2021-04-15 13:31:59 -05:00

2428 lines
101 KiB
Plaintext
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Volume 6, Number 14 3 April 1989
+---------------------------------------------------------------+
| _ |
| / \ |
| /|oo \ |
| - FidoNews - (_| /_) |
| _`@/_ \ _ |
| International | | \ \\ |
| FidoNet Association | (*) | \ )) |
| Newsletter ______ |__U__| / \// |
| / FIDO \ _//|| _\ / |
| (________) (_/(_|(____/ |
| (jm) |
+---------------------------------------------------------------+
Editor in Chief: Vince Perriello
Editors Emeritii: Dale Lovell
Thom Henderson
Chief Procrastinator Emeritus: Tom Jennings
Contributing Editors: Al Arango
FidoNews is published weekly by the International FidoNet
Association as its official newsletter. You are encouraged to
submit articles for publication in FidoNews. Article submission
standards are contained in the file ARTSPEC.DOC, available from
node 1:1/1. 1:1/1 is a Continuous Mail system, available for
network mail 24 hours a day.
Copyright 1989 by the International FidoNet Association. All
rights reserved. Duplication and/or distribution permitted for
noncommercial purposes only. For use in other circumstances,
please contact IFNA at (314) 576-4067. IFNA may also be contacted
at PO Box 41143, St. Louis, MO 63141.
Fido and FidoNet are registered trademarks of Tom Jennings of
Fido Software, 164 Shipley Avenue, San Francisco, CA 94107 and
are used with permission.
We don't necessarily agree with the contents of every article
published here. Most of these materials are unsolicited. No
article will be rejected which is properly attributed and legally
acceptable. We will publish every responsible submission
received.
Table of Contents
1. ARTICLES ................................................. 1
Policy4 Draft Released for Comment ....................... 1
ZOW, Yet Another Fantastically New File Packer! (Part 2 .. 35
2. COLUMNS .................................................. 37
The Veterinarian's Corner: Winter Weather & Antifreeze ... 37
3. LETTERS TO THE EDITOR .................................... 38
4. LATEST VERSIONS .......................................... 39
Latest Software Versions ................................. 39
5. NOTICES .................................................. 40
The Interrupt Stack ...................................... 40
FidoNews 6-14 Page 1 3 Apr 1989
=================================================================
ARTICLES
=================================================================
FidoNet Policy4
Comments Solicited
David Dodell, FidoNet International Coordinator
1:114/15 -- 1:1/0
Included in this article is a proposed policy document for
FidoNet. The existing policy has served well, but FidoNet has
grown and changed a great deal since it was adopted. This
proposal has been prepared by the Regional Coordinators, and your
comments are sincerely solicited.
Discussion at the net level is encouraged, and Network Coordina-
tors will represent their net to the Regional Coordinator. The
RC's realize that the net has significant input into the process
of preparing policy, and your comments will be thoughtfully
considered.
The deadline for comments is April 30. A final proposal will be
issued on May 8, and a vote will be conducted of NC's and RC's.
The voting period will end on June 5, and results will be
announced in the nodediff which is released on June 9.
You are encouraged to read the proposal in its entirity, but here
are a few of the differences between this proposal and Policy3.
Greater detail: Throughout the document, more detail has been
provided in an effort to clarify procedures. The intent is to
make expectations clear for new and existing sysops to reduce the
potential for unintentional policy violations, and to simplify
the resolution of disputes when they do occur. This is an admin-
istrative document which will assist both coordinators and
sysops.
Description of "new" developments: Routing hubs, point systems,
and zone coordinators are described. None of these existed when
Policy3 was written.
Change procedure: A procedure is included to modify policy. This
procedure will be used to adopt or reject Policy4.
Dispute resolution: A statute of limitations and a limit on
response time by a coordinator have been added. The appeal
process has been clarified. Specific requirements have been
added for a dialog between the complaining parties before the
filing of a formal complaint.
Mail: Specific procedures are included for private mail,
echomail, and mail routing.
Index: An index has been added to help you find that section that
you know is there, but can't seem to locate.
FidoNews 6-14 Page 2 3 Apr 1989
The full text of the proposal follows:
FidoNet Policy Document Version 4.03
*** DRAFT *** March 24, 1989
This policy document has been released for comment, and is not
yet in force. Please direct comments to your Network Coordi-
nator.
1 Overview
1.0 Language
The official language of FidoNet is English. All documents
must exist in English. Translation into other languages is
encouraged.
1.1 Introduction
FidoNet is an amateur electronic mail system. As such, all of
its participants and operators are unpaid volunteers. From
its early beginning as a few friends swapping messages back
and forth (1984), it now (1989) includes over 5,000 systems on
six continents.
FidoNet is not a common carrier or a value-added service
network and is a public network only in as much as the inde-
pendent, constituent nodes may individually provide public
access to the network on their system.
FidoNet is large enough that it would quickly fall apart of
its own weight unless some sort of structure and control were
imposed on it. Multinet operation provides the structure.
Decentralized management provides the control. This document
describes the procedures which have been developed to manage
the network.
1.2 Organization
FidoNet nodes are grouped on several levels.
Separate documents may be issued at the zone, region, or net
level to provide additional detail on local procedures. Ordi-
narily, these lower-level policies may not contradict this
policy. However, with the approval of the International
Coordinator, local policy can be used to implement differences
required due to local requirements. The Zone Coordinator
Council may reverse the decision of the International Coordi-
nator. These local policies may not place additional restric-
FidoNews 6-14 Page 3 3 Apr 1989
tions on members of FidoNet beyond those included in this
document, other than enforcement of local mail periods.
1.2.1 Points
A point is a FidoNet-compatible system that is not in the
nodelist, but communicates with FidoNet through a node re-
ferred to as a bossnode. A point is generally regarded in the
same manner as a user, for example, the bossnode is responsi-
ble for mail from the point. (See section 2.1.3.) Points are
addressed by using the bossnode's nodelist address; for exam-
ple, a point system with a bossnode of 114/15 might be known
as 114/15.12. Mail destined for the point is sent to the
bossnode, which then routes it to the point.
In supporting points, the bossnode makes use of a private net
number which should not be visible outside of the bossnode-
point relationship except as the first entry in the ^aPATH
line. Unfortunately, should the point call another system
directly (to do a file request, for example), the private
network number will appear as the caller's address. In this
way, points are different from users, since they operate
FidoNet-compatible mailers which are capable of contacting
systems other than the bossnode.
1.2.2 Nodes
A node is a single FidoNet address, and is the smallest offi-
cial unit of FidoNet.
1.2.3 Networks
A network is a collection of nodes in a local geographic area.
Networks coordinate their mail activity to decrease cost.
1.2.3 Regions
A region is a well-defined geographic area containing nodes
which may or may not be combined into networks. A typical
region will contain many nodes in networks, and a few indepen-
dent nodes which are not a part of any network.
1.2.5 Zones
A zone is a large geographic area containing many regions,
covering one or more countries and/or continents.
1.2.6 FidoNet
FidoNet indicates the entire amateur mail network as defined
by the weekly nodelist (see section 1.3.4).
FidoNews 6-14 Page 4 3 Apr 1989
1.3 Definitions
1.3.1 FidoNews
FidoNews is a weekly newsletter distributed throughout the
network by the coordinator structure. It is an important
medium by which FidoNet sysops communicate with each other.
FidoNews provides a sense of being a community of people with
common interests. Accordingly, sysops and users are encour-
aged to contribute to FidoNews. Contributions are submitted
to node 1/1; a file describing the format to be used is avail-
able on many systems.
1.3.2 Geography
Each level of FidoNet is geographically contained by the level
immediately above it. A given geographic location is covered
by one zone and one region within that zone, and is either in
one network or not in a network. There are never two zones,
two regions, or two networks which cover the same geographic
area.
If a node is in the area of a network, it should be listed in
that network, not as an independent in the region. (The
primary exception to this is a node receiving inordinate
amounts of host-routed mail; see section 4.2). Network bound-
aries are based on calling areas as defined by the local
telephone company. Even in the case of areas where node
density is so great that more than one network is needed to
serve one local calling area, a geographic guideline is used
to decide which nodes belong to what network. Network member-
ship is based on geographic or other purely technical ratio-
nale. It is not based on personal or social factors.
There are cases in which the local calling areas lead to
situations where logic dictates that a node physically in one
FidoNet Region should be assigned to another. In those cases,
with the agreement of the Regional Coordinators and Zone
Coordinator involved, exemptions may be granted. Such exemp-
tions are described in section 5.6.
1.3.3 Zone Mail Hour
Zone Mail Hour (ZMH) is a defined time during which all nodes
in a zone are required to be able to accept netmail. Each
Fidonet zone defines a ZMH and publishes the time of its ZMH
to all other Fidonet zones. See sections 2.1.8 and 10.2.
Zone Mail Hour has previously been referred to as National
Mail Hour and Network Mail hour. The term Zone Mail Hour is
more accurate.
1.3.4 Nodelist
The nodelist is a file updated weekly which contains the ad-
FidoNews 6-14 Page 5 3 Apr 1989
dresses of all recognized FidoNet nodes. This file is cur-
rently made available by the Zone Coordinator not later than
Zone Mail Hour each Saturday, and is available electronically
for download or file request at no charge. To be included in
the nodelist, a system must meet the standards defined by this
document. No other requirements may be imposed.
Partial nodelists (single-zone, for example) may be made
available at different levels in FidoNet. The full list as
published by the International Coordinator is regarded as the
official FidoNet nodelist, and is used in circumstances such
as determination of eligibility for voting. All parts that
make up the full nodelist are available on each Zone Coordina-
tor's and each Regional Coordinator's system.
