2428 lines
101 KiB
Plaintext
2428 lines
101 KiB
Plaintext
Volume 6, Number 14 3 April 1989
|
||
+---------------------------------------------------------------+
|
||
| _ |
|
||
| / \ |
|
||
| /|oo \ |
|
||
| - FidoNews - (_| /_) |
|
||
| _`@/_ \ _ |
|
||
| International | | \ \\ |
|
||
| FidoNet Association | (*) | \ )) |
|
||
| Newsletter ______ |__U__| / \// |
|
||
| / FIDO \ _//|| _\ / |
|
||
| (________) (_/(_|(____/ |
|
||
| (jm) |
|
||
+---------------------------------------------------------------+
|
||
Editor in Chief: Vince Perriello
|
||
Editors Emeritii: Dale Lovell
|
||
Thom Henderson
|
||
Chief Procrastinator Emeritus: Tom Jennings
|
||
Contributing Editors: Al Arango
|
||
|
||
FidoNews is published weekly by the International FidoNet
|
||
Association as its official newsletter. You are encouraged to
|
||
submit articles for publication in FidoNews. Article submission
|
||
standards are contained in the file ARTSPEC.DOC, available from
|
||
node 1:1/1. 1:1/1 is a Continuous Mail system, available for
|
||
network mail 24 hours a day.
|
||
|
||
Copyright 1989 by the International FidoNet Association. All
|
||
rights reserved. Duplication and/or distribution permitted for
|
||
noncommercial purposes only. For use in other circumstances,
|
||
please contact IFNA at (314) 576-4067. IFNA may also be contacted
|
||
at PO Box 41143, St. Louis, MO 63141.
|
||
|
||
Fido and FidoNet are registered trademarks of Tom Jennings of
|
||
Fido Software, 164 Shipley Avenue, San Francisco, CA 94107 and
|
||
are used with permission.
|
||
|
||
We don't necessarily agree with the contents of every article
|
||
published here. Most of these materials are unsolicited. No
|
||
article will be rejected which is properly attributed and legally
|
||
acceptable. We will publish every responsible submission
|
||
received.
|
||
|
||
|
||
Table of Contents
|
||
1. ARTICLES ................................................. 1
|
||
Policy4 Draft Released for Comment ....................... 1
|
||
ZOW, Yet Another Fantastically New File Packer! (Part 2 .. 35
|
||
2. COLUMNS .................................................. 37
|
||
The Veterinarian's Corner: Winter Weather & Antifreeze ... 37
|
||
3. LETTERS TO THE EDITOR .................................... 38
|
||
4. LATEST VERSIONS .......................................... 39
|
||
Latest Software Versions ................................. 39
|
||
5. NOTICES .................................................. 40
|
||
The Interrupt Stack ...................................... 40
|
||
FidoNews 6-14 Page 1 3 Apr 1989
|
||
|
||
|
||
=================================================================
|
||
ARTICLES
|
||
=================================================================
|
||
|
||
FidoNet Policy4
|
||
Comments Solicited
|
||
David Dodell, FidoNet International Coordinator
|
||
1:114/15 -- 1:1/0
|
||
|
||
Included in this article is a proposed policy document for
|
||
FidoNet. The existing policy has served well, but FidoNet has
|
||
grown and changed a great deal since it was adopted. This
|
||
proposal has been prepared by the Regional Coordinators, and your
|
||
comments are sincerely solicited.
|
||
|
||
Discussion at the net level is encouraged, and Network Coordina-
|
||
tors will represent their net to the Regional Coordinator. The
|
||
RC's realize that the net has significant input into the process
|
||
of preparing policy, and your comments will be thoughtfully
|
||
considered.
|
||
|
||
The deadline for comments is April 30. A final proposal will be
|
||
issued on May 8, and a vote will be conducted of NC's and RC's.
|
||
The voting period will end on June 5, and results will be
|
||
announced in the nodediff which is released on June 9.
|
||
|
||
You are encouraged to read the proposal in its entirity, but here
|
||
are a few of the differences between this proposal and Policy3.
|
||
|
||
Greater detail: Throughout the document, more detail has been
|
||
provided in an effort to clarify procedures. The intent is to
|
||
make expectations clear for new and existing sysops to reduce the
|
||
potential for unintentional policy violations, and to simplify
|
||
the resolution of disputes when they do occur. This is an admin-
|
||
istrative document which will assist both coordinators and
|
||
sysops.
|
||
|
||
Description of "new" developments: Routing hubs, point systems,
|
||
and zone coordinators are described. None of these existed when
|
||
Policy3 was written.
|
||
|
||
Change procedure: A procedure is included to modify policy. This
|
||
procedure will be used to adopt or reject Policy4.
|
||
|
||
Dispute resolution: A statute of limitations and a limit on
|
||
response time by a coordinator have been added. The appeal
|
||
process has been clarified. Specific requirements have been
|
||
added for a dialog between the complaining parties before the
|
||
filing of a formal complaint.
|
||
|
||
Mail: Specific procedures are included for private mail,
|
||
echomail, and mail routing.
|
||
|
||
Index: An index has been added to help you find that section that
|
||
you know is there, but can't seem to locate.
|
||
|
||
FidoNews 6-14 Page 2 3 Apr 1989
|
||
|
||
|
||
The full text of the proposal follows:
|
||
|
||
|
||
FidoNet Policy Document Version 4.03
|
||
*** DRAFT *** March 24, 1989
|
||
|
||
|
||
This policy document has been released for comment, and is not
|
||
yet in force. Please direct comments to your Network Coordi-
|
||
nator.
|
||
|
||
|
||
|
||
1 Overview
|
||
|
||
|
||
1.0 Language
|
||
|
||
The official language of FidoNet is English. All documents
|
||
must exist in English. Translation into other languages is
|
||
encouraged.
|
||
|
||
|
||
1.1 Introduction
|
||
|
||
FidoNet is an amateur electronic mail system. As such, all of
|
||
its participants and operators are unpaid volunteers. From
|
||
its early beginning as a few friends swapping messages back
|
||
and forth (1984), it now (1989) includes over 5,000 systems on
|
||
six continents.
|
||
|
||
FidoNet is not a common carrier or a value-added service
|
||
network and is a public network only in as much as the inde-
|
||
pendent, constituent nodes may individually provide public
|
||
access to the network on their system.
|
||
|
||
FidoNet is large enough that it would quickly fall apart of
|
||
its own weight unless some sort of structure and control were
|
||
imposed on it. Multinet operation provides the structure.
|
||
Decentralized management provides the control. This document
|
||
describes the procedures which have been developed to manage
|
||
the network.
|
||
|
||
|
||
1.2 Organization
|
||
|
||
FidoNet nodes are grouped on several levels.
|
||
|
||
Separate documents may be issued at the zone, region, or net
|
||
level to provide additional detail on local procedures. Ordi-
|
||
narily, these lower-level policies may not contradict this
|
||
policy. However, with the approval of the International
|
||
Coordinator, local policy can be used to implement differences
|
||
required due to local requirements. The Zone Coordinator
|
||
Council may reverse the decision of the International Coordi-
|
||
nator. These local policies may not place additional restric-
|
||
FidoNews 6-14 Page 3 3 Apr 1989
|
||
|
||
|
||
tions on members of FidoNet beyond those included in this
|
||
document, other than enforcement of local mail periods.
|
||
|
||
|
||
1.2.1 Points
|
||
|
||
A point is a FidoNet-compatible system that is not in the
|
||
nodelist, but communicates with FidoNet through a node re-
|
||
ferred to as a bossnode. A point is generally regarded in the
|
||
same manner as a user, for example, the bossnode is responsi-
|
||
ble for mail from the point. (See section 2.1.3.) Points are
|
||
addressed by using the bossnode's nodelist address; for exam-
|
||
ple, a point system with a bossnode of 114/15 might be known
|
||
as 114/15.12. Mail destined for the point is sent to the
|
||
bossnode, which then routes it to the point.
|
||
|
||
In supporting points, the bossnode makes use of a private net
|
||
number which should not be visible outside of the bossnode-
|
||
point relationship except as the first entry in the ^aPATH
|
||
line. Unfortunately, should the point call another system
|
||
directly (to do a file request, for example), the private
|
||
network number will appear as the caller's address. In this
|
||
way, points are different from users, since they operate
|
||
FidoNet-compatible mailers which are capable of contacting
|
||
systems other than the bossnode.
|
||
|
||
1.2.2 Nodes
|
||
|
||
A node is a single FidoNet address, and is the smallest offi-
|
||
cial unit of FidoNet.
|
||
|
||
|
||
1.2.3 Networks
|
||
|
||
A network is a collection of nodes in a local geographic area.
|
||
Networks coordinate their mail activity to decrease cost.
|
||
|
||
1.2.3 Regions
|
||
|
||
A region is a well-defined geographic area containing nodes
|
||
which may or may not be combined into networks. A typical
|
||
region will contain many nodes in networks, and a few indepen-
|
||
dent nodes which are not a part of any network.
|
||
|
||
1.2.5 Zones
|
||
|
||
A zone is a large geographic area containing many regions,
|
||
covering one or more countries and/or continents.
|
||
|
||
|
||
1.2.6 FidoNet
|
||
|
||
FidoNet indicates the entire amateur mail network as defined
|
||
by the weekly nodelist (see section 1.3.4).
|
||
|
||
|
||
FidoNews 6-14 Page 4 3 Apr 1989
|
||
|
||
|
||
1.3 Definitions
|
||
|
||
1.3.1 FidoNews
|
||
|
||
FidoNews is a weekly newsletter distributed throughout the
|
||
network by the coordinator structure. It is an important
|
||
medium by which FidoNet sysops communicate with each other.
|
||
FidoNews provides a sense of being a community of people with
|
||
common interests. Accordingly, sysops and users are encour-
|
||
aged to contribute to FidoNews. Contributions are submitted
|
||
to node 1/1; a file describing the format to be used is avail-
|
||
able on many systems.
|
||
|
||
|
||
1.3.2 Geography
|
||
|
||
Each level of FidoNet is geographically contained by the level
|
||
immediately above it. A given geographic location is covered
|
||
by one zone and one region within that zone, and is either in
|
||
one network or not in a network. There are never two zones,
|
||
two regions, or two networks which cover the same geographic
|
||
area.
|
||
|
||
If a node is in the area of a network, it should be listed in
|
||
that network, not as an independent in the region. (The
|
||
primary exception to this is a node receiving inordinate
|
||
amounts of host-routed mail; see section 4.2). Network bound-
|
||
aries are based on calling areas as defined by the local
|
||
telephone company. Even in the case of areas where node
|
||
density is so great that more than one network is needed to
|
||
serve one local calling area, a geographic guideline is used
|
||
to decide which nodes belong to what network. Network member-
|
||
ship is based on geographic or other purely technical ratio-
|
||
nale. It is not based on personal or social factors.
|
||
|
||
There are cases in which the local calling areas lead to
|
||
situations where logic dictates that a node physically in one
|
||
FidoNet Region should be assigned to another. In those cases,
|
||
with the agreement of the Regional Coordinators and Zone
|
||
Coordinator involved, exemptions may be granted. Such exemp-
|
||
tions are described in section 5.6.
|
||
|
||
1.3.3 Zone Mail Hour
|
||
|
||
Zone Mail Hour (ZMH) is a defined time during which all nodes
|
||
in a zone are required to be able to accept netmail. Each
|
||
Fidonet zone defines a ZMH and publishes the time of its ZMH
|
||
to all other Fidonet zones. See sections 2.1.8 and 10.2.
|
||
|
||
Zone Mail Hour has previously been referred to as National
|
||
Mail Hour and Network Mail hour. The term Zone Mail Hour is
|
||
more accurate.
|
||
|
||
1.3.4 Nodelist
|
||
|
||
The nodelist is a file updated weekly which contains the ad-
|
||
FidoNews 6-14 Page 5 3 Apr 1989
|
||
|
||
|
||
dresses of all recognized FidoNet nodes. This file is cur-
|
||
rently made available by the Zone Coordinator not later than
|
||
Zone Mail Hour each Saturday, and is available electronically
|
||
for download or file request at no charge. To be included in
|
||
the nodelist, a system must meet the standards defined by this
|
||
document. No other requirements may be imposed.
