified of a decision in the case by a change in a graphic
|
|||
|
placed on your web site, join our GIF notification Campaign --
|
|||
|
instructions can be found at:
|
|||
|
http://www.aclu.org/issues/cyber/trial/instructions.html
|
|||
|
|
|||
|
The image will change when the decision is handed down - notifying
|
|||
|
you, and everyone who visits your site.
|
|||
|
|
|||
|
2) Take the 1st Amendment Pledge at www.firstamendment.org, a joint
|
|||
|
FIDONEWS 14-25 Page 4 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
campaign of the ACLU and the Electronic Privacy Information Center
|
|||
|
(EPIC).
|
|||
|
|
|||
|
3) Subscribe to the Cyber-Liberties Update. Those of you who already
|
|||
|
receive the update directly will be notified. Those of you who read
|
|||
|
forwarded copies are encouraged to subscribe directly using the
|
|||
|
information in the footer of this document.
|
|||
|
|
|||
|
4) And the most important way you can show your support is to Join the
|
|||
|
ACLU. Information is available on our website http://www.aclu.org
|
|||
|
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
Setback in Efforts to Secure Online Privacy
|
|||
|
|
|||
|
FOR IMMEDIATE RELEASE
|
|||
|
Thursday, June 19, 1997
|
|||
|
|
|||
|
WASHINGTON -- A Senate committee today setback legislative efforts to
|
|||
|
secure online privacy, approving legislation that would restrict the
|
|||
|
right of businesses and individuals both to use encryption
|
|||
|
domestically and to export it.
|
|||
|
|
|||
|
On a voice vote, the Senate Commerce Committee adopted
|
|||
|
legislation that essentially reflects the Clinton Administration's
|
|||
|
anti-encryption policies.
|
|||
|
|
|||
|
The legislation approved today on a voice vote by the Senate
|
|||
|
Commerce Committee was introduced this week by Senate Commerce
|
|||
|
Committee Chairman John McCain, Republican of Arizona, and co-
|
|||
|
sponsored by Democrats Fritz Hollings of South Carolina; Robert Kerry
|
|||
|
of Nebraska and John Kerry of Massachusetts.
|
|||
|
|
|||
|
Encryption programs scramble information so that it can only be
|
|||
|
read with a "key" -- a code the recipient uses to unlock the scrambled
|
|||
|
electronic data. Programs that use more than 40 bits of data to
|
|||
|
encode information are considered "strong" encryption. Currently,
|
|||
|
unless these keys are made available to the government, the Clinton
|
|||
|
Administration bans export of hardware or software containing strong
|
|||
|
encryption, treating these products as "munitions."
|
|||
|
|
|||
|
Privacy advocates continue to criticize the Administration's
|
|||
|
stance, saying that the anti-cryptography ban has considerably
|
|||
|
weakened U.S. participation in the global marketplace, in addition
|
|||
|
to curtailing freedom of speech by denying users the right to "speak"
|
|||
|
using encryption. The ban also violates the right to privacy by
|
|||
|
limiting the ability to protect sensitive information in the new
|
|||
|
computerized world.
|
|||
|
|
|||
|
Today's committee action knocked out of consideration the so-
|
|||
|
called "Pro-CODE" legislation, a pro-encryption bill introduced by
|
|||
|
Senator Conrad Burns, Republican of Montana. Although the Burns
|
|||
|
legislation raised some civil liberties concerns, it would have lifted
|
|||
|
export controls on encryption programs and generally protected
|
|||
|
individual privacy.
|
|||
|
FIDONEWS 14-25 Page 5 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
"Privacy, anonymity and security in the digital world depend on
|
|||
|
encryption," said Donald Haines, legislative counsel on privacy and
|
|||
|
cyberspace issues for the ACLU's Washington National Office. "The aim
|
|||
|
of the Pro-CODE bill was to allow U.S. companies to compete with
|
|||
|
industries abroad and lift restrictions on the fundamental right to
|
|||
|
free speech, the hallmark of American democracy."
|
|||
|
|
|||
|
"Sadly, no one on the Commerce Committee, not even Senator Burns,
|
|||
|
stood up and defended the pro-privacy, pro-encryption effort," Haines
|
|||
|
added.
|
|||
|
|
|||
|
In the House, however, strong encryption legislation that would
|
|||
|
add new privacy protections for millions of Internet users in this
|
|||
|
country and around the world has been approved by two subcommittees.
|
|||
|
|
|||
|
The legislation -- H.R. 695, the "Security and Freedom Through
|
|||
|
Encryption Act" or SAFE -- would make stronger encryption products
|
|||
|
available to American citizens and users of the Internet around the
|
|||
|
world. It was introduced by Representative Robert W. Goodlatte,
|
|||
|
Republican of Virginia.
|
|||
|
|
|||
|
"We continue to work toward the goal of protecting the privacy of
|
|||
|
all Internet users by overturning the Clinton Administration's
|
|||
|
unreasonable encryption policy," Haines concluded
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
ACLU Cyber-Liberties Update Editor:
|
|||
|
Lisa Kamm (kamml@aclu.org)
|
|||
|
American Civil Liberties Union National Office
|
|||
|
125 Broad Street
|
|||
|
New York, New York 10004
|
|||
|
|
|||
|
To subscribe to the ACLU Cyber-Liberties Update, send a message
|
|||
|
to majordomo@aclu.org with "subscribe Cyber-Liberties" in the
|
|||
|
body of your message. To terminate your subscription, send a
|
|||
|
message to majordomo@aclu.org with "unsubscribe Cyber-Liberties"
|
|||
|
in the body.
|
|||
|
|
|||
|
The Cyber-Liberties Update is archived at
|
|||
|
http://www.aclu.org/issues/cyber/updates.html
|
|||
|
|
|||
|
For general information about the ACLU, write to info@aclu.org.
|
|||
|
PGP keys can be found at http://www.aclu.org/about/pgpkeys.html
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Lisa Kamm |To receive the biweekly
|
|||
|
kamml@aclu.org |ACLU Cyber-Liberties Update
|
|||
|
http://www.aclu.org |email: majordomo@aclu.org
|
|||
|
http://www.gilc.org |body of message: subscribe cyber-liberties
|
|||
|
|
|||
|
take the pledge: http://www.firstamendment.org
|
|||
|
|
|||
|
Lynn_Decker@aclu.org
|
|||
|
Online Programs Coordinator
|
|||
|
American Civil Liberties Union
|
|||
|
FIDONEWS 14-25 Page 6 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
125 Broad Street
|
|||
|
New York, NY 10004-2400
|
|||
|
|
|||
|
Visit the ACLU Freedom Network --
|
|||
|
http://www.aclu.org ACLU Constitution Hall on
|
|||
|
America Online -- keyword ACLU ACLU Supports the
|
|||
|
Global Internet Liberty Campaign (GILC)
|
|||
|
http://www.gilc.org/gilc
|
|||
|
|
|||
|
This Message was sent to cyber-liberties
|
|||
|
|
|||
|
Origin: N1BEE BBS +1 401 944 8498 V.34/V.FC/V.32bis/HST16.8(1:323/107)
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
--- Following message extracted from FIDONEWS @ 1:18/14 ---
|
|||
|
By Christopher Baker on Sun Jun 22 14:43:29 1997
|
|||
|
|
|||
|
From: Mike Bilow
|
|||
|
To: Christopher Baker
|
|||
|
Date: 21 Jun 97 08:35:50
|
|||
|
Subj: ACLU Cyber-Liberties Update, Special: June 20, 1997
|
|||
|
|
|||
|
* Forwarded (from: Netmail) by Mike Bilow using BilowMail0.2.
|
|||
|
* Original dated: Jun 21 '97, 00:16
|
|||
|
|
|||
|
From: "ACLU Cyber-Liberties Update Owner"@newmedium.com
|
|||
|
To: cyber-liberties@aclu.org
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
ACLU Cyber-Liberties Update
|
|||
|
Friday, June 20, 1997
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Georgia, New York Internet Regulations Ruled Unconstitutional
|
|||
|
|
|||
|
Georgia Ruling available online now, New York summary available now
|
|||
|
and Ruling on the way at
|
|||
|
http://www.aclu.org/issues/cyber/censor/censor.html
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
ACLU Wins First-Ever Challenge to a State
|
|||
|
Internet Censorship Law in Georgia
|
|||
|
|
|||
|
FOR IMMEDIATE RELEASE
|
|||
|
Friday, June 20, 1997
|
|||
|
|
|||
|
ATLANTA -- As the nation awaits a Supreme Court decision on Internet
|
|||
|
censorship, a federal district judge here today struck down a state
|
|||
|
law criminalizing online anonymous speech and the use of trademarked
|
|||
|
logos as links on the World Wide Web.
|
|||
|
|
|||
|
Ruling simultaneously in ALA v. Pataki, another ACLU challenge to
|
|||
|
FIDONEWS 14-25 Page 7 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
state Internet regulation, a Federal District Judge in New York today
|
|||
|
blocked the state from enforcing its version of the federal
|
|||
|
Communications Decency Act (CDA).
|
|||
|
|
|||
|
In ACLU v. Miller, Federal District Court Judge Marvin Shoob today
|
|||
|
granted the ACLU's request to enjoin Georgia's statute restricting
|
|||
|
free speech in cyberspace and denied the State's request to dismiss
|
|||
|
the suit.
|
|||
|
|
|||
|
The Court agreed with the ACLU, Electronic Frontiers Georgia and
|
|||
|
others that the statute is unconstitutionally vague and overbroad
|
|||
|
because it bars online users from using pseudonyms or communicating
|
|||
|
anonymously over the Internet. The Act also unconstitutionally
|
|||
|
restricts the use of links on the World Wide Web which allows users to
|
|||
|
connect to other sites.
|
|||
|
|
|||
|
In the Court's decision, Judge Shoob noted that Georgia's law, "sweeps
|
|||
|
innocent, protected speech within its scope." He went on to say that
|
|||
|
it, "affords prosecutors and police officers with substantial room for
|
|||
|
selective prosecution of persons who express minority viewpoints. . .
|
|||
|
. [Moreover,] Georgia already has in place many less restrictive
|
|||
|
means to address fraud and misrepresentation."
|
|||
|
|
|||
|
"The Court's order goes straight to the First Amendment flaws with the
|
|||
|
statute." said Scott McClain of Bondurant, Mixson & Elmore,
|
|||
|
cooperating attorneys for the ACLU. "Judge Shoob viewed the statute
|
|||
|
exactly as the Plaintiffs did: as a vague, overbroad, unconstitutional
|
|||
|
restriction on free speech and privacy on the Internet."
|
|||
|
|
|||
|
"The Court recognized that anonymity is the passport for entry into
|
|||
|
cyberspace for many persons," said Gerald Weber, Legal Director of
|
|||
|
the ACLU of Georgia. "Without anonymity, victims of domestic violence,
|
|||
|
persons in Alcoholics Anonymous, people with AIDS and so many others
|
|||
|
would fear using the Internet to seek information and support."
|
|||
|
|
|||
|
"We are very pleased with the Judge's decision," said Robert Costner,
|
|||
|
Executive Director of Electronic Frontiers Georgia. "This injunction
|
|||
|
clears the way for Electronics Frontier Georgia to release our
|
|||
|
anonymous remailer services on the Internet."
|
|||
|
|
|||
|
Georgia's lawsuit was the first challenge to state cyberspace laws and
|
|||
|
statutes restricting privacy on the Internet.
|
|||
|
|
|||
|
Today's ruling came as the nation awaits word from the U.S.
|
|||
|
Supreme Court in Reno v. ACLU, the ACLU's challenge to Internet
|
|||
|
censorship provisions of the federal Communications Decency Act (CDA).
|
|||
|
|
|||
|
"Today's decisions in New York and Georgia say that, whatever limits
|
|||
|
the Supreme Court sets on Congress's power to regulate the Internet,
|
|||
|
states are prohibited from acting to censor online expression," said
|
|||
|
Ann Beeson, an ACLU national staff attorney and member of the legal
|
|||
|
teams in the New York, Georgia and federal cases.
|
|||
|
|
|||
|
"Taken together, these decisions send a very important and powerful
|
|||
|
message to legislators in the other 48 states that they should keep
|
|||
|
their hands off the Internet," Beeson added.
|
|||
|
FIDONEWS 14-25 Page 8 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
The Georgia lawsuit was filed on September 24, 1996, by the ACLU on
|
|||
|
behalf of 14 plaintiffs. The 14 individual plaintiffs and
|
|||
|
organizations named in the ACLU v. Miller are: American Civil
|
|||
|
Liberties Union of Georgia; The AIDS Survival Project; the Atlanta
|
|||
|
Freethought Society; Atlanta Veterans Alliance; Community ConneXion;
|
|||
|
Electronic Frontier Foundation; Electronic Frontiers Georgia; Rep.
