2680 lines
115 KiB
Plaintext
2680 lines
115 KiB
Plaintext
F I D O N E W S -- Vol.10 No.13 (29-Mar-1993)
|
||
+----------------------------+-----------------------------------------+
|
||
| A newsletter of the | |
|
||
| FidoNet BBS community | Published by: |
|
||
| _ | |
|
||
| / \ | "FidoNews" BBS |
|
||
| /|oo \ | +1-519-570-4176 1:1/23 |
|
||
| (_| /_) | |
|
||
| _`@/_ \ _ | Editors: |
|
||
| | | \ \\ | Sylvia Maxwell 1:221/194 |
|
||
| | (*) | \ )) | Donald Tees 1:221/192 |
|
||
| |__U__| / \// | Tim Pozar 1:125/555 |
|
||
| _//|| _\ / | |
|
||
| (_/(_|(____/ | |
|
||
| (jm) | Newspapers should have no friends. |
|
||
| | -- JOSEPH PULITZER |
|
||
+----------------------------+-----------------------------------------+
|
||
| Submission address: editors 1:1/23 |
|
||
+----------------------------------------------------------------------+
|
||
| Internet addresses: |
|
||
| |
|
||
| Sylvia -- max@exlibris.tdkcs.waterloo.on.ca |
|
||
| Donald -- donald@exlibris.tdkcs.waterloo.on.ca |
|
||
| Tim -- pozar@kumr.lns.com |
|
||
| Both Don & Sylvia (submission address) |
|
||
| editor@exlibris.tdkcs.waterloo.on.ca |
|
||
+----------------------------------------------------------------------+
|
||
| For information, copyrights, article submissions, |
|
||
| obtaining copies and other boring but important details, |
|
||
| please refer to the end of this file. |
|
||
+----------------------------------------------------------------------+
|
||
========================================================================
|
||
Table of Contents
|
||
========================================================================
|
||
|
||
1. Editorial..................................................... 2
|
||
2. Articles...................................................... 3
|
||
Memory Still Warm........................................... 3
|
||
Interested in CB Radio? Why not hook into the echo!......... 4
|
||
Magazine reviews: MONDO 2000, bOING bOING, WIRED............ 5
|
||
White House press releases direct to FidoNet!............... 8
|
||
Genetic Algorithm echo being started........................ 9
|
||
The Comics For Sale conference.............................. 9
|
||
Caller id again............................................. 10
|
||
Caller Id....Curse or Help?................................. 11
|
||
$50 or $100 reward offered.................................. 11
|
||
Nodelist Troubles........................................... 12
|
||
CorelDRAW! ECHO............................................. 13
|
||
An open letter to the people who waste bandwidth............ 14
|
||
More on the point nodelist.................................. 14
|
||
Rebuttal to an Anonymous Critic............................. 15
|
||
The TRULY democratic policy proposal revealed............... 18
|
||
3. Fidonews Information.......................................... 46
|
||
FidoNews 10-13 Page: 2 29 Mar 1993
|
||
|
||
|
||
========================================================================
|
||
Editorial
|
||
========================================================================
|
||
The week started with a mail bulge that amounted to 35
|
||
megabytes unarchived. Little did we know that it was all for
|
||
Fidonews. We have received about 175k of articles, and they have
|
||
come in in every form, from properly formated articles to notes
|
||
via internet.
|
||
|
||
That, in turn, is forcing us to take a close look at just
|
||
what kind of policy we should have regarding Fidonet articles.
|
||
(there have been a number of letters, as well, regarding
|
||
Fidonews policy). The short answer to "what is Fidonews policy?"
|
||
is simple. There is none, and there will not be.
|
||
|
||
Everything that arrives will be read, then we will decide
|
||
what to do. Generally, everything will be printed, BUT THAT IS
|
||
NOT A "RULE". A case in point is last week's "policy" article.
|
||
|
||
Frankly, we are feeling a bit suckered. Tom knew what was
|
||
up, and refused to print the huge policy proposals. As soon as
|
||
we got in as editors, one of the authors quickley hit us with an
|
||
article, knowing full well that it had already been refused.