|
||
|
||
Partial nodelists (single-zone, for example) may be made
|
||
available at different levels in FidoNet. The full list as
|
||
published by the International Coordinator is regarded as the
|
||
official FidoNet nodelist, and is used in circumstances such
|
||
as determination of eligibility for voting. All parts that
|
||
make up the full nodelist are available on each Zone Coordina-
|
||
tor's and each Regional Coordinator's system.
|
||
|
||
|
||
1.3.5 Excessively Annoying Behavior
|
||
|
||
There are references throughout this policy to "excessively
|
||
annoying behavior", especially in section 9 (Resolution of
|
||
Disputes). It is difficult to define this term, as it is
|
||
based upon the judgement of the coordinator structure. Gener-
|
||
ally speaking, annoying behavior irritates, bothers, or causes
|
||
harm to some other person. It is not necessary to break a law
|
||
to be annoying. Refer to section 9 and the case studies
|
||
(section 10.3) for more information.
|
||
|
||
1.4 Administration of FidoNet
|
||
|
||
|
||
FidoNet has a hierarchical structure for administration of the
|
||
network, with the following levels:
|
||
|
||
|
||
1.4.1 International Coordinator
|
||
|
||
The International Coordinator is the "first among equals" Zone
|
||
Coordinator. He coordinates the joint production of the
|
||
master nodelist by his fellow Zone Coordinators.
|
||
|
||
The International Coordinator acts as the chair of the Zone
|
||
Coordinator Council and as the overseer of elections -- ar-
|
||
ranging the announcement of referenda, the collection and
|
||
counting of the ballots, and announcing the results for those
|
||
issues that affect FidoNet as a whole.
|
||
|
||
|
||
1.4.2 Zone Coordinator Council
|
||
|
||
In certain cases, the Zone Coordinators work as a council to
|
||
provide advice to the International Coordinator. The arrange-
|
||
ment is similar to that between a president and advisors. In
|
||
particular, this council considers inter-zonal issues. This
|
||
includes, but is not limited to: working out the details of
|
||
nodelist production, mediating inter-zonal disputes, and such
|
||
issues not addressed at a lower level of FidoNet.
|
||
FidoNews 6-14 Page 6 3 Apr 1989
|
||
|
||
|
||
1.4.3 Zone Coordinator
|
||
|
||
The Zone Coordinator compiles the nodelists from all of the
|
||
regions in the zone, and creates the master nodelist and
|
||
difference file, which is then distributed over FidoNet in the
|
||
zone. A Zone Coordinator does not perform routing services
|
||
for the zone.
|
||
|
||
|
||
1.4.4 Regional Coordinator
|
||
|
||
The Regional Coordinator maintains the list of independent
|
||
nodes in the region and accepts nodelists from the Network
|
||
Coordinators in the region. He compiles these lists to create
|
||
a regional nodelist, which he then sends to the Zone Coordina-
|
||
tor. A Regional Coordinator does not perform routing services
|
||
for any nodes in the region.
|
||
|
||
|
||
1.4.5 Network Coordinator
|
||
|
||
The Network Coordinator is responsible for maintaining the
|
||
list of nodes for the network, and for forwarding netmail sent
|
||
to the network from other FidoNet nodes. The Network Coordi-
|
||
nator may make arrangements to handle outgoing netmail, but is
|
||
not required to do so. The Network Coordinator is not re-
|
||
quired to provide a source for echomail.
|
||
|
||
|
||
1.4.6 Network Routing Hub
|
||
|
||
Network Routing Hubs exist only in some networks. They share
|
||
duties of the Network Coordinator, in order to ease the man-
|
||
agement of a large network. The exact duties and procedures
|
||
are a matter for the Network Coordinator and his hubs to
|
||
arrange, and will not be discussed here, except that a network
|
||
coordinator cannot delegate responsibility to mediate dis-
|
||
putes.
|
||
|
||
|
||
1.4.7 System Operator
|
||
|
||
The system operator (sysop) formulates a policy for running
|
||
his board and dealing with users. The sysop must mesh with
|
||
the rest of the FidoNet system if he is to send and receive
|
||
mail, and the local policy must be consistent with other
|
||
levels of FidoNet.
|
||
|
||
|
||
1.4.8 User
|
||
|
||
The sysop is responsible for the actions of any user when they
|
||
affect the rest of FidoNet. (If a user is annoying, the sysop
|
||
is annoying.) Any traffic entering FidoNet via a given node,
|
||
if not from the sysop, is considered to be from a user, and is
|
||
the responsibility of the sysop. This includes messages from
|
||
FidoNews 6-14 Page 7 3 Apr 1989
|
||
|
||
|
||
point systems.
|
||
|
||
|
||
1.4.9 Summary
|
||
|
||
These levels act to distribute the administration and control
|
||
of FidoNet to the lowest possible level, while still allowing
|
||
for coordinated action over the entire mail system. Adminis-
|
||
tration is made possible by operating in a top-down manner.
|
||
That is, a person at any given level is responsible to the
|
||
level above, and responsible for the level below.
|
||
|
||
For example, a Regional Coordinator is responsible to the Zone
|
||
Coordinator for anything that happens in the region. From the
|
||
point of view of the Zone Coordinator, the Regional Coordina-
|
||
tor is completely responsible for the smooth operation of the
|
||
region. Likewise, from the point of view of the Regional
|
||
Coordinator, the Network Coordinator is completely responsible
|
||
for the smooth operation of the network.
|
||
|
||
If a person at any level above sysop is unable to properly
|
||
perform their duties, the person at the next level may replace
|
||
them. For example, if a Regional Coordinator fails to per-
|
||
form, the Zone Coordinator can replace him.
|
||
|
||
The exceptions to this top down organization are the Zone and
|
||
International Coordinators. See sections 6.2 and 7.2.
|
||
|
||
|
||
2 Sysop Procedures
|
||
|
||
2.1 General
|
||
|
||
2.1.1 The Basics
|
||
|
||
The sysop of an individual node can generally do as he
|
||
pleases, as long as he observes the mail events, is not exces-
|
||
sively annoying to other nodes on FidoNet, and does not pro-
|
||
mote or participate in the distribution of pirated copyrighted
|
||
software or other illegal behavior via FidoNet.
|
||
|
||
|
||
2.1.2 Familiarity with Policy
|
||
|
||
In order to understand the meaning of "excessively annoying",
|
||
it is incumbent upon all sysops to occasionally re-read Fido-
|
||
Net policy. New sysops must familiarize themselves with
|
||
policy before requesting a node number.
|
||
|
||
|
||
2.1.3 Responsible for All Traffic Entering FidoNet Via His
|
||
Node
|
||
|
||
A Sysop is responsible for all traffic entering FidoNet via
|
||
his system. This includes (but is not limited to) traffic
|
||
entered by his users, points, and any other networks for which
|
||
FidoNews 6-14 Page 8 3 Apr 1989
|
||
|
||
|
||
he might act as a gateway. If a sysop allows "outside" mes-
|
||
sages to enter FidoNet via his system, he has a responsibility
|
||
to ensure his system is clearly identified by FidoNet node
|
||
number as the point of origin of that message, and a responsi-
|
||
bility to act as a gateway in the reverse direction. Should
|
||
such traffic result in a violation of Policy, the sysop must
|
||
rectify the situation.
|
||
|
||
|
||
2.1.4 Encryption and Review of Mail
|
||
|
||
FidoNet is an amateur system. Our technology is such that the
|
||
privacy of messages cannot be guaranteed. Any sysop has the
|
||
right to review traffic flowing through his system, if for no
|
||
other reason than to ensure that the system is not being used
|
||
for illegal purposes. Encryption obviously makes this review
|
||
impossible. Therefore, encrypted and/or commercial traffic
|
||
that is routed without the express permission of all the links
|
||
in the delivery system constitutes annoying behavior.
|
||
|
||
|
||
2.1.5 No Alteration of Routed Mail
|
||
|
||
A sysop may not modify, other than as required for routing or
|
||
other technical purposes, any message, netmail or echomail,
|
||
passing through the system from one FidoNet node to another.
|
||
If a sysop is offended by the content of a message, he must
|
||
follow the procedure described in section 2.1.7.
|
||
|
||
|
||
2.1.6 Private Netmail
|
||
|
||
The word "private" should be used with great care, especially
|
||
with users of a BBS. Some countries have laws which deal with
|
||
"private mail", and it should be made clear that the word
|
||
"private" does not imply that no person other than the recipi-
|
||
ent can read messages. Sysops who cannot provide this dis-
|
||
tinction should consider not offering users the option of
|
||
"private mail".
|
||
|
||
If a user sends a "private message", the user has no control
|
||
over the number of intermediate systems through which that
|
||
message is routed. A sysop who sends a message to another
|
||
sysop can control this aspect by sending the message direct to
|
||
the recipient's system, thus guaranteeing that only the recip-
|
||
ient or another individual to whom that sysop has given autho-
|
||
rization can read the message. Thus, a sysop may have differ-
|
||
ent expectations than a casual user.
|
||
|
||
2.1.6.1 No Disclosure of in-transit mail
|
||
|
||
Disclosing or in any way using information contained in pri-
|
||
vate netmail traffic not addressed to you or written by you is
|
||
considered annoying behavior, regardless of how you come upon
|
||
that traffic. This does not apply to echomail which is by
|
||
definition a broadcast medium, and where private mail is often
|
||
FidoNews 6-14 Page 9 3 Apr 1989
|
||
|
||
|
||
used to keep a sysop-only area restricted.
|
||
|
||
2.1.6.2 Private mail addressed to you
|
||
|
||
The issue of private mail which is addressed to you is more
|
||
difficult than the in-transit question treated in the previous
|
||
section. A common legal opinion holds that when you receive a
|
||
message it becomes your property and you have a legal right to
|
||
do with it what you wish. Your legal right does not excuse
|
||
you from annoying others.
|
||
|
||
In general, sensitive material should not be sent using Fido-
|
||
Net. This ideal is often compromised, as FidoNet is our
|
||
primary mode of communication. In general, if the sender of a
|
||
message specifically requests in the text of the message that
|
||
the contents be kept confidential, release of the message into
|
||
a public forum may be considered annoying.
|
||
|
||
There are exceptions. If someone is saying one thing in
|
||
public and saying the opposite in private mail, the recipient
|
||
of the private mail should not be subjected to harassment
|
||
simply because the sender requests that the message not be
|
||
released. Judgement and common sense should be used in this
|
||
area as in all other aspects of FidoNet behavior.
|
||
|
||
2.1.7 Not Routing Mail
|
||
|
||
A sysop is not required to route traffic if he has not agreed
|
||
to do so. He is not obligated to route traffic for all if he
|
||
routes it for any, unless he holds a Network Coordinator or
|
||
Hub Coordinator position. Routing traffic through a node not
|
||
obligated to perform routing without the permission of that
|
||
node may be annoying behavior. This includes unsolicited
|
||
echomail.
|
||
|
||
If a sysop does not forward a message when he had previously
|
||
agreed to perform such routing, the message must be returned
|
||
to the sysop of the node at which it entered FidoNet with an
|
||
explanation of why it was not forwarded. (It is not necessary
|
||
to return messages which are addressed to a node which is not
|
||
in the current nodelist.) Intentionally stopping an in-tran-
|
||
sit message without following this procedure constitutes
|
||
annoying behavior. In the case of a failure to forward traf-
|
||
fic due to some technical problem, it does not become annoying
|
||
unless it persists after being pointed out to the sysop.
|
||
|
||
|
||
2.1.8 Exclusivity of Zone Mail Hour
|
||
|
||
Zone Mail Hour is the heart of FidoNet, as this is when net-
|
||
work mail is passed between systems. Any system which wishes
|
||
to be a part of FidoNet must be able to receive mail from any
|
||
node in the nodelist during this time. This time is exclu-
|
||
sively reserved for netmail. Many phone systems charge on a
|
||
per-call basis, regardless of whether a connect, no connect,
|
||
or busy signal is encountered. For this reason, any activity
|
||
FidoNews 6-14 Page 10 3 Apr 1989
|
||
|
||
|
||
other than normal network mail processing that ties up a
|
||
system during ZMH is considered annoying behavior. Echomail
|
||
should not be transferred during ZMH. User (BBS) access to a
|
||
system is prohibited during ZMH.
|
||
|
||
A system which is a member of a local network may also be re-
|
||
quired to observe additional mail events, as defined by the
|
||
Network Coordinator. Access restrictions during local network
|
||
periods are left to the discretion of the Network Coordinator.