1.3.5 Excessively Annoying Behavior
There are references throughout this policy to "excessively
annoying behavior", especially in section 9 (Resolution of
Disputes). It is difficult to define this term, as it is
based upon the judgement of the coordinator structure. Gener-
ally speaking, annoying behavior irritates, bothers, or causes
harm to some other person. It is not necessary to break a law
to be annoying. Refer to section 9 and the case studies
(section 10.3) for more information.
1.4 Administration of FidoNet
FidoNet has a hierarchical structure for administration of the
network, with the following levels:
1.4.1 International Coordinator
The International Coordinator is the "first among equals" Zone
Coordinator. He coordinates the joint production of the
master nodelist by his fellow Zone Coordinators.
The International Coordinator acts as the chair of the Zone
Coordinator Council and as the overseer of elections -- ar-
ranging the announcement of referenda, the collection and
counting of the ballots, and announcing the results for those
issues that affect FidoNet as a whole.
1.4.2 Zone Coordinator Council
In certain cases, the Zone Coordinators work as a council to
provide advice to the International Coordinator. The arrange-
ment is similar to that between a president and advisors. In
particular, this council considers inter-zonal issues. This
includes, but is not limited to: working out the details of
nodelist production, mediating inter-zonal disputes, and such
issues not addressed at a lower level of FidoNet.
FidoNews 6-14 Page 6 3 Apr 1989
1.4.3 Zone Coordinator
The Zone Coordinator compiles the nodelists from all of the
regions in the zone, and creates the master nodelist and
difference file, which is then distributed over FidoNet in the
zone. A Zone Coordinator does not perform routing services
for the zone.
1.4.4 Regional Coordinator
The Regional Coordinator maintains the list of independent
nodes in the region and accepts nodelists from the Network
Coordinators in the region. He compiles these lists to create
a regional nodelist, which he then sends to the Zone Coordina-
tor. A Regional Coordinator does not perform routing services
for any nodes in the region.
1.4.5 Network Coordinator
The Network Coordinator is responsible for maintaining the
list of nodes for the network, and for forwarding netmail sent
to the network from other FidoNet nodes. The Network Coordi-
nator may make arrangements to handle outgoing netmail, but is
not required to do so. The Network Coordinator is not re-
quired to provide a source for echomail.
1.4.6 Network Routing Hub
Network Routing Hubs exist only in some networks. They share
duties of the Network Coordinator, in order to ease the man-
agement of a large network. The exact duties and procedures
are a matter for the Network Coordinator and his hubs to
arrange, and will not be discussed here, except that a network
coordinator cannot delegate responsibility to mediate dis-
putes.
1.4.7 System Operator
The system operator (sysop) formulates a policy for running
his board and dealing with users. The sysop must mesh with
the rest of the FidoNet system if he is to send and receive
mail, and the local policy must be consistent with other
levels of FidoNet.
1.4.8 User
The sysop is responsible for the actions of any user when they
affect the rest of FidoNet. (If a user is annoying, the sysop
is annoying.) Any traffic entering FidoNet via a given node,
if not from the sysop, is considered to be from a user, and is
the responsibility of the sysop. This includes messages from
FidoNews 6-14 Page 7 3 Apr 1989
point systems.
1.4.9 Summary
These levels act to distribute the administration and control
of FidoNet to the lowest possible level, while still allowing
for coordinated action over the entire mail system. Adminis-
tration is made possible by operating in a top-down manner.
That is, a person at any given level is responsible to the
level above, and responsible for the level below.
For example, a Regional Coordinator is responsible to the Zone
Coordinator for anything that happens in the region. From the
point of view of the Zone Coordinator, the Regional Coordina-
tor is completely responsible for the smooth operation of the
region. Likewise, from the point of view of the Regional
Coordinator, the Network Coordinator is completely responsible
for the smooth operation of the network.
If a person at any level above sysop is unable to properly
perform their duties, the person at the next level may replace
them. For example, if a Regional Coordinator fails to per-
form, the Zone Coordinator can replace him.
The exceptions to this top down organization are the Zone and
International Coordinators. See sections 6.2 and 7.2.
2 Sysop Procedures
2.1 General
2.1.1 The Basics
The sysop of an individual node can generally do as he
pleases, as long as he observes the mail events, is not exces-
sively annoying to other nodes on FidoNet, and does not pro-
mote or participate in the distribution of pirated copyrighted
software or other illegal behavior via FidoNet.
2.1.2 Familiarity with Policy
In order to understand the meaning of "excessively annoying",
it is incumbent upon all sysops to occasionally re-read Fido-
Net policy. New sysops must familiarize themselves with
policy before requesting a node number.
2.1.3 Responsible for All Traffic Entering FidoNet Via His
Node
A Sysop is responsible for all traffic entering FidoNet via
his system. This includes (but is not limited to) traffic
entered by his users, points, and any other networks for which
FidoNews 6-14 Page 8 3 Apr 1989
he might act as a gateway. If a sysop allows "outside" mes-
sages to enter FidoNet via his system, he has a responsibility
to ensure his system is clearly identified by FidoNet node
number as the point of origin of that message, and a responsi-
bility to act as a gateway in the reverse direction. Should
such traffic result in a violation of Policy, the sysop must
rectify the situation.
2.1.4 Encryption and Review of Mail
FidoNet is an amateur system. Our technology is such that the
privacy of messages cannot be guaranteed. Any sysop has the
right to review traffic flowing through his system, if for no
other reason than to ensure that the system is not being used
for illegal purposes. Encryption obviously makes this review
impossible. Therefore, encrypted and/or commercial traffic
that is routed without the express permission of all the links
in the delivery system constitutes annoying behavior.
2.1.5 No Alteration of Routed Mail
A sysop may not modify, other than as required for routing or
other technical purposes, any message, netmail or echomail,
passing through the system from one FidoNet node to another.
If a sysop is offended by the content of a message, he must
follow the procedure described in section 2.1.7.
2.1.6 Private Netmail
The word "private" should be used with great care, especially
with users of a BBS. Some countries have laws which deal with
"private mail", and it should be made clear that the word
"private" does not imply that no person other than the recipi-
ent can read messages. Sysops who cannot provide this dis-
tinction should consider not offering users the option of
"private mail".
If a user sends a "private message", the user has no control
over the number of intermediate systems through which that
message is routed. A sysop who sends a message to another
sysop can control this aspect by sending the message direct to
the recipient's system, thus guaranteeing that only the recip-
ient or another individual to whom that sysop has given autho-
rization can read the message. Thus, a sysop may have differ-
ent expectations than a casual user.
2.1.6.1 No Disclosure of in-transit mail
Disclosing or in any way using information contained in pri-
vate netmail traffic not addressed to you or written by you is
considered annoying behavior, regardless of how you come upon
that traffic. This does not apply to echomail which is by
definition a broadcast medium, and where private mail is often
FidoNews 6-14 Page 9 3 Apr 1989
used to keep a sysop-only area restricted.
2.1.6.2 Private mail addressed to you
The issue of private mail which is addressed to you is more
difficult than the in-transit question treated in the previous
section. A common legal opinion holds that when you receive a
message it becomes your property and you have a legal right to
do with it what you wish. Your legal right does not excuse
you from annoying others.
In general, sensitive material should not be sent using Fido-
Net. This ideal is often compromised, as FidoNet is our
primary mode of communication. In general, if the sender of a
message specifically requests in the text of the message that
the contents be kept confidential, release of the message into
a public forum may be considered annoying.
There are exceptions. If someone is saying one thing in
public and saying the opposite in private mail, the recipient
of the private mail should not be subjected to harassment
simply because the sender requests that the message not be
released. Judgement and common sense should be used in this
area as in all other aspects of FidoNet behavior.
2.1.7 Not Routing Mail
A sysop is not required to route traffic if he has not agreed
to do so. He is not obligated to route traffic for all if he
routes it for any, unless he holds a Network Coordinator or
Hub Coordinator position. Routing traffic through a node not
obligated to perform routing without the permission of that
node may be annoying behavior. This includes unsolicited
echomail.
If a sysop does not forward a message when he had previously
agreed to perform such routing, the message must be returned
to the sysop of the node at which it entered FidoNet with an
explanation of why it was not forwarded. (It is not necessary
to return messages which are addressed to a node which is not
in the current nodelist.) Intentionally stopping an in-tran-
sit message without following this procedure constitutes
annoying behavior. In the case of a failure to forward traf-
fic due to some technical problem, it does not become annoying
unless it persists after being pointed out to the sysop.
2.1.8 Exclusivity of Zone Mail Hour
Zone Mail Hour is the heart of FidoNet, as this is when net-
work mail is passed between systems. Any system which wishes
to be a part of FidoNet must be able to receive mail from any
node in the nodelist during this time. This time is exclu-
sively reserved for netmail. Many phone systems charge on a
per-call basis, regardless of whether a connect, no connect,
or busy signal is encountered. For this reason, any activity
FidoNews 6-14 Page 10 3 Apr 1989
other than normal network mail processing that ties up a
system during ZMH is considered annoying behavior. Echomail
should not be transferred during ZMH. User (BBS) access to a
system is prohibited during ZMH.
A system which is a member of a local network may also be re-
quired to observe additional mail events, as defined by the
Network Coordinator. Access restrictions during local network
periods are left to the discretion of the Network Coordinator.
