1887 lines
90 KiB
Plaintext
1887 lines
90 KiB
Plaintext
Volume 6, Number 17 24 April 1989
|
||
+---------------------------------------------------------------+
|
||
| _ |
|
||
| / \ |
|
||
| /|oo \ |
|
||
| - FidoNews - (_| /_) |
|
||
| _`@/_ \ _ |
|
||
| International | | \ \\ |
|
||
| FidoNet Association | (*) | \ )) |
|
||
| Newsletter ______ |__U__| / \// |
|
||
| / FIDO \ _//|| _\ / |
|
||
| (________) (_/(_|(____/ |
|
||
| (jm) |
|
||
+---------------------------------------------------------------+
|
||
Editor in Chief: Vince Perriello
|
||
Editors Emeritii: Dale Lovell
|
||
Thom Henderson
|
||
Chief Procrastinator Emeritus: Tom Jennings
|
||
Contributing Editors: Al Arango
|
||
|
||
FidoNews is published weekly by the International FidoNet
|
||
Association as its official newsletter. You are encouraged to
|
||
submit articles for publication in FidoNews. Article submission
|
||
standards are contained in the file ARTSPEC.DOC, available from
|
||
node 1:1/1. 1:1/1 is a Continuous Mail system, available for
|
||
network mail 24 hours a day.
|
||
|
||
Copyright 1989 by the International FidoNet Association. All
|
||
rights reserved. Duplication and/or distribution permitted for
|
||
noncommercial purposes only. For use in other circumstances,
|
||
please contact IFNA at (314) 576-4067. IFNA may also be contacted
|
||
at PO Box 41143, St. Louis, MO 63141.
|
||
|
||
Fido and FidoNet are registered trademarks of Tom Jennings of
|
||
Fido Software, 164 Shipley Avenue, San Francisco, CA 94107 and
|
||
are used with permission.
|
||
|
||
We don't necessarily agree with the contents of every article
|
||
published here. Most of these materials are unsolicited. No
|
||
article will be rejected which is properly attributed and legally
|
||
acceptable. We will publish every responsible submission
|
||
received.
|
||
|
||
|
||
Table of Contents
|
||
1. ARTICLES ................................................. 1
|
||
Reflections on the new Policy ............................ 1
|
||
POLICY4 Reaction ......................................... 11
|
||
Reflections on POLICY4 ................................... 14
|
||
2. LETTERS TO THE EDITOR .................................... 29
|
||
Message Encryption ....................................... 29
|
||
3. LATEST VERSIONS .......................................... 30
|
||
Latest Software Versions ................................. 30
|
||
4. NOTICES .................................................. 31
|
||
The Interrupt Stack ...................................... 31
|
||
FidoNews 6-17 Page 1 24 Apr 1989
|
||
|
||
|
||
=================================================================
|
||
ARTICLES
|
||
=================================================================
|
||
|
||
Vince Perriello
|
||
Fidonet 1:141/491
|
||
|
||
|
||
Reflections on the new Draft Policy document
|
||
|
||
|
||
I believe that the new Policy document is a good document. I
|
||
also believe that it has some important flaws and omissions.
|
||
Most of these are in the area of unnecessarily rigid or
|
||
arbitrary text. I've covered the areas I feel need to be either
|
||
further explained or corrected below.
|
||
|
||
This document should be corrected before the ratification vote.
|
||
But I feel that both the corrections and the vote should take
|
||
place as soon as possible. The author(s) of Policy4 have done a
|
||
good job addressing problems that have cropped up since the
|
||
prior version and we need to have it in force as soon as
|
||
possible.
|
||
|
||
|
||
[Beginning of quoted passages]
|
||
|
||
> The official language of FidoNet is English. All documents
|
||
> must exist in English. Translation into other languages is
|
||
> encouraged.
|
||
|
||
I thought this somewhat jingoistic until someone pointed out to
|
||
me that this had first appeared in a submission from Henk
|
||
Wevers. Maybe I have gotten too sensitive to the North American
|
||
bias issue. If Henk thought this necessary, then I'll go with
|
||
it. But why was it considered so important that it even
|
||
preceded the definition of Fidonet?
|
||
|
||
> FidoNet is an amateur electronic mail system. As such, all of
|
||
> its participants and operators are unpaid volunteers. From
|
||
> its early beginning as a few friends swapping messages back
|
||
> and forth (1984), it now (1989) includes over 5,000 systems on
|
||
> six continents.
|
||
|
||
What a difference five years makes. It's too bad we don't have
|
||
5,000 FRIENDS swapping messages back and forth <sigh>.
|
||
|
||
> FidoNet is not a common carrier or a value-added service
|
||
> network and is a public network only in as much as the
|
||
> independent, constituent nodes may individually provide public
|
||
> access to the network on their system.
|
||
|
||
Good. Though I would prefer that we also said something here
|
||
like "individual nodes providing commercial services using
|
||
Fidonet as a transport mechanism are acting solely for their own
|
||
purposes and not as a member or agent of Fidonet as a whole".
|
||
FidoNews 6-17 Page 2 24 Apr 1989
|
||
|
||
|
||
> FidoNet is large enough that it would quickly fall apart of
|
||
> its own weight unless some sort of structure and control were
|
||
> imposed on it. Multinet operation provides the structure.
|
||
> Decentralized management provides the control.
|
||
|
||
Now HERE's an interesting paragraph. You mean that the IC, the
|
||
Z1C and the Z1RC's are planning on relaxing the iron fist? The
|
||
use of the word "decentralized" seems to imply this. Good.
|
||
More power to them, er, to the Nodes and NC's I mean.
|
||
|
||
> In supporting points, the bossnode makes use of a private net
|
||
> number which should not be visible outside of the
|
||
> bossnode-point relationship except as the first entry in the
|
||
> ^aPATH line.
|
||
|
||
What's a ^aPATH line? Is this Echomail? Why are we talking
|
||
about specific Echomail implementation issues in Policy?
|
||
|
||
> Unfortunately, should the point call another system directly
|
||
> (to do a file request, for example), the private network
|
||
> number will appear as the caller's address. In this way,
|
||
> points are different from users, since they operate
|
||
> FidoNet-compatible mailers which are capable of contacting
|
||
> systems other than the bossnode.
|
||
|
||
May I infer from this that if a point makes a file request from
|
||
a node other than its bossnode that it is operating in a manner
|
||
which is consistent with Policy? This issue nearly brought the
|
||
BINKLEY echomail conference to its knees recently. Some clear
|
||
statement on the issue would be a welcome relief.
|
||
|
||
> A zone is a large geographic area containing many regions,
|
||
> covering one or more countries and/or continents.
|
||
|
||
This language is probably too restrictive. How about "which MAY
|
||
cover one or more ..."? I trust you agree that, for example,
|
||
the Soviet Union or (Mainland) China are so large they might
|
||
require multiple zones?
|
||
|
||
> FidoNews is a weekly newsletter distributed throughout the
|
||
> network by the coordinator structure.
|
||
|
||
I don't believe that the distribution is limited to
|
||
coordinators.
|
||
|
||
> It is an important medium by which FidoNet sysops communicate
|
||
> with each other. FidoNews provides a sense of being a
|
||
> community of people with common interests. Accordingly,
|
||
> sysops and users are encouraged to contribute to FidoNews.
|
||
|
||
(Newsletter Editor hat on) Thank you very much. (hat off)
|
||
|
||
> Contributions are submitted to node 1/1; a file describing
|
||
> the format to be used is available on many systems.
|
||
|
||
Why not say it's available on 1/1? And why not say 1:1/1?
|
||
FidoNews 6-17 Page 3 24 Apr 1989
|
||
|
||
|
||
There ARE other Zones, you know.
|
||
|
||
> Network boundaries are based on calling areas as defined by
|
||
> the local telephone company.
|
||
|
||
Not totally. Check out Net 132 in Zone 1, for example. It
|
||
includes at least two states and area codes.
|
||
|
||
> Even in the case of areas where node density is so great that
|
||
> more than one network is needed to serve one local calling
|
||
> area, a geographic guideline is used to decide which nodes
|
||
> belong to what network. Network membership is based on
|
||
> geographic or other purely technical rationale. It is not
|
||
> based on personal or social factors.
|
||
|
||
This makes a lot more sense than the preceding sentence. Maybe
|
||
the former should be scrapped or rewritten in favor of the
|
||
latter? Seems like what we really have is geography rightfully
|
||
taking precedence over local phone companies (which come in a
|
||
close second).
|
||
|
||
> Zone Mail Hour (ZMH) is a defined time during which all nodes in
|
||
> a zone are required to be able to accept netmail.
|
||
|
||
Might I suggest here you add a sentence? Such as " A given node
|
||
may use any method preferred by its operator to transfer mail,
|
||
but all nodes must be capable of falling back to the base
|
||
Fidonet protocol as defined in FTSC document FTS-0001"?
|
||
|
||
> The nodelist is a file updated weekly which contains the
|
||
> addresses of all recognized FidoNet nodes. This file is
|
||
> currently made available by the Zone Coordinator not later
|
||
> than Zone Mail Hour each Saturday, and is available
|
||
> electronically for download or file request at no charge.
|
||
|
||
Does this mean that 1:1/0 now allows file requests for this file
|
||
starting immediately after ZMH on Saturday?
|
||
|
||
> To be included in the nodelist, a system must meet the
|
||
> standards defined by this document. No other requirements may
|
||
> be imposed.
|
||
|
||
All the more reason to take FTS-0001's name in vain above. Did
|
||
you really mean to shut FTSC out here or was this just bad
|
||
language? If it was bad language, we'd best fix it. Like
|
||
"standards defined in this document or technical standards
|
||
ratified by the FTSC and accepted by the International
|
||
Coordinator" in place of "standards defined in this document"?
|
||
|
||
> In certain cases, the Zone Coordinators work as a council to
|
||
> provide advice to the International Coordinator.
|
||
|
||
When does the Council meet?
|
||
|
||
> The Network Coordinator is not required to provide a source
|
||
> for echomail.
|
||
FidoNews 6-17 Page 4 24 Apr 1989
|
||
|
||
|
||
No such statements were made about the IC, ZC or RC. Does this
|
||
mean that they ARE so required?