|
||
|
||
|
||
2.1.9 Private Nodes
|
||
|
||
The rare exception to ZMH compliance is Private Nodes. Per-
|
||
sons requesting private nodes should be supported as points if
|
||
possible. A private listing is justified when the system must
|
||
interface with many others, such as an echomail distributor.
|
||
In these cases, the exact manner and timing of mail delivery
|
||
is arranged between the private node and other systems. Such
|
||
an agreement between a private system and a hub is not binding
|
||
on any replacement for that hub. A private node must be a
|
||
part of a network (they cannot be independents in the region.)
|
||
Private nodes are encouraged to honor ZMH.
|
||
|
||
|
||
2.1.10 Observing Mail Events
|
||
|
||
Failure to observe the proper mail events is grounds for any
|
||
node to be dropped from FidoNet without notice (since notice
|
||
is generally given by netmail).
|
||
|
||
|
||
2.1.11 Use of Current Nodelist
|
||
|
||
Network mail systems generally operate unattended, and place
|
||
calls at odd hours of the night. If a system tries to call an
|
||
incorrect or out-of-date number, it could cause some poor
|
||
citizen's phone to ring in the wee hours of the morning, much
|
||
to the annoyance of innocent bystanders and civil authorities.
|
||
For this reason, a sysop who sends mail is obligated to obtain
|
||
and use the most recent edition of the nodelist as is practi-
|
||
cal.
|
||
|
||
|
||
2.1.12 Excommunication
|
||
|
||
A system which has been dropped from the network is said to be
|
||
excommunicated (i.e. denied communication). If you find that
|
||
you have been excommunicated without warning, your coordinator
|
||
was unable to contact you. You should rectify the problem and
|
||
contact your coordinator.
|
||
|
||
Systems may also be dropped from the nodelist for cause. See
|
||
section 9, and sections 4.3 and 5.2.
|
||
|
||
It is considered annoying behavior to assist a system which
|
||
FidoNews 6-14 Page 11 3 Apr 1989
|
||
|
||
|
||
was excommunicated in circumventing that removal from the
|
||
nodelist. For example, if you decide to provide an echomail
|
||
feed to your friend who has been excommunicated, it is likely
|
||
that your listing will also be removed.
|
||
|
||
|
||
2.1.13 Timing of Zone Mail Hour
|
||
|
||
The exact timing of Zone Mail Hour for each zone is set by the
|
||
Zone Coordinator. See section 10.2.
|
||
|
||
|
||
2.1.14 Non-observance of Daylight Savings Time
|
||
|
||
FidoNet does not observe daylight savings time. In areas
|
||
which observe daylight savings time the FidoNet mail schedules
|
||
must be adjusted in the same direction as the clock change.
|
||
Alternatively, you can simply leave your system on standard
|
||
time.
|
||
|
||
|
||
2.2 How to obtain a node number
|
||
|
||
|
||
You must first obtain a current nodelist so that you can send
|
||
mail. You do not need a node number to send mail, but you
|
||
must have one in order for others to send mail to you.
|
||
|
||
The first step in obtaining a current nodelist is to locate a
|
||
FidoNet bulletin board. Most bulletin board lists include at
|
||
least a few FidoNet systems, and usually identify them as
|
||
such. Use a local source to obtain documents because many
|
||
networks have detailed information available which explains
|
||
the coverage area of the network and any special requirements
|
||
or procedures.
|
||
|
||
Once you have a nodelist, you must determine which network or
|
||
region covers your area. Regions are numbered 1-99; network
|
||
numbers are greater than 99. Networks are more restricted in
|
||
area than regions, but are preferred since they improve the
|
||
flow of mail and provide more services to their members. If
|
||
you cannot find a network which covers your area, then pick
|
||
the region which does.
|
||
|
||
Once you have located the network or region in your area, send
|
||
a message containing a request for a node number to node zero
|
||
of that network or region. The request must be sent by net-
|
||
mail, use address -1/-1, and include the following:
|
||
|
||
1) Your name.
|
||
2) The name of your system.
|
||
3) The city and state where your system is located.
|
||
4) The phone number to be used when calling your system.
|
||
5) Your hours of operation, netmail and BBS.
|
||
6) The maximum baud rate you can support.
|
||
|
||
FidoNews 6-14 Page 12 3 Apr 1989
|
||
|
||
|
||
You must indicate that you have read, and agree to abide by,
|
||
this document and all the current and future policies of Fido-
|
||
Net.
|
||
|
||
Using a node number other than -1/-1 can cause problems for
|
||
the coordinator involved. Simply assigning yourself a
|
||
net/node number can be annoying, and can be grounds to reject
|
||
your request.
|
||
|
||
Your coordinator may want additional information. If so, he
|
||
will contact you.
|
||
|
||
Please allow at least two weeks for a node number request to
|
||
be processed. If you send your request to a Regional Coordi-
|
||
nator, he may forward it to the appropriate Network Coordina-
|
||
tor.
|
||
|
||
|
||
2.3 If You are Going Down
|
||
|
||
If your node will be down for an extended period (more than a
|
||
day or two), inform your coordinator as soon as possible. If
|
||
you do not do this, other systems will try to reach you while
|
||
you are down, much to their annoyance. Never put an answering
|
||
machine or similar device on your phone line while you are
|
||
down. If you do, calling systems will get the machine repeat-
|
||
edly, racking up large phone bills, which is very annoying.
|
||
|
||
If you will be leaving your system unattended for an extended
|
||
period of time (such as while you are on vacation), you should
|
||
notify your coordinator. Systems have a tendency to "crash"
|
||
now and then, so you will probably want your coordinator to
|
||
know that it is a temporary condition if it happens while you
|
||
are away.
|
||
|
||
|
||
2.4 How to Form a Network
|
||
|
||
If there are several nodes in your area, but no network, a new
|
||
network can be formed. This has advantages to both you and to
|
||
the rest of FidoNet. You receive better availability of
|
||
nodelist difference files and FidoNews, and everyone else can
|
||
take advantage of host-routing netmail to the new network.
|
||
|
||
The first step is to contact the other sysops in your area.
|
||
You must decide which nodes will comprise the network, and
|
||
which of those nodes you would like to be the Network Coordi-
|
||
nator. Then consult your Regional Coordinator. You must send
|
||
the following information:
|
||
|
||
1) The region number(s), or network number(s) if a net-
|
||
work is splitting up, that are affected by the formation
|
||
of your network. The Regional Coordinator will inform
|
||
the Zone Coordinator and the coordinators of any affected
|
||
networks that a new network is in formation.
|
||
|
||
FidoNews 6-14 Page 13 3 Apr 1989
|
||
|
||
|
||
2) A copy of the proposed network's nodelist segment.
|
||
This file should be attached to the message of applica-
|
||
tion for a network number, and should use the nodelist
|
||
format described in the current version of the appro-
|
||
priate FTSC publication. Please elect a name that re-
|
||
lates to your grouping, for example SoCalNet for nodes in
|
||
the Southern California Area and MassNet West for the
|
||
Western Massachusetts Area. Remember if you call your-
|
||
self DOGNET it doesn't identify your area.
|
||
|
||
Granting a network number is not automatic. Even if the
|
||
request is granted, the network might not be structured exact-
|
||
ly as you request. Your Regional Coordinator will review your
|
||
application and inform you of the decision.
|
||
|
||
Do not send a network number request to the Zone Coordinator.
|
||
All network number requests must be processed by the Regional
|
||
Coordinator.
|
||
|
||
|
||
|
||
3 General Procedures for All Coordinators
|
||
|
||
3.1 Make Available Nodelists, Difference Files, and FidoNews
|
||
|
||
Any Coordinator is responsible for obtaining and making avail-
|
||
able, on a weekly basis, nodelist difference files and Fido-
|
||
News.
|
||
|
||
|
||
3.2 Processing Nodelist Changes and Passing Them Upstream
|
||
|
||
Each coordinator is responsible for obtaining nodelist infor-
|
||
mation from the level below, processing it, and passing the
|
||
results to the level above. The timing of this process is
|
||
determined by the requirements imposed by the level above.
|
||
|
||
|
||
3.3 Ensure the Latest Policy is Available
|
||
|
||
A Coordinator is responsible to make the current version of
|
||
this document available to the level below, and to encourage
|
||
familiarity with it.
|
||
|
||
In addition, a coordinator is required to forward any local
|
||
policies he receives to the level above, and to review such
|
||
policies. Although not required, common courtesy dictates
|
||
that when formulating a local policy, the participation of the
|
||
level above should be solicited.
|
||
|
||
|
||
3.4 Minimize the Number of Hats Worn
|
||
|
||
Coordinators are encouraged to limit the number of FidoNet
|
||
functions they perform. In particular, a coordinator's system
|
||
should be readily available to the levels immediately above
|
||
FidoNews 6-14 Page 14 3 Apr 1989
|
||
|
||
|
||
and below, and a coordinator should not rule on the appeal of
|
||
his own decision.
|
||
|
||
Coordinators are discouraged from acting as echomail and soft-
|
||
ware-distribution hubs. If they do so, they should handle
|
||
echomail (or other volume distribution) on a system other than
|
||
the administrative system.
|
||
|
||
Another reason to discourage multiple hats is the difficulty
|
||
of replacing services if someone leaves the network. For
|
||
example, if a coordinator is the echomail hub and the soft-
|
||
ware-distribution hub, those services will be difficult to
|
||
restore when he resigns.
|
||
|
||
3.5 Be a Member of the Area Administered
|
||
|
||
A coordinator must be a member of the area administered. That
|
||
is, a Network Coordinator must be a member of that network by
|
||
virtue of geography. A Regional Coordinator must be either a
|
||
member of a network in his region, or an independent of the
|
||
region.
|
||
|
||
|
||
3.6 Encourage New Sysops to Enter FidoNet
|
||
|
||
A coordinator is encouraged to operate a public bulletin board
|
||
system which is freely available for the purpose of distribut-
|
||
ing Policy, FidoNews, and Nodelists to potential new sysops.
|
||
Dissemination of this information to persons who are potential
|
||
FidoNet sysops is important to the growth of FidoNet, and
|
||
coordinators should encourage development of new systems.
|
||
|
||
|
||
3.7 Tradition and Precedent
|
||
|
||
A coordinator is not bound by the practices of his predecessor
|
||
or peers beyond the scope of this document.
|
||
|
||
In addition, a new coordinator has the right to review any
|
||
decision made by his predecessors for compliance with Policy,
|
||
and take whatever actions may be necessary to rectify any
|
||
situations not in compliance.
|
||
|
||
|
||
3.8 Technical Management
|
||
|
||
The primary responsibility of any coordinator is technical
|
||
management of network operations. Decisions must be made on
|
||
technical grounds.
|
||
|
||
|
||
|
||
4 Network Coordinator Procedures
|
||
|
||
4.1 Responsibilities
|
||
|
||
FidoNews 6-14 Page 15 3 Apr 1989
|
||
|
||
|
||
A Network Coordinator has the following responsibilities:
|
||
|
||
1) To receive incoming mail for nodes in his network, and
|
||
arrange delivery to its recipients.
|
||
|
||
2) To assign node numbers to nodes in his network.
|
||
|
||
3) To maintain the nodelist for his network, and to send
|
||
a copy of it to his Regional Coordinator whenever it
|
||
changes.
|
||
|
||
4) To make available to his nodes new nodelist difference
|
||
files, new issues of FidoNews, and new revisions of
|
||
Network Policy Documents as they are received, and to
|
||
periodically check to insure that his nodes use up to
|
||
date nodelists.
|
||
|
||
|
||
4.2 Routing Inbound Mail
|
||
|
||
It is your responsibility as Network Coordinator to coordinate
|
||
the receipt and forwarding of host-routed inbound netmail for
|
||
nodes in your network. The best way to accomplish this is
|
||
left to your discretion.
|
||
|
||
If a node in your network is receiving large volumes of mail
|
||
you can request that he cease and desist routing these vol-
|
||
umes. If he refuses to do so, then you can request your
|
||
Regional Coordinator to assign the node a number as an inde-
|
||
pendent and drop him from your network.
|
||
|
||
Occasionally a node will make a "bombing run" (sending one
|
||
message to a great many nodes). If a node in another network
|
||
is making bombing runs on your nodes and routing them through
|
||
your inbound host, then you can complain to the network coor-
|
||
dinator of the offending node. (If the node is an indepen-
|
||
dent, complain to the regional coordinator.) Bombing runs are
|
||
considered to be annoying.