|
|||
|
Mitchell Kaye; Ken Leebow; Bruce Mirken; Bonnie L. Nadri; Josh Riley;
|
|||
|
John Troyer; and Jonathan Wallace.
|
|||
|
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
New York Judge Prohibits State Regulation of Internet
|
|||
|
|
|||
|
FOR IMMEDIATE RELEASE
|
|||
|
Friday, June 20, 1997
|
|||
|
|
|||
|
NEW YORK -- As the nation awaits a Supreme Court decision on Internet
|
|||
|
censorship, a federal district judge here today blocked New York State
|
|||
|
from enforcing its version of the federal Communications Decency Act
|
|||
|
(CDA).
|
|||
|
|
|||
|
Ruling simultaneously in ACLU v. Miller, another ACLU challenge to
|
|||
|
state Internet regulation, a Federal District Judge in Georgia today
|
|||
|
struck down a law criminalizing online anonymous speech and the use of
|
|||
|
trademarked logos as links on the World Wide Web.
|
|||
|
|
|||
|
In ALA v. Pataki, Federal District Judge Loretta A. Preska issued a
|
|||
|
preliminary injunction against the New York law, calling the Internet
|
|||
|
an area of commerce that should be marked off as a "national preserve"
|
|||
|
to protect online speakers from inconsistent laws that could "paralyze
|
|||
|
development of the Internet altogether."
|
|||
|
|
|||
|
Judge Preska, acknowledging that the New York act was "clearly modeled
|
|||
|
on the CDA," did not address the First Amendment issues raised by the
|
|||
|
ACLU's federal challenge, saying that the Commerce Clause provides
|
|||
|
"fully adequate support" for the injunction and that the Supreme Court
|
|||
|
would address the other issues in its widely anticipated decision in
|
|||
|
Reno v. ACLU. (The Court's next scheduled decision days are June 23,
|
|||
|
25 and 26.)
|
|||
|
|
|||
|
"Today's decisions in New York and Georgia say that, whatever limits
|
|||
|
the Supreme Court sets on Congress's power to regulate the Internet,
|
|||
|
states are prohibited from acting to censor online expression," said
|
|||
|
Ann Beeson, an ACLU national staff attorney who argued the case before
|
|||
|
Judge Preska and is a member of the ACLU v. Miller and Reno v. ACLU
|
|||
|
legal teams.
|
|||
|
|
|||
|
"Taken together, these decisions send a very important and powerful
|
|||
|
message to legislators in the other 48 states that they should keep
|
|||
|
their hands off the Internet," Beeson added.
|
|||
|
|
|||
|
In a carefully reasoned, 62-page opinion, Judge Preska warned of the
|
|||
|
extreme danger that state regulation would pose to the Internet,
|
|||
|
rejecting the state's argument that the statute would even be
|
|||
|
effective in preventing so-called "indecency" from reaching minors.
|
|||
|
FIDONEWS 14-25 Page 9 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
Further, Judge Preska observed, the state can already protect children
|
|||
|
through the vigorous enforcement of existing criminal laws.
|
|||
|
|
|||
|
"In many ways, this decision is more important for the business
|
|||
|
community than for the civil liberties community," said Chris Hansen,
|
|||
|
a senior ACLU attorney on the ALA v. Pataki legal team and lead
|
|||
|
counsel in Reno v. ACLU. "Legislatures are just about done with their
|
|||
|
efforts to regulate the business of Internet 'sin,' and have begun
|
|||
|
turning to the business of the Internet itself. Today's decision ought
|
|||
|
to stop that trend in its tracks."
|
|||
|
|
|||
|
Saying that the law would reduce all speech on the Internet to a level
|
|||
|
suitable for a six-year-old, the American Civil Liberties Union, the
|
|||
|
New York Civil Liberties Union, the American Library Association and
|
|||
|
others filed the challenge in January of this year.
|
|||
|
|
|||
|
The law, which was passed by the New York legislature late last year,
|
|||
|
provides criminal sanctions of up to four years in jail for
|
|||
|
communicating so-called "indecent" words or images to a minor.
|
|||
|
|
|||
|
In a courtroom hearing before Judge Preska in April, the ACLU
|
|||
|
presented a live Internet demonstration and testimony from plaintiffs
|
|||
|
who said that their speech had already been "chilled" by the threat of
|
|||
|
criminal prosecution.
|
|||
|
|
|||
|
"This is a big win for the people of the state of New York," said
|
|||
|
Norman Siegel, Executive Director of the New York Civil Liberties
|
|||
|
Union. "Today's ruling vindicates what we have been saying all along
|
|||
|
to Governor Pataki and legislators, that they cannot legally prevent
|
|||
|
New Yorkers from engaging in uninhibited, open and robust freedom of
|
|||
|
expression on the Internet."
|
|||
|
|
|||
|
The ALA v. Pataki plaintiffs are: the American Library Association,
|
|||
|
the Freedom to Read Foundation, the New York Library Association, the
|
|||
|
American Booksellers Foundation for Free Expression, Westchester
|
|||
|
Library System, BiblioBytes, Association of American Publishers,
|
|||
|
Interactive Digital Software Association, Magazine Publishers of
|
|||
|
America, Public Access Networks Corp. (PANIX), ECHO, NYC Net, Art on
|
|||
|
the Net, Peacefire and the American Civil Liberties Union.
|
|||
|
|
|||
|
Michael Hertz and others of the New York firm Latham & Watkins
|
|||
|
provided pro-bono assistance to the ACLU and NYCLU; Michael Bamberger
|
|||
|
of Sonnenschein Nath & Rosenthal in New York is also co-counsel in the
|
|||
|
case. Lawyers from the ACLU are Christopher Hansen, Ann Beeson and
|
|||
|
Art Eisenberg, legal director of the NYCLU.
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
ACLU Cyber-Liberties Update Editor:
|
|||
|
Lisa Kamm (kamml@aclu.org)
|
|||
|
American Civil Liberties Union National Office
|
|||
|
125 Broad Street
|
|||
|
New York, New York 10004
|
|||
|
|
|||
|
To subscribe to the ACLU Cyber-Liberties Update, send a message
|
|||
|
to majordomo@aclu.org with "subscribe Cyber-Liberties" in the
|
|||
|
body of your message. To terminate your subscription, send a
|
|||
|
FIDONEWS 14-25 Page 10 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
message to majordomo@aclu.org with "unsubscribe Cyber-Liberties"
|
|||
|
in the body.
|
|||
|
|
|||
|
The Cyber-Liberties Update is archived at
|
|||
|
http://www.aclu.org/issues/cyber/updates.html
|
|||
|
|
|||
|
For general information about the ACLU, write to info@aclu.org.
|
|||
|
PGP keys can be found at http://www.aclu.org/about/pgpkeys.html
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Lisa Kamm |To receive the biweekly
|
|||
|
kamml@aclu.org |ACLU Cyber-Liberties Update
|
|||
|
http://www.aclu.org |email: majordomo@aclu.org
|
|||
|
http://www.gilc.org |body of message: subscribe cyber-liberties
|
|||
|
|
|||
|
take the pledge: http://www.firstamendment.org
|
|||
|
|
|||
|
This Message was sent to cyber-liberties
|
|||
|
|
|||
|
Origin: N1BEE BBS +1 401 944 8498 V.34/V.FC/V.32bis/HST16.8(1:323/107)
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
X-Sender: dima@galactica.it
|
|||
|
Date: Thu, 19 Jun 1997 07:05:22 +0200
|
|||
|
To: cbaker84@digital.net
|
|||
|
From: Michele Di Maria <dima@galactica.it>
|
|||
|
Subject: BWExplorer
|
|||
|
|
|||
|
HI!,
|
|||
|
I'd like inform you that BWExplorer: the FIRST Blue Wave (tm) mail
|
|||
|
reader especially designed for Windows95/NT4) has been released.
|
|||
|
You can download it at Michele's HomePage at:
|
|||
|
http://www.geocities.com/siliconvalley/7409
|
|||
|
|
|||
|
(This is not a mailing list, I found you address at your site and I
|
|||
|
hope you will find interesting this new)
|
|||
|
|
|||
|
Thank you,
|
|||
|
Michele
|
|||
|
Michele's
|
|||
|
Shareware
|
|||
|
Site: http://www.geocities.com/SiliconValley/7409
|
|||
|
|
|||
|
-30-
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FIDONEWS 14-25 Page 11 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
ARTICLES
|
|||
|
=================================================================
|
|||
|
|
|||
|
CRC and The Nodelist
|
|||
|
|
|||
|
Has anybody else had problems keeping current? If it's not a missing
|
|||
|
DIFF now and then, it's CRC trouble... What is this CRC thing anyway?
|
|||
|
I've been trying to find out for over a year now, it's been one of
|
|||
|
those things that just keeps coming up now and then. Right now my
|
|||
|
NODELIST.164 has an improper CRC. The utility I use to merge the
|
|||
|
diffs told me so, and actually added a line at the bottom:
|
|||
|
|
|||
|
;S This Nodelist file has an improper CRC!
|
|||
|
|
|||
|
The nodelist seems to be working correctly, but it bugs me to know
|
|||
|
something is improper about it. I have all those FSC- and FTS- files
|
|||
|
that tell about fido junk, maybe they can help? Maybe someone in the
|
|||
|
net knows what's going on? Isn't anybody gonna do something? My
|
|||
|
Nodelist has an improper CRC! Help!
|
|||
|
|
|||
|
I like fido, and it's a good excuse to try writing small programs in
|
|||
|
c/c++ that can help me out. I've been sort of working on a small
|
|||
|
utility that will take our local netseg and make a BBS list for the
|
|||
|
systems not marked HUB, HOST or with a MO flag. Our netseg has that
|
|||
|
CRC number on the top line, shouldn't my program insure that the
|
|||
|
contents are valid before it tries to use them?
|
|||
|
|
|||
|
This source will check an input file for a number at the end of the
|
|||
|
top line, and use that number if found to compare CRC value with the
|
|||
|
rest of the file. There may already be code out there to do this, if
|
|||
|
there is, I sure wish I'd had access to it!! I'm very interested in
|
|||
|
c/c++, but don't have access to any echos dealing with fido or BBS
|
|||
|
programming. There may be plenty of source code out there.
|
|||
|
|
|||
|
Seems like most good software comes from Zone:2 anyway. If anybody
|
|||
|
knows where there is some source code dealing specifically with
|
|||
|
fidonet, how about dropping me a line?
|
|||
|
|
|||
|
If you need a compiled (.EXE) version, F'Req NLCRC.ZIP (35k).