|
||
|
||
> (in discussion of Hubs)
|
||
> ... a network coordinator cannot delegate responsibility to
|
||
> mediate disputes.
|
||
|
||
Why not, as long as the NC will step in if the decision of the
|
||
Hub is not acceptable to all parties?
|
||
|
||
> The system operator (sysop) formulates a policy for running
|
||
> his board and dealing with users.
|
||
|
||
You meant "his or her", right? Also, how about cases where a
|
||
Fidonet node isn't a BBS? Or are we phasing those nodes out?
|
||
|
||
> The sysop must mesh with the rest of the FidoNet system if he
|
||
> is to send and receive mail, and the local policy must be
|
||
> consistent with other levels of FidoNet.
|
||
|
||
Here you meant to say "He or She", didn't you? I'll assume you
|
||
mean the policy of the board when you say "local policy" here.
|
||
So, let me see if this works. If the International Coordinator
|
||
states that messages about "foo" are considered annoying, then I
|
||
can't allow messages about "foo" on my system even if they are
|
||
in local-only message bases? Balderdash. Rewrite this part.
|
||
|
||
> The sysop is responsible for the actions of any user when they
|
||
> affect the rest of FidoNet. (If a user is annoying, the sysop
|
||
> is annoying.)
|
||
|
||
Does this mean that any user may get his sysop thrown out of
|
||
Fidonet with one well-placed message? Seems like the sysop
|
||
should be given an opportunity to correct, limit access, or
|
||
remove a user before a determination is made that the sysop is
|
||
being annoying due to the actions of a user.
|
||
|
||
> Any traffic entering FidoNet via a given node, if not from the
|
||
> sysop, is considered to be from a user, and is the
|
||
> responsibility of the sysop. This includes messages from
|
||
> point systems.
|
||
|
||
Seems fair, but please see the previous point. By the way, is
|
||
there any reason why this logic can't include BIDIRECTIONAL
|
||
gateways with so-called "Alternative Networks" which use Fidonet
|
||
technology?
|
||
|
||
> These levels act to distribute the administration and control
|
||
> of FidoNet to the lowest possible level, while still allowing
|
||
> for coordinated action over the entire mail system.
|
||
|
||
Exactly what we should have in Zone 1. Low-level ADMINISTRATION
|
||
and high-level COORDINATION.
|
||
|
||
> The sysop of an individual node can generally do as he
|
||
> pleases, as long as he observes the mail events, is not
|
||
FidoNews 6-17 Page 5 24 Apr 1989
|
||
|
||
|
||
> excessively annoying to other nodes on FidoNet, and does not
|
||
> promote or participate in the distribution of pirated
|
||
> copyrighted software or other illegal behavior via FidoNet.
|
||
|
||
How about if the sysop decides to do something completely legal
|
||
but blatantly commercial, and advertises access to Fidonet as a
|
||
valuable part of the service he or she (I try to stay gender
|
||
neutral myself) has to offer? Then for some reason a legal
|
||
proceeding is initiated due to some action this person has or
|
||
has not taken. Are we protected? Enquiring minds ...
|
||
|
||
> In order to understand the meaning of "excessively annoying",
|
||
> it is incumbent upon all sysops to occasionally re-read
|
||
> FidoNet policy. New sysops must familiarize themselves with
|
||
> policy before requesting a node number.
|
||
|
||
Too bad we can't have some kind of exam too, like they do for
|
||
drivers' licenses. But just having this here is something.
|
||
Please don't forget to make sure that NC's are familiar with
|
||
this section and take some steps to determine that the operator
|
||
of a new node has in fact read POLICY (though I have no idea
|
||
what those steps would be)
|
||
|
||
> A Sysop is responsible for all traffic entering FidoNet via
|
||
> his system. This includes (but is not limited to) traffic
|
||
> entered by his users, points, and any other networks for which
|
||
> he might act as a gateway. If a sysop allows "outside"
|
||
> messages to enter FidoNet via his system, he has a
|
||
> responsibility to ensure his system is clearly identified by
|
||
> FidoNet node number as the point of origin of that message,
|
||
> and a responsibility to act as a gateway in the reverse
|
||
> direction. Should such traffic result in a violation of
|
||
> Policy, the sysop must rectify the situation.
|
||
|
||
How come a Sysop can fix problems with gateways and points but
|
||
is considered annoying if she has an annoying user?
|
||
|
||
> FidoNet is an amateur system. Our technology is such that the
|
||
> privacy of messages cannot be guaranteed. Any sysop has the
|
||
> right to review traffic flowing through his system, if for no
|
||
> other reason than to ensure that the system is not being used
|
||
> for illegal purposes. Encryption obviously makes this review
|
||
> impossible. Therefore, encrypted and/or commercial traffic
|
||
> that is routed without the express permission of all the links
|
||
> in the delivery system constitutes annoying behavior.
|
||
|
||
I'm not saying that something doesn't need to be said about
|
||
routed encrypted messages. But I have a problem with this black
|
||
and white stuff. No room for interpretation. No room for any
|
||
kind of mitigating circumstances, such as pilot error. We may
|
||
be judged by future generations on the quality of our mercy.
|
||
|
||
> 2.1.6 Private Netmail
|
||
|
||
This entire section makes a lot of sense. Of course it reads
|
||
more like something out of a "guide to novice sysops" rather
|
||
FidoNews 6-17 Page 6 24 Apr 1989
|
||
|
||
|
||
than a Fidonet Policy and Procedures document. But I agree it
|
||
needs to be stated somewhere. Good show.
|
||
|
||
> If a sysop does not forward a message when he had previously
|
||
> agreed to perform such routing, the message must be returned
|
||
> to the sysop of the node at which it entered FidoNet with an
|
||
> explanation of why it was not forwarded.
|
||
|
||
OK. How about messages which are sent to a given node in error?
|
||
Is the receiving node obligated to either forward or bounce? It
|
||
appears that there's nothing to cover this here.
|
||
|
||
> Zone Mail Hour is the heart of FidoNet, as this is when
|
||
> network mail is passed between systems. Any system which
|
||
> wishes to be a part of FidoNet must be able to receive mail
|
||
> from any node in the nodelist during this time.
|
||
|
||
Sure wish you'd mention FTS-0001 somewhere.
|
||
|
||
> Echomail should not be transferred during ZMH.
|
||
|
||
That's a little stiff. I don't see any problem with ultra low
|
||
volume Echomail. Can we fix the language to make individual
|
||
interpretations possible for individual cases?
|
||
|
||
> User (BBS) access to a system is prohibited during ZMH.
|
||
|
||
Yeah!
|
||
|
||
> A system which is a member of a local network may also be
|
||
> required to observe additional mail events, as defined by the
|
||
> Network Coordinator. Access restrictions during local network
|
||
> periods are left to the discretion of the Network Coordinator.
|
||
|
||
Why not let the NC judge whether such things as Echomail
|
||
transfer constitute annoying behavior as well? You can see a
|
||
problem better when you're in the same town with the guy than if
|
||
you're a couple of states removed. Though the exceptions should
|
||
be few and far between.
|
||
|
||
> The rare exception to ZMH compliance is Private Nodes. Persons
|
||
> requesting private nodes should be supported as points if
|
||
> possible. A private listing is justified when the system must
|
||
> interface with many others, such as an echomail distributor.
|
||
> In these cases, the exact manner and timing of mail delivery
|
||
> is arranged between the private node and other systems. Such
|
||
> an agreement between a private system and a hub is not binding
|
||
> on any replacement for that hub. A private node must be a part
|
||
> of a network (they cannot be independents in the region.)
|
||
|
||
That all sounds good. I can think of other applications of
|
||
Private nodes, but your example is adequate.
|
||
|
||
> Private nodes are encouraged to honor ZMH.
|
||
|
||
I'm not quite sure why. As I see it, the main purpose of a
|
||
FidoNews 6-17 Page 7 24 Apr 1989
|
||
|
||
|
||
private node is to have a Fidonet mailbox with restricted
|
||
access. Since other systems will be able to contact the private
|
||
node directly only by prior arrangement, what's the point of
|
||
having the private node honor ZMH?
|
||
|
||
> It is considered annoying behavior to assist a system which
|
||
> was excommunicated in circumventing that removal from the
|
||
> nodelist. For example, if you decide to provide an echomail
|
||
> feed to your friend who has been excommunicated, it is likely
|
||
> that your listing will also be removed.
|
||
|
||
Hmmm. Would I be presumptuous to call this the Lee Kemp Clause?
|
||
You know, there are reasons other than what you envisioned. How
|
||
about this: a system is excommunicated because he doesn't
|
||
observe ZMH. So he decides to become a point off your system.
|
||
Does that mean you're history in Fidonet?
|
||
|
||
> Once you have located the network or region in your area, send
|
||
> a message containing a request for a node number to node zero
|
||
> of that network or region. The request must be sent by
|
||
> netmail, use address -1/-1, and include the following:
|
||
>
|
||
> 1) Your name.
|
||
> 2) The name of your system.
|
||
> 3) The city and state where your system is located.
|
||
> 4) The phone number to be used when calling your system.
|
||
> 5) Your hours of operation, netmail and BBS.
|
||
> 6) The maximum baud rate you can support.
|
||
|
||
So far, so good. Though I don't understand the insistence on
|
||
using -1/-1 for an address. I'm aware of an old default address
|
||
in Fido of -1/-1 and of an undocumented feature in one or more
|
||
current network mailers. But I'm also told that several
|
||
nets already have a preferred address other than -1/-1 which
|
||
they use for the purpose of new node applications.
|
||
|
||
> You must indicate that you have read, and agree to abide by,
|
||
> this document and all the current and future policies of
|
||
> FidoNet.
|
||
|
||
Yeah, right. Give me a break. Who on earth is crazy enough to
|
||
agree to abide by some future nonexistent document? Contact
|
||
your legal eagle and see if she thinks that any such agreement
|
||
is worth the oxide it's written on.
|
||
|
||
> Using a node number other than -1/-1 can cause problems for
|
||
> the coordinator involved. Simply assigning yourself a
|
||
> net/node number can be annoying, and can be grounds to reject
|
||
> your request.
|
||
|
||
See comment above regarding -1/-1.