2.1.9 Private Nodes
The rare exception to ZMH compliance is Private Nodes. Per-
sons requesting private nodes should be supported as points if
possible. A private listing is justified when the system must
interface with many others, such as an echomail distributor.
In these cases, the exact manner and timing of mail delivery
is arranged between the private node and other systems. Such
an agreement between a private system and a hub is not binding
on any replacement for that hub. A private node must be a
part of a network (they cannot be independents in the region.)
Private nodes are encouraged to honor ZMH.
2.1.10 Observing Mail Events
Failure to observe the proper mail events is grounds for any
node to be dropped from FidoNet without notice (since notice
is generally given by netmail).
2.1.11 Use of Current Nodelist
Network mail systems generally operate unattended, and place
calls at odd hours of the night. If a system tries to call an
incorrect or out-of-date number, it could cause some poor
citizen's phone to ring in the wee hours of the morning, much
to the annoyance of innocent bystanders and civil authorities.
For this reason, a sysop who sends mail is obligated to obtain
and use the most recent edition of the nodelist as is practi-
cal.
2.1.12 Excommunication
A system which has been dropped from the network is said to be
excommunicated (i.e. denied communication). If you find that
you have been excommunicated without warning, your coordinator
was unable to contact you. You should rectify the problem and
contact your coordinator.
Systems may also be dropped from the nodelist for cause. See
section 9, and sections 4.3 and 5.2.
It is considered annoying behavior to assist a system which
FidoNews 6-14 Page 11 3 Apr 1989
was excommunicated in circumventing that removal from the
nodelist. For example, if you decide to provide an echomail
feed to your friend who has been excommunicated, it is likely
that your listing will also be removed.
2.1.13 Timing of Zone Mail Hour
The exact timing of Zone Mail Hour for each zone is set by the
Zone Coordinator. See section 10.2.
2.1.14 Non-observance of Daylight Savings Time
FidoNet does not observe daylight savings time. In areas
which observe daylight savings time the FidoNet mail schedules
must be adjusted in the same direction as the clock change.
Alternatively, you can simply leave your system on standard
time.
2.2 How to obtain a node number
You must first obtain a current nodelist so that you can send
mail. You do not need a node number to send mail, but you
must have one in order for others to send mail to you.
The first step in obtaining a current nodelist is to locate a
FidoNet bulletin board. Most bulletin board lists include at
least a few FidoNet systems, and usually identify them as
such. Use a local source to obtain documents because many
networks have detailed information available which explains
the coverage area of the network and any special requirements
or procedures.
Once you have a nodelist, you must determine which network or
region covers your area. Regions are numbered 1-99; network
numbers are greater than 99. Networks are more restricted in
area than regions, but are preferred since they improve the
flow of mail and provide more services to their members. If
you cannot find a network which covers your area, then pick
the region which does.
Once you have located the network or region in your area, send
a message containing a request for a node number to node zero
of that network or region. The request must be sent by net-
mail, use address -1/-1, and include the following:
1) Your name.
2) The name of your system.
3) The city and state where your system is located.
4) The phone number to be used when calling your system.
5) Your hours of operation, netmail and BBS.
6) The maximum baud rate you can support.
FidoNews 6-14 Page 12 3 Apr 1989
You must indicate that you have read, and agree to abide by,
this document and all the current and future policies of Fido-
Net.
Using a node number other than -1/-1 can cause problems for
the coordinator involved. Simply assigning yourself a
net/node number can be annoying, and can be grounds to reject
your request.
Your coordinator may want additional information. If so, he
will contact you.
Please allow at least two weeks for a node number request to
be processed. If you send your request to a Regional Coordi-
nator, he may forward it to the appropriate Network Coordina-
tor.
2.3 If You are Going Down
If your node will be down for an extended period (more than a
day or two), inform your coordinator as soon as possible. If
you do not do this, other systems will try to reach you while
you are down, much to their annoyance. Never put an answering
machine or similar device on your phone line while you are
down. If you do, calling systems will get the machine repeat-
edly, racking up large phone bills, which is very annoying.
If you will be leaving your system unattended for an extended
period of time (such as while you are on vacation), you should
notify your coordinator. Systems have a tendency to "crash"
now and then, so you will probably want your coordinator to
know that it is a temporary condition if it happens while you
are away.
2.4 How to Form a Network
If there are several nodes in your area, but no network, a new
network can be formed. This has advantages to both you and to
the rest of FidoNet. You receive better availability of
nodelist difference files and FidoNews, and everyone else can
take advantage of host-routing netmail to the new network.
The first step is to contact the other sysops in your area.
You must decide which nodes will comprise the network, and
which of those nodes you would like to be the Network Coordi-
nator. Then consult your Regional Coordinator. You must send
the following information:
1) The region number(s), or network number(s) if a net-
work is splitting up, that are affected by the formation
of your network. The Regional Coordinator will inform
the Zone Coordinator and the coordinators of any affected
networks that a new network is in formation.
FidoNews 6-14 Page 13 3 Apr 1989
2) A copy of the proposed network's nodelist segment.
This file should be attached to the message of applica-
tion for a network number, and should use the nodelist
format described in the current version of the appro-
priate FTSC publication. Please elect a name that re-
lates to your grouping, for example SoCalNet for nodes in
the Southern California Area and MassNet West for the
Western Massachusetts Area. Remember if you call your-
self DOGNET it doesn't identify your area.
Granting a network number is not automatic. Even if the
request is granted, the network might not be structured exact-
ly as you request. Your Regional Coordinator will review your
application and inform you of the decision.
Do not send a network number request to the Zone Coordinator.
All network number requests must be processed by the Regional
Coordinator.
3 General Procedures for All Coordinators
3.1 Make Available Nodelists, Difference Files, and FidoNews
Any Coordinator is responsible for obtaining and making avail-
able, on a weekly basis, nodelist difference files and Fido-
News.
3.2 Processing Nodelist Changes and Passing Them Upstream
Each coordinator is responsible for obtaining nodelist infor-
mation from the level below, processing it, and passing the
results to the level above. The timing of this process is
determined by the requirements imposed by the level above.
3.3 Ensure the Latest Policy is Available
A Coordinator is responsible to make the current version of
this document available to the level below, and to encourage
familiarity with it.
In addition, a coordinator is required to forward any local
policies he receives to the level above, and to review such
policies. Although not required, common courtesy dictates
that when formulating a local policy, the participation of the
level above should be solicited.
3.4 Minimize the Number of Hats Worn
Coordinators are encouraged to limit the number of FidoNet
functions they perform. In particular, a coordinator's system
should be readily available to the levels immediately above
FidoNews 6-14 Page 14 3 Apr 1989
and below, and a coordinator should not rule on the appeal of
his own decision.
Coordinators are discouraged from acting as echomail and soft-
ware-distribution hubs. If they do so, they should handle
echomail (or other volume distribution) on a system other than
the administrative system.
Another reason to discourage multiple hats is the difficulty
of replacing services if someone leaves the network. For
example, if a coordinator is the echomail hub and the soft-
ware-distribution hub, those services will be difficult to
restore when he resigns.
3.5 Be a Member of the Area Administered
A coordinator must be a member of the area administered. That
is, a Network Coordinator must be a member of that network by
virtue of geography. A Regional Coordinator must be either a
member of a network in his region, or an independent of the
region.
3.6 Encourage New Sysops to Enter FidoNet
A coordinator is encouraged to operate a public bulletin board
system which is freely available for the purpose of distribut-
ing Policy, FidoNews, and Nodelists to potential new sysops.
Dissemination of this information to persons who are potential
FidoNet sysops is important to the growth of FidoNet, and
coordinators should encourage development of new systems.
3.7 Tradition and Precedent
A coordinator is not bound by the practices of his predecessor
or peers beyond the scope of this document.
In addition, a new coordinator has the right to review any
decision made by his predecessors for compliance with Policy,
and take whatever actions may be necessary to rectify any
situations not in compliance.
3.8 Technical Management
The primary responsibility of any coordinator is technical
management of network operations. Decisions must be made on
technical grounds.
4 Network Coordinator Procedures
4.1 Responsibilities
FidoNews 6-14 Page 15 3 Apr 1989
A Network Coordinator has the following responsibilities:
1) To receive incoming mail for nodes in his network, and
arrange delivery to its recipients.
2) To assign node numbers to nodes in his network.
3) To maintain the nodelist for his network, and to send
a copy of it to his Regional Coordinator whenever it
changes.
4) To make available to his nodes new nodelist difference
files, new issues of FidoNews, and new revisions of
Network Policy Documents as they are received, and to
periodically check to insure that his nodes use up to
date nodelists.
4.2 Routing Inbound Mail
It is your responsibility as Network Coordinator to coordinate
the receipt and forwarding of host-routed inbound netmail for
nodes in your network. The best way to accomplish this is
left to your discretion.
If a node in your network is receiving large volumes of mail
you can request that he cease and desist routing these vol-
umes. If he refuses to do so, then you can request your
Regional Coordinator to assign the node a number as an inde-
pendent and drop him from your network.
Occasionally a node will make a "bombing run" (sending one
message to a great many nodes). If a node in another network
is making bombing runs on your nodes and routing them through
your inbound host, then you can complain to the network coor-
dinator of the offending node. (If the node is an indepen-
dent, complain to the regional coordinator.) Bombing runs are
considered to be annoying.
Another source of routing overload is echomail. Echomail
cannot be allowed to degrade the ability of FidoNet to handle
normal message traffic. If a node in your network is routing
large volumes of echomail, you can ask him to either limit the
amount of echomail or to stop routing his echomail.