|
||
That was not mentioned. Imediatley, we received two more, each
|
||
of the same length, along with demands that they be printed in
|
||
the name of fair play. Ok, fair play is fair play. One is in
|
||
this week's issue, and one will be in next. That is the end of
|
||
it. Fidonews is a NEWSLETTER. Fifty pages of legalese per week
|
||
is too much. Not because of pertinence, but because it is too
|
||
boring to live with. In the future, we will make policy four
|
||
replacements available for downloading, and run announcements of
|
||
them as they arrive. If they are submited with short articles
|
||
explaining how they differ, those will be considered as articles.
|
||
|
||
We received an excellent letter stating that back and forth
|
||
arguements about issues are better in echos. The writer is
|
||
quite correct. The recent spate of "I said", "you said", "no I
|
||
meant" articles on caller id *are* best suited for echos. Once it
|
||
gets to the arguement stage, then netmail and echos are the best
|
||
forum.
|
||
|
||
So how do we plan to do this? Well, if we have nothing
|
||
else to print, than maybe anything will get in. If we have too
|
||
much, then boring articles will get cut first. Next we will cut
|
||
rude articles, then we will cut the illiterate ones. That
|
||
policy will change weekly.
|
||
|
||
Last but not least, I would ask that people submitting
|
||
articles at least read artspec.doc, and attempt to follow it.
|
||
Files that arrive in my inbound with no title can be dealt with;
|
||
ones that arrive in internet mail, with no carriage returns, no
|
||
linefeeds, totally in upper-case, in non-ascii format, are a
|
||
pain in the butt.
|
||
FidoNews 10-13 Page: 3 29 Mar 1993
|
||
|
||
|
||
========================================================================
|
||
Articles
|
||
========================================================================
|
||
Memory Still Warm...
|
||
|
||
Terry L. Travis of Denver Colorado, a long-time BBS System
|
||
Operator and avid supporter of the electronic community, died
|
||
Tuesday, March 23, 1993 of renal and lung cancer. Terry was 37.
|
||
|
||
Viewing will be from 4 PM to 8 PM Friday (26 Mar 93)
|
||
followed by services 10 AM Saturday (27 Mar 93) at Olinger
|
||
Highland Mortuary, 300 E. 104th Avenue, Northglen, Colorado.
|
||
|
||
Terry was born May 20, 1955 in a small Iowa town. Never
|
||
knowing his real parents, he was shuttled from home to orphanage
|
||
to home until he finally came to Denver.
|
||
|
||
Terry started one of the earliest full-time electronic
|
||
bulletin boards in the country in 1983, keeping it continuously
|
||
running until his death. Many times he skipped meals, and even
|
||
car payments, in order to keep the BBS up and available.
|
||
|
||
He was one of the founders of IBECC, a non-profit
|
||
organization dedicated to the electronic community and the
|
||
handicapped. Terry was also responsible for the daily operation
|
||
of the IBECC BBS, maintaining the system, software, and inter-
|
||
network connections.
|
||
|
||
The BBS, which was his love and his life, will continue
|
||
indefinitely; his friend and associate, Marshall Barry, will
|
||
assume responsibility.
|
||
|
||
Terry was friend to many, dedicating himself to others by
|
||
providing solace and a open door to those who were in need, no
|
||
matter the personal cost. Beneath a gruff and crusty attitude,
|
||
there existed a selfless and caring heart.
|
||
|
||
Terry is survived by a daughter, Tara, with whom he has had
|
||
no contact for more than 17 years. He is also survived by the
|
||
family that adopted him, and thousands of computer enthusiasts
|
||
around the world. He truly shall be missed.
|
||
|
||
He has requested that donations be made to cancer / AIDS /
|
||
MS or other research in the hope that no others shall share his
|
||
fate.