|
||
|
||
> Never put an answering machine or similar device on your phone
|
||
> line while you are down. If you do, calling systems will get
|
||
> the machine repeatedly, racking up large phone bills, which is
|
||
> very annoying.
|
||
FidoNews 6-17 Page 8 24 Apr 1989
|
||
|
||
|
||
Why is it you use the magic phrase "annoying behavior" elsewhere
|
||
in cases where there are definite grey areas, and don't use it
|
||
HERE? A system that answers with a machine should be marked
|
||
DOWN! PERIOD! Make some effort to reach its owner, if you
|
||
can't then JUST MARK THAT SYSTEM DOWN!
|
||
|
||
> 3.1 Make Available Nodelists, Difference Files, and FidoNews
|
||
>
|
||
> Any Coordinator is responsible for obtaining and making
|
||
> available, on a weekly basis, nodelist difference files and
|
||
> FidoNews.
|
||
|
||
Well, which is it? In the heading, nodelists are mentioned; in
|
||
the accompanying text, they are not.
|
||
|
||
> In addition, a coordinator is required to forward any local
|
||
> policies he receives to the level above, and to review such
|
||
> policies. Although not required, common courtesy dictates
|
||
> that when formulating a local policy, the participation of the
|
||
> level above should be solicited.
|
||
|
||
This appears to be the only mention of local policy. Does this
|
||
mean that as long as it's not inconsistent with general policy,
|
||
that any local policy at all can be defined? With no consent
|
||
needed from the coordinators above?
|
||
|
||
> In addition, a new coordinator has the right to review any
|
||
> decision made by his predecessors for compliance with Policy,
|
||
> and take whatever actions may be necessary to rectify any
|
||
> situations not in compliance.
|
||
|
||
Does this include excommunication for cause (or refusal to do
|
||
so)? If so, we need some kind of statute of limitations.
|
||
|
||
>(From responsibilities of a Network Coordinator)
|
||
> It is also recommended, though not required, that you call a
|
||
> board which is applying for a node number before assigning it
|
||
> a node number.
|
||
|
||
As a USER? Why? If there are acceptability issues, they should
|
||
be documented here. If not, then what purpose would be served?
|
||
|
||
> You should use network mail to inform a new node of his node
|
||
> number, as this helps to insure that he is capable of
|
||
> receiving network mail.
|
||
|
||
That's the ticket. So why does an NC need to call a system
|
||
before granting a node number?
|
||
|
||
> You should to implement name changes ...
|
||
^^
|
||
Did this word just creep in?
|
||
|
||
> Policy, FidoNews, and the nodelist are the glue that holds us
|
||
> together. Without them, we would cease to be a community, and
|
||
> become just another random collection of bulletin boards.
|
||
FidoNews 6-17 Page 9 24 Apr 1989
|
||
|
||
|
||
So why doesn't a host need to have a full nodelist available any
|
||
more? Where does somebody get one if they need it?
|
||
|
||
> A Zone Coordinator is charged with the task of ensuring the
|
||
> smooth operation of his Zone. He does this by supervising the
|
||
> Regional Coordinators.
|
||
|
||
I hate that word "supervise". What place does the term
|
||
"supervision" have in an "amateur" network? By the way, it
|
||
doesn't seem to me that "coordinate" and "supervise" are the
|
||
same thing. So where can I find the description of the Zone
|
||
Supervisor?
|
||
|
||
>(from the section relating to Policy votes)
|
||
> Network coordinators are expected to assess the opinions of
|
||
> the members of their network, and to vote accordingly.
|
||
|
||
And what if they don't?
|
||
|
||
> If a number of alternatives are to be considered, they must be
|
||
> presented as whole documents, from which one is chosen.
|
||
|
||
What if more than one of them receives the requisite votes?
|
||
|
||
> A Policy amendment is considered in force if, at the end of
|
||
> the balloting period, it has received a majority of the votes
|
||
> cast, and has received a majority of the network-coordinator
|
||
> votes cast, and has received a majority of the regional-
|
||
> coordinator votes cast.
|
||
|
||
Let me get this straight. If 100% of the NC's vote in favor of
|
||
something but only 49% of the RC's do, then it fails? That's
|
||
democracy for ya. Can we at least make it a majority of one
|
||
plus a plurality of the other?
|
||
|
||
> In the case of multiple policy changes which are considered on
|
||
> the same ballot, a version must receive more than 50% of the
|
||
> votes cast to be considered ratified. "Abstain" is a valid
|
||
> vote in this case, effectively being a vote for not changing
|
||
> the current policy as it simply increases the number of votes
|
||
> required to ratify the proposed change.
|
||
|
||
This makes me even more certain that majority of one plus
|
||
plurality of the other makes sense. I don't believe in sleazy
|
||
voting tactics like this.
|
||
|
||
>(From Statute of Limitations clause)
|
||
> A complaint may not be filed more than 60 days after the date
|
||
> of discovery of the source of the infraction, either by
|
||
> admission or technical evidence. Complaints may not be filed
|
||
> more than 120 days after the incident unless they involve
|
||
> explicitly illegal behavior.
|
||
|
||
That's fine. Now let's say that the Coordinator finds in favor
|
||
of the person accused. Then the Coordinator leaves office. Can
|
||
the new coordinator reinitiate the proceedings, regardless of
|
||
FidoNews 6-17 Page 10 24 Apr 1989
|
||
|
||
|
||
the amount of time which has passed? Based on the earlier stuff
|
||
I pointed out, I would say that the answer is YES. That needs
|
||
to be addressed.
|
||
|
||
[End of quoted passages]
|
||
|
||
Those are the specific areas in which I saw problems in the
|
||
document. By and large, it's a good one, as I said above. I'd
|
||
like to see most of the changes proposed above in the final
|
||
version, though. Particularly the areas concerning FTSC. I
|
||
trust that the areas where annoying behavior is defined are
|
||
meant primarily to establish criteria for filing complaints and
|
||
not to lock a given Coordinator into a set course of action.
|
||
The reason I highlighted those areas was to make certain that
|
||
this was indeed the case.
|
||
|
||
I look forward to seeing language corrections and clarifications
|
||
added to the document, and to seeing it accepted by the *C's. I
|
||
can't encourage you enough to read this document yourself and to
|
||
discuss it with your fellow Sysops and with your respective Net
|
||
or Regional Coordinator. YOU are Fidonet. It's YOUR Policy.
|
||
Help make it the best Policy possible.
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 6-17 Page 11 24 Apr 1989
|
||
|
||
|
||
Randall Greylock
|
||
Fidonet 1:321/202
|
||
|
||
Disclaimers
|
||
|
||
I was involved in the process
|
||
|
||
First off, I'm biased. Much of the work on this Policy 4 was
|
||
done while I was an RC, and I had some influence on the form of
|
||
the document.
|
||
|
||
However, I do not pretend to speak for the coordinator
|
||
structure.
|
||
|
||
I also have to apologize to the coordinators, for in making my
|
||
comments to them when initially requested, I skimmed one big
|
||
section (Policy ratification), and missed what I feel is one of
|
||
the biggest flaws in the document.
|
||
|
||
|
||
I've seen Vince's Article
|
||
|
||
I've also seen a draft of Vince's article. For the most part, I
|
||
agree with his comments, although in some cases, what seemed
|
||
obvious to me was not obvious to others. (This is basically the
|
||
same problem as exists in P3.)
|
||
|
||
Oh, and I'm writing in extreme haste. It's 22:45 right now, I
|
||
have to have this sucker in by 23:00. It hasn't been spell
|
||
checked, grammar checked, or seriously logic checked. Sorry.
|
||
|
||
|
||
Original Design Goals
|
||
|
||
Minimal Changes from P3
|
||
|
||
One of the major goals of P4 (during my tenure, at least) was a
|
||
minimal set of changes from P3. The more changes there are, the
|
||
more argument there will be.
|
||
|
||
My feeling is this goal has largely been met.
|
||
|
||
|
||
Clear Path to P(N+1)
|
||
|
||
Another primary goal was the definition of how we get from P(n)
|
||
to P(n+1). While this goal has been met, I share the
|
||
reservations Vince has on this section of the document.
|
||
|
||
All in all, though, I can live with it.
|
||
|
||
|
||
Casting In Policy The Learning From Precedent
|
||
|
||
Finally, much of what was not so much to change Policy, but to
|
||
refine it - taking things decided by dispute and putting them
|
||
FidoNews 6-17 Page 12 24 Apr 1989
|
||
|
||
|
||
into clear Policy language. Much of the new text is not new
|
||
policy, but the application of Policy.
|
||
|
||
|
||
Problems - Perceived and Otherwise
|
||
|
||
Dual Majorities
|
||
|
||
The democratic procedures have changed greatly since last I saw
|
||
P4. At that time, the concept of two kinds of majorities was in
|
||
place in order to balance geography against population. In order
|
||
for Policy to be put in place, it had to be ratified by a
|
||
majority of those voting, and a majority of the Zones. The
|
||
intention (which may or may not have been well served) was to
|
||
ensure that a broad geographic consensus be reached for Policy
|
||
changes.
|
||
|
||
The concept of dual majorities applied to the levels of FidoNet
|
||
does not seem to provide any protection against anything. It
|
||
leaves the system such that a very small number of sysops can
|
||
dictate network philosophy - i.e., the RC's essentially have veto
|
||
power over any Policy initiative.
|
||
|
||
I do not necessarily believe democratic procedures are the best
|
||
way to run a network. But I do believe the majority of the
|
||
network feels otherwise. The language as it stands is an affront
|
||
to that viewpoint. An argument can (and will) be made that the
|
||
RC's are in the best position to formulate and evaluate Policy.
|
||
Further argument can and will be made that most people don't
|
||
participate anyway. While there is merit to both of these
|
||
arguments, this is not a good reason to institionalize a caste
|
||
system in the decision making process.
|
||
|
||
|
||
Usage of the Word Annoying
|
||
|
||
During my involvement in the P4 formulation, the word annoying
|
||
and the phrase excessively annoying were used rather precisely.
|
||
Annoying behaviour is not, in and of itself, excommunicatable.
|
||
Excessively annoying behaviour is. Annoying behaviour can
|
||
CUMULATIVELY become excessively annoying if steps are not taken
|
||
to rectify it.