|
||
|
||
Another source of routing overload is echomail. Echomail
|
||
cannot be allowed to degrade the ability of FidoNet to handle
|
||
normal message traffic. If a node in your network is routing
|
||
large volumes of echomail, you can ask him to either limit the
|
||
amount of echomail or to stop routing his echomail.
|
||
|
||
You are not required to forward encrypted, commercial, or
|
||
illegal mail. However, you must follow the procedures de-
|
||
scribed in section 2.1.7 if you do not forward the mail.
|
||
|
||
|
||
4.3 Assigning Node Numbers
|
||
|
||
It is your responsibility to assign node numbers to new nodes
|
||
in your network. You may also change the numbers of existing
|
||
nodes in your network, though you should check with your
|
||
member nodes before doing so. You may assign any numbers you
|
||
FidoNews 6-14 Page 16 3 Apr 1989
|
||
|
||
|
||
wish, so long as each node has a unique number within your
|
||
network.
|
||
|
||
You must not assign a node number to any system until you have
|
||
received a formal request from that system by FidoNet mail.
|
||
This will ensure that the system is minimally operational.
|
||
The strict maintenance of this policy has been one of the
|
||
great strengths of FidoNet.
|
||
|
||
It is also recommended, though not required, that you call a
|
||
board which is applying for a node number before assigning it
|
||
a node number.
|
||
|
||
You may not assign a node number to a node in an area covered
|
||
by an existing network. Further, if you have nodes in an area
|
||
covered by a network in formation, those nodes must be trans-
|
||
ferred to the new network.
|
||
|
||
You should use network mail to inform a new node of his node
|
||
number, as this helps to insure that he is capable of receiv-
|
||
ing network mail.
|
||
|
||
If a node in your network is acting in a sufficiently annoying
|
||
manner, then you can take whatever action you deem fit, ac-
|
||
cording to the circumstances of the case.
|
||
|
||
|
||
4.4 Maintaining the Nodelist
|
||
|
||
|
||
You should to implement name changes, phone number changes,
|
||
and so forth in your segment of the nodelist as soon as possi-
|
||
ble after the information is received from the affected node.
|
||
You should also on occasion send a message to every node in
|
||
your network to ensure that they are operational. If a node
|
||
turns out to be "off the air" with no prior warning, you can
|
||
either mark the node down or remove it from the nodelist.
|
||
(Nodes are to marked DOWN for a maximum of two weeks, after
|
||
which the line should be removed from the nodelist.)
|
||
|
||
At your discretion, you may distribute a portion of this work-
|
||
load to routing hubs. In this case, you should receive the
|
||
nodelists from the Hub Coordinators within your network. You
|
||
will need to maintain a set of nodelists for each hub within
|
||
your network, since you cannot count on getting an update from
|
||
each Hub Coordinator every week. You should assemble a master
|
||
nodelist for your network every week and send it to your
|
||
Regional Coordinator by the day and time he designates. It is
|
||
suggested that you do this as late as is practical, so as to
|
||
accommodate any late changes, balanced with the risk of miss-
|
||
ing the connection with your Regional Coordinator and thus
|
||
losing a week.
|
||
|
||
4.5 Making Available Policies, Nodelists and FidoNews
|
||
|
||
As a Network Coordinator you should obtain a new issue of
|
||
FidoNews 6-14 Page 17 3 Apr 1989
|
||
|
||
|
||
FidoNews and a new nodelist difference file every week from
|
||
your Regional Coordinator. The nodelist difference file is
|
||
currently made available each Saturday, and FidoNews is pub-
|
||
lished each Monday. You must make these files available to
|
||
all nodes in the network, and you are encouraged to make them
|
||
available to the general public for download.
|
||
|
||
You should also obtain the most recent versions of the Policy
|
||
documents that bind the members of your network, and make
|
||
those available to the nodes in your network. Policies are
|
||
released at sporadic intervals, so you should also inform the
|
||
nodes in your network when such events occur, and ensure the
|
||
nodes are generally familiar with the changes.
|
||
|
||
Policy, FidoNews, and the nodelist are the glue that holds us
|
||
together. Without them, we would cease to be a community, and
|
||
become just another random collection of bulletin boards.
|
||
|
||
|
||
|
||
5 Regional Coordinator Procedures
|
||
|
||
5.1 Responsibilities
|
||
|
||
A Regional Coordinator has the following responsibilities:
|
||
|
||
1) To assign node numbers to independent nodes in the
|
||
region.
|
||
|
||
2) To encourage independent nodes in the region to join
|
||
existing networks, or to form new networks.
|
||
|
||
3) To assign network numbers to networks in the region
|
||
and define their boundaries.
|
||
|
||
4) To compile a nodelist of all of the networks and
|
||
independents in the region, and to send a copy of it to
|
||
the Zone Coordinator whenever it changes.
|
||
|
||
5) To ensure the smooth operation of networks within the
|
||
region.
|
||
|
||
6) To make new nodelist difference files, Policies, and
|
||
issues of FidoNews available to the Network Coordinators
|
||
in the region as soon as is practical.
|
||
|
||
|
||
5.2 Assigning Node Numbers
|
||
|
||
It is your responsibility to assign node numbers to indepen-
|
||
dent nodes in your region. You may also change the numbers of
|
||
existing nodes in your region, though you should check with
|
||
the respective nodes before doing so. You may assign any
|
||
numbers you wish, so long as each node has a unique number
|
||
within your region.
|
||
|
||
FidoNews 6-14 Page 18 3 Apr 1989
|
||
|
||
|
||
You should not assign a node number to any system until you
|
||
have received a formal request from that system by FidoNet
|
||
mail. This will ensure that the system is minimally opera-
|
||
tional. The strict maintenance of this policy has been one of
|
||
the great strengths of FidoNet.
|
||
|
||
It is also recommended, though not required, that you call a
|
||
board which is applying for a node number before assigning it
|
||
a node number.
|
||
|
||
You should use network mail to inform a new node of his node
|
||
number, as this helps to insure that he is capable of receiv-
|
||
ing network mail.
|
||
|
||
If a node in your region is acting in a sufficiently annoying
|
||
manner, then you can take whatever action you deem fit, ac-
|
||
cording to the circumstances of the case.
|
||
|
||
If you receive a node number request from outside your region,
|
||
you must forward it to the most local coordinator for the
|
||
requestor as you can determine. If you receive a node number
|
||
request from a new node that is in an area covered by an
|
||
existing network, then you must forward the request to the
|
||
Coordinator of that network instead of assigning a number
|
||
yourself.
|
||
|
||
If a network forms in an area for which you have independent
|
||
nodes, those nodes will be transferred to the local network as
|
||
soon as is practical.
|
||
|
||
|
||
5.3 Encouraging the Formation and Growth of Networks
|
||
|
||
One of your main duties as a Regional Coordinator is to pro-
|
||
mote the growth of networks in your region.
|
||
|
||
You should avoid having independent nodes in your region which
|
||
are within the coverage area of a network. There are, howev-
|
||
er, certain cases where a node should not be a member of a
|
||
network, such as a system with a large amount of inbound
|
||
netmail; see section 4.2.
|
||
|
||
If several independent nodes in your region are in a local
|
||
area you should encourage them to form a network, and if
|
||
necessary you may require them to form a network. Refer to
|
||
section 2.4. Note that this is not intended to encourage the
|
||
formation of trivial networks. Obviously, one node does not
|
||
make a network. The exact number of nodes required for an
|
||
effective network must be judged according to the circumstan-
|
||
ces of the situation, and is left to your discretion.
|
||
|
||
|
||
5.4 Assigning Network Numbers
|
||
|
||
It is your responsibility to assign network numbers to new
|
||
networks forming within your region. You are assigned a pool
|
||
FidoNews 6-14 Page 19 3 Apr 1989
|
||
|
||
|
||
of network numbers to use for this purpose by your Zone Coor-
|
||
dinator. As a part of this function, it is the responsibility
|
||
of the Regional Coordinator to define the boundaries of the
|
||
networks in the region.
|
||
|
||
|
||
5.5 Maintaining the Nodelist
|
||
|
||
As a Regional Coordinator, you have a dual role in maintaining
|
||
the nodelist for your region.
|
||
|
||
First, you must maintain the list of independent nodes in your
|
||
region. You should attempt to implement name changes, phone
|
||
number changes, and so forth in this nodelist as soon as
|
||
possible. You should also on occasion send a message to every
|
||
independent node in your region to ensure that they are opera-
|
||
tional. If a node turns out to be "off the air" with no prior
|
||
warning, you can either mark the node down or remove it from
|
||
the nodelist. (Nodes are to marked DOWN for a maximum of two
|
||
weeks, after which the line should be removed from the node-
|
||
list.)
|
||
|
||
Second, you must receive the nodelists from the Network Coor-
|
||
dinators within your region. You will need to maintain a set
|
||
of nodelists for each network within your region, since you
|
||
cannot count on getting an update from each Network Coordina-
|
||
tor every week. You should assemble a master nodelist for
|
||
your region every week and send it to your Zone Coordinator by
|
||
the day and time he designates. It is suggested that you do
|
||
this as late as practical, so as to accommodate late changes,
|
||
balanced with the risk of missing the connection with your
|
||
Zone Coordinator and thus losing a week.
|
||
|
||
|
||
5.6 Geographic Exemptions
|
||
|
||
There are cases where local calling geography does not follow
|
||
FidoNet regions. In exceptional cases, exemptions to normal
|
||
geographic guidelines are agreed upon by the Regional Coordi-
|
||
nators and Zone Coordinator involved. Such an exemption is
|
||
not a right, and is not permanent. When a network is formed
|
||
in the proper region that would provide local calling access
|
||
to the exempted node, it is no longer exempt. An exemption
|
||
may be reviewed and revoked at any time by any of the coordi-
|
||
nators involved.
|
||
|
||
|
||
5.7 Overseeing Network Operations
|
||
|
||
It is your responsibility as Regional Coordinator to ensure
|
||
that the networks within your region are operating in an ac-
|
||
ceptable manner. This does not mean that you are required to
|
||
operate those networks; that is the responsibility of the
|
||
Network Coordinators. It means that you are responsible for
|
||
assuring that the Network Coordinators within your region are
|
||
acting responsibly.
|
||
FidoNews 6-14 Page 20 3 Apr 1989
|
||
|
||
|
||
If you find that a Network Coordinator within your region is
|
||
not properly performing his duties (as outlined in Section 4),
|
||
then you should take whatever action you deem necessary to
|
||
correct the situation.
|
||
|
||
If a network grows so large that it cannot reasonably accommo-
|
||
date traffic flow during the Zone Mail Hour, the Regional
|
||
Coordinator can direct the creation of one or more new net-
|
||
works from that network. These new networks, although they
|
||
may be within a single local-calling area, must still conform
|
||
to a geographical basis for determining membership.
|
||
|
||
It is your obligation as Regional Coordinator to maintain
|
||
direct and reasonably frequent contact with the networks in
|
||
your region. The exact method of accomplishing this is left to
|
||
your discretion.
|
||
|
||
|
||
5.8 Making Available Nodelists, Policies, and FidoNews
|
||
|
||
As a Regional Coordinator, it is your responsibility to obtain
|
||
the latest nodelist difference file, network policies, and the
|
||
latest issues of FidoNews as they are published, and to make
|
||
them available to the Network Coordinators within your region.
|
||
The nodelist is posted weekly on Saturday by the Zone Coordi-
|
||
nator, and FidoNews is published weekly on Monday by node 1/1.
|
||
Contact them for more details on how to obtain the latest
|
||
copies each week.
|
||
|
||
It is your responsibility to make these available to all Net-
|
||
work Coordinators in your region as soon as is practical
|
||
after you receive them. The method of distribution is left to
|
||
your discretion. You are not required to distribute them to
|
||
any independent nodes in your region, though you may if you
|
||
wish. You are encouraged to make all these documents avail-
|
||
able for downloading by the general public.
|
||
|
||
|
||
|
||
6 Zone Coordinator Procedures
|
||
|
||
6.1 General
|
||
|
||
A Zone Coordinator for FidoNet has the primary task of main-
|
||
taining the nodelist for his Zone, sharing it with the other
|
||
Zone Coordinators, and ensuring the distribution of the master
|
||
nodelist (or difference file) to the Regions in his Zone. He
|
||
is also responsible for coordinating the distribution of
|
||
Network Policy documents and FidoNews to the Regional Coordi-
|
||
nators in his zone.