|
||
|
||
Contact: Michelle Weisblat or Marshall Barry at (303) 426-
|
||
1847 (voice); P.O. Box 486, Louisville, CO 80027-0486 (US Mail);
|
||
or electronically to "Michelle.Weisblat@f969.n104.z1.FidoNet.Org"
|
||
|
||
FidoNews 10-13 Page: 4 29 Mar 1993
|
||
|
||
|
||
Interested in CB Radio? Why not hook into the echo!
|
||
Read on for details ...
|
||
From: Tony Vilimek (2:253/511)
|
||
|
||
ATTENTION USERS AND SYSOPS !! **
|
||
|
||
Are you interested in Citizens' Band Radio and want to
|
||
contact others with the same interest? Look no further
|
||
and enter the CB Radio FidoNet message area!
|
||
|
||
>---8<--- A snip from the CB Radio Echo Rules ---8<---<
|
||
|
||
8) Keep on topic. The topic is Citizens' Band Radio;
|
||
This means talking about any CB related stuff like
|
||
contacting other CB users, CB equipment and repairs,
|
||
CB DXing, CB legal waffle, CB help and advise, and
|
||
so on.
|
||
|
||
>---8<-------------------------------------------8<---<
|
||
|
||
This echo has been available from the UK national
|
||
backbone for a while now and has been ticking along nicely.
|
||
I'm now looking for worldwide interest and possible easy
|
||
links, for mail traffic to travel on the back of already
|
||
existing zone to zone echo traffic. If you're into anything
|
||
related with CB Radio, come and chat in this echo NOW and
|
||
tell all your friends about it! Message traffic will
|
||
gaurantee availability to your country! Don't waste any
|
||
more time and start chatting in the CB Radio message area
|
||
NOW! ;-)
|
||
|
||
If you are already gating mail in or out of the UK and
|
||
you're interested in hooking up with this fairly new echo,
|
||
please contact me now by netmail. We can discuss ways of
|
||
setting up a reliable interzone link. Or, you could ask
|
||
your UK link to hook up with the echo as it's already
|
||
locally available to them via the normal UK backbone links.
|
||
Thanks in advance for your time.
|
||
|
||
Cheerz, 10-10 till we do it again! ;-)
|
||
|
||
_ // [ CBBBS System Manager ] /\/\ [ FidoNet: (2:253/511) ] \\ _
|
||
\X/ [ CB Radio Echo Moderator ] _/\_ [ AmigaNet: (39:133/100) ] \X/
|
||
FidoNews 10-13 Page: 5 29 Mar 1993
|
||
|
||
|
||
Magazine reviews: MONDO 2000, bOING bOING, WIRED
|
||
|
||
by Tom Jennings (tomj@fido.wps.com)
|
||
26 Mar 93
|
||
|
||
I usually hate to review things. What a terrible task. But there's an
|
||
exception to everything; here's three.
|
||
|
||
For years, I've lived in this in-between world, I do techy things,
|
||
certainly, but I refuse to overlook the frequently oppressive and
|
||
terrible things done with a lot of the junk I could work on (and, sigh,
|
||
get paid for). And all of it starts right here: how we live, work and
|
||
play with each other. Corporate culture, what I call that crap that
|
||
passes for human interaction in that place you probably call "work", I
|
||
simply cannot live with. It quite literally makes me sick.
|
||
|
||
Most of the people I actually live and play with are utterly
|
||
non-technical, but are intelligent, literate people working on all sorts
|
||
of things, like music, building social centers in ex-countries,
|
||
using punk music to transport ideas and communications to ex-USSR,
|
||
operating community switchboards without grants, etc.
|
||
|
||
Slowly, these two diffuse "groups" are growing into each other, with
|
||
wonderful and exciting results. Previously separated fraternal twins
|
||
are together, essentially.
|
||
|
||
Some of them publish magazines. Here's three I've run into.
|
||
|
||
MONDO 2000
|
||
|
||
I should have taken the hint from my friend Mykel Board; simply never do
|
||
negative reviews. A few months back, in a FidoNews editorial (gasp) I
|
||
basically slagged MONDO. I won't hurt myself further by dragging out my
|
||
original words. Or maybe I shouldn't apologize, and instead point out
|
||
just how much MONDO has *changed* in these last two issues.