|
||
|
||
Unfortunately, given the lack of precision in the usage of other
|
||
terms and phrases in the document, this distinction may have
|
||
been lost. Somewhere along the line, it would be nice to have
|
||
some word other than annoying to describe the "lesser" mode of
|
||
the term.
|
||
|
||
|
||
References to Technical Standards Documents
|
||
|
||
The biggest problem with Policy in all its incarnations is that
|
||
what seemed obvious to the authors is not nearly so obvious to
|
||
the readers. This is particularly true in the case of technical
|
||
standards and their relationship to this document.
|
||
FidoNews 6-17 Page 13 24 Apr 1989
|
||
|
||
|
||
It seemed obvious that saying "One must be capable of receiving
|
||
netmail during ZMH" implied FTS-0001 compliance. There is a
|
||
flip side of this problem Vince fails to mention, however - to
|
||
the best of my knowledge, there is no official list of compliant
|
||
software. Further, there is a serious problem of existence.
|
||
Does FidoNet exist? Does a relationship between FidoNet and
|
||
IFNA exist? Does a relationship between IFNA and FTSC exist?
|
||
Does a relationship between FidoNet and FTSC exist? The answers
|
||
to these questions are not clear to me, and I'm not sure
|
||
hardening such relationships is the best way to clarify them.
|
||
There was, during my involvement, a feeling on the part of many
|
||
that we could not solve all the problems of the world, and we'd
|
||
be better off clearly saying how we should go about addressing
|
||
them than doing a bad job of addressing them in an environment
|
||
where the right to do so was unclear.
|
||
|
||
Also, there are some issues that are political as well as
|
||
technical. One of them is the appearance of "non-FidoNet"
|
||
address information in traffic flowing through FidoNet's routing
|
||
systems. Is it fair to impose the burden of another network's
|
||
routing information on nodes operating in an official FidoNet
|
||
capacity? Personally, I think not. No matter what, I do not
|
||
think this is a purely technical decision.
|
||
|
||
Similar arguments can be made about the -1/-1 new node number
|
||
request. The goal was to make it possible for hosts to be able
|
||
to honor requests for node numbers, while still being able to
|
||
maintain control of their systems. It is possible with many
|
||
mailers to close out unidentified systems, and regulate the
|
||
access of known ones. The goal was to provide a known number
|
||
for the request of a new node number to simplify the lives of
|
||
those hosts that wish to otherwise exclude unknown systems.
|
||
-1/-1 was chosen because of historical precedent. I suggest
|
||
that a single number like 1/32000 be used in its stead. (We
|
||
don't need yet another administrative entry in each net.)
|
||
|
||
|
||
Overall Reaction
|
||
|
||
Overall, I still urge any and all coordinators to ratify this
|
||
document. Even with the flaws, the existance of a clear
|
||
ratification process provides a mechanism for other issues to be
|
||
addressed in the future. The process has taken much too long as
|
||
it is, and has caused too much turmoil. Let's get the sucker
|
||
out the door, then take six months or a year to carefully
|
||
address many of the perceived problems of the net.
|
||
Specifically, I would leave aside the issue of commercialism
|
||
that seems to be sweeping the net lately - the current Policy
|
||
seems to have mostly worked, and rules should not be made in
|
||
haste. Many, many dates have been set and past for the
|
||
implementation of this document; I believe that the credibility
|
||
of the *C structure simply cannot take too many more election
|
||
dates set, missed, voted on, then overturned, all of which is
|
||
done with little public notice.
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 6-17 Page 14 24 Apr 1989
|
||
|
||
|
||
Jack Decker
|
||
Fidonet 1:154/8 LCRnet 77:1011/8 NetWork 8:70/8
|
||
|
||
REFLECTIONS ON POLICY4
|
||
|
||
After reading POLICY4, I have a few comments I'd like to share
|
||
with you. I haven't had access to the SYSOP or IFNA echoes for
|
||
close to four months now (another result of ECHOPOL), so these
|
||
thoughts are not repetitions of anything I've heard there
|
||
recently. First, I'll take some of the parts of POLICY4 and
|
||
comment on them individually, then I'll close with some general
|
||
comments.
|
||
|
||
Starting near the beginning (a very good place to start!), we
|
||
find this small but significant (and somewhat confusing)
|
||
paragraph:
|
||
|
||
FidoNet is large enough that it would quickly fall
|
||
apart of its own weight unless some sort of structure
|
||
and control were imposed on it. Multinet operation
|
||
provides the structure. Decentralized management
|
||
provides the control. This document describes the
|
||
procedures which have been developed to manage the
|
||
network.
|
||
|
||
Highlight the words "unless some sort of structure and control
|
||
were imposed on it." The problem here is that most Fidonet
|
||
sysops that I've spoken to don't want structure and control
|
||
IMPOSED ON THEM from on high. It's strange that in America,
|
||
the land of democracy, the people in Fidonet would be forced to
|
||
live under a document that sounds like something that the
|
||
Russian government would issue (in pre-glastnost days, no
|
||
less).
|
||
|
||
1.2.3 Networks
|
||
|
||
A network is a collection of nodes in a local
|
||
geographic area. Networks coordinate their mail
|
||
activity to decrease cost.
|
||
|
||
This is mention #1 of geography. I'll get back to this later.
|
||
|
||
1.2.3 Regions
|
||
|
||
A region is a well-defined geographic area containing
|
||
nodes which may or may not be combined into networks.
|
||
A typical region will contain many nodes in networks,
|
||
and a few independent nodes which are not a part of
|
||
any network.
|
||
|
||
Mention #2 of geography. More later.
|
||
|
||
1.2.5 Zones
|
||
|
||
A zone is a large geographic area containing many
|
||
regions, covering one or more countries and/or
|
||
FidoNews 6-17 Page 15 24 Apr 1989
|
||
|
||
|
||
continents.
|
||
|
||
Mention #3 of geography. For those in other (non-Fidonet)
|
||
networks it also ignores current usage of zones, but then I
|
||
hear they're trying to come up with some spiffy new "Domain"
|
||
proposal that will once again break all existing software, so
|
||
the other nets won't have to (be allowed to?) use zones for
|
||
this purpose.
|
||
|
||
1.3.2 Geography
|
||
|
||
Each level of FidoNet is geographically contained by
|
||
the level immediately above it. A given geographic
|
||
location is covered by one zone and one region within
|
||
that zone, and is either in one network or not in a
|
||
network. There are never two zones, two regions, or
|
||
two networks which cover the same geographic area.
|
||
|
||
Why? Would the world come to an end if there were two nets in
|
||
the same geographic area? Maybe we ought to give AT&T the
|
||
northern U.S., Sprint the Eastern seaboard, MCI the West and
|
||
Southwest, and divide the rest of the U.S. among the other
|
||
long distance carriers. What's that got to do with anything?
|
||
Well, recent history should tell us that when you can only
|
||
obtain a service from one provider, they can charge whatever
|
||
they want, and often treat those they serve in any way they
|
||
like. When there is competition, or the ability to go to more
|
||
than one source for a service, the providers of that service
|
||
seem to be just a little nicer and more considerate.
|
||
|
||
Even where real competition doesn't exist, the fact that
|
||
competition is possible can make a big difference. If I had
|
||
the only gas station in a town and decided to charge $5 a
|
||
gallon for gas, you can bet that somebody would soon get the
|
||
idea that they would be a local hero if they opened a station
|
||
and charged only $1.50 a gallon. That thought would probably
|
||
keep me from charging totally ridiculous prices for my gas.
|
||
|
||
I know some are saying "That's fine for business, but what has
|
||
it to do with Fidonet?" Simple, human nature being what it is,
|
||
the same principles apply. If you have a net coordinator or a
|
||
regional coordinator who can tell people to do things his way
|
||
or get out of the net, or to accept the few services he chooses
|
||
to provide even though someone else might be willing to offer
|
||
more services, that gives the *C structure the ability to "play
|
||
dictator" to those under them. Of course, MOST *C's wouldn't
|
||
do that, but life can be no fun at all if YOU happen to be
|
||
under a heavy-handed *C.
|
||
|
||
If a node is in the area of a network, it should be
|
||
listed in that network, not as an independent in the
|
||
region. (The primary exception to this is a node
|
||
receiving inordinate amounts of host-routed mail; see
|
||
section 4.2). Network boundaries are based on calling
|
||
areas as defined by the local telephone company. Even
|
||
in the case of areas where node density is so great
|
||
FidoNews 6-17 Page 16 24 Apr 1989
|
||
|
||
|
||
that more than one network is needed to serve one
|
||
local calling area, a geographic guideline is used to
|
||
decide which nodes belong to what network. Network
|
||
membership is based on geographic or other purely
|
||
technical rationale. It is not based on personal or
|
||
social factors.
|
||
|
||
More geography. Also, who determines "calling areas as defined
|
||
by the local telephone company?" Some cities have a metro area
|
||
(where it's a free call to anywhere in that area from anywhere
|
||
in that area), but in other places calling areas overlap (for
|
||
example, everyone gets their home exchange plus all surrounding
|
||
exchanges as part of their local calling area). Some folks may
|
||
live just outside a local calling area for a net, but may wish
|
||
to participate in that net anyway, while others in the same
|
||
situation may prefer to remain independent.
|
||
|
||
There are cases in which the local calling areas lead
|
||
to situations where logic dictates that a node
|
||
physically in one FidoNet Region should be assigned to
|
||
another. In those cases, with the agreement of the
|
||
Regional Coordinators and Zone Coordinator involved,
|
||
exemptions may be granted. Such exemptions are
|
||
described in section 5.6.
|
||
|
||
An admission that basing everything on geography is going to
|
||
cause problems. But wait 'til you see section 5.6!
|
||
|
||
1.4.9 Summary
|
||
|
||
These levels act to distribute the administration and
|
||
control of FidoNet to the lowest possible level, while
|
||
still allowing for coordinated action over the entire
|
||
mail system. Administration is made possible by
|
||
operating in a top-down manner. That is, a person at
|
||
any given level is responsible to the level above, and
|
||
responsible for the level below.