|
||
|
||
The Zone Coordinator is responsible for the maintenance of the
|
||
nodelist for his administrative region. The Administrative
|
||
Region has the same number as his zone, and consists of nodes
|
||
assigned for administrative purposes not related to the send-
|
||
ing and receiving of normal network mail.
|
||
FidoNews 6-14 Page 21 3 Apr 1989
|
||
|
||
|
||
A Zone Coordinator is charged with the task of ensuring the
|
||
smooth operation of his Zone. He does this by supervising the
|
||
Regional Coordinators.
|
||
|
||
If a Zone Coordinator determines that a Regional Coordinator
|
||
is not properly performing his duties (as outlined in section
|
||
5), he should seek a replacement for that Regional Coordina-
|
||
tor, or take other action as he sees fit.
|
||
|
||
The Zone Coordinator defines the geographic boundaries of the
|
||
regions within his zone and sets the time for the Zone Mail
|
||
Hour.
|
||
|
||
The Zone Coordinator is responsible for reviewing and approv-
|
||
ing any geographic exemptions as described elsewhere in this
|
||
document.
|
||
|
||
The Zone Coordinator is responsible for insuring the smooth
|
||
operation of gates between his zone and all other zones for
|
||
the transfer of interzonal mail.
|
||
|
||
The Zone Coordinators are responsible for the selection of the
|
||
International Coordinator from among their ranks.
|
||
|
||
|
||
6.2 Selection
|
||
|
||
The Zone Coordinator is selected by an absolute majority vote
|
||
of the Regional Coordinators within his zone.
|
||
|
||
|
||
7 International Coordinator Procedures
|
||
|
||
7.1 General
|
||
|
||
The International Coordinator is the "first among equals" Zone
|
||
Coordinator.
|
||
|
||
The International Coordinator has the primary task of coordi-
|
||
nating the creation of the master nodelist by managing the
|
||
distribution between the Zones of the Zone nodelists. The
|
||
International Coordinator is responsible for definition of new
|
||
zones and for negotiation of agreements for communication with
|
||
other networks. ("Other network" in this context means other
|
||
networks with which FidoNet communicates as peer-to-peer, not
|
||
"network" in the sense of the FidoNet organizational level.)
|
||
|
||
The International Coordinator is also responsible for coordi-
|
||
nating the distribution of Network Policies and FidoNews to
|
||
the Zone Coordinators.
|
||
|
||
The International Coordinator is responsible for coordinating
|
||
the activities of the Zone Coordinator Council. The Interna-
|
||
tional Coordinator acts as the spokesman for the Zone Coordi-
|
||
nator Council.
|
||
|
||
FidoNews 6-14 Page 22 3 Apr 1989
|
||
|
||
|
||
In cases not specifically covered by this document, the Inter-
|
||
national Coordinator may issue specific interpretations or
|
||
extensions to this policy. The Zone Coordinator Council may
|
||
reverse such rulings by a majority vote.
|
||
|
||
7.2 Selection
|
||
|
||
The International Coordinator is selected (or removed) by an
|
||
absolute majority vote of the Zone Coordinators.
|
||
|
||
|
||
8 Referenda
|
||
|
||
The procedures described in this section are used to ratify a
|
||
new version of FidoNet policy, which is the mechanism by which
|
||
policy is changed. This procedure is also used to impeach a
|
||
Zone Coordinator.
|
||
|
||
|
||
8.1 Initiation
|
||
|
||
A referendum on policy modification is invoked when a majority
|
||
of the FidoNet Regional Coordinators inform the International
|
||
Coordinator that they wish to consider a proposed new version
|
||
of Policy.
|
||
|
||
|
||
8.2 Announcement and Results Notification
|
||
|
||
Proposed changes to Policy are distributed using the same
|
||
structure which is used to distribute nodelist difference
|
||
files and FidoNews. Results and announcements related to the
|
||
referendum are distributed by the coordinator structure as a
|
||
part of the weekly nodelist difference file. The Interna-
|
||
tional Coordinator provides copies to the editor of FidoNews
|
||
for inclusion there, although the official announcement and
|
||
voting dates are tied to nodelist distributions.
|
||
|
||
If it is adopted, the International Coordinator sets the
|
||
effective date for a new policy through announcement in the
|
||
weekly nodelist difference file. The effective date will be
|
||
not more than one month after the close of balloting.
|
||
|
||
|
||
8.3 Eligibility to Vote
|
||
|
||
Each member of the FidoNet coordinator structure at and above
|
||
Network Coordinator is entitled to one vote. (Hub coordina-
|
||
tors do not vote.) In the case of the position changing hands
|
||
during the balloting process, either the incumbent or the new
|
||
coordinator may vote, but not both.
|
||
|
||
Network coordinators are expected to assess the opinions of
|
||
the members of their network, and to vote accordingly. A
|
||
formal election is not necessary, but the network coordinator
|
||
must inform the net of the issues and solicit input. The
|
||
FidoNews 6-14 Page 23 3 Apr 1989
|
||
|
||
|
||
network coordinator functions as the representative of the
|
||
rank and file members of FidoNet.
|
||
|
||
|
||
8.4 Voting Mechanism
|
||
|
||
The actual voting mechanism, including whether the ballot is
|
||
secret and how the ballots are to be collected, verified, and
|
||
counted, is left to the discretion of the International Coor-
|
||
dinator. Ideally, ballot collection should be by some secure
|
||
message system, conducted over FidoNet itself.
|
||
|
||
In order to provide a discussion period, the announcement of
|
||
any ballot must be made at least two weeks before the date of
|
||
voting commencement. The balloting period must be at least
|
||
two weeks.
|
||
|
||
|
||
8.5 Voting is on a whole Policy Document
|
||
|
||
Given that Policy is intertwined and self referencing, a rela-
|
||
tively simple change may require several alterations of the
|
||
document. In order to simplify the process, balloting is done
|
||
on choices between whole documents, rather than individual
|
||
amendments. In the simplest case, this means voting yea or
|
||
nay to a new document. If a number of alternatives are to be
|
||
considered, they must be presented as whole documents, from
|
||
which one is chosen.
|
||
|
||
|
||
8.6 Dual Majorities
|
||
|
||
A Policy amendment is considered in force if, at the end of
|
||
the balloting period, it has received a majority of the votes
|
||
cast, and has received a majority of the network-coordinator
|
||
votes cast, and has received a majority of the regional-coor-
|
||
dinator votes cast.
|
||
|
||
In the case of multiple policy changes which are considered on
|
||
the same ballot, a version must receive more than 50% of the
|
||
votes cast to be considered ratified. "Abstain" is a valid
|
||
vote in this case, effectively being a vote for not changing
|
||
the current policy as it simply increases the number of votes
|
||
required to ratify the proposed change.
|
||
|
||
|
||
8.7 Impeachment of a Zone Coordinator
|
||
|
||
8.7.1 Initiation
|
||
|
||
In extreme cases, a Zone Coordinator may be impeached by
|
||
referendum. Impeachment of a Zone Coordinator does not re-
|
||
quire a Policy violation. An impeachment proceeding is in-
|
||
voked when a majority of the Regional Coordinators in a zone
|
||
request the International Coordinator to institute it.
|
||
|
||
FidoNews 6-14 Page 24 3 Apr 1989
|
||
|
||
|
||
8.7.2 Procedure as in Policy Referendum
|
||
|
||
The provisions of sections 8.2 and 8.3 apply to impeachment
|
||
referenda.
|
||
|
||
The dual majority described in section 8.6 applies. Only
|
||
coordinators in the affected zone vote (even if the zone
|
||
coordinator is also the International Coordinator).
|
||
|
||
8.7.3 Voting Mechanism
|
||
|
||
The balloting procedures are set, the votes are collected, and
|
||
the results are announced by a Regional Coordinator chosen by
|
||
the Zone Coordinator who is being impeached. The removal of
|
||
the Zone Coordinator is effective two weeks after the end of
|
||
balloting if the impeachment carries.
|
||
|
||
8.7.4 Limited to once per year
|
||
|
||
The removal of a Zone Coordinator is primarily intended to be
|
||
a mechanism by which the net as a whole expresses displeasure
|
||
with the way Policy is being interpreted. At one time or
|
||
another, everyone is unhappy with the way policy is inter-
|
||
preted. In order to keep the Zone Coordinators interpreting
|
||
policy as opposed to defending themselves, at least one full
|
||
calendar year must elapse between impeachment referenda (re-
|
||
gardless of how many people hold the position of Zone Coor-
|
||
dinator during that year.)
|
||
|
||
Should a Zone Coordinator resign during an impeachment pro-
|
||
cess, the process is considered null and void, and does not
|
||
consume the "once per year quota".
|
||
|
||
|
||
9 Resolution of Disputes
|
||
|
||
9.1 General
|
||
|
||
The FidoNet judicial philosophy can be summed up in two rules:
|
||
|
||
1) Thou shalt not excessively annoy others.
|
||
|
||
2) Thou shalt not be too easily annoyed.
|
||
|
||
In other words, there are no hard and fast rules of conduct,
|
||
but reasonably polite behavior is expected. Also, in any
|
||
dispute both sides are examined, and action could be taken
|
||
against either or both parties. ("Judge not, lest ye be
|
||
judged!")
|
||
|
||
The coordinator structure has the responsibility for defining
|
||
"excessively annoying". Like a common definition of pornogra-
|
||
phy ("I can't define it, but I know it when I see it."), a
|
||
hard and fast definition of acceptable FidoNet behavior is not
|
||
possible. The guidelines in this policy are deliberately
|
||
vague to provide the freedom that the coordinator structure
|
||
FidoNews 6-14 Page 25 3 Apr 1989
|
||
|
||
|
||
requires to respond to the needs of a growing and changing
|
||
community.
|
||
|
||
The first step in any dispute between sysops is for the sysops
|
||
to attempt to communicate directly, at least by netmail,
|
||
preferably by voice. Any complaint made that has skipped this
|
||
most basic communication step will be rejected.
|
||
|
||
Filing a formal complaint is not an action which should be
|
||
taken lightly. Investigation and response to complaints
|
||
requires time which coordinators would prefer to spend doing
|
||
more constructive activities. Persons who persist in filing
|
||
trivial policy complaints may find themselves on the wrong
|
||
side of an annoying-behavior complaint. Complaints must be
|
||
accompanied with verifiable evidence, generally copies of
|
||
messages; a simple word-of-mouth complaint will be dismissed
|
||
out of hand.
|
||
|
||
Failure to follow the procedures herein described (in particu-
|
||
lar, by skipping a coordinator, or involving a coordinator not
|
||
in the appeal chain) is in and of itself annoying behavior.
|
||
|
||
|
||
9.2 Problems with Another Node
|
||
|
||
If you are having problems with another node, you should first
|
||
try to work it out via netmail or voice conversation with the
|
||
other sysop.
|
||
|
||
If this fails to resolve the problem, you should complain to
|
||
your Network Coordinator and his Network Coordinator. If one
|
||
or both of you is not in a network, then complain to the
|
||
appropriate Regional Coordinator. Should this fail to provide
|
||
satisfaction, you have the right to follow the appeal process
|
||
described in section 9.5.
|
||
|
||
|
||
9.3 Problems with your Network Coordinator
|
||
|
||
If you are having problems with your Network Coordinator and
|
||
feel that you are not being treated properly, you are entitled
|
||
to a review of your situation. As with all disputes, the
|
||
first step is to communicate directly to attempt to resolve
|
||
the problem.
|
||
|
||
The next step is to contact your Regional Coordinator. If he
|
||
feels that your case has merit, there are several things he
|
||
may do. For example, he may order a change of Network Coordi-
|
||
nators, or even the disbanding of your network, though this is
|
||
unlikely. If you have been excommunicated by your Network
|
||
Coordinator, that judgement may be reversed, at which point
|
||
you will be reinstated into your net.
|
||
|
||
If you fail to obtain relief from your Regional Coordinator,
|
||
you have the right to follow the appeal process described in
|
||
section 9.5.