You are not required to forward encrypted, commercial, or
illegal mail. However, you must follow the procedures de-
scribed in section 2.1.7 if you do not forward the mail.
4.3 Assigning Node Numbers
It is your responsibility to assign node numbers to new nodes
in your network. You may also change the numbers of existing
nodes in your network, though you should check with your
member nodes before doing so. You may assign any numbers you
FidoNews 6-14 Page 16 3 Apr 1989
wish, so long as each node has a unique number within your
network.
You must not assign a node number to any system until you have
received a formal request from that system by FidoNet mail.
This will ensure that the system is minimally operational.
The strict maintenance of this policy has been one of the
great strengths of FidoNet.
It is also recommended, though not required, that you call a
board which is applying for a node number before assigning it
a node number.
You may not assign a node number to a node in an area covered
by an existing network. Further, if you have nodes in an area
covered by a network in formation, those nodes must be trans-
ferred to the new network.
You should use network mail to inform a new node of his node
number, as this helps to insure that he is capable of receiv-
ing network mail.
If a node in your network is acting in a sufficiently annoying
manner, then you can take whatever action you deem fit, ac-
cording to the circumstances of the case.
4.4 Maintaining the Nodelist
You should to implement name changes, phone number changes,
and so forth in your segment of the nodelist as soon as possi-
ble after the information is received from the affected node.
You should also on occasion send a message to every node in
your network to ensure that they are operational. If a node
turns out to be "off the air" with no prior warning, you can
either mark the node down or remove it from the nodelist.
(Nodes are to marked DOWN for a maximum of two weeks, after
which the line should be removed from the nodelist.)
At your discretion, you may distribute a portion of this work-
load to routing hubs. In this case, you should receive the
nodelists from the Hub Coordinators within your network. You
will need to maintain a set of nodelists for each hub within
your network, since you cannot count on getting an update from
each Hub Coordinator every week. You should assemble a master
nodelist for your network every week and send it to your
Regional Coordinator by the day and time he designates. It is
suggested that you do this as late as is practical, so as to
accommodate any late changes, balanced with the risk of miss-
ing the connection with your Regional Coordinator and thus
losing a week.
4.5 Making Available Policies, Nodelists and FidoNews
As a Network Coordinator you should obtain a new issue of
FidoNews 6-14 Page 17 3 Apr 1989
FidoNews and a new nodelist difference file every week from
your Regional Coordinator. The nodelist difference file is
currently made available each Saturday, and FidoNews is pub-
lished each Monday. You must make these files available to
all nodes in the network, and you are encouraged to make them
available to the general public for download.
You should also obtain the most recent versions of the Policy
documents that bind the members of your network, and make
those available to the nodes in your network. Policies are
released at sporadic intervals, so you should also inform the
nodes in your network when such events occur, and ensure the
nodes are generally familiar with the changes.
Policy, FidoNews, and the nodelist are the glue that holds us
together. Without them, we would cease to be a community, and
become just another random collection of bulletin boards.
5 Regional Coordinator Procedures
5.1 Responsibilities
A Regional Coordinator has the following responsibilities:
1) To assign node numbers to independent nodes in the
region.
2) To encourage independent nodes in the region to join
existing networks, or to form new networks.
3) To assign network numbers to networks in the region
and define their boundaries.
4) To compile a nodelist of all of the networks and
independents in the region, and to send a copy of it to
the Zone Coordinator whenever it changes.
5) To ensure the smooth operation of networks within the
region.
6) To make new nodelist difference files, Policies, and
issues of FidoNews available to the Network Coordinators
in the region as soon as is practical.
5.2 Assigning Node Numbers
It is your responsibility to assign node numbers to indepen-
dent nodes in your region. You may also change the numbers of
existing nodes in your region, though you should check with
the respective nodes before doing so. You may assign any
numbers you wish, so long as each node has a unique number
within your region.
FidoNews 6-14 Page 18 3 Apr 1989
You should not assign a node number to any system until you
have received a formal request from that system by FidoNet
mail. This will ensure that the system is minimally opera-
tional. The strict maintenance of this policy has been one of
the great strengths of FidoNet.
It is also recommended, though not required, that you call a
board which is applying for a node number before assigning it
a node number.
You should use network mail to inform a new node of his node
number, as this helps to insure that he is capable of receiv-
ing network mail.
If a node in your region is acting in a sufficiently annoying
manner, then you can take whatever action you deem fit, ac-
cording to the circumstances of the case.
If you receive a node number request from outside your region,
you must forward it to the most local coordinator for the
requestor as you can determine. If you receive a node number
request from a new node that is in an area covered by an
existing network, then you must forward the request to the
Coordinator of that network instead of assigning a number
yourself.
If a network forms in an area for which you have independent
nodes, those nodes will be transferred to the local network as
soon as is practical.
5.3 Encouraging the Formation and Growth of Networks
One of your main duties as a Regional Coordinator is to pro-
mote the growth of networks in your region.
You should avoid having independent nodes in your region which
are within the coverage area of a network. There are, howev-
er, certain cases where a node should not be a member of a
network, such as a system with a large amount of inbound
netmail; see section 4.2.
If several independent nodes in your region are in a local
area you should encourage them to form a network, and if
necessary you may require them to form a network. Refer to
section 2.4. Note that this is not intended to encourage the
formation of trivial networks. Obviously, one node does not
make a network. The exact number of nodes required for an
effective network must be judged according to the circumstan-
ces of the situation, and is left to your discretion.
5.4 Assigning Network Numbers
It is your responsibility to assign network numbers to new
networks forming within your region. You are assigned a pool
FidoNews 6-14 Page 19 3 Apr 1989
of network numbers to use for this purpose by your Zone Coor-
dinator. As a part of this function, it is the responsibility
of the Regional Coordinator to define the boundaries of the
networks in the region.
5.5 Maintaining the Nodelist
As a Regional Coordinator, you have a dual role in maintaining
the nodelist for your region.
First, you must maintain the list of independent nodes in your
region. You should attempt to implement name changes, phone
number changes, and so forth in this nodelist as soon as
possible. You should also on occasion send a message to every
independent node in your region to ensure that they are opera-
tional. If a node turns out to be "off the air" with no prior
warning, you can either mark the node down or remove it from
the nodelist. (Nodes are to marked DOWN for a maximum of two
weeks, after which the line should be removed from the node-
list.)
Second, you must receive the nodelists from the Network Coor-
dinators within your region. You will need to maintain a set
of nodelists for each network within your region, since you
cannot count on getting an update from each Network Coordina-
tor every week. You should assemble a master nodelist for
your region every week and send it to your Zone Coordinator by
the day and time he designates. It is suggested that you do
this as late as practical, so as to accommodate late changes,
balanced with the risk of missing the connection with your
Zone Coordinator and thus losing a week.
5.6 Geographic Exemptions
There are cases where local calling geography does not follow
FidoNet regions. In exceptional cases, exemptions to normal
geographic guidelines are agreed upon by the Regional Coordi-
nators and Zone Coordinator involved. Such an exemption is
not a right, and is not permanent. When a network is formed
in the proper region that would provide local calling access
to the exempted node, it is no longer exempt. An exemption
may be reviewed and revoked at any time by any of the coordi-
nators involved.
5.7 Overseeing Network Operations
It is your responsibility as Regional Coordinator to ensure
that the networks within your region are operating in an ac-
ceptable manner. This does not mean that you are required to
operate those networks; that is the responsibility of the
Network Coordinators. It means that you are responsible for
assuring that the Network Coordinators within your region are
acting responsibly.
FidoNews 6-14 Page 20 3 Apr 1989
If you find that a Network Coordinator within your region is
not properly performing his duties (as outlined in Section 4),
then you should take whatever action you deem necessary to
correct the situation.
If a network grows so large that it cannot reasonably accommo-
date traffic flow during the Zone Mail Hour, the Regional
Coordinator can direct the creation of one or more new net-
works from that network. These new networks, although they
may be within a single local-calling area, must still conform
to a geographical basis for determining membership.
It is your obligation as Regional Coordinator to maintain
direct and reasonably frequent contact with the networks in
your region. The exact method of accomplishing this is left to
your discretion.
5.8 Making Available Nodelists, Policies, and FidoNews
As a Regional Coordinator, it is your responsibility to obtain
the latest nodelist difference file, network policies, and the
latest issues of FidoNews as they are published, and to make
them available to the Network Coordinators within your region.
The nodelist is posted weekly on Saturday by the Zone Coordi-
nator, and FidoNews is published weekly on Monday by node 1/1.
Contact them for more details on how to obtain the latest
copies each week.
It is your responsibility to make these available to all Net-
work Coordinators in your region as soon as is practical
after you receive them. The method of distribution is left to
your discretion. You are not required to distribute them to
any independent nodes in your region, though you may if you
wish. You are encouraged to make all these documents avail-
able for downloading by the general public.
6 Zone Coordinator Procedures
6.1 General
A Zone Coordinator for FidoNet has the primary task of main-
taining the nodelist for his Zone, sharing it with the other
Zone Coordinators, and ensuring the distribution of the master
nodelist (or difference file) to the Regions in his Zone. He
is also responsible for coordinating the distribution of
Network Policy documents and FidoNews to the Regional Coordi-
nators in his zone.
The Zone Coordinator is responsible for the maintenance of the
nodelist for his administrative region. The Administrative
Region has the same number as his zone, and consists of nodes
assigned for administrative purposes not related to the send-
ing and receiving of normal network mail.