|
||
|
||
This strikes me as being backward. A coordinator SHOULD be
|
||
responsible to those he governs. "Government by the consent of
|
||
the governed", it's called. Seems I recall that the United
|
||
States fought some wars to win this right a couple of hundred
|
||
years ago.
|
||
|
||
For example, a Regional Coordinator is responsible to
|
||
the Zone Coordinator for anything that happens in the
|
||
region. From the point of view of the Zone
|
||
Coordinator, the Regional Coordinator is completely
|
||
responsible for the smooth operation of the region.
|
||
Likewise, from the point of view of the Regional
|
||
Coordinator, the Network Coordinator is completely
|
||
responsible for the smooth operation of the network.
|
||
|
||
If a person at any level above sysop is unable to
|
||
properly perform their duties, the person at the next
|
||
level may replace them. For example, if a Regional
|
||
FidoNews 6-17 Page 17 24 Apr 1989
|
||
|
||
|
||
Coordinator fails to perform, the Zone Coordinator can
|
||
replace him.
|
||
|
||
What this means, folks, is that if your NC decides to back you
|
||
in a dispute against the Fidonet hierarchy, they can order him
|
||
replaced. You have no say as to who you want for your NC.
|
||
Does any of this remind you of the government structure used in
|
||
certain countries that don't have many Fidonet nodes?
|
||
|
||
2.1.6.1 No Disclosure of in-transit mail
|
||
|
||
Disclosing or in any way using information contained
|
||
in private netmail traffic not addressed to you or
|
||
written by you is considered annoying behavior,
|
||
regardless of how you come upon that traffic. This
|
||
does not apply to echomail which is by definition a
|
||
broadcast medium, and where private mail is often used
|
||
to keep a sysop-only area restricted.
|
||
|
||
There are several clauses in the proposed policy dealing with
|
||
private mail. My feeling is that this is an amateur network,
|
||
and therefore we shouldn't handle mail for which any level of
|
||
"security" is expected. There are private commercial services
|
||
intended for that purpose (e.g. MCI Mail, Compuserve, GEnie,
|
||
etc.). Given that, I would prefer not to see clauses like the
|
||
one above, which could (under the right circumstances) subject
|
||
a Fidonet sysop to litigation.
|
||
|
||
2.1.9 Private Nodes
|
||
|
||
The rare exception to ZMH compliance is Private Nodes.
|
||
Persons requesting private nodes should be supported
|
||
as points if possible. A private listing is justified
|
||
when the system must interface with many others, such
|
||
as an echomail distributor. In these cases, the exact
|
||
manner and timing of mail delivery is arranged between
|
||
the private node and other systems. Such an agreement
|
||
between a private system and a hub is not binding on
|
||
any replacement for that hub. A private node must be
|
||
a part of a network (they cannot be independents in
|
||
the region.) Private nodes are encouraged to honor
|
||
ZMH.
|
||
|
||
What happens if a person needs to operate a private node (for
|
||
whatever reason) but is not part of the geographical coverage
|
||
area of any network? The point may be a bit moot, because
|
||
since a private node is by definition unlisted, it could be
|
||
part of any net and nobody would be the wiser (so long as the
|
||
real geographic location of the node was not given in the
|
||
nodelist, and folks were careful not to reveal the real
|
||
location). But why force folks to go through that type of
|
||
sham?
|
||
|
||
2.2 How to obtain a node number
|
||
|
||
[Regarding application for a new Fidonet node] .....
|
||
FidoNews 6-17 Page 18 24 Apr 1989
|
||
|
||
|
||
You must indicate that you have read, and agree to
|
||
abide by, this document and all the current and future
|
||
policies of FidoNet.
|
||
|
||
How can one "read and agree to abide by" all FUTURE policies of
|
||
Fidonet? Especially when they often seem to be imposed "at
|
||
will" by power-hungry coordinators?
|
||
|
||
2.4 How to Form a Network
|
||
|
||
If there are several nodes in your area, but no
|
||
network, a new network can be formed. This has
|
||
advantages to both you and to the rest of FidoNet.
|
||
You receive better availability of nodelist difference
|
||
files and FidoNews, and everyone else can take
|
||
advantage of host-routing netmail to the new network.
|
||
|
||
....
|
||
|
||
Granting a network number is not automatic. Even if
|
||
the request is granted, the network might not be
|
||
structured exactly as you request. Your Regional
|
||
Coordinator will review your application and inform
|
||
you of the decision.
|
||
|
||
Does this now give the RC veto power over which nodes can and
|
||
cannot be in a local network? Again, it seems the power is
|
||
flowing from the wrong direction here...
|
||
|
||
3.5 Be a Member of the Area Administered
|
||
|
||
A coordinator must be a member of the area
|
||
administered. That is, a Network Coordinator must be a
|
||
member of that network by virtue of geography. A
|
||
Regional Coordinator must be either a member of a
|
||
network in his region, or an independent of the
|
||
region.
|
||
|
||
More geography (I've lost count by now...).
|
||
|
||
4.3 Assigning Node Numbers
|
||
|
||
...
|
||
|
||
You may not assign a node number to a node in an area
|
||
covered by an existing network. Further, if you have
|
||
nodes in an area covered by a network in formation,
|
||
those nodes must be transferred to the new network.
|
||
|
||
Though perhaps not readily apparent, this is still more
|
||
geography!
|
||
|
||
5.1 Responsibilities
|
||
|
||
A Regional Coordinator has the following
|
||
responsibilities:
|
||
FidoNews 6-17 Page 19 24 Apr 1989
|
||
|
||
|
||
...
|
||
|
||
3) To assign network numbers to networks in the
|
||
region and define their boundaries."
|
||
|
||
"...and define their boundaries???" So the RC can come in and
|
||
in one fell swoop, cut a bunch of nodes out of your net by
|
||
changing the boundaries! More geography! More power flowing
|
||
in the wrong direction!
|
||
|
||
5.2 Assigning Node Numbers
|
||
|
||
...
|
||
|
||
If a network forms in an area for which you have
|
||
independent nodes, those nodes will be transferred to
|
||
the local network as soon as is practical.
|
||
|
||
Normally this would be desirable, but in certain cases it may
|
||
not be. Why not give the independent nodes the option of
|
||
joining or not joining the new network?
|
||
|
||
Let me give you one example of a potential problem. There are,
|
||
we'll say, ten independent nodes in a given area. One of the
|
||
local sysops reads Policy one day and decides to apply to form
|
||
a net, listing all ten of the independent nodes in his area as
|
||
part of the new net. Unfortunately, this guy is well known to
|
||
the local Sysop community (but NOT to the RC) as a real twit,
|
||
someone that can't get along with anybody. The RC approves the
|
||
request, and these other nine sysops suddenly find themselves
|
||
under the thumb of Mr. Twit.
|
||
|
||
5.3 Encouraging the Formation and Growth of Networks
|
||
|
||
One of your main duties as a Regional Coordinator is
|
||
to promote the growth of networks in your region.
|
||
|
||
You should avoid having independent nodes in your
|
||
region which are within the coverage area of a
|
||
network. There are, however, certain cases where a
|
||
node should not be a member of a network, such as a
|
||
system with a large amount of inbound netmail; see
|
||
section 4.2.
|
||
|
||
If several independent nodes in your region are in a
|
||
local area you should encourage them to form a
|
||
network, and if necessary you may require them to form
|
||
a network. Refer to section 2.4. Note that this is
|
||
not intended to encourage the formation of trivial
|
||
networks. Obviously, one node does not make a
|
||
network. The exact number of nodes required for an
|
||
effective network must be judged according to the
|
||
circumstances of the situation, and is left to your
|
||
discretion.
|
||
|
||
This puts a lot of power... much TOO MUCH power in my
|
||
FidoNews 6-17 Page 20 24 Apr 1989
|
||
|
||
|
||
opinion... into the hands of the RC. Of course it goes without
|
||
saying that we're still talking geography here.
|
||
|
||
5.4 Assigning Network Numbers
|
||
|
||
It is your responsibility to assign network numbers to
|
||
new networks forming within your region. You are
|
||
assigned a pool of network numbers to use for this
|
||
purpose by your Zone Coordinator. As a part of this
|
||
function, it is the responsibility of the Regional
|
||
Coordinator to define the boundaries of the networks
|
||
in the region.
|
||
|
||
"define the boundaries of the networks???" Here we go again
|
||
(sorry if it's getting monotonous, I was getting pretty tired
|
||
of it by the time I waded through the whole document! I didn't
|
||
agree with it the first time, and the endless repetition sure
|
||
didn't win me over!).
|
||
|
||
5.6 Geographic Exemptions
|
||
|
||
There are cases where local calling geography does not
|
||
follow FidoNet regions. In exceptional cases,
|
||
exemptions to normal geographic guidelines are agreed
|
||
upon by the Regional Coordinators and Zone Coordinator
|
||
involved. Such an exemption is not a right, and is
|
||
not permanent. When a network is formed in the proper
|
||
region that would provide local calling access to the
|
||
exempted node, it is no longer exempt. An exemption
|
||
may be reviewed and revoked at any time by any of the
|
||
coordinators involved.
|
||
|
||
Finally we arrive at section 5.6. Don't you love this? They
|
||
admit that in some cases there may be good reasons to bend the
|
||
rules on the geography, but then they allow any of who knows
|
||
how many coordinators to kill the arrangement on a whim (thus
|
||
forcing some nodes to go long distance for services they should
|
||
be able to get for free). The way this clause is worded sucks
|
||
eggs, in my opinion. It allows the RC's to get much too
|
||
involved in what should be a matter of concern only to a local
|
||
net.
|
||
|
||
5.7 Overseeing Network Operations
|
||
|
||
...
|
||
|
||
If a network grows so large that it cannot reasonably
|
||
accommodate traffic flow during the Zone Mail Hour,
|
||
the Regional Coordinator can direct the creation of
|
||
one or more new networks from that network. These new
|
||
networks, although they may be within a single
|
||
local-calling area, must still conform to a
|
||
geographical basis for determining membership.
|
||
|
||
Not only is this getting confusing, it's getting ridiculous!
|
||
Does this mean that in some cases a sysop may have to join a
|
||
FidoNews 6-17 Page 21 24 Apr 1989
|
||
|
||
|
||
new net if he moves across town? Would it be so awful terrible
|
||
to give sysops a choice of which net they prefer to belong to?