|
||
FidoNews 6-14 Page 26 3 Apr 1989
|
||
|
||
|
||
9.4 Problems with Other Coordinators
|
||
|
||
Complaints concerning annoying behavior on the part of any
|
||
coordinator are treated as in section 9.2 and should be filed
|
||
with the next level of coordinator. For example, if you feel
|
||
that your Regional Coordinator is guilty of annoying behavior
|
||
(as opposed to a failure to fulfill his duties as a coordina-
|
||
tor) you should file your complaint with the Zone Coordinator.
|
||
|
||
Complaints concerning the performance of a coordinator in
|
||
carrying out the duties mandated by policy are accepted only
|
||
from the level immediately below. For example, complaints
|
||
concerning the performance of Regional Coordinators would be
|
||
accepted from Network Coordinators and independents in that
|
||
region. Such complaints should be addressed to the Zone
|
||
Coordinator after an appropriate attempt to work them out by
|
||
direct communications.
|
||
|
||
|
||
9.5 Appeal Process
|
||
|
||
A decision made by a coordinator may be appealed to the next
|
||
level. Appeals must be made within two weeks of the decision
|
||
which is being appealed. All appeals must follow the chain of
|
||
command; if levels are skipped the appeal will be dismissed
|
||
out of hand.
|
||
|
||
An appeal will not result in a full investigation, but will be
|
||
based upon the documentation supplied by the parties at the
|
||
lower level. For example, an appeal of a Network Coordina-
|
||
tor's decision will be decided by the Regional Coordinator
|
||
based upon information provided by the coordinator and the
|
||
sysop involved; the Regional Coordinator is not expected to
|
||
make an independent attempt to gather information.
|
||
|
||
The appeal structure is as follows:
|
||
|
||
Network Coordinator decisions may be appealed to the
|
||
appropriate Regional Coordinator.
|
||
|
||
Regional Coordinator decisions may be appealed to the
|
||
appropriate Zone Coordinator. At this point, the Zone
|
||
Coordinator will make a decision and communicate it to
|
||
the Regional Coordinators in that zone. This decision
|
||
may be reversed by a majority vote of the Regional Coor-
|
||
dinators.
|
||
|
||
Zone Coordinator decisions may be appealed to the Inter-
|
||
national Coordinator. The International Coordinator will
|
||
make a decision and communicate it to the Zone Coordina-
|
||
tor Council, which may reverse it by majority vote.
|
||
|
||
If your problem is with a Zone Coordinator per se, that is, a
|
||
Zone Coordinator has committed a Policy violation against you,
|
||
your complaint should be filed with the International Coordi-
|
||
nator, who will make a decision and submit it to the Zone
|
||
FidoNews 6-14 Page 27 3 Apr 1989
|
||
|
||
|
||
Coordinator Council for possible reversal, as described above.
|
||
|
||
|
||
9.6 Statute of Limitations
|
||
|
||
A complaint may not be filed more than 60 days after the date
|
||
of discovery of the source of the infraction, either by admis-
|
||
sion or technical evidence. Complaints may not be filed more
|
||
than 120 days after the incident unless they involve explicit-
|
||
ly illegal behavior.
|
||
|
||
|
||
9.7 Right to a Speedy Decision
|
||
|
||
A coordinator is required to render a final decision and
|
||
notify the parties involved within 30 days of the receipt of
|
||
the complaint or appeal.
|
||
|
||
|
||
9.8 Return to Original Network
|
||
|
||
Once a policy dispute is resolved, any nodes reinstated on
|
||
appeal are returned to the local network or region to which
|
||
they geographically or technically belong.
|
||
|
||
|
||
9.9 Echomail
|
||
|
||
Echomail is an important and powerful force in FidoNet. For
|
||
the purposes of Policy Disputes, echomail is simply a differ-
|
||
ent flavor of netmail, and is therefore covered by Policy. By
|
||
its nature, echomail places unique technical and social de-
|
||
mands on the net over and above those covered by this version
|
||
of Policy. In recognition of this, an echomail policy which
|
||
extends (and does not contradict) general Policy, maintained
|
||
by the Echomail Coordinators, and ratified by a process simi-
|
||
lar to that of this document, is recognized by the FidoNet
|
||
Coordinators as a valid structure for dispute resolution on
|
||
matters pertaining to echomail. At some future date the
|
||
echomail policy document may be merged with this one.
|
||
|
||
|
||
9.10 Case Histories
|
||
|
||
Most of FidoNet Policy is interpretive in nature. No one can
|
||
see what is to come in our rapidly changing environment.
|
||
Policy itself is only a part of what is used as the ground
|
||
rules for mediating disputes -- as or more important are the
|
||
precedents.
|
||
|
||
In order to accommodate this process, case histories may be
|
||
added to or removed from this document by the International
|
||
Coordinator, with such a revision subject to reversal by the
|
||
Zone Coordinator Council. Should Policy be amended in such a
|
||
way to invalidate a precedent, Policy supersedes said prece-
|
||
dent. (A carefully prepared amendment would address this by
|
||
FidoNews 6-14 Page 28 3 Apr 1989
|
||
|
||
|
||
removing the precedent reference as a part of the amendment.)
|
||
|
||
Although a case may be removed, the text of a case history may
|
||
not be modified by any mechanism. Case history is written
|
||
close to the time of the decision, by those involved with it.
|
||
Amending the text of a case history is the same as revising
|
||
history, something quite inappropriate in an organization
|
||
dedicated to moving information.
|
||
|
||
|
||
|
||
10 Appendices
|
||
|
||
10.1 General
|
||
|
||
The Appendices of this document are exceptions to the normal
|
||
ratification process. Section 10.2 can be changed by the
|
||
appropriate Zone Coordinator, and section 10.3 may be modified
|
||
by the International Coordinator (see Section 9.10).
|
||
|
||
|
||
10.2 Timing of Zone Mail Hour
|
||
|
||
Zone Mail Hour is observed each day, including weekends and
|
||
holidays. The time is based upon Universal Coordinated Time
|
||
(UTC), also known as Greenwich Mean time (GMT). In areas
|
||
which observe Daylight Savings Time during part of the year,
|
||
the local time of zone mail hour will change because FidoNet
|
||
does not observe Daylight Savings Time. The exact timing of
|
||
Zone Mail Hour is set for each zone by the Zone Coordinator.
|
||
|
||
In FidoNet Zone 1, Zone Mail Hour is observed from 0900 to
|
||
1000 UTC. In each of the time zones, this is:
|
||
|
||
Eastern Standard Time 4 AM to 5 AM
|
||
Central Standard Time 3 AM to 4 AM
|
||
Mountain Standard Time 2 AM to 3 AM
|
||
Pacific Standard Time 1 AM to 2 AM
|
||
Hawaii Standard Time 11 PM to Midnight
|
||
|
||
In FidoNet Zone 2, Zone Mail Hour is observed from 0230 to
|
||
0330 UTC.
|
||
|
||
In Fidonet Zone 3, Zone Mail Hour is observed from 1800 to
|
||
1900 UTC. In each of the time Zones involved this is:
|
||
|
||
|
||
GMT +12 Zone 6:00 AM to 7:00 AM
|
||
(New Zealand)
|
||
|
||
GMT +10 Zone 4:00 AM to 5:00 AM
|
||
(East Australia)
|
||
(Papua New Guinea)
|
||
(Micronesia)
|
||
|
||
GMT +9.5 Zone 3:30 AM to 4:30 AM
|
||
FidoNews 6-14 Page 29 3 Apr 1989
|
||
|
||
|
||
(Central Australia)
|
||
|
||
GMT +9 Zone 3:00 AM to 4:00 AM
|
||
(Japan)
|
||
(Korea)
|
||
(Eastern Indonesia)
|
||
|
||
GMT +8 Zone 2:00 AM to 3:00 AM
|
||
(Hong Kong)
|
||
(Taiwan)
|
||
(Central Indonesia)
|
||
(Philippines)
|
||
|
||
GMT +7 Zone 1:00 AM to 2:00 AM
|
||
(Malaysia)
|
||
(Singapore)
|
||
(Thailand)
|
||
(Western Australia)
|
||
(Western Indonesia)
|
||
|
||
|
||
10.3 Case Histories
|
||
|
||
|
||
Case histories of past disputes are instructive to show gener-
|
||
al procedures and methods. Any decision may be included in
|
||
this document by a majority vote of either the Zone Coordina-
|
||
tor Council or the Regional Coordinators.
|
||
|
||
Policy4 significantly changes the functions of the Zone and
|
||
International Coordinators. In the following cases which were
|
||
decided using Policy3, substitute "Zone Coordinator" for all
|
||
occurrences of "International Coordinator(*)".
|
||
|
||
|
||
10.3.1 The Case of the Crooked Node
|
||
|
||
A sysop of a local node was using network mail to engage in
|
||
unethical business practices. His Network Coordinator became
|
||
very annoyed at this, and dropped the local from his nodelist.
|
||
|
||
The local appealed to his Regional Coordinator for assignment
|
||
as an independent node. The Regional Coordinator, after
|
||
checking with the Network Coordinator, decided that the Net-
|
||
work Coordinator was right to be annoyed. Independent status
|
||
was denied.
|
||
|
||
The International Coordinator(*) did not intervene.
|
||
|
||
|
||
10.3.2 The Case of the Hacker Mailer
|
||
|
||
A sysop of a local node made use of file attaches for extra
|
||
users to mail himself the USER.BBS file from several local
|
||
boards. The sysops of these boards felt annoyed at this, and
|
||
appealed to their Network Coordinator, who agreed and dropped
|
||
FidoNews 6-14 Page 30 3 Apr 1989
|
||
|
||
|
||
the offending node from the nodelist.
|
||
|
||
The Regional Coordinator was not consulted.
|
||
|
||
The International Coordinator(*) did not intervene.
|
||
|
||
|
||
10.3.3 The Case of the Bothered Barker
|
||
|
||
A local node became annoyed with his Network Coordinator for
|
||
failing to provide services. Repeated complaints to his Net-
|
||
work Coordinator did not satisfy him, so he appealed to the
|
||
International Coordinator(*).
|
||
|
||
The International Coordinator(*) dismissed the complaint
|
||
because the Regional Coordinator had not been consulted.
|
||
|
||
The local node submitted his complaint to his Regional Coordi-
|
||
nator, who investigated the case and discovered that there was
|
||
some justice to the complaint. He advised and assisted the
|
||
Network Coordinator in configuring his system to provide an
|
||
improved level of service to the local nodes.
|
||
|
||
The Regional Coordinator also decided that the local node was
|
||
being too easily annoyed, in that he was expecting services
|
||
not normally required of a Network Coordinator. The local
|
||
node was informed as to the true duties of a Network Coordina-
|
||
tor, and was advised to lower his expectations.
|
||
|
||
|
||
10.3.4 The Case of the Busy Beaver
|
||
|
||
A local node which was operated by a retail establishment was
|
||
engaged in making "bombing runs" to mail advertisements over
|
||
FidoNet. His Network Coordinator felt annoyed and handling
|
||
the outgoing traffic for a commercial operation, and asked the
|
||
local node to leave the network.
|
||
|
||
The local node applied to the Regional Coordinator, and was
|
||
granted status as an independent node in his region.
|
||
|
||
|
||
10.3.5 The Mark of the Devil
|
||
|
||
A local sysop whose board was used in conjunction with voodoo
|
||
rites, hacking, phreaking, and obscene material applied to a
|
||
Network Coordinator for a node number. The Network Coordina-
|
||
tor deemed that this board was exceptionally annoying, and
|
||
denied the request.
|
||
|
||
The Regional Coordinator was not consulted.
|
||
|
||
The International Coordinator(*), on seeing that the Regional
|
||
Coordinator had not been consulted, dismissed the case out of
|
||
hand. No further appeals were made.
|
||
|
||
FidoNews 6-14 Page 31 3 Apr 1989
|
||
|
||
|
||
10.3.6 The Case of the Sysop Twit
|
||
|
||
A patron of various local nodes had been roundly recognized by
|
||
all sysops as a twit. The user obtained his own system,
|
||
became a sysop, and applied for a node number. The Network
|
||
Coordinator denied the request. No appeals were made.
|
||
|
||
|
||
10.3.7 The Case of the Echomail Junkie
|
||
|
||
A local node became enamored with echomail and joined several
|
||
conferences, routing his outbound mail through his network.
|
||
He then started an echomail conference of his own and began
|
||
relaying echomail between several systems, again routing it
|
||
all through his network.