|
||
|
||
The first hint something was up was a review of a Stun Gun (Nova
|
||
Industries), in issue #8. A marginal note starts, "People have been
|
||
bashing us for our purported gee-whiz approach to new tech. Where do
|
||
they get these ideas? ...". So Paco Xander Nathan does an excellent
|
||
review -- laid over one of MONDO's silly fashion spreads, with
|
||
the models pointing baroque plastic 'ray guns'... OK, OK, MONDO
|
||
takes hints. Very sharp!
|
||
|
||
#8 has Diamanda Galas on the cover and interviewed inside. She's as
|
||
sharp, witty and nasty as ever. But the coup is the engineered
|
||
collision/interview between the bands U2 and NEGATIVELAND; in case you
|
||
weren't aware, NEGATIVELAND did a parody of sorts of a U2 album,
|
||
including audio samples and sleeve. U2 sued them hard. It was handled
|
||
very meanly. So here we've got oh-so-alternative,
|
||
we're-not-corpersate-rock band U2 trying to talk their way out of
|
||
responsibility for putting NEGATIVELAND way out of business. Very sharp
|
||
mammals at work this issue!! A cryptic story about the cypherpunk list.
|
||
Hmm.
|
||
FidoNews 10-13 Page: 6 29 Mar 1993
|
||
|
||
|
||
I actually read all of issue #8 thinking hmm, by some incredibly bizarre
|
||
accident, this is a great magazine. I even bought it. My boyfriend
|
||
rubbed it in.
|
||
|
||
So then whilst doing laundry, caffiening at Farleys, again, there
|
||
appears issue #9. Yeow! It has Jade on the cover! Jade is a local
|
||
girl, you see, someone who's in one of my social circles, friends of
|
||
friends of mine. So I pick it up and take it to my table, embarrassed to
|
||
be seen with it, grumble.
|
||
|
||
Another story about crypto stuff, the story of PGP, and words from Phil
|
||
Zimmerman, it's author. It's pretty good, and I think would actually
|
||
inform people not already involved (hard to do).
|
||
|
||
A fashion spread, PANIC SEX, with Jade, Bridgette (7-foot tall deathrock
|
||
drag boyfriend of Danielle Hell) with a rifle; Stafford and Heidi,
|
||
lovely boys they are. Not a sign of the usual consumption of other
|
||
peoples' trips, something so so common when covering non-mainstreamy
|
||
societies. OK, so I'm hypersensitive, tough shit. Good job! (Great
|
||
spread!)
|
||
|
||
An interview with LAIBACH, what freaks. Scary. A very decent intro to
|
||
ISDN, why it's worth thinking about. OK, so I bought this issue too. I had
|
||
to admit I was more than pleased.
|
||
|
||
I've only mentioned about 15% of each issue's content. It's been really
|
||
worth getting. I actually read 90% of the last two issues.
|
||
|
||
I also feel just as strongly that most previous issues were mainly
|
||
high-priced fluff and self-indulgence. My my how things can change!!
|
||
|
||
I don't think it's a cooincidental one-shot (though anything's
|
||
possible). The USERS GUIDE TO THE NEW EDGE is excellent. It
|
||
covers a mix of tech, high-gimcrackery, fashion (sigh) and interesting
|
||
people. It plays with form in that there's running parallel texts that
|
||
act as footnotes (a traditional, primitive form of hypertext, usually
|
||
poorly exploited). As always, it has more color than your average
|
||
hallucination. I think they arranged themselves in alignment with
|
||
their actual reality, which is somewhat outside of the things the
|
||
cover, interpreting somewhat for public consumption, approaching but
|
||
not yet falling into the abyss of cooption. Edge indeed! There's no
|
||
formulaic approach to this, you gotta feel your way about. Good luck!
|
||
|
||
(MONDO 2000, Box 10171, Berkeley CA 94709; $24/yr, 4 issues(?) US.