|
|||
|
L8r,
|
|||
|
bw
|
|||
|
|
|||
|
/*******************************************: 55734
|
|||
|
** NLCRC.C Test a nodelist segment for correct CRC
|
|||
|
** 6/97 Brian Wood 1:362/903
|
|||
|
** (903!brainwave@river.chattanooga.net)
|
|||
|
** thanks to:
|
|||
|
** Ross N. Williams, Author:
|
|||
|
** A PAINLESS GUIDE TO CRC ERROR DETECTION ALGORITHMS
|
|||
|
** and:
|
|||
|
** The SNIPPETS guy, I think it's Bob Juge or Stout?
|
|||
|
** and for FTS-0005:
|
|||
|
** The Distribution Nodelist
|
|||
|
** Original by Ben Baker Amended by Rick Moore
|
|||
|
*/
|
|||
|
FIDONEWS 14-25 Page 12 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
#include <stdio.h>
|
|||
|
#include <stdlib.h>
|
|||
|
#include <string.h>
|
|||
|
|
|||
|
unsigned AddCRC(unsigned, char *, unsigned);
|
|||
|
|
|||
|
main(int argc, char **argv)
|
|||
|
{
|
|||
|
unsigned crc=0;
|
|||
|
unsigned lines=0;
|
|||
|
unsigned compare=0;
|
|||
|
char szCrc[10];
|
|||
|
char topline[200]; /* assuming a nodelist entry */
|
|||
|
char oneline[200]; /* will be <= 200 characters */
|
|||
|
FILE *f;
|
|||
|
|
|||
|
if( argc > 1 ) {
|
|||
|
if( (f = fopen( argv[1], "rb" ) ) == NULL ) {
|
|||
|
printf("\nCan't open %s", argv[1]);
|
|||
|
exit(-1);
|
|||
|
}
|
|||
|
}
|
|||
|
else {
|
|||
|
printf("\nUsage: NLCRC <nodelist.ext>");
|
|||
|
exit(-1);
|
|||
|
}
|
|||
|
|
|||
|
/* Take the CRC from the top line of nodelist */
|
|||
|
fgets( topline, sizeof(topline), f);
|
|||
|
strcpy(szCrc, &topline[strlen(topline)-8]);
|
|||
|
compare = (unsigned)atof(szCrc);
|
|||
|
if(compare==0) {
|
|||
|
printf("\n%s doesn't seem to be a nodelist!", argv[1]);
|
|||
|
exit(-1);
|
|||
|
}
|
|||
|
|
|||
|
/* FTS-0005 says calculate beginning with
|
|||
|
** 1st character of second line, and ignore
|
|||
|
** EOF(ASCII 26) if present, so.... */
|
|||
|
printf("\nReading File...");
|
|||
|
while( fgets(oneline, sizeof(oneline), f) != NULL
|
|||
|
&& oneline[0] != 26) {
|
|||
|
crc = AddCRC( crc, oneline, strlen(oneline) );
|
|||
|
lines++;
|
|||
|
}
|
|||
|
|
|||
|
/* Show the results */
|
|||
|
printf("\n%s %ld bytes", argv[1], ftell(f));
|
|||
|
fclose(f);
|
|||
|
printf("\nLinesread = %u", lines);
|
|||
|
if(oneline[0] == 26)
|
|||
|
printf(" -minus top line and EOF-");
|
|||
|
else
|
|||
|
printf(" -minus top line- EOF Missing!");
|
|||
|
printf("\n%u = compare crc", compare);
|
|||
|
printf("\n%u = actual crc", crc);
|
|||
|
FIDONEWS 14-25 Page 13 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
printf("\n");
|
|||
|
if(compare==crc)
|
|||
|
printf("\nCRC appears OK!");
|
|||
|
else
|
|||
|
printf("\nCRC Values Do Not Match!");
|
|||
|
|
|||
|
return 0;
|
|||
|
}
|
|||
|
/*
|
|||
|
** END MAIN */
|
|||
|
|
|||
|
/************************
|
|||
|
** Function: AddCRC(...)
|
|||
|
*/
|
|||
|
unsigned AddCRC(unsigned crc, char *sz, unsigned len)
|
|||
|
{
|
|||
|
|
|||
|
unsigned CRC16table[] = { /* Polynomial 0x1021 (CITT) */
|
|||
|
0x0000, 0x1021, 0x2042, 0x3063, 0x4084, 0x50a5, 0x60c6,
|
|||
|
0x70e7, 0x8108, 0x9129, 0xa14a, 0xb16b, 0xc18c, 0xd1ad,
|
|||
|
0xe1ce, 0xf1ef, 0x1231, 0x0210, 0x3273, 0x2252, 0x52b5,
|
|||
|
0x4294, 0x72f7, 0x62d6, 0x9339, 0x8318, 0xb37b, 0xa35a,
|
|||
|
0xd3bd, 0xc39c, 0xf3ff, 0xe3de, 0x2462, 0x3443, 0x0420,
|
|||
|
0x1401, 0x64e6, 0x74c7, 0x44a4, 0x5485, 0xa56a, 0xb54b,
|
|||
|
0x8528, 0x9509, 0xe5ee, 0xf5cf, 0xc5ac, 0xd58d, 0x3653,
|
|||
|
0x2672, 0x1611, 0x0630, 0x76d7, 0x66f6, 0x5695, 0x46b4,
|
|||
|
0xb75b, 0xa77a, 0x9719, 0x8738, 0xf7df, 0xe7fe, 0xd79d,
|
|||
|
0xc7bc, 0x48c4, 0x58e5, 0x6886, 0x78a7, 0x0840, 0x1861,
|
|||
|
0x2802, 0x3823, 0xc9cc, 0xd9ed, 0xe98e, 0xf9af, 0x8948,
|
|||
|
0x9969, 0xa90a, 0xb92b, 0x5af5, 0x4ad4, 0x7ab7, 0x6a96,
|
|||
|
0x1a71, 0x0a50, 0x3a33, 0x2a12, 0xdbfd, 0xcbdc, 0xfbbf,
|
|||
|
0xeb9e, 0x9b79, 0x8b58, 0xbb3b, 0xab1a, 0x6ca6, 0x7c87,
|
|||
|
0x4ce4, 0x5cc5, 0x2c22, 0x3c03, 0x0c60, 0x1c41, 0xedae,
|
|||
|
0xfd8f, 0xcdec, 0xddcd, 0xad2a, 0xbd0b, 0x8d68, 0x9d49,
|
|||
|
0x7e97, 0x6eb6, 0x5ed5, 0x4ef4, 0x3e13, 0x2e32, 0x1e51,
|
|||
|
0x0e70, 0xff9f, 0xefbe, 0xdfdd, 0xcffc, 0xbf1b, 0xaf3a,
|
|||
|
0x9f59, 0x8f78, 0x9188, 0x81a9, 0xb1ca, 0xa1eb, 0xd10c,
|
|||
|
0xc12d, 0xf14e, 0xe16f, 0x1080, 0x00a1, 0x30c2, 0x20e3,
|
|||
|
0x5004, 0x4025, 0x7046, 0x6067, 0x83b9, 0x9398, 0xa3fb,
|
|||
|
0xb3da, 0xc33d, 0xd31c, 0xe37f, 0xf35e, 0x02b1, 0x1290,
|
|||
|
0x22f3, 0x32d2, 0x4235, 0x5214, 0x6277, 0x7256, 0xb5ea,
|
|||
|
0xa5cb, 0x95a8, 0x8589, 0xf56e, 0xe54f, 0xd52c, 0xc50d,
|
|||
|
0x34e2, 0x24c3, 0x14a0, 0x0481, 0x7466, 0x6447, 0x5424,
|
|||
|
0x4405, 0xa7db, 0xb7fa, 0x8799, 0x97b8, 0xe75f, 0xf77e,
|
|||
|
0xc71d, 0xd73c, 0x26d3, 0x36f2, 0x0691, 0x16b0, 0x6657,
|
|||
|
0x7676, 0x4615, 0x5634, 0xd94c, 0xc96d, 0xf90e, 0xe92f,
|
|||
|
0x99c8, 0x89e9, 0xb98a, 0xa9ab, 0x5844, 0x4865, 0x7806,
|
|||
|
0x6827, 0x18c0, 0x08e1, 0x3882, 0x28a3, 0xcb7d, 0xdb5c,
|
|||
|
0xeb3f, 0xfb1e, 0x8bf9, 0x9bd8, 0xabbb, 0xbb9a, 0x4a75,
|
|||
|
0x5a54, 0x6a37, 0x7a16, 0x0af1, 0x1ad0, 0x2ab3, 0x3a92,
|
|||
|
0xfd2e, 0xed0f, 0xdd6c, 0xcd4d, 0xbdaa, 0xad8b, 0x9de8,
|
|||
|
0x8dc9, 0x7c26, 0x6c07, 0x5c64, 0x4c45, 0x3ca2, 0x2c83,
|
|||
|
0x1ce0, 0x0cc1, 0xef1f, 0xff3e, 0xcf5d, 0xdf7c, 0xaf9b,
|
|||
|
0xbfba, 0x8fd9, 0x9ff8, 0x6e17, 0x7e36, 0x4e55, 0x5e74,
|
|||
|
0x2e93, 0x3eb2, 0x0ed1, 0x1ef0 };
|
|||
|
|
|||
|
FIDONEWS 14-25 Page 14 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
while(len--)
|
|||
|
crc=(crc<<8)^CRC16table[(crc>>8)^*sz++];
|
|||
|
|
|||
|
return( crc );
|
|||
|
}
|
|||
|
/*
|
|||
|
** END NLCRC.C */
|
|||
|
|
|||
|
--- ISR sn 000 at river.chattanooga.net vsn 1.0a unreg
|
|||
|
--
|
|||
|
|Fidonet: Brainwave 1:362/903
|
|||
|
|Internet: 903!Brainwave@river.chattanooga.net
|
|||
|
|
|
|||
|
| Standard disclaimer: The views of this user are strictly his own.
|
|||
|
| River Canyon Rd. BBS <=> Chattanooga OnLine! Gateway to the World.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FIDONEWS 14-25 Page 15 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
COLUMNS
|
|||
|
=================================================================
|
|||
|
|
|||
|
|
|||
|
Lock and Load: Guerilla Marketing for BBSes
|
|||
|
Robert Parson (1:3822/1)
|
|||
|
|
|||
|
Y'know. One of the things I've always found rather bothersome about
|
|||
|
the Internet is its lack of a local identity. Sure, it's got lots of
|
|||
|
really spiffy stuff on it. But it still seems rather cold and
|
|||
|
distant. Even the sites that are highly personalized are somewhat
|
|||
|
remote.
|
|||
|
|
|||
|
When was the last time you were really able to discuss local issues
|
|||
|
with someone on the Internet? Can you vent your indignation about a
|
|||
|
city sales tax increase with someone across the country? You could,
|
|||
|
but he or she won't have the same empathy as someone across the town
|
|||
|
would have.
|
|||
|
|
|||
|
This is the great power BBSes have. They are the Friendly
|
|||
|
Neighborhood Electronic Townhalls. But the users can't come if they
|
|||
|
don't know you are there.
|
|||
|
|
|||
|
When I was just a tad, about 8 or 9 years old, my grandfather and two
|
|||
|
uncles opened up a window glass store. Most of their business came
|
|||
|
from contractors who called up and said "We've built a house, now we
|
|||
|
need windows." But a good chunk of their business was repairing
|
|||
|
windows broken in storms, vandals, or the neighborhood baseball games.
|
|||
|
|
|||
|
One Saturday morning, they armed my brother and me with hundreds of
|
|||
|
flyers. We were to go slipping through the neighborhood, tucking
|
|||
|
these flyers into doors. The flyers talked about how great the work
|
|||
|
of Lawrence Glass Company (In Lawrence IN) was and how inexpensive the
|
|||
|
rates were. We earned a whopping 25 cents each (it's amazing how I
|
|||
|
can remember things like that, but can't remember how old my wife is).
|
|||
|
|
|||
|
I'm sure you can see where this is going. How many of your neighbors
|
|||
|
know you have a BBS?
|
|||
|
|
|||
|
Crack open the Desktop Publisher and create a flyer. It doesn't have
|
|||
|
to be very elaborate. Make sure it has the name of your BBS and the
|
|||
|
data number (you might want to include your voice phone in case
|
|||
|
someone wants to ask a question before they dial in), and invite the
|
|||
|
neighborhood to call. Print up a jillion of these things.
|
|||
|
|
|||
|
Then put those preteens to work. If they're like mine, they're aching
|
|||
|
to get outside anyway ("But there's a blizzard!" "I don't care! I
|
|||
|
wanna go out!"). And don't forget to give them a quarter for their
|
|||
|
efforts.
|
|||
|
|
|||
|
Now, it's quite likely not every house in your neighborhood is going
|
|||
|
to have a computer equipped with a modem. I think in my neighborhood
|
|||
|
there's an average of one computer per block. But that's unimportant.
|
|||
|
What IS important is that you're getting the word out to people that
|
|||
|
are likely to be intrigued at the very least.
|
|||
|
FIDONEWS 14-25 Page 16 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
1. They're going to be interested because it's someone they know that
|
|||
|
lives near them.
|
|||
|
2. They're going to be interested because it's so close to them, there
|
|||
|
may be something on the BBS that offers them some sort of local
|
|||
|
information.
|
|||
|
3. They're going to be interested because it's something
|
|||
|
different.
|
|||
|
4. They're going to be interested because they want to make sure you
|
|||
|
aren't peddling pornography. (or maybe because you are)
|
|||
|
5. They're going to be interested because you had the audacity to put
|
|||
|
that doggone flyer in their door.
|
|||
|
|
|||
|
I'm constant amazed at the numbers of small-town weeklies that exist.
|
|||
|
They're poorly written, sloppily edited, have messy layouts, and low
|
|||
|
page counts. Thy thrive because they publish the little details of
|
|||
|
small-town life. Your Friendly Neighborhood BBS can thrive in much
|
|||
|
the same way.
|
|||
|
|
|||
|
|
|||
|
Robert Parson
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FIDONEWS 14-25 Page 17 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
GETTING TECHNICAL
|
|||
|
=================================================================
|
|||
|
|
|||
|
|
|||
|
[This is part of the continuing FidoNet History series publishing the
|
|||
|
FidoNet Technical Standards and Proposals. FSC-0084 was skipped due
|
|||
|
to size. These have been reformatted to 70 columns where required and
|
|||
|
tables may be askew as a result. Node numbers and phone numbers may
|
|||
|
be out of date. High ASCII characters have been converted or
|
|||
|
removed as necessary.] Ed.