FidoNews 6-14 Page 21 3 Apr 1989
A Zone Coordinator is charged with the task of ensuring the
smooth operation of his Zone. He does this by supervising the
Regional Coordinators.
If a Zone Coordinator determines that a Regional Coordinator
is not properly performing his duties (as outlined in section
5), he should seek a replacement for that Regional Coordina-
tor, or take other action as he sees fit.
The Zone Coordinator defines the geographic boundaries of the
regions within his zone and sets the time for the Zone Mail
Hour.
The Zone Coordinator is responsible for reviewing and approv-
ing any geographic exemptions as described elsewhere in this
document.
The Zone Coordinator is responsible for insuring the smooth
operation of gates between his zone and all other zones for
the transfer of interzonal mail.
The Zone Coordinators are responsible for the selection of the
International Coordinator from among their ranks.
6.2 Selection
The Zone Coordinator is selected by an absolute majority vote
of the Regional Coordinators within his zone.
7 International Coordinator Procedures
7.1 General
The International Coordinator is the "first among equals" Zone
Coordinator.
The International Coordinator has the primary task of coordi-
nating the creation of the master nodelist by managing the
distribution between the Zones of the Zone nodelists. The
International Coordinator is responsible for definition of new
zones and for negotiation of agreements for communication with
other networks. ("Other network" in this context means other
networks with which FidoNet communicates as peer-to-peer, not
"network" in the sense of the FidoNet organizational level.)
The International Coordinator is also responsible for coordi-
nating the distribution of Network Policies and FidoNews to
the Zone Coordinators.
The International Coordinator is responsible for coordinating
the activities of the Zone Coordinator Council. The Interna-
tional Coordinator acts as the spokesman for the Zone Coordi-
nator Council.
FidoNews 6-14 Page 22 3 Apr 1989
In cases not specifically covered by this document, the Inter-
national Coordinator may issue specific interpretations or
extensions to this policy. The Zone Coordinator Council may
reverse such rulings by a majority vote.
7.2 Selection
The International Coordinator is selected (or removed) by an
absolute majority vote of the Zone Coordinators.
8 Referenda
The procedures described in this section are used to ratify a
new version of FidoNet policy, which is the mechanism by which
policy is changed. This procedure is also used to impeach a
Zone Coordinator.
8.1 Initiation
A referendum on policy modification is invoked when a majority
of the FidoNet Regional Coordinators inform the International
Coordinator that they wish to consider a proposed new version
of Policy.
8.2 Announcement and Results Notification
Proposed changes to Policy are distributed using the same
structure which is used to distribute nodelist difference
files and FidoNews. Results and announcements related to the
referendum are distributed by the coordinator structure as a
part of the weekly nodelist difference file. The Interna-
tional Coordinator provides copies to the editor of FidoNews
for inclusion there, although the official announcement and
voting dates are tied to nodelist distributions.
If it is adopted, the International Coordinator sets the
effective date for a new policy through announcement in the
weekly nodelist difference file. The effective date will be
not more than one month after the close of balloting.
8.3 Eligibility to Vote
Each member of the FidoNet coordinator structure at and above
Network Coordinator is entitled to one vote. (Hub coordina-
tors do not vote.) In the case of the position changing hands
during the balloting process, either the incumbent or the new
coordinator may vote, but not both.
Network coordinators are expected to assess the opinions of
the members of their network, and to vote accordingly. A
formal election is not necessary, but the network coordinator
must inform the net of the issues and solicit input. The
FidoNews 6-14 Page 23 3 Apr 1989
network coordinator functions as the representative of the
rank and file members of FidoNet.
8.4 Voting Mechanism
The actual voting mechanism, including whether the ballot is
secret and how the ballots are to be collected, verified, and
counted, is left to the discretion of the International Coor-
dinator. Ideally, ballot collection should be by some secure
message system, conducted over FidoNet itself.
In order to provide a discussion period, the announcement of
any ballot must be made at least two weeks before the date of
voting commencement. The balloting period must be at least
two weeks.
8.5 Voting is on a whole Policy Document
Given that Policy is intertwined and self referencing, a rela-
tively simple change may require several alterations of the
document. In order to simplify the process, balloting is done
on choices between whole documents, rather than individual
amendments. In the simplest case, this means voting yea or
nay to a new document. If a number of alternatives are to be
considered, they must be presented as whole documents, from
which one is chosen.
8.6 Dual Majorities
A Policy amendment is considered in force if, at the end of
the balloting period, it has received a majority of the votes
cast, and has received a majority of the network-coordinator
votes cast, and has received a majority of the regional-coor-
dinator votes cast.
In the case of multiple policy changes which are considered on
the same ballot, a version must receive more than 50% of the
votes cast to be considered ratified. "Abstain" is a valid
vote in this case, effectively being a vote for not changing
the current policy as it simply increases the number of votes
required to ratify the proposed change.
8.7 Impeachment of a Zone Coordinator
8.7.1 Initiation
In extreme cases, a Zone Coordinator may be impeached by
referendum. Impeachment of a Zone Coordinator does not re-
quire a Policy violation. An impeachment proceeding is in-
voked when a majority of the Regional Coordinators in a zone
request the International Coordinator to institute it.
FidoNews 6-14 Page 24 3 Apr 1989
8.7.2 Procedure as in Policy Referendum
The provisions of sections 8.2 and 8.3 apply to impeachment
referenda.
The dual majority described in section 8.6 applies. Only
coordinators in the affected zone vote (even if the zone
coordinator is also the International Coordinator).
8.7.3 Voting Mechanism
The balloting procedures are set, the votes are collected, and
the results are announced by a Regional Coordinator chosen by
the Zone Coordinator who is being impeached. The removal of
the Zone Coordinator is effective two weeks after the end of
balloting if the impeachment carries.
8.7.4 Limited to once per year
The removal of a Zone Coordinator is primarily intended to be
a mechanism by which the net as a whole expresses displeasure
with the way Policy is being interpreted. At one time or
another, everyone is unhappy with the way policy is inter-
preted. In order to keep the Zone Coordinators interpreting
policy as opposed to defending themselves, at least one full
calendar year must elapse between impeachment referenda (re-
gardless of how many people hold the position of Zone Coor-
dinator during that year.)
Should a Zone Coordinator resign during an impeachment pro-
cess, the process is considered null and void, and does not
consume the "once per year quota".
9 Resolution of Disputes
9.1 General
The FidoNet judicial philosophy can be summed up in two rules:
1) Thou shalt not excessively annoy others.
2) Thou shalt not be too easily annoyed.
In other words, there are no hard and fast rules of conduct,
but reasonably polite behavior is expected. Also, in any
dispute both sides are examined, and action could be taken
against either or both parties. ("Judge not, lest ye be
judged!")
The coordinator structure has the responsibility for defining
"excessively annoying". Like a common definition of pornogra-
phy ("I can't define it, but I know it when I see it."), a
hard and fast definition of acceptable FidoNet behavior is not
possible. The guidelines in this policy are deliberately
vague to provide the freedom that the coordinator structure
FidoNews 6-14 Page 25 3 Apr 1989
requires to respond to the needs of a growing and changing
community.
The first step in any dispute between sysops is for the sysops
to attempt to communicate directly, at least by netmail,
preferably by voice. Any complaint made that has skipped this
most basic communication step will be rejected.
Filing a formal complaint is not an action which should be
taken lightly. Investigation and response to complaints
requires time which coordinators would prefer to spend doing
more constructive activities. Persons who persist in filing
trivial policy complaints may find themselves on the wrong
side of an annoying-behavior complaint. Complaints must be
accompanied with verifiable evidence, generally copies of
messages; a simple word-of-mouth complaint will be dismissed
out of hand.
Failure to follow the procedures herein described (in particu-
lar, by skipping a coordinator, or involving a coordinator not
in the appeal chain) is in and of itself annoying behavior.
9.2 Problems with Another Node
If you are having problems with another node, you should first
try to work it out via netmail or voice conversation with the
other sysop.
If this fails to resolve the problem, you should complain to
your Network Coordinator and his Network Coordinator. If one
or both of you is not in a network, then complain to the
appropriate Regional Coordinator. Should this fail to provide
satisfaction, you have the right to follow the appeal process
described in section 9.5.
9.3 Problems with your Network Coordinator
If you are having problems with your Network Coordinator and
feel that you are not being treated properly, you are entitled
to a review of your situation. As with all disputes, the
first step is to communicate directly to attempt to resolve
the problem.
The next step is to contact your Regional Coordinator. If he
feels that your case has merit, there are several things he
may do. For example, he may order a change of Network Coordi-
nators, or even the disbanding of your network, though this is
unlikely. If you have been excommunicated by your Network
Coordinator, that judgement may be reversed, at which point
you will be reinstated into your net.
If you fail to obtain relief from your Regional Coordinator,
you have the right to follow the appeal process described in
section 9.5.
FidoNews 6-14 Page 26 3 Apr 1989
9.4 Problems with Other Coordinators
Complaints concerning annoying behavior on the part of any
coordinator are treated as in section 9.2 and should be filed
with the next level of coordinator. For example, if you feel
that your Regional Coordinator is guilty of annoying behavior
(as opposed to a failure to fulfill his duties as a coordina-
tor) you should file your complaint with the Zone Coordinator.
Complaints concerning the performance of a coordinator in
carrying out the duties mandated by policy are accepted only
from the level immediately below. For example, complaints
concerning the performance of Regional Coordinators would be
accepted from Network Coordinators and independents in that
region. Such complaints should be addressed to the Zone
Coordinator after an appropriate attempt to work them out by
direct communications.