|
||
mondo@well.sf.ca.us)
|
||
|
||
bOING bOING
|
||
|
||
Really a giant zine. Wiseass fringey reviews, commentary, stories, etc.
|
||
You'll recognize a lot of names in common in all this fringey writing
|
||
stuff. It has actually become a "scene". bOING bOING has the character
|
||
of the corner of the planet it's main writers are from, Austin Tex-ass. It
|
||
straddles the cool/nerd boundary fairly well. It's more "downscale" than
|
||
MONDO; they apparently don't have their own oil-well or whatever. These
|
||
FidoNews 10-13 Page: 7 29 Mar 1993
|
||
|
||
are the people who would graffiti the bathroom and hack the stereo at a
|
||
MONDO party.
|
||
|
||
I stumbled upon MONDO #9 somewhere in Seattle this past summer. I read
|
||
it immediately cover to cover *twice*. A review/interview of Lewis
|
||
Shiner's novel SLAM caused me to locate and buy everything he's written
|
||
except FRONTERA (unfindable). Stories on A-life, fake ants, home surgery
|
||
on your cat, zine reviews, columns of odd, unclassifiable wierdness,
|
||
etc. #9 has a flip-over-back-cover parody of MONDO 2000 that is very
|
||
funny -- parodying exactly what I hated so about previous MONDOs. Maybe
|
||
they read it!
|
||
|
||
Alas, #10 was a bad mistake. I'm sure it's temporary. See, it's called
|
||
the "Sex candy for mutants" issue. Sheesh, apparently people from outer
|
||
space are just like us! We're all het males who like to look at boobies!
|
||
Aww come on GUYS!! Sex means -- sexy! Where were hot stories? Read
|
||
TASTE OF LATEX for a sample of a reasonable display of diversity and
|
||
erotica. Hey I thought we were fringey! Don't hip straight guys ever
|
||
imagine sex with their male friends? Having female sex organs?
|
||
What's the best way to jerk off at work? How to read VGA erotica with
|
||
one hand? Sex under the influence of 60-cycle hum and niacin poisoning?
|
||
Women? Oh them! (Well there was one good sex thing, a review of vibrators
|
||
done by two women no less -- but it was borrowed from BEN IS DEAD. Oh
|
||
well.) I know they'll hate to hear this, but MONDO blurs boundaries
|
||
quite well, one thing I overlooked even in their bad old days.
|
||
|
||
Look I'm no sex expert, I'm a nerd too! But if you're gonna do
|
||
something, please, do reiterate the usual dullness on us... it's OK,
|
||
#10 has things of merit, and I still look forward to the rest of my
|
||
subscription, and probably renewing it. I hotly await #11...
|
||
|
||
(bOING bOING, 11288 Ventura Blvd, #818, Studio City CA 91604; $14/yr US, 4
|
||
issues. boing@wixter.cactus.org)
|
||
|
||
(last but by far not the least)
|
||
|
||
WIRED
|
||
|
||
WIRED is less chaotic, less immediate, and more solidly technical, but
|
||
with am excellent take and approach to technology in our large-scale
|
||
social setting. It's not just technophilia, like all the ucky trade rags
|
||
and "PRODUCT WEAKLY" ad-rags. It has the color and flash of the new
|
||
self-referential edge stuff, but a substantial base. It has a sort-of
|
||
multi-page column covering technical and cultural tidbits. Instead of
|
||
just reviews or stories of the wonderful world of technology, it
|
||
attempts to put objects into some sort of perspective -- "flyaway"
|
||
quasi-portable TV-sat base stations, who uses them, how, and their
|
||
effect on media. Sterling's story/report on VR used by the military,
|
||
starts out with the usual gee-whiz hook, but ends up covering it's
|
||
position in the post-cold-war political and economic world.
|
||
|
||
WIRED is bright and colorful, and the major stories start with flashy
|
||
hooks to suck you in, but each follows up with solid writing and
|
||
reporting. Let's hope they can continue to pull this off, and not go the
|
||
way of OMNI (which, as I recall, once had a lot more substantial pop
|
||
FidoNews 10-13 Page: 8 29 Mar 1993
|
||
|
||
science, before it devolved into embarrasing UFO and magic-pill
|
||
stories).