|
|||
|
|
|||
|
|
|||
|
| Document: FSC-0085
|
|||
|
| Version: 001
|
|||
|
| Date: 03 September 1995
|
|||
|
|
|
|||
|
| Denis Bider, FidoNet#2:380/129.0
|
|||
|
|
|||
|
/*
|
|||
|
|
|||
|
Date: 25-Jul-1995
|
|||
|
Document: Descriptions of the "NOZIP" and "ERX<n>" nodelist flags
|
|||
|
Purpose: To give a system that is about to send some mail to a system
|
|||
|
not already defined by its operator in its configuration some idea
|
|||
|
about what kind of mail the mentioned destination system accepts
|
|||
|
Author: denis bider, ofs->FidoNet#2:380/129.0
|
|||
|
|
|||
|
|
|||
|
The NOZIP nodelist flag and its affects on the MN nodelist flag
|
|||
|
======================================================================
|
|||
|
Generally, most FTN systems are able to receive compressed mail from
|
|||
|
any other FTN system. Up to now, the official compression format
|
|||
|
between systems has been ARC. This document, however, puts the ZIP
|
|||
|
format to that position.
|
|||
|
* A system whose nodelist entry contains neither an "MN" and
|
|||
|
neither a "NOZIP" flag is assumed to support both ARC and ZIP.
|
|||
|
* A system whose nodelist entry contains an "MN" flag is assumed
|
|||
|
not to support any compression at all.
|
|||
|
* A system whose nodelist entry contains a "NOZIP" flag is assumed
|
|||
|
to support ARC compression, while not supporting ZIP
|
|||
|
compression.
|
|||
|
* Both "NOZIP" and "MN" flags cannot appear in the same nodelist
|
|||
|
entry. If they, by some accident, do, the system should be
|
|||
|
assumed not to support any mail compression.
|
|||
|
|
|||
|
Since the majority of systems support ZIP compression, a flag
|
|||
|
indicating that this type of compression is NOT supported has is
|
|||
|
proposed instead of a flag indicating that this type of compression IS
|
|||
|
supported, the reason being to minimize the amount of changes required
|
|||
|
to the nodelist.
|
|||
|
|
|||
|
The format of the NOZIP flag is, simply, "NOZIP".
|
|||
|
The format of the MN flag stays the same.
|
|||
|
|
|||
|
The ERX<n> nodelist flag
|
|||
|
FIDONEWS 14-25 Page 18 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
======================================================================
|
|||
|
The presence of this flag in a system's nodelist entry indicates that
|
|||
|
the system is able to process ERX mail packets of level <n>. The
|
|||
|
current minimum and maximum values of <n> are both "1", indicating
|
|||
|
that the system is able to process ERX packets of level 1, meaning
|
|||
|
that the packets can only contain EDX message items. Please refer to
|
|||
|
EDX1.TXT for the EDX and ERX specifications.
|
|||
|
|
|||
|
The format of the "ERX<n>" nodelist flag is
|
|||
|
"ERX" <n>
|
|||
|
as in "the three letters 'E', 'R' and 'X', immediately followed with
|
|||
|
the token <n>", where <n> is a number in decimal notation, with
|
|||
|
currently all values but '1' being reserved.
|
|||
|
|
|||
|
If your system does not support ZIP and you do not yet have a NOZIP
|
|||
|
flag in your nodelist entry, or if your system is able to process ERX
|
|||
|
packets and you do not yet have an ERX<n> flag, please urge your NC or
|
|||
|
RC, whichever appropriate, to update your nodelist entry as soon as
|
|||
|
possible.
|
|||
|
|
|||
|
// EOF */
|
|||
|
|
|||
|
-30-
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
| Document: FSC-0086
|
|||
|
| Version: 001
|
|||
|
| Date: 03 September 1995
|
|||
|
|
|
|||
|
| Mirko Mucko, 2:2433/920
|
|||
|
|
|||
|
Information / Description of a new standard
|
|||
|
|
|||
|
S tandard
|
|||
|
R equest
|
|||
|
I nformation
|
|||
|
F ile
|
|||
|
|
|||
|
Copyright (c) 1994,95 by Gordian Schuermann & Mirko Mucko
|
|||
|
|
|||
|
I Overview
|
|||
|
Introduction 0
|
|||
|
Description in general 1
|
|||
|
Required statements 1.1
|
|||
|
Optional statements 1.2
|
|||
|
Undefined options 1.3
|
|||
|
Implementation 2.0
|
|||
|
|
|||
|
0. Introduction
|
|||
|
In common, more and more mailer are about to implement the ability to
|
|||
|
call external request processors. But very soon, we discovered a
|
|||
|
command line cannot handle all the information the mailer has and the
|
|||
|
ERP needs.
|
|||
|
|
|||
|
FIDONEWS 14-25 Page 19 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
To transfer the information in a proper and fast way, we designed and
|
|||
|
implemented the S R I F option in the mean it will be a standard
|
|||
|
soon.
|
|||
|
|
|||
|
The structure and idea is protected by copyright law, except these
|
|||
|
circumstances:
|
|||
|
|
|||
|
+ you may distrubute, use and implement this structure for
|
|||
|
free
|
|||
|
+ you have not to pay any value for usage of these methodes
|
|||
|
+ you should note in your documentation the origin of SRIF
|
|||
|
|
|||
|
1. Description
|
|||
|
The SRIF name is the only parameter given from the Mailer to the
|
|||
|
External Request Processor. The file is designated as a so called
|
|||
|
"plain vanilla ASCII" file, filled with pre-defined, optional and
|
|||
|
not-yet defined statemets.
|
|||
|
|
|||
|
We discussed the possibility of binary files, and of EMSI-like files,
|
|||
|
but a plain ASCII control file is more flexible and can be read
|
|||
|
faster by various program languages (C, Pascal, Basic, Cobol ect).
|
|||
|
|
|||
|
In the SRIF, one command plus parameter is allowed per line, the file
|
|||
|
is unlimited in length, comments are not allowed.
|
|||
|
|
|||
|
The SRIF is generated by the Mailer and after the ERP finished its
|
|||
|
work, the Mailer is responsible for erasing the SRIF.
|
|||
|
|
|||
|
1.1 Required statements
|
|||
|
The following statements are required for the ERP:
|
|||
|
|
|||
|
Sysop <Sysop_Name>
|
|||
|
This is the name of the remote sysop
|
|||
|
|
|||
|
AKA <Zone:Net/Node[.Point][@Domain]>
|
|||
|
This is the main aka of the remote system in
|
|||
|
4D or 5D notation. A zero as point number may
|
|||
|
be ommited, the domain with "@" is optional
|
|||
|
|
|||
|
Baud <Current LINE rate>
|
|||
|
This is the effective baud rate, not the fixed
|
|||
|
DTE rate
|
|||
|
|
|||
|
Time <Time in minutes>
|
|||
|
This is the time till next event which does
|
|||
|
not allow file requests. Use -1 if no limits
|
|||
|
|
|||
|
RequestList <File of request list>
|
|||
|
This is the filename of the list containing
|
|||
|
requested files.
|
|||
|
ResponseList <File of response list>
|
|||
|
This is the filename of the response list.
|
|||
|
It must not be equal to RequestList. One file
|
|||
|
per line, including drives/pathes to the file.
|
|||
|
The first character defines the way the mailer
|
|||
|
should act after sending that file:
|
|||
|
FIDONEWS 14-25 Page 20 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
= erase file if sent successfully
|
|||
|
+ do not erase the file after sent
|
|||
|
- erase the file in any case after session
|
|||
|
|
|||
|
RemoteStatus <PROTECTED or UNPROTECTED>
|
|||
|
Defines whether the session is protected by
|
|||
|
password or not
|
|||
|
|
|||
|
SystemStatus <LISTED or UNLISTED>
|
|||
|
Defines whether the remote system is listed in
|
|||
|
any current nodelist of system.
|
|||
|
|
|||
|
1.2 Optional statements
|
|||
|
These parameters are already known and defined, but a ERP should run
|
|||
|
also without them:
|
|||
|
|
|||
|
SessionProtocoll <e.g. ZAP,ZMO,XMA
|
|||
|
|
|||
|
AKA <Zone:Net/Node[.Point][@Domain]>
|
|||
|
Additional AKAs. One AKA is required (see
|
|||
|
REQUIRED section)
|
|||
|
|
|||
|
Site <Site Info>
|
|||
|
The site info as given e.g. in EMSI handshake
|
|||
|
|
|||
|
Location <Location and/or ZIP>
|
|||
|
The location info as given e.g. in EMSI
|
|||
|
handshake
|
|||
|
|
|||
|
Phone <Phone Number>
|
|||
|
The phone number info as given e.g. in EMSI
|
|||
|
handshake
|
|||
|
|
|||
|
Password <Session password>
|
|||
|
On protected sessions, the session password.
|
|||
|
If no protected session, this parameter must
|
|||
|
be ommited!
|
|||
|
|
|||
|
DTE <Current DTE rate>
|
|||
|
The PC<->Modem speed (so call DTE rate)
|
|||
|
|
|||
|
PORT <COM Port from 1 to 8>
|
|||
|
The FOSSIL Communication Port. The Mailer
|
|||
|
should leave the fossil "hot" for the Request
|
|||
|
Processor
|
|||
|
|
|||
|
Mailer <Remote's mailer if EMSI>
|
|||
|
The Mailer name as defined by FTC
|
|||
|
|
|||
|
MailerCode <Remote's FTSC code>
|
|||
|
The hex code of the remote mailer as defined
|
|||
|
by FTC
|
|||
|
|
|||
|
SerialNumber <Remote's serial number if passed>
|
|||
|
The remote mailer's serial number if
|
|||
|
transfered
|
|||
|
FIDONEWS 14-25 Page 21 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
Version <Remote's version number if EMSI>
|
|||
|
The remote mailer's version number if
|
|||
|
transfered
|
|||
|
|
|||
|
Revision <remote's revision number if EMSI>
|
|||
|
The remote mailer's revision number if
|
|||
|
transfered
|
|||
|
|
|||
|
SessionType <may be EMSI, FTSC0001, WAZOO, JANUS, HYDRA or
|
|||
|
OTHER>
|
|||
|
The session-type, this may be one of the known
|
|||
|
session types or "OTHER" if not (yet) defined
|
|||
|
|
|||
|
OurAKA <AKA which has been called for proper
|
|||
|
response>
|
|||
|
If the mailer does AKA matching, the AKA of
|
|||
|
the mailer being called
|
|||
|
|
|||
|
TRANX <Tranx Line as 8 digit hex string>
|
|||
|
The unix-style time stamp (hexadecimal
|
|||
|
notation of seconds since 1.1.1980)
|
|||
|
|
|||
|
1.3 Undefined options
|
|||
|
There may be the need to add new commands / parameters to the SRI
|
|||
|
file. If so, they may be added, but inform us to keep the
|
|||
|
documentation "up to date" and to share your good ideas with other
|
|||
|
autors of software for FIDONet.
|
|||
|
|
|||
|
2.0 Implementation
|
|||
|
SRIF is implemented in these fine products already :
|
|||
|
|
|||
|
Mailer Request Processor
|
|||
|
------------------------------------------------------
|
|||
|
McMail xOR
|
|||
|
EasyERP
|
|||
|
|
|||
|
Other products will follow soon !
|
|||
|
|
|||
|
-30-
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
| Document: FSC-0087
|
|||
|
| Version: 001
|
|||
|
| Date: 31 October, 1995
|
|||
|
|
|
|||
|
| Robert Williamson FidoNet#1:167/104.0
|
|||
|
|
|||
|
File Forwarding in Fidonet Technology Networks
|
|||
|
Robert Williamson FidoNet#1:167/104.0 robert@ecs.mtlnet.org
|
|||
|
|
|||
|
Purpose:
|
|||
|
To document current practices in File Forwarding and the
|
|||
|
minimum requirements and known extensions of the TIC file format.
|
|||
|
FIDONEWS 14-25 Page 22 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
Acknowledgements:
|
|||
|
The TIC file format was introduced by Barry Geller, in the
|
|||
|
MSDOS File Forwarder, Tick. Useful extensions to this format were
|
|||
|
introduced by Harald Helms, in the MSDOS FileForwarder, AllFix.
|
|||
|
|
|||
|
Terminology:
|
|||
|
FTN - Fidonet Technolgy Network, such as FIDONET, AMIGANET or
|
|||
|
IBMNET. Sometimes used interchangably with the term DOMAIN.
|
|||
|
|
|||
|
FNC - FileName Conversion, process of converting filenames to
|
|||
|
msdos 8.3 format for transmission.
|
|||
|
|
|||
|
FQFA - Fully Qualified FTN Address, the format is
|
|||
|
FTN#Zone:Net/Node.Point
|
|||
|
|
|||
|
CRC - Cyclic Redundancy Check, method to determine whether some
|
|||
|
data has been altered. CRC-32 is used in File Forwarding.
|
|||
|
|
|||
|
TIC - a file that contains control information for the File
|
|||
|
Forwarding system. These files are named xxSTAMP.TIC, where xx
|
|||
|
is an abbreviation representing the File Forwarding program
|
|||
|
name and stamp is a unixdate stamp truncated to 6 characters.