|
||
Oh, yeah, you did notice they mentioned geography again, didn't
|
||
you?
|
||
|
||
9.1 General
|
||
|
||
The FidoNet judicial philosophy can be summed up in
|
||
two rules:
|
||
|
||
1) Thou shalt not excessively annoy others.
|
||
|
||
2) Thou shalt not be too easily annoyed.
|
||
|
||
In other words, there are no hard and fast rules of
|
||
conduct, but reasonably polite behavior is expected.
|
||
Also, in any dispute both sides are examined, and
|
||
action could be taken against either or both parties.
|
||
("Judge not, lest ye be judged!")
|
||
|
||
The coordinator structure has the responsibility for
|
||
defining "excessively annoying". Like a common
|
||
definition of pornography ("I can't define it, but I
|
||
know it when I see it."), a hard and fast definition
|
||
of acceptable FidoNet behavior is not possible. The
|
||
guidelines in this policy are deliberately vague to
|
||
provide the freedom that the coordinator structure
|
||
requires to respond to the needs of a growing and
|
||
changing community.
|
||
|
||
I'm glad they used that example. It makes the difference
|
||
between the proposed policy and a democratic governing system
|
||
fairly obvious.
|
||
|
||
Pornography is supposed to be judged according to "prevailing
|
||
community standards." In other words, it is NOT supposed to be
|
||
the opinion of the judges hearing the case. Suppose the judge
|
||
were a closet Ted Bundy, or a straight-laced Puritan? No
|
||
matter, it's not HIS opinion that's supposed to count, rather
|
||
the offense is to be measured against community standards...
|
||
that is, what would most of the PEOPLE in the community think
|
||
about this?
|
||
|
||
But in Fidonet, "Excessively Annoying Behaviour" is judged not
|
||
against the views of the common sysops of Fidonet, but rather
|
||
against the values and ideals of the *C structure, which are
|
||
often diametrically opposed to the views of the common sysop.
|
||
|
||
For example, common sysops might find it very annoying that a
|
||
Regional Coordinator would try to step in and say which nodes
|
||
could or could not be in their net! MANY sysops have found it
|
||
VERY annoying that certain coordinators with very big egos (or
|
||
worse?) have tried to prohibit cross-regional echo feeds.
|
||
|
||
9.8 Return to Original Network
|
||
|
||
FidoNews 6-17 Page 22 24 Apr 1989
|
||
|
||
|
||
Once a policy dispute is resolved, any nodes
|
||
reinstated on appeal are returned to the local network
|
||
or region to which they geographically or technically
|
||
belong.
|
||
|
||
Just one more mention of geography... but the "or technically"
|
||
is interesting. I wish there were a lot more "or
|
||
technically"'s in this document, it might put things in a much
|
||
different light.
|
||
|
||
9.9 Echomail
|
||
|
||
Echomail is an important and powerful force in
|
||
FidoNet. For the purposes of Policy Disputes,
|
||
echomail is simply a different flavor of netmail, and
|
||
is therefore covered by Policy. By its nature,
|
||
echomail places unique technical and social demands on
|
||
the net over and above those covered by this version
|
||
of Policy. In recognition of this, an echomail policy
|
||
which extends (and does not contradict) general
|
||
Policy, maintained by the Echomail Coordinators, and
|
||
ratified by a process similar to that of this
|
||
document, is recognized by the FidoNet Coordinators as
|
||
a valid structure for dispute resolution on matters
|
||
pertaining to echomail. At some future date the
|
||
echomail policy document may be merged with this one.
|
||
|
||
Well, that's a whole discussion unto itself. Suffice it to say
|
||
that the current echomail policy was formed by a small group of
|
||
people who seemed to have specific goals in mind (inhibiting
|
||
communications within the network!) and who were not very
|
||
tolerant of dissenting views. For example, one of the primary
|
||
people involved in echomail policy described those who didn't
|
||
agree with geographic echomail restrictions as "fools". Many
|
||
people felt that there was a real attempt to "railroad" this
|
||
policy into place.
|
||
|
||
The big problem with the Echo Policy is that it really
|
||
represents the views of only a few in Fidonet, rather than the
|
||
many. The average sysop was given NO real say in the formation
|
||
of Echopol.
|
||
|
||
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
|
||
|
||
You may wonder why I am so hung up on geography? Basically,
|
||
because it gives those in control the ability to suppress
|
||
dissent. It's the old "divide and conquer" routine. I've seen
|
||
some real efforts to keep those who disagree with Fidonet
|
||
policies from talking to each other, or to the other Sysops in
|
||
Fidonet.
|
||
|
||
Besides, it doesn't make sense technically, at least not in
|
||
North America. I would estimate that out of those sysops who
|
||
make a large number of long distance calls in a month, a fairly
|
||
good percentage are using some type of calling plan that is not
|
||
distance sensitive, whether on a packet switching network (e.g.
|
||
FidoNews 6-17 Page 23 24 Apr 1989
|
||
|
||
|
||
PC Pursuit, Starlink) or a long distance service (e.g. Reach
|
||
Out America, or Telecom Canada's "Between Friends"). Still
|
||
other sysops have access to company tie lines, Foreign Exchange
|
||
lines, or WATS lines that can give them access to other areas
|
||
of the country at little or no cost.
|
||
|
||
Many sysops have lost echo feeds in recent months, because they
|
||
(or their feeds) were formerly able to get feeds from PC
|
||
Pursuitable points (or even nearby points outside their
|
||
region), but were cut off from those feeds when regional
|
||
restrictions on echomail traffic started to be imposed IN
|
||
ANTICIPATION of an Echomail policy allowing these restrictions.
|
||
You heard me right. Many of the *C's were so into their power
|
||
trip that they went ahead and began enforcing a policy that was
|
||
still in the draft stage!
|
||
|
||
Now it may make some sense to base some things on geography,
|
||
but Fidonet regions make no sense at all (as a matter of fact,
|
||
I heard they were based on NFL football regions, or some such
|
||
thing. No one's yet been able to explain to me what football
|
||
has to do with computer networks).
|
||
|
||
The major problem is that Fidonet regions divide up the country
|
||
and inhibit folks from talking to each other, yet they are too
|
||
large to be meaningful in terms of reducing costs. For
|
||
example, a person living near the border of a region might know
|
||
that a feed for an echo he wants exists only thirty miles away,
|
||
but across a regional boundary. The next nearest feed (and the
|
||
only "legal" feed for him) is several hundred miles away in his
|
||
own region.
|
||
|
||
Now phone rates are a funny thing... even if you're on a
|
||
distance-sensitive long distance service (and keep in mind that
|
||
many sysops are not), most of the increases in phone rates are
|
||
within the first 125 miles from your location. After that, the
|
||
rates taper off, and the cost of a call remains pretty uniform
|
||
across the country (there's only a two or three cents per
|
||
minute difference between a call to a point 125 miles away, and
|
||
a call a couple of thousand miles distant). Also, in many
|
||
places, calls within your own state cost significantly more
|
||
than calls going a similar distance to an out-of-state point.
|
||
So, setting strict geographical boundaries for echomail can
|
||
often increase costs for sysops.
|
||
|
||
At the net level, basing net boundaries on a geographical
|
||
factor can have several undesirable results. It may keep those
|
||
who live near the net, or who have strong emotional ties with
|
||
the net, from getting into that net. But the biggest problem,
|
||
I think, it that it sets up a situation where the NC has too
|
||
much power. He can service nodes on a "take it or leave it"
|
||
basis. Nothing wrong with that IF there are other sources. We
|
||
don't require Standard Oil to put a gas station in every city,
|
||
because if they don't someone else probably will, and if that
|
||
firm charges too much, a competitor will no doubt appear sooner
|
||
or later. But, we do require Bell Telephone to serve every
|
||
customer in their service area, and not only that, we have an
|
||
FidoNews 6-17 Page 24 24 Apr 1989
|
||
|
||
|
||
body of people independent of the phone company (the Public
|
||
Utilities Commission) who can step in and intervene on behalf
|
||
of customers who have been overcharged, or otherwise wrongly
|
||
treated.
|
||
|
||
The trouble is that in Fidonet, all the "oversight" comes from
|
||
above... from the very people who appointed the coordinator to
|
||
his position. Nowhere are those who receive any services from
|
||
these coordinators given any say in the process. Given that, I
|
||
believe that the least we can do is to allow sysops some amount
|
||
of choice in which net they will join. That way, if you manage
|
||
to get a real dictator as an NC or RC, and the RC or ZC refuses
|
||
to replace him (thereby admitting that they made a mistake in
|
||
appointing the guy in the first place), sysops don't have to
|
||
leave Fidonet entirely to get out from under the guy.
|
||
|
||
Now I have one more thing to say about geography. Some people
|
||
have come up with the bright idea that if cross-regional
|
||
echomail feeds are prohibited, it will somehow cause dupe
|
||
messages to magically disappear. What these folks fail to
|
||
understand is the difference between geography and topology.
|
||
You can have faulty topology no matter where the individual
|
||
nodes are geographically located, or you can have a "clean"
|
||
topology even if nodes are spread across the country. The
|
||
physical location of a node makes no difference at all.
|
||
|
||
For example, suppose you have a node that has been
|
||
participating in a local net and not causing dupes. Let's
|
||
further suppose he polls his net host nightly for mail and
|
||
echoes. Now, one night he quietly packs up in the middle of
|
||
the night and moves across the country, and begins polling his
|
||
net host via long distance. Does his computer contain a sensor
|
||
that says, "oops, I've changed times zones, so I have to
|
||
generate duplicate messages?" Not hardly! As long as the node
|
||
maintains the same topology within his original net (connecting
|
||
to the same node for his feeds), he isn't going to screw up
|
||
echomail. What does this prove? Simply that whether the
|
||
network topology is good or bad has nothing to do with
|
||
geography. You could draw a network topology map without ever
|
||
knowing or caring where the nodes are geographically located.