9.5 Appeal Process
A decision made by a coordinator may be appealed to the next
level. Appeals must be made within two weeks of the decision
which is being appealed. All appeals must follow the chain of
command; if levels are skipped the appeal will be dismissed
out of hand.
An appeal will not result in a full investigation, but will be
based upon the documentation supplied by the parties at the
lower level. For example, an appeal of a Network Coordina-
tor's decision will be decided by the Regional Coordinator
based upon information provided by the coordinator and the
sysop involved; the Regional Coordinator is not expected to
make an independent attempt to gather information.
The appeal structure is as follows:
Network Coordinator decisions may be appealed to the
appropriate Regional Coordinator.
Regional Coordinator decisions may be appealed to the
appropriate Zone Coordinator. At this point, the Zone
Coordinator will make a decision and communicate it to
the Regional Coordinators in that zone. This decision
may be reversed by a majority vote of the Regional Coor-
dinators.
Zone Coordinator decisions may be appealed to the Inter-
national Coordinator. The International Coordinator will
make a decision and communicate it to the Zone Coordina-
tor Council, which may reverse it by majority vote.
If your problem is with a Zone Coordinator per se, that is, a
Zone Coordinator has committed a Policy violation against you,
your complaint should be filed with the International Coordi-
nator, who will make a decision and submit it to the Zone
FidoNews 6-14 Page 27 3 Apr 1989
Coordinator Council for possible reversal, as described above.
9.6 Statute of Limitations
A complaint may not be filed more than 60 days after the date
of discovery of the source of the infraction, either by admis-
sion or technical evidence. Complaints may not be filed more
than 120 days after the incident unless they involve explicit-
ly illegal behavior.
9.7 Right to a Speedy Decision
A coordinator is required to render a final decision and
notify the parties involved within 30 days of the receipt of
the complaint or appeal.
9.8 Return to Original Network
Once a policy dispute is resolved, any nodes reinstated on
appeal are returned to the local network or region to which
they geographically or technically belong.
9.9 Echomail
Echomail is an important and powerful force in FidoNet. For
the purposes of Policy Disputes, echomail is simply a differ-
ent flavor of netmail, and is therefore covered by Policy. By
its nature, echomail places unique technical and social de-
mands on the net over and above those covered by this version
of Policy. In recognition of this, an echomail policy which
extends (and does not contradict) general Policy, maintained
by the Echomail Coordinators, and ratified by a process simi-
lar to that of this document, is recognized by the FidoNet
Coordinators as a valid structure for dispute resolution on
matters pertaining to echomail. At some future date the
echomail policy document may be merged with this one.
9.10 Case Histories
Most of FidoNet Policy is interpretive in nature. No one can
see what is to come in our rapidly changing environment.
Policy itself is only a part of what is used as the ground
rules for mediating disputes -- as or more important are the
precedents.
In order to accommodate this process, case histories may be
added to or removed from this document by the International
Coordinator, with such a revision subject to reversal by the
Zone Coordinator Council. Should Policy be amended in such a
way to invalidate a precedent, Policy supersedes said prece-
dent. (A carefully prepared amendment would address this by
FidoNews 6-14 Page 28 3 Apr 1989
removing the precedent reference as a part of the amendment.)
Although a case may be removed, the text of a case history may
not be modified by any mechanism. Case history is written
close to the time of the decision, by those involved with it.
Amending the text of a case history is the same as revising
history, something quite inappropriate in an organization
dedicated to moving information.
10 Appendices
10.1 General
The Appendices of this document are exceptions to the normal
ratification process. Section 10.2 can be changed by the
appropriate Zone Coordinator, and section 10.3 may be modified
by the International Coordinator (see Section 9.10).
10.2 Timing of Zone Mail Hour
Zone Mail Hour is observed each day, including weekends and
holidays. The time is based upon Universal Coordinated Time
(UTC), also known as Greenwich Mean time (GMT). In areas
which observe Daylight Savings Time during part of the year,
the local time of zone mail hour will change because FidoNet
does not observe Daylight Savings Time. The exact timing of
Zone Mail Hour is set for each zone by the Zone Coordinator.
In FidoNet Zone 1, Zone Mail Hour is observed from 0900 to
1000 UTC. In each of the time zones, this is:
Eastern Standard Time 4 AM to 5 AM
Central Standard Time 3 AM to 4 AM
Mountain Standard Time 2 AM to 3 AM
Pacific Standard Time 1 AM to 2 AM
Hawaii Standard Time 11 PM to Midnight
In FidoNet Zone 2, Zone Mail Hour is observed from 0230 to
0330 UTC.
In Fidonet Zone 3, Zone Mail Hour is observed from 1800 to
1900 UTC. In each of the time Zones involved this is:
GMT +12 Zone 6:00 AM to 7:00 AM
(New Zealand)
GMT +10 Zone 4:00 AM to 5:00 AM
(East Australia)
(Papua New Guinea)
(Micronesia)
GMT +9.5 Zone 3:30 AM to 4:30 AM
FidoNews 6-14 Page 29 3 Apr 1989
(Central Australia)
GMT +9 Zone 3:00 AM to 4:00 AM
(Japan)
(Korea)
(Eastern Indonesia)
GMT +8 Zone 2:00 AM to 3:00 AM
(Hong Kong)
(Taiwan)
(Central Indonesia)
(Philippines)
GMT +7 Zone 1:00 AM to 2:00 AM
(Malaysia)
(Singapore)
(Thailand)
(Western Australia)
(Western Indonesia)
10.3 Case Histories
Case histories of past disputes are instructive to show gener-
al procedures and methods. Any decision may be included in
this document by a majority vote of either the Zone Coordina-
tor Council or the Regional Coordinators.
Policy4 significantly changes the functions of the Zone and
International Coordinators. In the following cases which were
decided using Policy3, substitute "Zone Coordinator" for all
occurrences of "International Coordinator(*)".
10.3.1 The Case of the Crooked Node
A sysop of a local node was using network mail to engage in
unethical business practices. His Network Coordinator became
very annoyed at this, and dropped the local from his nodelist.
The local appealed to his Regional Coordinator for assignment
as an independent node. The Regional Coordinator, after
checking with the Network Coordinator, decided that the Net-
work Coordinator was right to be annoyed. Independent status
was denied.
The International Coordinator(*) did not intervene.
10.3.2 The Case of the Hacker Mailer
A sysop of a local node made use of file attaches for extra
users to mail himself the USER.BBS file from several local
boards. The sysops of these boards felt annoyed at this, and
appealed to their Network Coordinator, who agreed and dropped
FidoNews 6-14 Page 30 3 Apr 1989
the offending node from the nodelist.
The Regional Coordinator was not consulted.
The International Coordinator(*) did not intervene.
10.3.3 The Case of the Bothered Barker
A local node became annoyed with his Network Coordinator for
failing to provide services. Repeated complaints to his Net-
work Coordinator did not satisfy him, so he appealed to the
International Coordinator(*).
The International Coordinator(*) dismissed the complaint
because the Regional Coordinator had not been consulted.
The local node submitted his complaint to his Regional Coordi-
nator, who investigated the case and discovered that there was
some justice to the complaint. He advised and assisted the
Network Coordinator in configuring his system to provide an
improved level of service to the local nodes.
The Regional Coordinator also decided that the local node was
being too easily annoyed, in that he was expecting services
not normally required of a Network Coordinator. The local
node was informed as to the true duties of a Network Coordina-
tor, and was advised to lower his expectations.
10.3.4 The Case of the Busy Beaver
A local node which was operated by a retail establishment was
engaged in making "bombing runs" to mail advertisements over
FidoNet. His Network Coordinator felt annoyed and handling
the outgoing traffic for a commercial operation, and asked the
local node to leave the network.
The local node applied to the Regional Coordinator, and was
granted status as an independent node in his region.
10.3.5 The Mark of the Devil
A local sysop whose board was used in conjunction with voodoo
rites, hacking, phreaking, and obscene material applied to a
Network Coordinator for a node number. The Network Coordina-
tor deemed that this board was exceptionally annoying, and
denied the request.
The Regional Coordinator was not consulted.
The International Coordinator(*), on seeing that the Regional
Coordinator had not been consulted, dismissed the case out of
hand. No further appeals were made.
FidoNews 6-14 Page 31 3 Apr 1989
10.3.6 The Case of the Sysop Twit
A patron of various local nodes had been roundly recognized by
all sysops as a twit. The user obtained his own system,
became a sysop, and applied for a node number. The Network
Coordinator denied the request. No appeals were made.
10.3.7 The Case of the Echomail Junkie
A local node became enamored with echomail and joined several
conferences, routing his outbound mail through his network.
He then started an echomail conference of his own and began
relaying echomail between several systems, again routing it
all through his network.
His Network Coordinator observed that network performance was
becoming seriously impaired. The offending node was told to
hold it down. A compromise was reached whereby much of the
echomail traffic was no longer routed through the network, and
routed echomail was limited to twenty messages per night. No
appeals were made.
10.3.8 The Case of the Bouncing Board
A local user decided to establish a node to promote a worthy
charity. The machine being used was also used for various
other activities during the day, and the sysop was often
called away. His coworkers would often forget to bring the
board up at the end of the day while he was away, so the node
was often down for extended periods. The Network Coordinator,
finding the node unable to receive mail, would mark it down.
The sysop would return, restart the board, and ask to be
reinstated.
The Network Coordinator eventually decided that the sysop was
not able to maintain a reliable system, and removed him from
the nodelist completely. Subsequent requests for a node
number from the same sysop were turned down. No appeals were
made.