|
|||
|
|
|||
|
UTC - Universal Time Coordinated, the time at the 0o
|
|||
|
meridian (Greenwich); previously called GMT forwarding - the
|
|||
|
process of creating and sending tic files and the associated file
|
|||
|
to one's downlinks.
|
|||
|
|
|||
|
ticking - the processing of reading and verifying a tic file and
|
|||
|
it's associated file.
|
|||
|
|
|||
|
hatching - the process of introducing a new file into a fileecho
|
|||
|
|
|||
|
cross-hatching - the process of forwarding a file from one
|
|||
|
fileecho (ususally restricted) to another
|
|||
|
|
|||
|
Associated File - The file listed in the FILE field of the TIC
|
|||
|
file.
|
|||
|
|
|||
|
Note that use of UPPERCASE on tic file keywords in this
|
|||
|
document in for display purposes only.
|
|||
|
|
|||
|
Format of a TIC file:
|
|||
|
|
|||
|
Addressing:
|
|||
|
In a tic file any form of FTN address representation from
|
|||
|
3d to FQFA may be used. All File Forwarders must understand
|
|||
|
the following formats:
|
|||
|
|
|||
|
zone:net/node - 3D
|
|||
|
zone:net/node.point - 4D
|
|||
|
zone:net/node@ftn - 5D - point 0 assumed
|
|||
|
zone:net/node.point@ftn - 5D
|
|||
|
ftn#zone:net/node.point - fqfa
|
|||
|
|
|||
|
File Forwarders should have configurable options per site as
|
|||
|
FIDONEWS 14-25 Page 23 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
to the type of addressing each of it's downlinks can understand.
|
|||
|
|
|||
|
Dates:
|
|||
|
All dates are expressed in UTC.
|
|||
|
|
|||
|
TimeDateStamps:
|
|||
|
All TimeDateStamps are unix TimeDateStamps (# of seconds
|
|||
|
since Jan 1, 1960) in UTC and expressed in hexadecimal notation.
|
|||
|
|
|||
|
Case Insensitivity:
|
|||
|
the format is completely case-insensitive. It is general
|
|||
|
practice that the first letter of a keyword is uppercase. This is
|
|||
|
not a requirement.
|
|||
|
|
|||
|
Order Dependancy:
|
|||
|
keywords are not order dependant.
|
|||
|
Order dependancy is required in some groupings of a keyword,
|
|||
|
such as PATH, VIA, DESC and APP.
|
|||
|
|
|||
|
Modification of address fields on PassThrough:
|
|||
|
The forwarding site may modify the addresses in any keyword
|
|||
|
field to make them compliant with the addressing limitations of
|
|||
|
each downlink.
|
|||
|
|
|||
|
Stripping of SeenBys:
|
|||
|
The forwarding site may strip seenbys to current FTN, ZONE or
|
|||
|
NET, when not forwarding outside of current FTN, ZONE or NET. This
|
|||
|
does not imply nor permit the stripping of of a direct downlink
|
|||
|
which is outside the current strip filter.
|
|||
|
|
|||
|
Keywords:
|
|||
|
There are no colons on keywords.
|
|||
|
|
|||
|
Each keyword line is terminated with CR LF pair.
|
|||
|
|
|||
|
The maximum length of a keyword line is 256 characters,
|
|||
|
including the CRLF termination. Some keyword lines may have a shorter
|
|||
|
limit.
|
|||
|
|
|||
|
Keywords are separated from their data by a single space.
|
|||
|
There is no space if there is no data associated with the keyword.
|
|||
|
eg: ReturnReceipt
|
|||
|
|
|||
|
Keywords are case-insensitive and order independant.
|
|||
|
|
|||
|
Keywords not understood are to be passed-though.
|
|||
|
|
|||
|
Known Keywords that are blank should not be passed though.
|
|||
|
For example, an empty AREADESC, could be either dropped
|
|||
|
or the blank replaced with the proper description.
|
|||
|
|
|||
|
Most Keywords are passed through when processing.
|
|||
|
There are exceptions. In some cases, a site-specific
|
|||
|
replacement may be created.
|
|||
|
Keywords marked with a ^ should not be passed-through.
|
|||
|
|
|||
|
FIDONEWS 14-25 Page 24 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
Keywords marked with a * are REQUIRED when processing a TIC
|
|||
|
file. If any of these are missing, the tic file should be
|
|||
|
considered as BAD and the associated file not forwarded to downlinks.
|
|||
|
|
|||
|
Keywords marked with a # are CREATED when hatching or
|
|||
|
forwarding.
|
|||
|
|
|||
|
*# AREA [AreaName]
|
|||
|
the TagName of the file area.
|
|||
|
|
|||
|
AREADESC [description of area] OPTIONAL
|
|||
|
a short (80 chars) description of the file area. This
|
|||
|
could be the description found in FileBone.NA
|
|||
|
|
|||
|
*# FILE [File being sent]
|
|||
|
the name of the file being sent, no path
|
|||
|
the filename must conform to msdos 8.3 format, unless it is
|
|||
|
known that the receiving site can handle longer filenames.
|
|||
|
|
|||
|
^# FULLNAME [original filename before FNC] OPTIONAL FNC
|
|||
|
only the original filename (no path) before FileName Conversion
|
|||
|
|
|||
|
*# CRC [CRC-32 in hex]
|
|||
|
crc of the file being sent, 8 hexadecimal characters
|
|||
|
|
|||
|
^ MAGIC [MagicName] OPTIONAL
|
|||
|
Name under which the file can be FREQed from the site
|
|||
|
listed in FROM. This is NOT passed though when forwarding,
|
|||
|
unless the MAGIC name is the same on the forwarding site. It
|
|||
|
can be replaced by the appropriate name.
|
|||
|
|
|||
|
REPLACES [FileName] OPTIONAL
|
|||
|
Filename (no path) of a file hatched in the AREA
|
|||
|
that the associated file replaces. If the site expects FNC files,
|
|||
|
and the filename does not confrom to msdos 8.3 convention, the
|
|||
|
REPLACES name should also be FNC.
|
|||
|
|
|||
|
# DESC [Description]
|
|||
|
Description of the file, limited to 80 characters per line,
|
|||
|
including CRLF termination.
|
|||
|
If multiple LDESC lines are used, the DESC line must
|
|||
|
provide the maximum information. No File Forwadrer is
|
|||
|
required to passthough or make use of any extra DESC line
|
|||
|
after the first.
|
|||
|
|
|||
|
# LDESC [multiple lines]
|
|||
|
A long description of the file. LDESC does NOT replace
|
|||
|
DESC, it is used IN ADDITION to the short description. No File
|
|||
|
Forwarder is required make use of LESC lines.
|
|||
|
|
|||
|
# SIZE [Bytes] OPTIONAL, SHOULD be required
|
|||
|
Length of the file in bytes
|
|||
|
|
|||
|
DATE [TimeDateStamp]
|
|||
|
TimeDateStamp of the file. Can be date of creation of
|
|||
|
archive.
|
|||
|
FIDONEWS 14-25 Page 25 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
RELEASE [TimeDateStamp]
|
|||
|
Date when file is TO BE released. Usually used by SDS, but
|
|||
|
can be used by ADS as well.
|
|||
|
|
|||
|
AUTHOR [name]
|
|||
|
Name of the author of the software package being hatched.
|
|||
|
This field is obviously not applicable to Newsletters, Nodelists and
|
|||
|
Diffs and the like.
|
|||
|
|
|||
|
SOURCE [authors_address]
|
|||
|
FTN address of the Author of the software package being
|
|||
|
hatched. Not necessary the same as the ORIGIN hatch site. Does not
|
|||
|
have
|
|||
|
to be an FTN address.
|
|||
|
|
|||
|
^ APP [program] [Application Specific Information]
|
|||
|
The APP keyword is a keyword known to programs of the
|
|||
|
name indicated. APP'S are order dependent and must be passed
|
|||
|
though.
|
|||
|
|
|||
|
*# ORIGIN [Address]
|
|||
|
Site where file entered the fileecho
|
|||
|
|
|||
|
*^# FROM [Address] [Pwd]
|
|||
|
Site that is forwarding the file to the next site.
|
|||
|
Pwd is optional and rarely used, IF AT ALL. Pwd is NEVER passed
|
|||
|
through.
|
|||
|
|
|||
|
^ TO [Address] OPTIONAL
|
|||
|
Site to which this TIC and the assocaited file are being
|
|||
|
sent. This keyword is included in the .TIC file when:
|
|||
|
a) the file is being routed via another system which
|
|||
|
permits such routing.
|
|||
|
b) the platform in use does not have any FTN
|
|||
|
software independant method of associating a
|
|||
|
file and it's destination. eg. platforms that
|
|||
|
do not have filenotes that could contain this
|
|||
|
information as part of the filesystem.
|
|||
|
|
|||
|
If the address in the TO line is that of the receiving
|
|||
|
site, the field is not passed through when forwarding. If the
|
|||
|
address in the TO lines IS NOT that of the receiving site, it
|
|||
|
should be forwarded to the TO site, if a routing agreement is in place
|
|||
|
with the sending site.
|
|||
|
|
|||
|
*^# CREATED [by] [Program Banner]
|
|||
|
File Forwarder which created the TIC file. This is
|
|||
|
generally in the form:
|
|||
|
Created [by] program_name version [copyright_info]
|
|||
|
|
|||
|
VIA [FROM CREATED] OPTIONAL (tracking)
|
|||
|
Copy of CREATED line of FROM, with 'Created [by]'
|
|||
|
stripped and FROM prepended. Always passed though. The VIA is only
|
|||
|
created by the receiving site when forwarding. It is never created
|
|||
|
by the hatching site. Therefore, in any TIC file, the addresses
|
|||
|
in the FROM and VIA should never be the same.
|
|||
|
FIDONEWS 14-25 Page 26 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
examples:
|
|||
|
Via 1:167/100 ALLFIX+ 4.31 Copyright (C) 1992,95 Harald
|
|||
|
Harms (2:281/910)
|
|||
|
Via FIDONET#1:167/104.0 XTick 3 Copyright (c) 1995 Robert
|
|||
|
Williamson FIDONET#1:167/104.0
|
|||
|
|
|||
|
*# PATH [Address] [TimeDateStamp] [date and time]
|
|||
|
Address of Site which has forwarded the file.
|
|||
|
TimeDateStamp, date and time is that of when the Site received and
|
|||
|
Processed the file.
|
|||
|
|
|||
|
* # SEENBY [Address]
|
|||
|
Site which has received the file. There are multiple
|
|||
|
lines of Seenby and they are unordered.
|
|||
|
|
|||
|
* PW [password]
|
|||
|
Site or Area password. This is case-insensitive and should
|
|||
|
be at least 5 characters in length.
|
|||
|
|
|||
|
PGP [signature]
|
|||
|
PrettyGoodPrivacy signature. To be discussed.
|
|||
|
|
|||
|
^ ReceiptRequest -no data- OPTIONAL
|
|||
|
A request to the receiving system to generate a
|
|||
|
IsReturnReceipt (attribute word bit 13) messsage, in the same manner
|
|||
|
it would if it had received a message with the FileAttach an
|
|||
|
ReturnReceipt attributes and a subject of the filename.
|
|||
|
There is NO requirement to recognize this keyword. It
|
|||
|
should never be passed through.
|
|||
|
|
|||
|
Transmission of Files:
|
|||
|
|
|||
|
The associated file, that is, the file Listed in the FILE field
|
|||
|
of the TIC file, should always be sent FIRST. In the case of a
|
|||
|
failed session, sending the FILE first prevents the orphaning
|
|||
|
of the file that is normally caused by the deletion or movement of
|
|||
|
the TIC file to BAD.
|
|||
|
|
|||
|
File Forwarders should not move or delete orphaned TIC files, but
|
|||
|
this can neither be relied upon nor mandated.
|
|||
|
|
|||
|
File Forwaders should be transparent to the renaming of
|
|||
|
file by mailers. This means that if the mailer renames a
|
|||
|
duplicate file by renaming or bumpinmg a numeric extension, the
|
|||
|
File Forwarder should be able to use the size and crc fields of
|
|||
|
the TIC to find and properly rename the associated file referred to in
|
|||
|
the TIC.
|
|||
|
|
|||
|
File Forwaders should always delete and dequeue unsent TIC files
|
|||
|
when re-hatching the same or updated version of an associated
|
|||
|
file. The implementor may wish to allow exceptions for
|
|||
|
periodicals such as nodediffs and newsletters.