|
||
|
||
Issue #1 also has a talk between Camille Paglia (smart feminist
|
||
troublemaker) and Stuart Brand (Whole Earth stuff and Media Lab),
|
||
discussing Marshall McLuhan, that whacky Canadian who pegged our culture
|
||
so well. OK, I call this a blatant position piece, a statement of where
|
||
WIRED wants to be. I want to be there too!
|
||
|
||
WIRED looks like it might become a major mover. They're independent, yet
|
||
seem to have substantial support, and national distribution. I
|
||
immediately bought a subscription.
|
||
|
||
(You might get the impression I subscribe to magazines all the time; in
|
||
fact I now have a total of four subscriptions, period.)
|
||
|
||
(WIRED, Box 191826, San Francisco CA 94119-1826; $19.95/yr US, 6 issues.
|
||
lr@wired.com)
|
||
|
||
--
|
||
Tom Jennings / tomj@fido.wps.com / World Power Systems / San Francisco CA
|
||
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
White House press releases direct to FidoNet!
|
||
|
||
The Office of Media Affairs at the U.S. White House (you know, the
|
||
electronic propaganda ministers for the current regime) have arranged to
|
||
output official press releases, news items, quotable quotes, etc
|
||
directly to FidoNet. (You read it right -- the W.H. O.M.A. knows what
|
||
FidoNet is, and went out of their way to get their propaganda to us --
|
||
OK so of course they would, they want anyone who will listen to read
|
||
their stuff -- but the amazing part is that they noticed -- I'm still
|
||
not sure if this is good or bad -- I seem to have gotten off the
|
||
original point -- everyone here's an American, right? -- I mean -- )
|
||
|
||
OK. Where was I.
|
||
|
||
So the Office of Media Affairs at the U.S. White house has made
|
||
available for direct FidoNet consumption oh never mind. It's available
|
||
as a FidoNet echo conference named INET.WHITE.HOUSE. It is wanting
|
||
people to carry it. You can request a feed from the echomail
|
||
outlet nearest you, though it is not yet on the backbone; if enough
|
||
people ask for it etc. Try AREAFIXing to 1:13/13 for INET.WHITE.HOUSE.
|
||
Maybe that will work, I don't know. Hell, I don't read echo mail.
|
||
|
||
Tom Jennings
|
||
tomj@fido.wps.com
|
||
|
||
PS: It also wants an archive site to hold old stuff; if you own a disk
|
||
manufacturing company or are just plain perverse, you could start archiving
|
||
this stuff and announce in these epages it's availability...
|
||
FidoNews 10-13 Page: 9 29 Mar 1993
|
||
|
||
|
||
--
|
||
Tom Jennings / tomj@fido.wps.com / World Power Systems / San Francisco CA
|
||
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Genetic Algorithm echo being started
|
||
|
||
I have been perusing the Internet lately, and have picked up a liking
|
||
for Neural Net, Artificial Intelligence, & Genetic Algorithm related
|
||
topics. (Referred to as NN,AI and GA respectively from here on in)
|
||
Upon browsing thru the backbone and non-backbone echolists, I noticed
|
||
the AI and NEURAL_NET echoes, which I am now carrying, but nothing
|
||
relating to GA and/or Natural Life type coding/research. Due to this
|
||
I am attempting to start a new echo, with the tentative areaname of
|
||
GA_Echo, which will deal specifically with Genetic Algorithms and the
|
||
uses it can be put to, as well as Natural Life type approaches. If
|
||
you would be interested in carrying this echo, either now or once it
|
||
would make backbone status (assuming interest is sufficient, and a
|
||
number of other things <g>) feel free to contact me via netmail
|
||
at 1:115/100. I am currently finishing the first draft of the
|
||
conference guidelines, and am open to review and/or criticism of said
|
||
document by other GA/NN/AI interested sysops.