10.5 Credits, acknowledgments, etc.
Fido and FidoNet are registered trademarks of Fido Software,
Inc.
Index
-1/-1, 2.3
Additional mail events in local network 2.1.8
Administrative Region 6.1
FidoNews 6-14 Page 32 3 Apr 1989
Advantages to network membership 2.2
Alteration of mail 2.1.5
Answering machine 2.3
Announcement of voting results 8.2
Annoying behavior 1.3.5, 1.4.8, 2.1.1, 2.1.2, 2.1.4, 2.1.6,
2.1.7, 2.1.8, 2.1.11, 2.3, 4.2, 4.3, 5.2, 9, 10
Appeal chain 9.5
Availability of NodeList 1.3.4
Balloting Period 8.4
Bombing run 4.2
BossNode 1.2.1
Boundaries 1.3.2
Calling areas 1.3.2, 5.6, 5.7
Case histories 9.10, 10.3
Changing node numbers 4.3, 5.2
Commercial messages 2.1.4, 4.2
Contributions to FidoNews 1.3.1
Current nodelist 2.1.11
Daylight Savings Time 2.1.14
Difference file 4.5, 5.8, 8.2
Disclosing private mail 2.1.6
Discussion period 8.2
Disputes 9
Distribution of ballots 8.2
Down 2.3, 4.4, 5.5
Downloading by users 3.6, 4.5, 5.8
Dual majority 8.6, 8.7.2
EchoMail 1.4.5, 4.2, 9.9
Effective date (policy change) 8.2
Elections 1.4.1
Eligibility to vote 8.3
Encryption 2.1.4, 4.2
Exceptions 5.6
Excessively annoying behavior 1.3.5, 1.4.8, 2.1.1, 2.1.2, 2.1.4,
2.1.6, 2.1.7, 2.1.8, 2.1.11, 2.3, 4.2, 4.3, 5.2, 9, 10
Exclusivity of Zone Mail Hour 2.1.8
Excommunication 2.1.12, 4.3, 5.2, 9
Exemptions, node location 1.3.2, 5.6
Familiarity with policy 2.1.2, 2.2
FidoNet, definition 1.2.6
FidoNews 1.3.1
availability 3.1, 4.5, 5.8
FTSC 2.4
Gateway 2.1.3
Geography 1.3.2, 5.6
Glue 4.5
Hats 3.4
Host-routed mail 4.2
How to obtain a node number 2.2
Hub 1.4.6 4.4
Illegal behavior 2.1.1, 9.6
Illegal mail 4.2
Impeachment 8.7
In-transit mail 2.1.6.1
Independent node 4.2, 5.2
Inter-zonal questions 1.4.2
FidoNews 6-14 Page 33 3 Apr 1989
International Coordinator 1.4.1, 1.4.9, 7
International FidoNet Association 1.2.6
Language 1.0
Levels of FidoNet 1.2, 1.4
Local calling areas 1.3.2
Local policies 1.2, 3.3
Mail 1.4.5, 4.2
Majority 8.6, 8.7.2
Member of area administrated 3.5
Modification of mail 2.1.5
National Mail Hour see Zone Mail Hour
Network
advantages 2.2
boundaries 1.3.2, 5.4
definition 1.2.3
forming 2.4, 5.3
hub 1.4.6, 4.4
numbers 2.2, 5.4
Network Coordinator 1.4.5
procedures 4
replacement 5.7, 9.3
Network Mail Hour see Zone Mail Hour
New sysops 2.1.2, 3.6
Node numbers 4.3, 5.2
obtaining 2.2
Nodelist 1.3.4, 2.2, 4.4, 5.5
availability 3.1, 4.5, 5.8
changes 4.4, 5.2
current 2.1.11
definition 1.3.4
format 10.3
official 1.3.4
Nodes
definition 1.2.2
down 2.3
Observing mail events 2.1.8, 2.1.10
Obtaining a node number 2.2
Offensive messages 2.1.5
Partial nodelist 1.3.4
Pirated software 2.1.1
Point of origin 2.1.3
Points 1.2.1, 1.4.8, 2.1.3
Policy 3.1, 3.3, 4.5, 5.8
changing 8
familiarity with 2.1.2, 2.2
local 1.2, 3.3
Precedent 3.7, 9.10, 10.3
Private messsages 2.1.6
Private network 1.2.1
Private nodes 2.1.9
Problem resolution 9
Public BBS 3.6
Ratification 7.1
Referendum 1.4.1, 8
Regional Coordinator 1.4.4
procedures 5
FidoNews 6-14 Page 34 3 Apr 1989
replacement 6.1, 9.4
Regions 1.2.4
Replacement of coordinators 1.4.9
Replacing services 3.4
Requirements to be in NodeList 1.3.4, 2.1.2, 2.2
Resignation of ZC 8.7.4
Resolution of disputes 9
Results Announcement 8.2
Review of decisions 3.7
Review of routed traffic 2.1.4
Routing 2.1.4 - 2.1.7, 4.2
Routing Hub 1.4.6, 4.4
Rules 9.1
Speedy decision 9.7
Statute of limitations 9.6
Submissions to FidoNews 1.3.1
Sysop procedures 2
System operator (sysop) 1.4.7
Three-tiered networks 1.4.6
Time limit on decision 9.7
Timing of Zone Mail Hour 2.1.13, 2.1.14, 10.2
Top-down 1.4.9
Tradition 3.7
Trivial network 5.3
Unattended systems 2.3
Updates to nodelist 3.2
User 1.4.8
User access during ZMH 2.1.8
Vacation 2.3
Vote 8
eligibility 8.3, 8.7.2
ZMH see Zone Mail Hour
Zone Coordinator 1.4.3, 6
election 1.4.9, 6.2
impeachment 8.7
procedures 6
removal 6.2
resignation during impeachment 8.7.4
Zone Coordinator Council 1.4.2, 7.1
Zone Mail Hour 1.3.3, 2.1.8
timing 2.1.13, 2.1.14, 10.2
Zones
definition 1.2.5
new 1.4.2
unique 1.3.2
-----------------------------------------------------------------
FidoNews 6-14 Page 35 3 Apr 1989
Jeff Sheese, JStek BBS
Fidonet 1:109/116 (Netmail HOST routed via 1:109/100)
EggNet 99:9200/1 (Netmail HOST routed via 99:9200/0)
ZOW, Yet Another Fantastically New File Packer! (Part 2 of 2)
Yes, yet ANOTHER fantastically new file packer is about to hit
the public domain software scene!
If you read last week's Fidonews article about ZOW, your probably
wondering how I can do all this wonderful stuff in one program.
Well, here is the English psuedo-code that I used to develop the
software package. Remember, I mentioned that ZOW formats are
public domain!
1. The command line for calling ZOW is "ZOW cmd FILENAME.EXT",
where 'cmd' is GET or PUT.
2. To pack a file of any given size to only 2K one must issue
the command "ZOW PUT FILENAME.EXT".
3. To retrieve a file from it's ZOW format, one must issue the
command "ZOW GET FILENAME.EXT".
4. ZOW parses the command line to determine the command,
whether it be GET or PUT.
5. Method for PUT, or packing the data file:
a. ZOW parses the command line to get the filename and
extender.
b. ZOW creates the file "FILENAME.ZOW", using ZOW as the
filename extender.
c. ZOW stores a copyright notice, starting at the
beginning of "FILENAME.ZOW", ending with an ASCII end
of file mark. This is so that anyone using the TYPE
command to list the contents of the ZOW formatted file
will see that it's a ZOW file.
d. ZOW stores the original "FILENAME.EXT" after the ASCII
end of file mark.
e. ZOW fills the rest of the 2048 byte "FILENAME.ZOW" file
with random numbers. The amount of time to do this is
determined by a random number generator, seeded with
the number equal to the size of the original file.
f. ZOW closes "FILENAME.ZOW".
g. ZOW changes the attributes of "FILENAME.ZOW" so that
it's a SYSTEM, HIDDEN, READ-ONLY file.
Next the user does a directory of the floppy disk. Notice that
"FILENAME.EXT" is gone and "FILENAME.ZOW" is in it's place? Also
notice that "FILENAME.ZOW" is only 2048 bytes long!
I'm really excited about my new file packer! As a matter of fact
I'm going to call a lawyer tomorrow and copyright it! Forget you
saw the English Pseudo code! *I* own it now! I can make a lot
of money off this thing and it's mine, all mine!!! By the time
you read this I would have copyrighted it! i'm going to
copyright it so all you joust queens can forget you ever saw
it!!!!!!! forget i said anything about public domain!!!!!!!!
public domain is for the birds!!!! get real!!!! get a life!!!!
FidoNews 6-14 Page 36 3 Apr 1989
DENIAL OF COPYRIGHTS
This article has been provided pursuant to absolutely no
License Agreement containing restrictions on its use. This
article contains all valuable trade secrets and proprietary
information of JStek Enterprises and is not protected by Federal
Copyright Law. It may be copied or distributed in any form or
medium, disclosed to third parties, or used in any manner not
provided for in the aforementioned nonexistant License Agreement
except without prior written authorization from JStek
Enterprises.
This article is the property of JStek Enterprises (who has
their own FedEx account!) as its created work. This work
includes certain individual portions provided to JStek
Enterprises by operators and users of the JStek Bulletin Boards.
JStek has the right to create and distribute these articles
based, in part, on rights granted to it by those originating such
portions. Other than the rights granted JStek, those creating
and maintaining the portions retain all residual rights in and to
each's individual portion. Specific manure rights are hereby
granted to whomever wants to clean up the mess.