|
|||
|
|
|||
|
-to be continued-
|
|||
|
|
|||
|
-30-
|
|||
|
FIDONEWS 14-25 Page 27 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
| Document: FSC-0088
|
|||
|
| Version: 001
|
|||
|
| Date: 31 October, 1995
|
|||
|
|
|
|||
|
| Robert Williamson FidoNet#1:167/104.0
|
|||
|
|
|||
|
Compatibility and Link Qualifier Extensions for EMSI Sessions
|
|||
|
Robert Williamson FidoNet#1:167/104.0 robert@ecs.mtlnet.org
|
|||
|
|
|||
|
Purpose:
|
|||
|
|
|||
|
The basic purpose of this document is to start discussions which
|
|||
|
will hopefully result in an improved handshake negotiation
|
|||
|
protocol.
|
|||
|
|
|||
|
Scope:
|
|||
|
|
|||
|
Relation of flags to Types of files transferred:
|
|||
|
|
|||
|
The FSC-0056 EMSI specification (hereafter referred to as
|
|||
|
EMSI-I) makes little distinction between ARCmail/packets and
|
|||
|
other types of files, such as files attached and TIC'ed files.
|
|||
|
In EMSI-I, the term 'Mail' when not used in conjunction with
|
|||
|
the term 'compressed', is interpreted to mean ANY file.
|
|||
|
|
|||
|
This extension (hereafter referred to as EMSI-II) makes
|
|||
|
reference to and allows control of types of files in addition to
|
|||
|
'compressed mail'. References to 'Mail' are changed to 'File'
|
|||
|
where common practice so indicates. The additional qualifier
|
|||
|
flags described provide for more control as to the types of files
|
|||
|
a system is prepared to receive.
|
|||
|
|
|||
|
|
|||
|
Relation of flags to presented addresses:
|
|||
|
|
|||
|
The EMSI-I specification does not allow qualification for any
|
|||
|
address other than the PRIMARY address. This means that Link
|
|||
|
flags are limited in application to either all presented
|
|||
|
addresses or to the primary presented address only.
|
|||
|
|
|||
|
This extension also allows application of Link flags to
|
|||
|
specific addresses other than the primary.
|
|||
|
|
|||
|
Distinctions between Calling and Answering System:
|
|||
|
|
|||
|
In the EMSI-I spec, the type of flags that may be presented is
|
|||
|
limited by the status of the site. Certain flags may only be
|
|||
|
presented when the site is the caller and other flags may only
|
|||
|
be presented when the site is the answerer. This proposed
|
|||
|
extension removes this distinction.
|
|||
|
|
|||
|
In the EMSI-I spec, certain Link and Capability (a.k.a:
|
|||
|
Compatibility) flags are caller-driven, while others are
|
|||
|
FIDONEWS 14-25 Page 28 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
controlled by the answering system. This specification attempts
|
|||
|
to harmonize these discrepancies.
|
|||
|
|
|||
|
A attempt is made to remain somewhat backwards compatible and to
|
|||
|
have new flags follow the original flag naming convention.
|
|||
|
However, IMHO, it would be preferable to harmonize the flags;
|
|||
|
reducing the number of them while retaining the fine type
|
|||
|
control, so that the same codes are used in all sessions.
|
|||
|
|
|||
|
Under both EMSI-I and EMSI-II, any flags that are not
|
|||
|
understood, are to be ignored. Therfore, if a site presents
|
|||
|
it's flags in EMSI-II format and the other site does not do
|
|||
|
EMSI-II, it is permissable for that site to interpret all flags
|
|||
|
according to EMSI-I specifications.
|
|||
|
|
|||
|
Specifics:
|
|||
|
|
|||
|
Compatibility flags:
|
|||
|
|
|||
|
Compatibility flags consist of a string of codes that specify
|
|||
|
the PROTOCOL CAPABILITIES and ENABLED FEATURES of the mailer.
|
|||
|
|
|||
|
ARC, XMA
|
|||
|
These EMSI-I compatibility flags have no meaning relavant
|
|||
|
to the transfer of files and are not to be presented under
|
|||
|
EMSI-II. If received, they are to be ignored.
|
|||
|
|
|||
|
FNC
|
|||
|
The FNC EMSI-I compatibility flag has been identified as a
|
|||
|
'mistake' by the author of EMSI-I. This is agreeable as that
|
|||
|
specification called for the creation of a filename
|
|||
|
that was ALWAYS 8.3, not up-to-8.up-to-3. It is not to
|
|||
|
be presented under EMSI-II. If received as a compatibility
|
|||
|
flag, it is to be ignored.
|
|||
|
|
|||
|
Protocol Selection:
|
|||
|
|
|||
|
In the EMSI-I spec, a requirement is placed upon the calling
|
|||
|
system to present it's available protocols in order of
|
|||
|
preference. A quote follows:
|
|||
|
|
|||
|
The calling system must list supported protocols first and
|
|||
|
descending order of preference (the most desirable protocol
|
|||
|
should be listed first).
|
|||
|
The answering system should only present one protocol and it
|
|||
|
should be the first item in the compatibility_codes field.
|
|||
|
|
|||
|
Some mailer authors have interpreted 'the compatibility_codes
|
|||
|
field' in the second sentence to mean that of the answering
|
|||
|
system, thereby making protocol selection RECEIVER-PREFS driven.
|
|||
|
This interpretation makes unnecessary the 'decending order'
|
|||
|
requirement placed upon the calling system, so shall be
|
|||
|
considered in conflict with that requirement.
|
|||
|
|
|||
|
Most mailer authors have interpreted that phrase to mean
|
|||
|
the 'compatibility_codes field' OF THE CALLER, thereby making
|
|||
|
FIDONEWS 14-25 Page 29 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
protocol selection CALLER-PREFS driven. Since EMSI-I was
|
|||
|
intended to be "a clear protocol definition for state-of-the-
|
|||
|
art E-Mail systems to follow", they cannot be faulted for
|
|||
|
interpretation. Caller-prefs driven selection is state-of-the-
|
|||
|
art, receiver-prefs driven selection is older technolgy, such as
|
|||
|
Wazoo.
|
|||
|
|
|||
|
This specification requires that the second
|
|||
|
interpretation, CALLER-PREFS driven, be mandatory.
|
|||
|
|
|||
|
New Compatibilty Flags:
|
|||
|
----------------------
|
|||
|
|
|||
|
EII
|
|||
|
Indicates that the system will interpret flags under
|
|||
|
this specification, if other end also presents this flag. IF
|
|||
|
either or both systems do not present this flag, all
|
|||
|
interpretations are done according to EMSI-I.
|
|||
|
|
|||
|
DFB
|
|||
|
Indicates that the system presenting is capabable of fall-
|
|||
|
back to FTS1/WAZOO negotiation in the case of failure of EMSI
|
|||
|
handshake or no common protocol. Since ZMO is the minimum
|
|||
|
required protocol, NCP should only occur if the answering
|
|||
|
system presents more than one protocol.. (ie. it's broken)
|
|||
|
|
|||
|
FRQ
|
|||
|
Indicates that the system will accept and process file
|
|||
|
requests received during outbound calls. In other words, the
|
|||
|
calling system will do a second turnaround for uni-directional
|
|||
|
protocols, to send the files requested, at his cost.
|
|||
|
|
|||
|
NRQ
|
|||
|
NRQ should be presented ONLY IF the mailer does not have a file
|
|||
|
request server, task or function and cannot accept requests.. It
|
|||
|
should NOT be used to indicate that the function is temporarly
|
|||
|
disabled.
|
|||
|
|
|||
|
When examined, No requests will be sent. It would be advisable
|
|||
|
that the mailer alert the system operator of this occurance
|
|||
|
to prevent continued polling of the remote site.
|
|||
|
|
|||
|
Protocol Capabilities:
|
|||
|
|
|||
|
Protocol capability flags are presented in decending
|
|||
|
order of preference by the caller. The answering system
|
|||
|
selects and presents the FIRST protocol from the callers
|
|||
|
list that it supports. The answering system must present only
|
|||
|
ONE protocol.
|
|||
|
|
|||
|
HYD Hydra bi-directional (link flags define parameters)
|
|||
|
JAN Janus bi-directional
|
|||
|
TZA DirectZap (TrapDoor DirectZap varient)
|
|||
|
DZA DirectZap (Zmodem variant, reduced escape set)
|
|||
|
ZAP ZedZap (Zmodem variant, upe 8K blocks)
|
|||
|
ZMO Zmodem w/1,024 packets (Wazoo ZedZip)
|
|||
|
FIDONEWS 14-25 Page 30 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
SLK SeaLink (no TYSNC, No MDM7, No TeLink)
|
|||
|
(8-32k window/ReSync/OverDrive/LongNames)
|
|||
|
NCP
|
|||
|
This is presented if no compatible protocol can be negotiated
|
|||
|
under EMSI. Since in most FTN networks, a common protocol
|
|||
|
DOES exist, fallback to WaZoo and FTS1 negotiation is
|
|||
|
expected. If these negotiation methods are not available, the
|
|||
|
session is terminated.
|
|||
|
|
|||
|
This condition should never occur under normal
|
|||
|
circumstances. It should be considered as a problem with the
|
|||
|
design or configuration of one of the mailers involved.
|
|||
|
|
|||
|
Link flags:
|
|||
|
----------
|
|||
|
|
|||
|
Link flags consist of a string of codes that specify DESIRED
|
|||
|
CONNECT CONDITIONS. They apply to the CURRENT SESSION ONLY.
|
|||
|
Under EMSI-I, there are four TYPES of link flags: communications
|
|||
|
parameters, session parameters, pickup options and hold options.
|
|||
|
Under EMSI-II, only three types are used, the communications
|
|||
|
parameters type is REMOVED, as it serves no purpose whatsoever in
|
|||
|
FTN operations.
|
|||
|
|
|||
|
Link Session options:
|
|||
|
|
|||
|
FNC
|
|||
|
If either system presents this flag, it is an indication
|
|||
|
that the presenting system requires filename conversion
|
|||
|
to cp/m-msdos conventions. The other system will convert
|
|||
|
filenames to cp/m cpm/msdos 8.3 conventions before sending.
|
|||
|
The convention is defined as a filename consisting of
|
|||
|
two parts, the filepart and extension. The filepart and
|
|||
|
extension are separated by a period ".". The filepart may be
|
|||
|
from 1 to 8 characters in length and the extension may be
|
|||
|
from 0 to 3 characters. The character set shall be any uppercase
|
|||
|
character in the range A-Z and any numeric character in the
|
|||
|
range 0-9. If the extension is of zero length, the period may
|
|||
|
or may not be present.
|
|||
|
|
|||
|
RMA
|
|||
|
Indicates that the presenting site is able to send and process
|
|||
|
multiple file requests. If both sites present this flag, the
|
|||
|
caller will send any REQ files found for each AKA presented by the
|
|||
|
answering system. The answering system will process each received
|
|||
|
REQ.
|
|||
|
|
|||
|
RH1
|
|||
|
Indicates that under the Hydra protocol, batch one contains
|
|||
|
file requests only, while batch 2 is reserved for all other files.
|
|||
|
|
|||
|
(others to be defined)
|
|||
|
|
|||
|
Pickup and Hold Flags:
|
|||
|
|
|||
|
Under the EMSI-I specification, Link Pickup flags are only
|
|||
|
FIDONEWS 14-25 Page 31 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
presented when calling (an Outbound Session) and are examined and
|
|||
|
processed only when answering (an Inbound Session) and Link
|
|||
|
Hold flags are only presented when answering (an Inbound
|
|||
|
Session) and are examined and processed only when calling (an
|
|||
|
Outbound Session).
|
|||
|
|
|||
|
With EMSI-II, BOTH Pickup and Hold flags are presented by both
|
|||
|
sites during a session. This allows more control for those
|
|||
|
systems, for example, which cannot modify addresses presented
|
|||
|
or rotate akas to change the primary address presented on a
|
|||
|
per-session or per-site basis.
|
|||
|
|
|||
|
Link Pickup and Hold:
|
|||
|
|
|||
|
Each system can present one of three (or more) Link options
|
|||
|
related to application of addresses. If neither of these flags
|
|||
|
are presented, PUA is to be assumed.
|
|||
|
|
|||
|
Neither PUA nor PUP is to be presented if only one
|
|||
|
address was presented.
|
|||
|
|
|||
|
PUP Pickup FILES for primary address only
|
|||
|
/ PUA Pickup FILES for all presented addresses
|
|||
|
/ PUn Pickup FILES for address number n in AKA list
|
|||
|
one of |
|
|||
|
\
|
|||
|
\ NPU No FILE pickup desired. (calling system)
|
|||
|
HAT Hold all FILES (answering system)
|
|||
|
HAn Hold all FILES for address number n in AKA list
|
|||
|
|
|||
|
Qualifiers:
|
|||
|
|
|||
|
Qualifiers are processed in the order presented, with any
|
|||
|
conflict being resolved by subsequent qualifiers overridding
|
|||
|
any conflicting previous qualifier in the list.