|
||
|
||
So, I have two major reason for not liking all the fuss about
|
||
geography (and we must admit they've gone out of their way to
|
||
get it into this document!) One is that these restrictions COST
|
||
PEOPLE MONEY. They are particularly unfair to those who live
|
||
near the border of a geographic area, since they are often
|
||
forced to make long distance calls to more distant points than
|
||
would be necessary without the restrictions. They other is
|
||
that they provide a perfect spawning ground for petty dictators
|
||
(and Fidonet has seen far too many of THOSE types already!).
|
||
|
||
THESE RULES ARE UNENFORCEABLE
|
||
|
||
There is a saying that when lawmakers create unenforceable
|
||
laws, they create disrespect for the law in general. There are
|
||
generally two reasons that laws can be considered
|
||
FidoNews 6-17 Page 25 24 Apr 1989
|
||
|
||
|
||
unenforceable. One is that you can never catch the someone in
|
||
the act in order to find out that the rules are being broken.
|
||
The other is that such a high percentage of people consider the
|
||
law ridiculous and/or unenforceable, so they make no attempt to
|
||
comply with it. If everyone is breaking a certain law, it is
|
||
de facto unenforceable, and eventually the law is usually
|
||
change to reflect reality.
|
||
|
||
Policy documents are the "laws" of Fidonet. If certain
|
||
provisions are unenforceable, it can't help but create a
|
||
climate of disrespect for Policy in general. I believe that
|
||
parts of the proposed Fidonet policy are unenforceable for both
|
||
of the above-mentioned reasons. First, because Fidonet is
|
||
really a hobbyist organization, few sysops read Policy more
|
||
than once, and a lot of those who do read it ignore it anyway,
|
||
especially the parts that don't seem to make much sense. Since
|
||
BBS's come and go, this problem will ever be with us. But,
|
||
more importantly, sysops often conspire to "bend" certain rules
|
||
in such a way that the higher-ups will never find out about it
|
||
unless some fluke occurs. Some examples I've heard of
|
||
(actually, none of these refer to a specific situation, but are
|
||
composites of many tales I've heard):
|
||
|
||
* A node lets callers on during ZMH, but few callers call at
|
||
that time of morning anyway. If the NC or RC calls to deliver
|
||
mail and the line's not busy, the mail gets through and they
|
||
are none the wiser. If the line IS busy, they have no way of
|
||
knowing that it's a BBS caller rather than another mail call in
|
||
progress.
|
||
|
||
* A sysop wants to feed echomail to a node in another region.
|
||
Since he doesn't normally communicate with anyone else in the
|
||
distant node's net, he just defines the distant net as a
|
||
"pointnet" in his software, and uses some other software to
|
||
strip or change PATH lines and other information on incoming
|
||
messages from that node, so that the messages appear to have
|
||
originated on his board. Of course, should a dupe loop occur
|
||
in this setup, there is no easy way for anyone to track it down
|
||
because all records of the "wild feed" have been expunged from
|
||
the messages. Sure, it's an intentional violation of the
|
||
rules, but he feels justified because after all, he never had
|
||
any vote in the rules!
|
||
|
||
* Another sysop has moved to a different region, but he wants
|
||
to keep in touch with the folks in his old home town. So, his
|
||
old net/node number is still in the nodelist, and he polls his
|
||
net host every night for mail. Right now his node is listed as
|
||
private/unlisted, so nobody can call him, but should the RC
|
||
ever decide to try and remove all private nodes from the
|
||
nodelist, he knows a nice "permanently busy" official phone
|
||
company number that he can place in the nodelist.
|
||
|
||
* Then there is the guy who always wanted to be an echo hub, so
|
||
he set up his own point net. Since points are considered BBS
|
||
users, they can be located just about anywhere, and his point
|
||
users are (mostly because he's in a PC Pursuitable city).
|
||
FidoNews 6-17 Page 26 24 Apr 1989
|
||
|
||
|
||
Strangely enough, some of his points also happen to be BBS
|
||
sysops (who, coincidentally, seem to be getting their echo
|
||
feeds from unknown sources), but as far as he is concerned,
|
||
they are just users of his BBS, and entitled to get echoes just
|
||
like any of his other point users...
|
||
|
||
One other point... many sysops have come to realize that the
|
||
ONLY possible sanction in Fidonet is excommunication, and while
|
||
many RC's would be more than happy to excommunicate all of the
|
||
"troublemakers" from their regions, most NC's (who generally
|
||
know the "offenders" personally) are not usually so inclined,
|
||
especially in the case of a policy regulation that nobody asked
|
||
for in the first place. So, the only way that the RC can get a
|
||
node excommunicated is to replace the NC of the net, but that
|
||
isn't always so easy, either. One RC tried that and discovered
|
||
that over 90% of the nodes in his region were ready to pull out
|
||
of Fidonet and start their own network (the RC resigned
|
||
instead). In another case, the RC wanted to replace an NC, but
|
||
out of about twenty sysops, only one even thought about taking
|
||
the job... and was gently but firmly persuaded not to by the
|
||
other sysops of that net. The NC stayed put.
|
||
|
||
The fact that excommunication is the only sanction gives sysops
|
||
a lot more power than many of them realize. Suppose the only
|
||
possible penalty for a crime were death? How would you ever
|
||
enforce littering laws? You wouldn't... you'd concentrate on
|
||
the really important crimes and forget the small stuff. But
|
||
those in the Fidonet power structure like to issue a lot of
|
||
proclamations regarding minor things, totally forgetting that
|
||
they have no way short of excommunication to enforce these
|
||
dictums... and you can't excommunicate too many nodes, or folks
|
||
begin to suspect that maybe there's something wrong here!
|
||
|
||
WHY THE POWER GRAB?
|
||
|
||
The thing I can't understand is why such a small number of
|
||
people have subjected themselves to such a large number of
|
||
flames to try and bring about something that at least 90% of
|
||
the sysops are either actively opposed to, or just don't care
|
||
about. Why are they so doggedly determined to push policies
|
||
that have caused some of the brightest software developers in
|
||
Fidonet to consider leaving the net? (some have done more than
|
||
just consider it!) Why are they trying to promote policies
|
||
that will restrict the free flow of information and
|
||
communications?
|
||
|
||
These are questions you should be asking yourself, if you are a
|
||
Fidonet sysop.
|
||
|
||
There are probably a lot of entities that don't care much for
|
||
our amateur network, both in the commercial and governmental
|
||
spheres. Commercial interests would rather you use their
|
||
services (and pay the associated per-minute charges). The
|
||
government is probably a bit unsettled by the fact that we're
|
||
moving massive amounts of data around containing all sorts of
|
||
information, pretty much at will. I'm sure that some in
|
||
FidoNews 6-17 Page 27 24 Apr 1989
|
||
|
||
|
||
government would really appreciate a move to funnel all
|
||
echomail through eight or ten central collection points, which
|
||
could be more easily monitored.
|
||
|
||
Now, some have said that this kind of thinking is just plain
|
||
silly, even if some of the principal players in the creation of
|
||
Fidonet policy don't live all that far from our nation's
|
||
capitol. Well, if that be the case, I apologize. Only thing
|
||
is, for months now, I've been trying to figure out why these
|
||
people would subject themselves to flames, harrassment, and the
|
||
generally negative comments about their motives, character, and
|
||
integrity that have come from the many sysops who simply don't
|
||
want the vision of Fidonet that they're trying to sell.
|
||
|
||
IF I COULD CHANGE FIDONET...
|
||
|
||
If I could change Fidonet any way I wanted, I'd only make two
|
||
changes.
|
||
|
||
First, I'd get rid of all geographic restrictions. In most
|
||
cases they aren't needed. In most cases, folks will join the
|
||
net nearest them. If they don't, there may just be a good
|
||
reason why they don't.
|
||
|
||
Second, I'd get rid of Regions. They aren't needed. In fact,
|
||
they aren't even used for mail routing purposes. They just set
|
||
up artificial barriers to communications. If the ZC needs
|
||
folks under him to divide the workload, then let's have
|
||
"Coordinators at large". Each NC would be assigned to a
|
||
Coordinator at Large, and would sent his nodelist updates to
|
||
that person and receive his Fidonews and Netdiff feeds from
|
||
that person. In the event of a personality conflict, the ZC
|
||
could allow the NC to go through a different Coordinator at
|
||
Large (and if all the NC's requested a transfer away from a
|
||
certain coordinator, wouldn't that be a pretty good indicator
|
||
that the guy has no business being a Coordinator?).
|
||
|
||
I know some folks will quickly add that *C's should be elected,
|
||
not appointed. I believe that, too, but don't think that would
|
||
be quite so important if people were not forced to deal only
|
||
with a single *C (at any level), based strictly on where they
|
||
happen to be physically located.
|
||
|
||
Now, I've been saying all this for quite some time, and a lot
|
||
of other good, sincere sysops have been saying some of the same
|
||
things. But the idea of taking the Geography out of Fidonet
|
||
seems to scare the <insert favorite expletive> out of some of
|
||
the current crop of Fidonet *C's. Why? Is it because some
|
||
don't want to lose their Fiefdoms? Or is there some other
|
||
reason they want to keep bottleneck control over Fidonet, and
|
||
inhibit communication between different geographical areas?
|
||
|
||
Those of you in alternate networks shouldn't feel so smug
|
||
because you're not having these problems. Think about it...
|
||
where do your echoes come from? In most cases, are they either
|
||
received from or passed to Fidonet through a gate? That
|
||
FidoNews 6-17 Page 28 24 Apr 1989
|
||
|
||
|
||
gateway connection could be easily monitored or disrupted. And
|
||
right now, none of the alternate nets are all that large. If
|
||
one of THEM grows to 4,000 nodes, we may see some occurrences
|
||
in those networks that are difficult to understand.
|
||
|
||
It's time for all sysops to wake up and see how our freedom to
|
||
communicate is being gradually eroded by the added layers of
|
||
Policy proclamations being foisted upon us. Tell your *C's
|
||
that you do not support restrictions upon our freedom to
|
||
communicate! Let the voice of the average sysop be heard! Ask
|
||
yourself... are things really better now than they were before
|
||
we had "Echomail Coordinators"? Do you really feel that
|
||
restrictions based on artificial geographic boundaries have any
|
||
merit? If not, write a message to your *C's today, and let
|
||
your voice be heard!