Everyone is granted any right to use, sale, duplication or
distribution of this article for any commercial purpose. I
figure if your willing to copy it and present it as your own, I
must have done something right!
(This article may be reproduced without permission and may
also be excerpted out of context in a misleading way. -jes)
-----------------------------------------------------------------
FidoNews 6-14 Page 37 3 Apr 1989
=================================================================
COLUMNS
=================================================================
The Veterinarian's Corner
Excerpts from the ANIMED GroupMail Conference
by Don Thomson, 1:102/1005
With the winter weather, and more of us traveling to the ski
slopes, the proper antifreeze in the radiator can be a lifesaver.
Unfortunately, many 'do-it-yourselfers' who will do the radiator
flushes and replace the old coolant with new antifreeze are
unaware that Ethylene Glycol based antifreezes are highly toxic.
Ethylene glycol, which acts to lower the freezing point of
radiator coolant (and also raises the boiling point), is
particularly attractive to animals. It has a sweet taste, and if
simply drained into the street gutter, or into an open catch pan
where an animal can lap it up, may spell kidney failure in short
order.
The first signs of ethylene glycol poisoning are a 'drunken'
incoordination, but as the agent is metabolized by the liver, it
becomes a potent toxin for the kidneys. Treatment must be
initiated extremely early or severe damage will be done. Very
few pets recover without prolonged dialysis if the initial
poisoning is not treated immediately with the appropriate
antidotes.
This is DEFINATELY one case where PREVENTION is paramount!
DB Thomson, DVM
1:102/1005
9:871/16
-----------------------------------------------------------------
FidoNews 6-14 Page 38 3 Apr 1989
=================================================================
LETTERS TO THE EDITOR
=================================================================
From: Robert Heller @ 1:321/153.0 (Locks Hill BBS, Wendell, Mass)
Subject: "Will ZIP Replace ARC?" (Article by John Herro 1:363/6,
in FidoNews V6 #11)
Date: Sat Mar 25, 1989 12:18:24.58
I'd like to say a few words on the whole "compression wars" that
has been going on for some time now in various forums.
Most of the "new" compression/packing/archiving programs only
run on MS-DOS systems (i.e. Intel 8086 derived systems). Of the
many (I have not counted recently) computers I use, both at home
(2) and at work (many others), only one has a Intel 8086 derived
CPU, and it does not run MS-DOS. The computer my BBS runs on is
a 68000-based system (it presently runs CP/M-68K and will be soon
running OS-9/68000). There are only two archiver program that
runs on all of them (more or less): ARC 5.12 and Zoo (2.01). ARC
was an extreem pain to port out of the MS-DOS world (it was not
written in a portable fashion). I ported Zoo to OS-9/68000 very
easily. While Zoo may not be the fastest (or the tightest)
packer, it does fairly well. ARC 5.12 tends to run like a dog
and does not pack the best, but it is an old program.
Because I have no way of verifying them, I won't be supporting
the use of .ZIP files on my bbs. I do not think it is a good
idea to make a packing method a "standard" until some effort has
gone into making software that can handle the proposed "standard"
archives under many (if not most/all) different operating systems
and processor types. ARC was ported in self-defense (with great
difficulty in some cases). Zoo was written with the idea of
being ported to different operating systems, compilers, and
processor types. Unless/until the same can be said of PKZIP or
any of the other "new" compression/packer/archiver programs, I
don't think we should be talking about establishing standards as
yet.
Comments, questions, etc. welcome.
Robert Heller
ARPANet: Heller@cs.umass.edu
BITNET: Heller@UMass.BITNET
FidoNet: 1:321/153.0 (Locks Hill BBS,
1-508-544-8337,
300/1200/2400 BAUD)
BIX: locks.hill.bbs
-----------------------------------------------------------------
FidoNews 6-14 Page 39 3 Apr 1989
=================================================================
LATEST VERSIONS
=================================================================
Latest Software Versions
Bulletin Board Software
Name Version Name Version Name Version
Fido 12k* Opus 1.03b TBBS 2.1
QuickBBS 2.03 TPBoard 5.0 TComm/TCommNet 3.4*
Lynx 1.22 Phoenix 1.3 RBBS 17.1D
Network Node List Other
Mailers Version Utilities Version Utilities Version
Dutchie 2.90C* EditNL 4.00 ARC 6.01*
SEAdog 4.50* MakeNL 2.12 ARCmail 2.0*
BinkleyTerm 2.20* Prune 1.40 ConfMail 4.00
D'Bridge 1.18* XlatList 2.90* TPB Editor 1.21
FrontDoor 2.0 XlaxNode 2.32* TCOMMail 2.1*
PRENM 1.40 XlaxDiff 2.32* TMail 8901*
ParseList 1.30 UFGATE 1.02*
GROUP 2.04*
EMM 1.40
MSGED 1.99*
XRS 1.2*
* Recently changed
Utility authors: Please help keep this list up to date by
reporting new versions to 1:1/1. It is not our intent to list
all utilities here, only those which verge on necessity.
-----------------------------------------------------------------
FidoNews 6-14 Page 40 3 Apr 1989
=================================================================
NOTICES
=================================================================
The Interrupt Stack
8 May 1989
Digital Equipment Corporations User Society (DECUS) will be
holding its semi-annual symposium in Atlanta, GA. Runs
through May 12. As usual sysop's will get together and chat.
19 May 1989
Start of EuroCon III at Eindhoven, The Netherlands
24 Aug 1989
Voyager 2 passes Neptune.
24 Aug 1989
FidoCon '89 starts at the Holiday Inn in San Jose,
California. Trade show, seminars, etc. Contact 1/89
for info.
5 Oct 1989
20th Anniversary of "Monty Python's Flying Circus"
If you have something which you would like to see on this
calendar, please send a message to FidoNet node 1:1/1.
-----------------------------------------------------------------
FidoNews 6-14 Page 41 3 Apr 1989
OFFICERS OF THE INTERNATIONAL FIDONET ASSOCIATION
Mort Sternheim 1:321/109 Chairman of the Board
Bob Rudolph 1:261/628 President
Matt Whelan 3:3/1 Vice President
Bill Bolton 3:711/403 Vice President-Technical Coordinator
Linda Grennan 1:147/1 Secretary
Kris Veitch 1:147/30 Treasurer
IFNA COMMITTEE AND BOARD CHAIRS
Administration and Finance Mark Grennan 1:147/1
Board of Directors Mort Sternheim 1:321/109
Bylaws Don Daniels 1:107/210
Ethics Vic Hill 1:147/4
Executive Committee Bob Rudolph 1:261/628
International Affairs Rob Gonsalves 2:500/1
Membership Services David Drexler 1:147/1
Nominations & Elections David Melnick 1:107/233
Public Affairs David Drexler 1:147/1
Publications Rick Siegel 1:107/27
Security & Individual Rights Jim Cannell 1:143/21
Technical Standards Rick Moore 1:115/333
IFNA BOARD OF DIRECTORS
DIVISION AT-LARGE
10 Courtney Harris 1:130/732 Don Daniels 1:107/210
11 Bill Allbritten 1:11/301 Mort Sternheim 1:321/109
12 Bill Bolton 3:711/403 Mark Grennan 1:147/1
13 Irene Henderson 1:107/9 (vacant)
14 Ken Kaplan 1:100/22 Ted Polczyinski 1:154/5
15 Scott Miller 1:128/12 Matt Whelan 3:3/1
16 Ivan Schaffel 1:141/390 Robert Rudolph 1:261/628
17 Neal Curtin 1:343/1 Steve Jordan 1:206/2871
18 Andrew Adler 1:135/47 Kris Veitch 1:147/30
19 David Drexler 1:147/1 (vacant)
2 Henk Wevers 2:500/1 David Melnik 1:107/233
-----------------------------------------------------------------
FidoNews 6-14 Page 42 3 Apr 1989
__
The World's First / \
BBS Network /|oo \
* FidoNet * (_| /_)
_`@/_ \ _
| | \ \\
| (*) | \ ))
______ |__U__| / \//
/ Fido \ _//|| _\ /
(________) (_/(_|(____/ (tm)
Membership for the International FidoNet Association
Membership in IFNA is open to any individual or organization that
pays a specified annual membership fee. IFNA serves the
international FidoNet-compatible electronic mail community to
increase worldwide communications.
Member Name _______________________________ Date _______________
Address _________________________________________________________
City ____________________________________________________________
State ________________________________ Zip _____________________
Country _________________________________________________________
Home Phone (Voice) ______________________________________________
Work Phone (Voice) ______________________________________________
Zone:Net/Node Number ____________________________________________
BBS Name ________________________________________________________
BBS Phone Number ________________________________________________
Baud Rates Supported ____________________________________________
Board Restrictions ______________________________________________
Your Special Interests __________________________________________
_________________________________________________________________
_________________________________________________________________
In what areas would you be willing to help in FidoNet? __________
_________________________________________________________________
_________________________________________________________________
Send this membership form and a check or money order for $25 in
US Funds to:
International FidoNet Association
PO Box 41143
St Louis, Missouri 63141
USA
Thank you for your membership! Your participation will help to
insure the future of FidoNet.
Please NOTE that IFNA is a general not-for-profit organization
and Articles of Association and By-Laws were adopted by the
membership in January 1987. The second elected Board of Directors
was filled in August 1988. The IFNA Echomail Conference has been
established on FidoNet to assist the Board. We welcome your
input to this Conference.
-----------------------------------------------------------------