|
|||
|
|
|||
|
Qualifiers may be not be presented with either NPU or HAT and
|
|||
|
should be ignored if received with NPU or HAT.
|
|||
|
|
|||
|
PickUp:
|
|||
|
|
|||
|
PMO PickUp Mail (ARCmail and Packets) ONLY
|
|||
|
PMn PickUp Mail ONLY for address number n in AKA list
|
|||
|
|
|||
|
NFE No TIC'S, associated files or files
|
|||
|
attachs desired
|
|||
|
NFn No TIC'S, associated files or file attaches,
|
|||
|
for address number n in AKA list
|
|||
|
|
|||
|
NXP No compressed mail pickup desired
|
|||
|
NXn No compressed mail pickup desired,
|
|||
|
for address number n in AKA list
|
|||
|
|
|||
|
NRQ File requests not accepted by caller
|
|||
|
This flag is presented if file request processing
|
|||
|
is disabled TEMPORARILY for any reason
|
|||
|
FIDONEWS 14-25 Page 32 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
NRn File requests not accepted by caller
|
|||
|
for address number n in AKA list
|
|||
|
|
|||
|
Note that NFE,NPX,NRQ != NPU
|
|||
|
|
|||
|
Hold:
|
|||
|
|
|||
|
HNM Hold all traffic EXCEPT Mail (ARCmail and Packets)
|
|||
|
HNn Hold all traffic EXCEPT Mail (ARCmail and Packets)
|
|||
|
for address number n in AKA list
|
|||
|
|
|||
|
HXT Hold compressed mail traffic.
|
|||
|
HXn Hold compressed mail traffic.
|
|||
|
for address number n in AKA list
|
|||
|
|
|||
|
HFE Hold tic's and associated files
|
|||
|
and file attaches other than mail
|
|||
|
HFn Hold tic's and associated files
|
|||
|
and file attaches other than mail
|
|||
|
for address number n in AKA list
|
|||
|
|
|||
|
HRQ Hold file requests (not processed at this time)
|
|||
|
This flag is presented if file request processing
|
|||
|
is disabled TEMPORARILY for any reason
|
|||
|
HRn Hold file requests (not processed at this time)
|
|||
|
for address number n in AKA list
|
|||
|
|
|||
|
Note that HXT,HRQ,HFE == HAT
|
|||
|
|
|||
|
-eot-
|
|||
|
|
|||
|
-30-
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FIDONEWS 14-25 Page 33 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
ADVERTISE YOUR FREE SERVICE/EVENT
|
|||
|
=================================================================
|
|||
|
|
|||
|
|
|||
|
Emanuel Edwards
|
|||
|
1:348/963
|
|||
|
emanuel@pangea.ca
|
|||
|
|
|||
|
Hello all Wrestling Fans:
|
|||
|
|
|||
|
Where else can you find:
|
|||
|
|
|||
|
All the Latest News, great wrestling scoops and great wrestling
|
|||
|
advertisement? You can get it all on the WRESTLING_CHAT. The echo
|
|||
|
tag is called WRESTLING_CHAT.
|
|||
|
|
|||
|
Wrestling Fans in North American and around the world if you want to
|
|||
|
hear about all the latest wrestling news and upcoming events this is
|
|||
|
the echo to be on. All you sysops request the WRESTLING_CHAT on you
|
|||
|
BBS. The Wrestling_chat offer a freedom of speech atmosphere and
|
|||
|
there are great wrestling fans on that echo that echo.
|
|||
|
|
|||
|
Regards
|
|||
|
|
|||
|
Emanuel Moderator
|
|||
|
Barry Laws Jr Co_Moderator
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FIDONEWS 14-25 Page 34 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
NOTICES
|
|||
|
=================================================================
|
|||
|
|
|||
|
|
|||
|
--- Following message extracted from NETMAIL @ 1:18/14 ---
|
|||
|
By Christopher Baker on Fri Jun 20 00:18:09 1997
|
|||
|
|
|||
|
From: Mark Storm @ 1:366/2
|
|||
|
To: Christopher Baker @ 1:18/14
|
|||
|
Date: 15 Jun 97 12:15:25
|
|||
|
Subj: area code changes
|
|||
|
|
|||
|
* Copied (from: netmail) by Mark Storm using timEd/2 1.10+.
|
|||
|
|
|||
|
Hello Ken!
|
|||
|
|
|||
|
effective June 23, 1997 until March 23, 1998 the area codes for the
|
|||
|
northwest Florida counties will be in a change mode ... all counties
|
|||
|
west of and including Madison and Taylor will change to 850 ... I
|
|||
|
getting ready for this change I will be submitting my nets changes
|
|||
|
effective 28 June 1997 ...
|
|||
|
|
|||
|
a listing of the counties effected area as follows:
|
|||
|
|
|||
|
Escambia
|
|||
|
Santa Rosa
|
|||
|
Okaloosa
|
|||
|
Walton
|
|||
|
Holmes
|
|||
|
Washington
|
|||
|
Bay
|
|||
|
Jackson
|
|||
|
Calhoun
|
|||
|
Gulf
|
|||
|
Gadsden
|
|||
|
Liberty
|
|||
|
Franklin
|
|||
|
Wakulla
|
|||
|
Leon
|
|||
|
Jefferson
|
|||
|
Madison
|
|||
|
Taylor
|
|||
|
|
|||
|
A copy of this has been sent to Chris Baker in an improper format for
|
|||
|
submission to FidoNews if he feels it is appropriate ... also if you
|
|||
|
wish to place it at the bottom of the nodelist feel free ... Mark..
|
|||
|
(mstorm@arc.net)
|
|||
|
|
|||
|
later...
|
|||
|
|
|||
|
|
|||
|
M<ark mstorm@arc.net
|
|||
|
|
|||
|
-30-
|
|||
|
|
|||
|
FIDONEWS 14-25 Page 35 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
Future History
|
|||
|
|
|||
|
1 Jul 1997
|
|||
|
Canada Day - Happy Birthday Canada.
|
|||
|
|
|||
|
9 Jul 1997
|
|||
|
Independence Day, Argentina.
|
|||
|
|
|||
|
1 Aug 1997
|
|||
|
International FidoNet PENPAL [Echo] meeting in Dijon, France
|
|||
|
|
|||
|
13 Oct 1997
|
|||
|
Thanksgiving Day, Canada.
|
|||
|
|
|||
|
1 Dec 1997
|
|||
|
World AIDS Day.
|
|||
|
|
|||
|
10 Dec 1997
|
|||
|
Nobel Day, Sweden.
|
|||
|
|
|||
|
12 Jan 1998
|
|||
|
HAL 9000 is one year old today.
|
|||
|
|
|||
|
30 Apr 1998
|
|||
|
Queens Day, Holland.
|
|||
|
|
|||
|
22 May 1998
|
|||
|
Expo '98 World Exposition in Lisbon (Portugal) opens.
|
|||
|
|
|||
|
1 Dec 1998
|
|||
|
Fifteenth Anniversary of release of Fido version 1 by
|
|||
|
Tom Jennings.
|
|||
|
|
|||
|
31 Dec 1999
|
|||
|
Hogmanay, Scotland. The New Year that can't be missed.
|
|||
|
|
|||
|
1 Jan 2000
|
|||
|
The 20th Century, C.E., is still taking place thru 31 Dec.
|
|||
|
|
|||
|
15 Sep 2000
|
|||
|
Sydney (Australia) Summer Olympiad opens.
|
|||
|
|
|||
|
1 Jan 2001
|
|||
|
This is the actual start of the new millennium, C.E.
|
|||
|
|
|||
|
-- If YOU have something which you would like to see in this
|
|||
|
Future History, please send a note to the FidoNews Editor.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FIDONEWS 14-25 Page 36 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
FIDONEWS PUBLIC-KEY
|
|||
|
=================================================================
|
|||
|
|
|||
|
|
|||
|
[this must be copied out to a file starting at column 1 or
|
|||
|
it won't process under PGP as a valid public-key]
|
|||
|
|
|||
|
|
|||
|
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
|||
|
Version: 2.6.2
|
|||
|
Comment: Clear-signing is Electronic Digital Authenticity!
|
|||
|
|
|||
|
mQCNAzINVLcAAAEEAM5dZN6t6j5Yc0kl7qegVFfiBeVoteuhDg4ay8h43u38Q4kO
|
|||
|
eJ9Mm7J89wXFb9vgouBVb4biIN6bTWCwcXTbGhBe5OIceLvluuxuEKsaIs/UwXNe
|
|||
|
Ogx5azIPhRfC7MJDe41Z8tMEBuHY/NE88cuxQ8yXWO126IRttavu6L/U5BwRAAUR
|
|||
|
tCRGaWRvTmV3cyBFZGl0b3IgPDE6MS8yM0BmaWRvbmV0Lm9yZz6JAJUDBRAyGwFS
|
|||
|
JZMgw7eCKz0BAZl0A/9xrfhpsEOqGiPfjy2qd9dv6tvSVPPVFu+Wy1lGTHYtuTtg
|
|||
|
FIN3fQ47AM3XzqHxWRWvp/xZYgR6sRICL7UFx94ShYBQc7CyqBBZKA0IvIWqXP/g
|
|||
|
c4Br+gQJR6CLiQK7TUyjUbqNbs6QAxuNUi4xFQM+O2Gene5/iTjHFmmSDj2C9YkB
|
|||
|
FQMFEDIOmHDTQ6/52IG1SQEBQ78H/Rz/mleIrtZwFIOhzy3JH4Z6FUTfZuM9nPcs
|
|||
|
1ZLjZCPptHvY7wEYJWGr03lPPJ6tj1VBXwTrWJTf/hOLsoi00GKV8t1thjqGDo23
|
|||
|
O91/bSQ+Vn0vBQ2vOEJys8ftxdoLJAyI5YLzHVT+RsMTQLIXVuPyrNcKs1vC2ql+
|
|||
|
UDHpU1R+9cG9JUEHpGI6z0DPnQ74SKbQH3fiVBpHhYx4BmvcBC4gWQzKMkDWFiq3
|
|||
|
8AssIZ7b9lWl3OBgQ4UM1OIDKoJyjRewIdKyl7zboKSt6Qu8LrcsXO3kb81YshOW
|
|||
|
ZpSS3QDIqfZC4+EElnB15l4RcVwnPHBaQY0FxUr4Vl4UWM36jbuJAJUDBRAyDpgY
|
|||
|
q+7ov9TkHBEBAQGoA/sFfN07IFQcir456tJfBfB9R5Z6e6UKmexaFhWOsLHqbCq6
|
|||
|
3FGXDLeivNn6NTz81QeqLIHglTuM3NP1mu8sw215klAG8G3M1NA2xLw7Eqhspze2
|
|||
|
raGvNeEwxl8e+PY9aZwBj4UWU+CmIm6QNiP0MtvR7QYDIKn5mZCDc3CLmr942IkB
|
|||
|
FQMFEDIOh0O8AhTPqRipPQEB4EYH/1gkDmdHL6lbEkFuQLrylF+weBl0XQ+kv7ER
|
|||
|
vWXYrvIrkppxtc4VAge6CXXEbOGJnvkFHgyNZzO9Q9O64QsmZvjip+4lhDLeNrdH
|
|||
|
X9DizS4YKXxkSKr9Yltmn2/AlBCx6jwcDIfkqy/P1tNWcikxZZMd6KryK0Wsres9
|
|||
|
Ik12OmVmJjQSxb5bS6Q8aYUbV3qwosGXTqy+BzYh/UYAX/XJIWa5kxFVSPKFSZ+5
|
|||
|
toiSzANd9SpHPEogGvQDHJlJ23lmsMx/6uHsR1LTsQ8su8zIk92XyqePJTjlMx2j
|
|||
|
D7KJWNR7Zzu4QHCXBkga5W8l2FfPk7D3+o7bXTLRuR1yTYGdNoiJAJUCBRAyDhwt
|
|||
|
SlKLwP4OFW0BAdaMA/9rcWQlSq44K9JuJ7fZUgt9fwxGreTud9fC8DvlbUW79+CA
|
|||
|
AHLTLLagcEF1OKsWzVBWcA2JEAp+TUTqktRN0oD8vnaw3uNJd1G5KK59hw0WR8x1
|
|||
|
v4ivypbSjiq95Y3gBunb7WjpyiFRWDlm0PrKrWHtbWzjnpPIpetln1UuqsSfbokB
|
|||
|
FQIFEDIOG9C3N61ZQ4Dr/QEBIzMH/1VxxztmBPBszbjZLDO8Svcax9Ng8IcWpcDy
|
|||
|
WqHCAA2Hoe5VtMD0v6w31ZgVqTPIvCark2Y/aTR1GofiuN9NUqbVV534AgAYLzYk
|
|||
|
DMT1swsPvqDTpOYgQl6PCGh6A5JGAbWJfKkX9XCUHJAAmiTsEVRNnjOgL+p6qjoh
|
|||
|
EfIG8CGehghWSRKl5eGeDAtbXupZKNjFI1t2XV+ks0RFQ/RPuTH7pF7pk7WO6Cyg
|
|||
|
+Dk2ZMgua0HRL1fXvHKb5Xzr3MVgsbAl5gP8ooIiD9MI/x5Irh3oo58VyoEZNBs/
|
|||
|
Kz+drGFDPljcS6fdiVCFtYIzMrshY6YsfLi0aB8fwOvFtxgBqli0J0NocmlzdG9w
|
|||
|
aGVyIEJha2VyIDwxOjE4LzE0QGZpZG9uZXQub3JnPrQoQ2hyaXN0b3BoZXIgQmFr
|
|||
|
ZXIgPGNiYWtlcjg0QGRpZ2l0YWwubmV0Pg==
|
|||
|
=61OQ
|
|||
|
-----END PGP PUBLIC KEY BLOCK-----
|
|||
|
|
|||
|
|
|||
|
File-request FNEWSKEY from 1:1/23 [1:18/14] or download it from the
|
|||
|
Rights On! BBS at 1-904-409-7040 anytime except 0100-0130 ET and Zone
|
|||
|
1 ZMH at 1200-9600+ HST/V32B. The FidoNews key is also available on
|
|||
|
the FidoNews homepage listed in the Masthead information.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FIDONEWS 14-25 Page 37 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
FIDONET BY INTERNET
|
|||
|
=================================================================
|
|||
|
|
|||
|
This is a list of all FidoNet-related sites reported to the Editor as
|
|||
|
of this appearance.