|
||
|
||
His Network Coordinator observed that network performance was
|
||
becoming seriously impaired. The offending node was told to
|
||
hold it down. A compromise was reached whereby much of the
|
||
echomail traffic was no longer routed through the network, and
|
||
routed echomail was limited to twenty messages per night. No
|
||
appeals were made.
|
||
|
||
|
||
10.3.8 The Case of the Bouncing Board
|
||
|
||
A local user decided to establish a node to promote a worthy
|
||
charity. The machine being used was also used for various
|
||
other activities during the day, and the sysop was often
|
||
called away. His coworkers would often forget to bring the
|
||
board up at the end of the day while he was away, so the node
|
||
was often down for extended periods. The Network Coordinator,
|
||
finding the node unable to receive mail, would mark it down.
|
||
The sysop would return, restart the board, and ask to be
|
||
reinstated.
|
||
|
||
The Network Coordinator eventually decided that the sysop was
|
||
not able to maintain a reliable system, and removed him from
|
||
the nodelist completely. Subsequent requests for a node
|
||
number from the same sysop were turned down. No appeals were
|
||
made.
|
||
|
||
|
||
10.5 Credits, acknowledgments, etc.
|
||
|
||
Fido and FidoNet are registered trademarks of Fido Software,
|
||
Inc.
|
||
|
||
|
||
|
||
|
||
Index
|
||
|
||
-1/-1, 2.3
|
||
Additional mail events in local network 2.1.8
|
||
Administrative Region 6.1
|
||
FidoNews 6-14 Page 32 3 Apr 1989
|
||
|
||
|
||
Advantages to network membership 2.2
|
||
Alteration of mail 2.1.5
|
||
Answering machine 2.3
|
||
Announcement of voting results 8.2
|
||
Annoying behavior 1.3.5, 1.4.8, 2.1.1, 2.1.2, 2.1.4, 2.1.6,
|
||
2.1.7, 2.1.8, 2.1.11, 2.3, 4.2, 4.3, 5.2, 9, 10
|
||
Appeal chain 9.5
|
||
Availability of NodeList 1.3.4
|
||
Balloting Period 8.4
|
||
Bombing run 4.2
|
||
BossNode 1.2.1
|
||
Boundaries 1.3.2
|
||
Calling areas 1.3.2, 5.6, 5.7
|
||
Case histories 9.10, 10.3
|
||
Changing node numbers 4.3, 5.2
|
||
Commercial messages 2.1.4, 4.2
|
||
Contributions to FidoNews 1.3.1
|
||
Current nodelist 2.1.11
|
||
Daylight Savings Time 2.1.14
|
||
Difference file 4.5, 5.8, 8.2
|
||
Disclosing private mail 2.1.6
|
||
Discussion period 8.2
|
||
Disputes 9
|
||
Distribution of ballots 8.2
|
||
Down 2.3, 4.4, 5.5
|
||
Downloading by users 3.6, 4.5, 5.8
|
||
Dual majority 8.6, 8.7.2
|
||
EchoMail 1.4.5, 4.2, 9.9
|
||
Effective date (policy change) 8.2
|
||
Elections 1.4.1
|
||
Eligibility to vote 8.3
|
||
Encryption 2.1.4, 4.2
|
||
Exceptions 5.6
|
||
Excessively annoying behavior 1.3.5, 1.4.8, 2.1.1, 2.1.2, 2.1.4,
|
||
2.1.6, 2.1.7, 2.1.8, 2.1.11, 2.3, 4.2, 4.3, 5.2, 9, 10
|
||
Exclusivity of Zone Mail Hour 2.1.8
|
||
Excommunication 2.1.12, 4.3, 5.2, 9
|
||
Exemptions, node location 1.3.2, 5.6
|
||
Familiarity with policy 2.1.2, 2.2
|
||
FidoNet, definition 1.2.6
|
||
FidoNews 1.3.1
|
||
availability 3.1, 4.5, 5.8
|
||
FTSC 2.4
|
||
Gateway 2.1.3
|
||
Geography 1.3.2, 5.6
|
||
Glue 4.5
|
||
Hats 3.4
|
||
Host-routed mail 4.2
|
||
How to obtain a node number 2.2
|
||
Hub 1.4.6 4.4
|
||
Illegal behavior 2.1.1, 9.6
|
||
Illegal mail 4.2
|
||
Impeachment 8.7
|
||
In-transit mail 2.1.6.1
|
||
Independent node 4.2, 5.2
|
||
Inter-zonal questions 1.4.2
|
||
FidoNews 6-14 Page 33 3 Apr 1989
|
||
|
||
|
||
International Coordinator 1.4.1, 1.4.9, 7
|
||
International FidoNet Association 1.2.6
|
||
Language 1.0
|
||
Levels of FidoNet 1.2, 1.4
|
||
Local calling areas 1.3.2
|
||
Local policies 1.2, 3.3
|
||
Mail 1.4.5, 4.2
|
||
Majority 8.6, 8.7.2
|
||
Member of area administrated 3.5
|
||
Modification of mail 2.1.5
|
||
National Mail Hour see Zone Mail Hour
|
||
Network
|
||
advantages 2.2
|
||
boundaries 1.3.2, 5.4
|
||
definition 1.2.3
|
||
forming 2.4, 5.3
|
||
hub 1.4.6, 4.4
|
||
numbers 2.2, 5.4
|
||
Network Coordinator 1.4.5
|
||
procedures 4
|
||
replacement 5.7, 9.3
|
||
Network Mail Hour see Zone Mail Hour
|
||
New sysops 2.1.2, 3.6
|
||
Node numbers 4.3, 5.2
|
||
obtaining 2.2
|
||
Nodelist 1.3.4, 2.2, 4.4, 5.5
|
||
availability 3.1, 4.5, 5.8
|
||
changes 4.4, 5.2
|
||
current 2.1.11
|
||
definition 1.3.4
|
||
format 10.3
|
||
official 1.3.4
|
||
Nodes
|
||
definition 1.2.2
|
||
down 2.3
|
||
Observing mail events 2.1.8, 2.1.10
|
||
Obtaining a node number 2.2
|
||
Offensive messages 2.1.5
|
||
Partial nodelist 1.3.4
|
||
Pirated software 2.1.1
|
||
Point of origin 2.1.3
|
||
Points 1.2.1, 1.4.8, 2.1.3
|
||
Policy 3.1, 3.3, 4.5, 5.8
|
||
changing 8
|
||
familiarity with 2.1.2, 2.2
|
||
local 1.2, 3.3
|
||
Precedent 3.7, 9.10, 10.3
|
||
Private messsages 2.1.6
|
||
Private network 1.2.1
|
||
Private nodes 2.1.9
|
||
Problem resolution 9
|
||
Public BBS 3.6
|
||
Ratification 7.1
|
||
Referendum 1.4.1, 8
|
||
Regional Coordinator 1.4.4
|
||
procedures 5
|
||
FidoNews 6-14 Page 34 3 Apr 1989
|
||
|
||
|
||
replacement 6.1, 9.4
|
||
Regions 1.2.4
|
||
Replacement of coordinators 1.4.9
|
||
Replacing services 3.4
|
||
Requirements to be in NodeList 1.3.4, 2.1.2, 2.2
|
||
Resignation of ZC 8.7.4
|
||
Resolution of disputes 9
|
||
Results Announcement 8.2
|
||
Review of decisions 3.7
|
||
Review of routed traffic 2.1.4
|
||
Routing 2.1.4 - 2.1.7, 4.2
|
||
Routing Hub 1.4.6, 4.4
|
||
Rules 9.1
|
||
Speedy decision 9.7
|
||
Statute of limitations 9.6
|
||
Submissions to FidoNews 1.3.1
|
||
Sysop procedures 2
|
||
System operator (sysop) 1.4.7
|
||
Three-tiered networks 1.4.6
|
||
Time limit on decision 9.7
|
||
Timing of Zone Mail Hour 2.1.13, 2.1.14, 10.2
|
||
Top-down 1.4.9
|
||
Tradition 3.7
|
||
Trivial network 5.3
|
||
Unattended systems 2.3
|
||
Updates to nodelist 3.2
|
||
User 1.4.8
|
||
User access during ZMH 2.1.8
|
||
Vacation 2.3
|
||
Vote 8
|
||
eligibility 8.3, 8.7.2
|
||
ZMH see Zone Mail Hour
|
||
Zone Coordinator 1.4.3, 6
|
||
election 1.4.9, 6.2
|
||
impeachment 8.7
|
||
procedures 6
|
||
removal 6.2
|
||
resignation during impeachment 8.7.4
|
||
Zone Coordinator Council 1.4.2, 7.1
|
||
Zone Mail Hour 1.3.3, 2.1.8
|
||
timing 2.1.13, 2.1.14, 10.2
|
||
Zones
|
||
definition 1.2.5
|
||
new 1.4.2
|
||
unique 1.3.2
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 6-14 Page 35 3 Apr 1989
|
||
|
||
|
||
Jeff Sheese, JStek BBS
|
||
Fidonet 1:109/116 (Netmail HOST routed via 1:109/100)
|
||
EggNet 99:9200/1 (Netmail HOST routed via 99:9200/0)
|
||
|
||
ZOW, Yet Another Fantastically New File Packer! (Part 2 of 2)
|
||
|
||
Yes, yet ANOTHER fantastically new file packer is about to hit
|
||
the public domain software scene!
|
||
|
||
If you read last week's Fidonews article about ZOW, your probably
|
||
wondering how I can do all this wonderful stuff in one program.
|
||
Well, here is the English psuedo-code that I used to develop the
|
||
software package. Remember, I mentioned that ZOW formats are
|
||
public domain!
|
||
|
||
1. The command line for calling ZOW is "ZOW cmd FILENAME.EXT",
|
||
where 'cmd' is GET or PUT.
|
||
2. To pack a file of any given size to only 2K one must issue
|
||
the command "ZOW PUT FILENAME.EXT".
|
||
3. To retrieve a file from it's ZOW format, one must issue the
|
||
command "ZOW GET FILENAME.EXT".
|
||
4. ZOW parses the command line to determine the command,
|
||
whether it be GET or PUT.
|
||
5. Method for PUT, or packing the data file:
|
||
a. ZOW parses the command line to get the filename and
|
||
extender.
|
||
b. ZOW creates the file "FILENAME.ZOW", using ZOW as the
|
||
filename extender.
|
||
c. ZOW stores a copyright notice, starting at the
|
||
beginning of "FILENAME.ZOW", ending with an ASCII end
|
||
of file mark. This is so that anyone using the TYPE
|
||
command to list the contents of the ZOW formatted file
|
||
will see that it's a ZOW file.
|
||
d. ZOW stores the original "FILENAME.EXT" after the ASCII
|
||
end of file mark.
|
||
e. ZOW fills the rest of the 2048 byte "FILENAME.ZOW" file
|
||
with random numbers. The amount of time to do this is
|
||
determined by a random number generator, seeded with
|
||
the number equal to the size of the original file.
|
||
f. ZOW closes "FILENAME.ZOW".
|
||
g. ZOW changes the attributes of "FILENAME.ZOW" so that
|
||
it's a SYSTEM, HIDDEN, READ-ONLY file.
|
||
|
||
Next the user does a directory of the floppy disk. Notice that
|
||
"FILENAME.EXT" is gone and "FILENAME.ZOW" is in it's place? Also
|
||
notice that "FILENAME.ZOW" is only 2048 bytes long!
|
||
|
||
I'm really excited about my new file packer! As a matter of fact
|
||
I'm going to call a lawyer tomorrow and copyright it! Forget you
|
||
saw the English Pseudo code! *I* own it now! I can make a lot
|
||
of money off this thing and it's mine, all mine!!! By the time
|
||
you read this I would have copyrighted it! i'm going to
|
||
copyright it so all you joust queens can forget you ever saw
|
||
it!!!!!!! forget i said anything about public domain!!!!!!!!
|
||
public domain is for the birds!!!! get real!!!! get a life!!!!
|
||
|
||
FidoNews 6-14 Page 36 3 Apr 1989
|
||
|
||
|
||
DENIAL OF COPYRIGHTS
|
||
|
||
This article has been provided pursuant to absolutely no
|
||
License Agreement containing restrictions on its use. This
|
||
article contains all valuable trade secrets and proprietary
|
||
information of JStek Enterprises and is not protected by Federal
|
||
Copyright Law. It may be copied or distributed in any form or
|
||
medium, disclosed to third parties, or used in any manner not
|
||
provided for in the aforementioned nonexistant License Agreement
|
||
except without prior written authorization from JStek
|
||
Enterprises.