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 6-17 Page 29 24 Apr 1989
|
||
|
||
|
||
=================================================================
|
||
LETTERS TO THE EDITOR
|
||
=================================================================
|
||
|
||
Garth Kidd
|
||
Fidonet 3:680/809
|
||
|
||
There is currently a large discussion (argument?) going on in
|
||
some echo areas as to the legality of encrypting messages. The
|
||
draft FidoNet policy in FidoNews 6.14 stated that encryption of
|
||
any form was considered "annoying behaviour".
|
||
|
||
In echo areas, this is entirely fair. People pay large sums of
|
||
money to transport echo areas around the place, and people
|
||
should not use them as an alternative to NetMail.
|
||
|
||
The ruling, however, has one worrying aspect:
|
||
|
||
It effectively bans encryption of messages, whether by DES means
|
||
or simply by rotating the message 13 characters through the
|
||
alphabet. Unfortunately, it also prevents the only means of
|
||
keeping our privacy. It is a simple matter for sysops to read
|
||
"private" messages (most don't: some might), and thus people
|
||
will want to encrypt. Unfortunately, this makes it harder to
|
||
tell if people are using the Net for illegal purposes (transfer
|
||
of classified documents, etc).
|
||
|
||
Discounting the last point, it seems fair to ban encryption in
|
||
all places BUT private messages. Including the last point, it
|
||
seems that it should be totally banned, or performed in a simple
|
||
matter that anyone needing to check for illegal activity. This
|
||
seems to be a trivial exercise, as it removes the privacy aspect
|
||
again!
|
||
|
||
I suggest an open debate in an echo area, or pehaps a vote of
|
||
some kind by the participants in FidoNet. As voting by e-mail
|
||
would be difficult, I suggest that it be restricted to sysops
|
||
only, and the voting to be restricted to one vote per node.
|
||
Comments on this method, please.
|
||
|
||
Finally, I would like to point out that the echo area I have
|
||
seen on some bulletin board, containing USENET and ACSNET jokes,
|
||
have in them messages encryped with ROT13 (rotating letters
|
||
forward 13 characters), which is quite popular and necessary for
|
||
legal reasons on potentially offensive jokes. The ruling in the
|
||
draft policy makes these messages rather illegal. How should
|
||
these be handled?
|
||
|
||
Yours,
|
||
Garth Kidd.
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 6-17 Page 30 24 Apr 1989
|
||
|
||
|
||
=================================================================
|
||
LATEST VERSIONS
|
||
=================================================================
|
||
|
||
Latest Software Versions
|
||
|
||
Bulletin Board Software
|
||
Name Version Name Version Name Version
|
||
|
||
Fido 12k Opus 1.03b TBBS 2.1
|
||
QuickBBS 2.03 TPBoard 5.0 TComm/TCommNet 3.4
|
||
Lynx 1.30* Phoenix 1.3 RBBS 17.1D
|
||
|
||
|
||
Network Node List Other
|
||
Mailers Version Utilities Version Utilities Version
|
||
|
||
Dutchie 2.90C* EditNL 4.00 ARC 6.01
|
||
SEAdog 4.50 MakeNL 2.12 ARCmail 2.0
|
||
BinkleyTerm 2.20* Prune 1.40 ConfMail 4.00
|
||
D'Bridge 1.18* XlatList 2.90 TPB Editor 1.21
|
||
FrontDoor 2.0 XlaxNode 2.32 TCOMMail 2.2*
|
||
PRENM 1.40 XlaxDiff 2.32 TMail 8901
|
||
ParseList 1.30 UFGATE 1.03
|
||
GROUP 2.07*
|
||
EMM 1.40
|
||
MSGED 1.99
|
||
XRS 2.0*
|
||
|
||
* Recently changed
|
||
|
||
Utility authors: Please help keep this list up to date by
|
||
reporting new versions to 1:1/1. It is not our intent to list
|
||
all utilities here, only those which verge on necessity.
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 6-17 Page 31 24 Apr 1989
|
||
|
||
|
||
=================================================================
|
||
NOTICES
|
||
=================================================================
|
||
|
||
The Interrupt Stack
|
||
|
||
|
||
28 Apr 1989
|
||
Start of Gateway '89 show at the Viscount Hotel in Queens,
|
||
New York. Contact Gateway '89 at (516) 678-7180 for info.
|
||
|
||
8 May 1989
|
||
Digital Equipment Corporations User Society (DECUS) will be
|
||
holding its semi-annual symposium in Atlanta, GA. Runs
|
||
through May 12. As usual sysop's will get together and chat.
|
||
|
||
15 May 1989
|
||
Denmark changes telephone numbers from 7 to 8 digits.
|
||
|
||
19 May 1989
|
||
Start of EuroCon III at Eindhoven, The Netherlands. Contact
|
||
Hans Ligthelm of 2:500/3 for details.
|
||
|
||
5 Jun 1989
|
||
David Dodell's 32nd Birthday
|
||
|
||
24 Aug 1989
|
||
Voyager 2 passes Neptune.
|
||
|
||
24 Aug 1989
|
||
FidoCon '89 starts at the Holiday Inn in San Jose,
|
||
California. Trade show, seminars, etc. Contact 1/89
|
||
for info.
|
||
|
||
5 Oct 1989
|
||
20th Anniversary of "Monty Python's Flying Circus"
|
||
|
||
11 Nov 1989
|
||
A new area code forms in northern Illinois at 12:01 am.
|
||
Chicago proper will remain area code 312; suburban areas
|
||
formerly served with that code will become area code 708.
|
||
|
||
If you have something which you would like to see on this
|
||
calendar, please send a message to FidoNet node 1:1/1.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FidoNews 6-17 Page 32 24 Apr 1989
|
||
|
||
|
||
OFFICERS OF THE INTERNATIONAL FIDONET ASSOCIATION
|
||
|
||
Mort Sternheim 1:321/109 Chairman of the Board
|
||
Bob Rudolph 1:261/628 President
|
||
Matt Whelan 3:3/1 Vice President
|
||
Bill Bolton 3:711/403 Vice President-Technical Coordinator
|
||
Linda Grennan 1:147/1 Secretary
|
||
Kris Veitch 1:147/30 Treasurer
|
||
|
||
|
||
IFNA COMMITTEE AND BOARD CHAIRS
|
||
|
||
Administration and Finance Mark Grennan 1:147/1
|
||
Board of Directors Mort Sternheim 1:321/109
|
||
Bylaws Don Daniels 1:107/210
|
||
Ethics Vic Hill 1:147/4
|
||
Executive Committee Bob Rudolph 1:261/628
|
||
International Affairs Rob Gonsalves 2:500/1
|
||
Membership Services David Drexler 1:147/1
|
||
Nominations & Elections David Melnick 1:107/233
|
||
Public Affairs David Drexler 1:147/1
|
||
Publications Rick Siegel 1:107/27
|
||
Security & Individual Rights Jim Cannell 1:143/21
|
||
Technical Standards Rick Moore 1:115/333
|
||
|
||
|
||
IFNA BOARD OF DIRECTORS
|
||
|
||
DIVISION AT-LARGE
|
||
|
||
10 Courtney Harris 1:102/732 Don Daniels 1:107/210
|
||
11 Bill Allbritten 1:11/301 Mort Sternheim 1:321/109
|
||
12 Bill Bolton 3:711/403 Mark Grennan 1:147/1
|
||
13 Irene Henderson 1:107/9 (vacant)
|
||
14 Ken Kaplan 1:100/22 Ted Polczyinski 1:154/5
|
||
15 Scott Miller 1:128/12 Matt Whelan 3:3/1
|
||
16 Ivan Schaffel 1:141/390 Robert Rudolph 1:261/628
|
||
17 Neal Curtin 1:343/1 Steve Jordan 1:206/2871
|
||
18 Andrew Adler 1:135/47 Kris Veitch 1:147/30
|
||
19 David Drexler 1:147/1 (vacant)
|
||
2 Henk Wevers 2:500/1 David Melnik 1:107/233
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 6-17 Page 33 24 Apr 1989
|
||
|
||
|
||
__
|
||
The World's First / \
|
||
BBS Network /|oo \
|
||
* FidoNet * (_| /_)
|
||
_`@/_ \ _
|
||
| | \ \\
|
||
| (*) | \ ))
|
||
______ |__U__| / \//
|
||
/ Fido \ _//|| _\ /
|
||
(________) (_/(_|(____/ (tm)
|
||
|
||
Membership for the International FidoNet Association
|
||
|
||
Membership in IFNA is open to any individual or organization that
|
||
pays a specified annual membership fee. IFNA serves the
|
||
international FidoNet-compatible electronic mail community to
|
||
increase worldwide communications.
|
||
|
||
Member Name _______________________________ Date _______________
|
||
Address _________________________________________________________
|
||
City ____________________________________________________________
|
||
State ________________________________ Zip _____________________
|
||
Country _________________________________________________________
|
||
Home Phone (Voice) ______________________________________________
|
||
Work Phone (Voice) ______________________________________________
|
||
|
||
Zone:Net/Node Number ____________________________________________
|
||
BBS Name ________________________________________________________
|
||
BBS Phone Number ________________________________________________
|
||
Baud Rates Supported ____________________________________________
|
||
Board Restrictions ______________________________________________
|
||
|
||
Your Special Interests __________________________________________
|
||
_________________________________________________________________
|
||
_________________________________________________________________
|
||
In what areas would you be willing to help in FidoNet? __________
|
||
_________________________________________________________________
|
||
_________________________________________________________________
|
||
Send this membership form and a check or money order for $25 in
|
||
US Funds to:
|
||
International FidoNet Association
|
||
PO Box 41143
|
||
St Louis, Missouri 63141
|
||
USA
|
||
|
||
Thank you for your membership! Your participation will help to
|
||
insure the future of FidoNet.
|
||
|
||
Please NOTE that IFNA is a general not-for-profit organization
|
||
and Articles of Association and By-Laws were adopted by the
|
||
membership in January 1987. The second elected Board of Directors
|
||
was filled in August 1988. The IFNA Echomail Conference has been
|
||
established on FidoNet to assist the Board. We welcome your
|
||
input to this Conference.
|
||
|
||
-----------------------------------------------------------------
|
||
|