|
|||
|
|
|||
|
============
|
|||
|
|
|||
|
FidoNet:
|
|||
|
|
|||
|
Homepage http://www.fidonet.org
|
|||
|
FidoNews http://ddi.digital.net/~cbaker84/fidonews.html
|
|||
|
HTML FNews http://www.geocities.com/Athens/6894/
|
|||
|
WWW sources http://www.scms.rgu.ac.uk/students/cs_yr94/lk/fido.html
|
|||
|
FTSC page http://www2.blaze.net.au/ftsc.html
|
|||
|
Echomail http://www.portal.ca/~awalker/index.html
|
|||
|
WebRing http://ddi.digital.net/~cbaker84/fnetring.html
|
|||
|
|
|||
|
============
|
|||
|
|
|||
|
Zone 1: http://www.z1.fidonet.org
|
|||
|
|
|||
|
Region 10: http://www.psnw.com/~net205/region10.html
|
|||
|
|
|||
|
Region 11: http://oeonline.com/~garyg/region11/
|
|||
|
|
|||
|
Region 13: http://www.smalltalkband.com/st01000.htm
|
|||
|
|
|||
|
Region 14: http://www.netins.net/showcase/fidonet/
|
|||
|
|
|||
|
Region 15: http://www.smrtsys.com/region15/ [disappeared?]
|
|||
|
|
|||
|
Region 16: http://www.tiac.net/users/satins/region16.htm
|
|||
|
|
|||
|
Region 17: http://www.portal.ca/~awalker/region17.htm
|
|||
|
REC17: http://www.westsound.com/ptmudge/
|
|||
|
|
|||
|
Region 18: http://www.citicom.com/fido.html
|
|||
|
|
|||
|
Region 19: http://www.compconn.net
|
|||
|
|
|||
|
============
|
|||
|
|
|||
|
Zone 2: http://www.z2.fidonet.org
|
|||
|
|
|||
|
ZEC2: http://fidoftp.paralex.co.uk/zec.htm [shut down?]
|
|||
|
Zone 2 Elist: http://www.fidonet.ch/z2_elist/z2_elist.htm
|
|||
|
|
|||
|
Region 20: http://www.fidonet.pp.se (in Swedish)
|
|||
|
|
|||
|
Region 24: http://www.swb.de/personal/flop/gatebau.html (in German)
|
|||
|
|
|||
|
Region 25:
|
|||
|
http://members.aol.com/Net254/
|
|||
|
|
|||
|
FIDONEWS 14-25 Page 38 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
Region 27: http://telematique.org/ft/r27.htm
|
|||
|
|
|||
|
Region 29: http://www.rtfm.be/fidonet/ (in French)
|
|||
|
|
|||
|
Region 30: http://www.fidonet.ch (in Swiss)
|
|||
|
|
|||
|
Region 34: http://www.pobox.com/cnb/r34.htm (in Spanish)
|
|||
|
REC34: http://pobox.com/~chr
|
|||
|
|
|||
|
Region 36: http://www.geocities.com/SiliconValley/7207/
|
|||
|
|
|||
|
Region 41: http://www.fidonet.gr (in Greek and English)
|
|||
|
|
|||
|
Region 48: http://www.fidonet.org.pl
|
|||
|
|
|||
|
============
|
|||
|
|
|||
|
Zone 3: http://www.z3.fidonet.org
|
|||
|
|
|||
|
============
|
|||
|
|
|||
|
Zone 4: (not yet listed)
|
|||
|
|
|||
|
Region 90:
|
|||
|
Net 904: http://members.tripod.com/~net904 (in Spanish)
|
|||
|
|
|||
|
============
|
|||
|
|
|||
|
Zone 5: (not yet listed)
|
|||
|
|
|||
|
============
|
|||
|
|
|||
|
Zone 6: http://www.z6.fidonet.org
|
|||
|
|
|||
|
============
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FIDONEWS 14-25 Page 39 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
FIDONEWS INFORMATION
|
|||
|
=================================================================
|
|||
|
|
|||
|
------- FIDONEWS MASTHEAD AND CONTACT INFORMATION -------
|
|||
|
|
|||
|
Editor: Christopher Baker
|
|||
|
|
|||
|
Editors Emeritii: Tom Jennings, Thom Henderson, Dale Lovell,
|
|||
|
Vince Perriello, Tim Pozar, Sylvia Maxwell,
|
|||
|
Donald Tees
|
|||
|
|
|||
|
"FidoNews Editor"
|
|||
|
FidoNet 1:1/23
|
|||
|
BBS 1-904-409-7040, 300/1200/2400/14400/V.32bis/HST(ds)
|
|||
|
|
|||
|
more addresses:
|
|||
|
Christopher Baker -- 1:18/14, cbaker84@digital.net
|
|||
|
cbaker84@aol.com
|
|||
|
cbaker84@msn.com
|
|||
|
|
|||
|
(Postal Service mailing address)
|
|||
|
FidoNews Editor
|
|||
|
P.O. Box 471
|
|||
|
Edgewater, FL 32132-0471
|
|||
|
U.S.A.
|
|||
|
|
|||
|
|
|||
|
voice: 1-904-409-3040 [1400-2100 ET only, please]
|
|||
|
[1800-0100 UTC/GMT]
|
|||
|
|
|||
|
------------------------------------------------------
|
|||
|
|
|||
|
FidoNews is published weekly by and for the members of the FIDONET
|
|||
|
INTERNATIONAL AMATEUR ELECTRONIC MAIL system. It is a compilation
|
|||
|
of individual articles contributed by their authors or their
|
|||
|
authorized agents. The contribution of articles to this compilation
|
|||
|
does not diminish the rights of the authors. OPINIONS EXPRESSED in
|
|||
|
these articles ARE THOSE OF THE AUTHORS and not necessarily those of
|
|||
|
FidoNews.
|
|||
|
|
|||
|
Authors retain copyright on individual works; otherwise FidoNews is
|
|||
|
Copyright 1997 Christopher Baker. All rights reserved. Duplication
|
|||
|
and/or distribution permitted for noncommercial purposes only. For
|
|||
|
use in other circumstances, please contact the original authors, or
|
|||
|
the Editor.
|
|||
|
|
|||
|
=*=*=*=*=*=*=*=*=
|
|||
|
|
|||
|
OBTAINING COPIES: The most recent issue of FidoNews in electronic
|
|||
|
form may be obtained from the FidoNews Editor via manual download or
|
|||
|
file-request, or from various sites in the FidoNet and Internet.
|
|||
|
PRINTED COPIES may be obtained by sending SASE to the above postal
|
|||
|
address. File-request FIDONEWS for the current Issue. File-request
|
|||
|
FNEWS for the current month in one archive. Or file-request specific
|
|||
|
back Issue filenames in distribution format [FNEWSEnn.ZIP] for a
|
|||
|
FIDONEWS 14-25 Page 40 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
particular Issue. Monthly Volumes are available as FNWSmmmy.ZIP
|
|||
|
where mmm = three letter month [JAN - DEC] and y = last digit of the
|
|||
|
current year [7], i.e., FNWSFEB7.ZIP for all the Issues from Feb 97.
|
|||
|
|
|||
|
Annual volumes are available as FNEWSn.ZIP where n = the Volume number
|
|||
|
1 - 14 for 1984 - 1997, respectively. Annual Volume archives range in
|
|||
|
size from 48K to 1.4M.
|
|||
|
|
|||
|
|
|||
|
INTERNET USERS: FidoNews is available via:
|
|||
|
|
|||
|
http://www.fidonet.org/fidonews.htm
|
|||
|
ftp://ftp.fidonet.org/pub/fidonet/fidonews/
|
|||
|
ftp://ftp.aminet.org/pub/aminet/comm/fido/
|
|||
|
|
|||
|
*=*=*
|
|||
|
|
|||
|
You may obtain an email subscription to FidoNews by sending email to:
|
|||
|
|
|||
|
jbarchuk@worldnet.att.net
|
|||
|
|
|||
|
with a Subject line of: subscribe fnews-edist
|
|||
|
|
|||
|
and no message in the message body. To remove your name from the email
|
|||
|
distribution use a Subject line of: unsubscribe fnews-edist with no
|
|||
|
message to the same address above.
|
|||
|
|
|||
|
*=*=*
|
|||
|
|
|||
|
You can read the current FidoNews Issue in HTML format at:
|
|||
|
|
|||
|
http://www.geocities.com/Athens/6894/
|
|||
|
|
|||
|
STAR SOURCE for ALL Past Issues via FTP and file-request -
|
|||
|
Available for FReq from 1:396/1 or by anonymous FTP from:
|
|||
|
|
|||
|
ftp://ftp.sstar.com/fidonet/fnews/
|
|||
|
|
|||
|
Each yearly archive also contains a listing of the Table-of-Contents
|
|||
|
for that year's issues. The total set is currently about 11 Megs.
|
|||
|
|
|||
|
=*=*=*=
|
|||
|
|
|||
|
The current week's FidoNews and the FidoNews public-key are now also
|
|||
|
available almost immediately after publication on the Editor's new
|
|||
|
homepage on the World Wide Web at:
|
|||
|
|
|||
|
http://ddi.digital.net/~cbaker84/fidonews.html
|
|||
|
|
|||
|
There are also links there to jim barchuk's HTML FidoNews source and
|
|||
|
to John Souvestre's FTP site for the archives. There is also an email
|
|||
|
link for sending in an article as message text. Drop on over.
|
|||
|
|
|||
|
=*=*=*=*=*=*=*=*=
|
|||
|
|
|||
|
A PGP generated public-key is available for the FidoNews Editor from
|
|||
|
FIDONEWS 14-25 Page 41 23 Jun 1997
|
|||
|
|
|||
|
|
|||
|
1:1/23 [1:18/14] by file-request for FNEWSKEY or by download from
|
|||
|
Rights On! BBS at 1-904-409-7040 as FIDONEWS.ASC in File Area 18. It
|
|||
|
is also posted twice a month into the PKEY_DROP Echo available on the
|
|||
|
Zone 1 Echomail Backbone.
|
|||
|
|
|||
|
*=*=*=*=*
|
|||
|
|
|||
|
SUBMISSIONS: You are encouraged to submit articles for publication in
|
|||
|
FidoNews. Article submission requirements are contained in the file
|
|||
|
ARTSPEC.DOC, available from the FidoNews Editor, or file-requestable
|
|||
|
from 1:1/23 [1:18/14] as file "ARTSPEC.DOC". ALL Zone Coordinators
|
|||
|
also have copies of ARTSPEC.DOC. Please read it.
|
|||
|
|
|||
|
"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
|
|||
|
trademarks of Tom Jennings, P.O. Box 410923, San Francisco, CA 94141,
|
|||
|
and are used with permission.
|
|||
|
|
|||
|
"Disagreement is actually necessary,
|
|||
|
or we'd all have to get in fights
|
|||
|
or something to amuse ourselves
|
|||
|
and create the requisite chaos."
|
|||
|
-Tom Jennings
|
|||
|
|
|||
|
-30-
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
|