|
||
|
||
This article is the property of JStek Enterprises (who has
|
||
their own FedEx account!) as its created work. This work
|
||
includes certain individual portions provided to JStek
|
||
Enterprises by operators and users of the JStek Bulletin Boards.
|
||
JStek has the right to create and distribute these articles
|
||
based, in part, on rights granted to it by those originating such
|
||
portions. Other than the rights granted JStek, those creating
|
||
and maintaining the portions retain all residual rights in and to
|
||
each's individual portion. Specific manure rights are hereby
|
||
granted to whomever wants to clean up the mess.
|
||
|
||
Everyone is granted any right to use, sale, duplication or
|
||
distribution of this article for any commercial purpose. I
|
||
figure if your willing to copy it and present it as your own, I
|
||
must have done something right!
|
||
|
||
(This article may be reproduced without permission and may
|
||
also be excerpted out of context in a misleading way. -jes)
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 6-14 Page 37 3 Apr 1989
|
||
|
||
|
||
=================================================================
|
||
COLUMNS
|
||
=================================================================
|
||
|
||
The Veterinarian's Corner
|
||
Excerpts from the ANIMED GroupMail Conference
|
||
|
||
by Don Thomson, 1:102/1005
|
||
|
||
With the winter weather, and more of us traveling to the ski
|
||
slopes, the proper antifreeze in the radiator can be a lifesaver.
|
||
Unfortunately, many 'do-it-yourselfers' who will do the radiator
|
||
flushes and replace the old coolant with new antifreeze are
|
||
unaware that Ethylene Glycol based antifreezes are highly toxic.
|
||
|
||
Ethylene glycol, which acts to lower the freezing point of
|
||
radiator coolant (and also raises the boiling point), is
|
||
particularly attractive to animals. It has a sweet taste, and if
|
||
simply drained into the street gutter, or into an open catch pan
|
||
where an animal can lap it up, may spell kidney failure in short
|
||
order.
|
||
|
||
The first signs of ethylene glycol poisoning are a 'drunken'
|
||
incoordination, but as the agent is metabolized by the liver, it
|
||
becomes a potent toxin for the kidneys. Treatment must be
|
||
initiated extremely early or severe damage will be done. Very
|
||
few pets recover without prolonged dialysis if the initial
|
||
poisoning is not treated immediately with the appropriate
|
||
antidotes.
|
||
|
||
This is DEFINATELY one case where PREVENTION is paramount!
|
||
|
||
DB Thomson, DVM
|
||
1:102/1005
|
||
9:871/16
|
||
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 6-14 Page 38 3 Apr 1989
|
||
|
||
|
||
=================================================================
|
||
LETTERS TO THE EDITOR
|
||
=================================================================
|
||
|
||
From: Robert Heller @ 1:321/153.0 (Locks Hill BBS, Wendell, Mass)
|
||
Subject: "Will ZIP Replace ARC?" (Article by John Herro 1:363/6,
|
||
in FidoNews V6 #11)
|
||
Date: Sat Mar 25, 1989 12:18:24.58
|
||
|
||
I'd like to say a few words on the whole "compression wars" that
|
||
has been going on for some time now in various forums.
|
||
|
||
Most of the "new" compression/packing/archiving programs only
|
||
run on MS-DOS systems (i.e. Intel 8086 derived systems). Of the
|
||
many (I have not counted recently) computers I use, both at home
|
||
(2) and at work (many others), only one has a Intel 8086 derived
|
||
CPU, and it does not run MS-DOS. The computer my BBS runs on is
|
||
a 68000-based system (it presently runs CP/M-68K and will be soon
|
||
running OS-9/68000). There are only two archiver program that
|
||
runs on all of them (more or less): ARC 5.12 and Zoo (2.01). ARC
|
||
was an extreem pain to port out of the MS-DOS world (it was not
|
||
written in a portable fashion). I ported Zoo to OS-9/68000 very
|
||
easily. While Zoo may not be the fastest (or the tightest)
|
||
packer, it does fairly well. ARC 5.12 tends to run like a dog
|
||
and does not pack the best, but it is an old program.
|
||
|
||
Because I have no way of verifying them, I won't be supporting
|
||
the use of .ZIP files on my bbs. I do not think it is a good
|
||
idea to make a packing method a "standard" until some effort has
|
||
gone into making software that can handle the proposed "standard"
|
||
archives under many (if not most/all) different operating systems
|
||
and processor types. ARC was ported in self-defense (with great
|
||
difficulty in some cases). Zoo was written with the idea of
|
||
being ported to different operating systems, compilers, and
|
||
processor types. Unless/until the same can be said of PKZIP or
|
||
any of the other "new" compression/packer/archiver programs, I
|
||
don't think we should be talking about establishing standards as
|
||
yet.
|
||
|
||
Comments, questions, etc. welcome.
|
||
|
||
Robert Heller
|
||
ARPANet: Heller@cs.umass.edu
|
||
BITNET: Heller@UMass.BITNET
|
||
FidoNet: 1:321/153.0 (Locks Hill BBS,
|
||
1-508-544-8337,
|
||
300/1200/2400 BAUD)
|
||
BIX: locks.hill.bbs
|
||
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 6-14 Page 39 3 Apr 1989
|
||
|
||
|
||
=================================================================
|
||
LATEST VERSIONS
|
||
=================================================================
|
||
|
||
Latest Software Versions
|
||
|
||
Bulletin Board Software
|
||
Name Version Name Version Name Version
|
||
|
||
Fido 12k* Opus 1.03b TBBS 2.1
|
||
QuickBBS 2.03 TPBoard 5.0 TComm/TCommNet 3.4*
|
||
Lynx 1.22 Phoenix 1.3 RBBS 17.1D
|
||
|
||
|
||
Network Node List Other
|
||
Mailers Version Utilities Version Utilities Version
|
||
|
||
Dutchie 2.90C* EditNL 4.00 ARC 6.01*
|
||
SEAdog 4.50* MakeNL 2.12 ARCmail 2.0*
|
||
BinkleyTerm 2.20* Prune 1.40 ConfMail 4.00
|
||
D'Bridge 1.18* XlatList 2.90* TPB Editor 1.21
|
||
FrontDoor 2.0 XlaxNode 2.32* TCOMMail 2.1*
|
||
PRENM 1.40 XlaxDiff 2.32* TMail 8901*
|
||
ParseList 1.30 UFGATE 1.02*
|
||
GROUP 2.04*
|
||
EMM 1.40
|
||
MSGED 1.99*
|
||
XRS 1.2*
|
||
|
||
* Recently changed
|
||
|
||
Utility authors: Please help keep this list up to date by
|
||
reporting new versions to 1:1/1. It is not our intent to list
|
||
all utilities here, only those which verge on necessity.
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 6-14 Page 40 3 Apr 1989
|
||
|
||
|
||
=================================================================
|
||
NOTICES
|
||
=================================================================
|
||
|
||
The Interrupt Stack
|
||
|
||
|
||
8 May 1989
|
||
Digital Equipment Corporations User Society (DECUS) will be
|
||
holding its semi-annual symposium in Atlanta, GA. Runs
|
||
through May 12. As usual sysop's will get together and chat.
|
||
|
||
19 May 1989
|
||
Start of EuroCon III at Eindhoven, The Netherlands
|
||
|
||
24 Aug 1989
|
||
Voyager 2 passes Neptune.
|
||
|
||
24 Aug 1989
|
||
FidoCon '89 starts at the Holiday Inn in San Jose,
|
||
California. Trade show, seminars, etc. Contact 1/89
|
||
for info.
|
||
|
||
5 Oct 1989
|
||
20th Anniversary of "Monty Python's Flying Circus"
|
||
|
||
If you have something which you would like to see on this
|
||
calendar, please send a message to FidoNet node 1:1/1.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FidoNews 6-14 Page 41 3 Apr 1989
|
||
|
||
|
||
OFFICERS OF THE INTERNATIONAL FIDONET ASSOCIATION
|
||
|
||
Mort Sternheim 1:321/109 Chairman of the Board
|
||
Bob Rudolph 1:261/628 President
|
||
Matt Whelan 3:3/1 Vice President
|
||
Bill Bolton 3:711/403 Vice President-Technical Coordinator
|
||
Linda Grennan 1:147/1 Secretary
|
||
Kris Veitch 1:147/30 Treasurer
|
||
|
||
|
||
IFNA COMMITTEE AND BOARD CHAIRS
|
||
|
||
Administration and Finance Mark Grennan 1:147/1
|
||
Board of Directors Mort Sternheim 1:321/109
|
||
Bylaws Don Daniels 1:107/210
|
||
Ethics Vic Hill 1:147/4
|
||
Executive Committee Bob Rudolph 1:261/628
|
||
International Affairs Rob Gonsalves 2:500/1
|
||
Membership Services David Drexler 1:147/1
|
||
Nominations & Elections David Melnick 1:107/233
|
||
Public Affairs David Drexler 1:147/1
|
||
Publications Rick Siegel 1:107/27
|
||
Security & Individual Rights Jim Cannell 1:143/21
|
||
Technical Standards Rick Moore 1:115/333
|
||
|
||
|
||
IFNA BOARD OF DIRECTORS
|
||
|
||
DIVISION AT-LARGE
|
||
|
||
10 Courtney Harris 1:130/732 Don Daniels 1:107/210
|
||
11 Bill Allbritten 1:11/301 Mort Sternheim 1:321/109
|
||
12 Bill Bolton 3:711/403 Mark Grennan 1:147/1
|
||
13 Irene Henderson 1:107/9 (vacant)
|
||
14 Ken Kaplan 1:100/22 Ted Polczyinski 1:154/5
|
||
15 Scott Miller 1:128/12 Matt Whelan 3:3/1
|
||
16 Ivan Schaffel 1:141/390 Robert Rudolph 1:261/628
|
||
17 Neal Curtin 1:343/1 Steve Jordan 1:206/2871
|
||
18 Andrew Adler 1:135/47 Kris Veitch 1:147/30
|
||
19 David Drexler 1:147/1 (vacant)
|
||
2 Henk Wevers 2:500/1 David Melnik 1:107/233
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 6-14 Page 42 3 Apr 1989
|
||
|
||
|
||
__
|
||
The World's First / \
|
||
BBS Network /|oo \
|
||
* FidoNet * (_| /_)
|
||
_`@/_ \ _
|
||
| | \ \\
|
||
| (*) | \ ))
|
||
______ |__U__| / \//
|
||
/ Fido \ _//|| _\ /
|
||
(________) (_/(_|(____/ (tm)
|
||
|
||
Membership for the International FidoNet Association
|
||
|
||
Membership in IFNA is open to any individual or organization that
|
||
pays a specified annual membership fee. IFNA serves the
|
||
international FidoNet-compatible electronic mail community to
|
||
increase worldwide communications.
|
||
|
||
Member Name _______________________________ Date _______________
|
||
Address _________________________________________________________
|
||
City ____________________________________________________________
|
||
State ________________________________ Zip _____________________
|
||
Country _________________________________________________________
|
||
Home Phone (Voice) ______________________________________________
|
||
Work Phone (Voice) ______________________________________________
|
||
|
||
Zone:Net/Node Number ____________________________________________
|
||
BBS Name ________________________________________________________
|
||
BBS Phone Number ________________________________________________
|
||
Baud Rates Supported ____________________________________________
|
||
Board Restrictions ______________________________________________
|
||
|
||
Your Special Interests __________________________________________
|
||
_________________________________________________________________
|
||
_________________________________________________________________
|
||
In what areas would you be willing to help in FidoNet? __________
|
||
_________________________________________________________________
|
||
_________________________________________________________________
|
||
Send this membership form and a check or money order for $25 in
|
||
US Funds to:
|
||
International FidoNet Association
|
||
PO Box 41143
|
||
St Louis, Missouri 63141
|
||
USA
|
||
|
||
Thank you for your membership! Your participation will help to
|
||
insure the future of FidoNet.
|
||
|
||
Please NOTE that IFNA is a general not-for-profit organization
|
||
and Articles of Association and By-Laws were adopted by the
|
||
membership in January 1987. The second elected Board of Directors
|
||
was filled in August 1988. The IFNA Echomail Conference has been
|
||
established on FidoNet to assist the Board. We welcome your
|
||
input to this Conference.
|
||
|
||
-----------------------------------------------------------------
|
||
|