|
||
|
||
Paul M. Chartraw
|
||
The Hideaway BBS
|
||
1:115/100
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
The Comics For Sale conference
|
||
Walter Tietjen (FidoNet 1:151/114 - AlterNet 7:42/2022)
|
||
|
||
Rules of the CMX4SALE conference:
|
||
|
||
This is the place to buy/sell/trade comics and comic-character toys.
|
||
|
||
If you use a `handle' on your local BBS, please include your REAL NAME
|
||
in your ad. Also a telephone number &/or Snail-Mail address should be
|
||
included in your ad. Mail/telephone replies to ads take less time than
|
||
replies in the conference.
|
||
|
||
USA - Prices should be in U.S.$
|
||
Other countries - _PLEASE_ specify currency (Example: Canada are those
|
||
prices in U.S.$ or Can-$?)
|
||
|
||
Both personal and commercial ads may appear here.
|
||
|
||
This conference is available in both GroupMail and EchoMail formats
|
||
(SysOp's choice) and is FULLY moderated on the GroupMail side. GroupMail
|
||
TopStar is AlterNet 7:42/2022 a/k/a FidoNet 1:151/114
|
||
|
||
SysOps: You are _WELCOME_ to pass this conference to _ANY_ node
|
||
which wants it. _NO_ pre-approval needed.
|
||
FidoNews 10-13 Page: 10 29 Mar 1993
|
||
|
||
|
||
CMX4SALE conference - active nodes (Z1=FidoNet Z7=AlterNet):
|
||
|
||
Net City Phone
|
||
1:19/37 Russellville AR 1-501-968-3910
|
||
1:124/3112 Dallas, TX 1-214-557-2642
|
||
1:151/114 Raleigh NC 1-919-833-3412
|
||
1:294/1 St. Joseph MO 1-816-233-1357
|
||
1:351/715 Ucluelet, BC Canada 1-604-726-2577
|
||
1:380/7 Shreveport LA 1-318-424-9260
|
||
1:393/3 Justin, TX 1-817-648-2599
|
||
1:2410/290 Dearborn, MI 1-313-562-0051
|
||
1:3625/462 Mobile AL 1-205-633-5875
|
||
1:3628/7 Carolina Beach, NC 1-919-458-7999
|
||
1:3628/10 Carolina Beach, NC (Mail hub) 1-919-458-3033
|
||
1:3641/1 Durham NC 1-919-286-7738
|
||
7:520/560 Lyndhurst, NJ 1-201-935-7968
|
||
7:520/561 Lyndhurst, NJ 1-201-935-1485
|
||
7:520/562 Lyndhurst, NJ 1-201-935-7004
|
||
7:520/563 Lyndhurst, NJ 1-201-935-7008
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Caller id again
|
||
Stanton McCandlish, SysOp: Noise in the Void Data Center BBS
|
||
FidoNet: 1:301/2 Internet: anton@hydra.unm.edu
|
||
|
||
Well yet again, another person has sent some long winded article
|
||
supporting CID, and again most of it is misinterpretation of
|
||
what I said, based on what the writer wished I had said so that
|
||
I could be slammed harder. I did NOT say that callers should
|
||
not have to provide BBSs with correct address, name and phone
|
||
number. The last few criticisms of my letter have hinged on
|
||
just this imaginary point. I said "that's what the login
|
||
questionnaires are for." I agree that CBV can be abused, and
|
||
that there may be a problem. Again I did not say that CID is
|
||
Satan incarnate, rather that some thought should be given to its
|
||
use and that people should be patient and wait until policy has
|
||
been updated and nodelist flags defined to account for CID-only
|
||
systems. Is this so difficult to grasp? As for long distance
|
||
callers: why verify them? What nut is going to call you long
|
||
distance, at THEIR expense to lie to you so they can get an
|
||
extra account to cheat SRE with, or whatever? It just isn't
|
||
likely. And finally, the merits of Canadian vs US law is real
|
||
neat and all but totally irrelevant. READ the article, for
|
||
chrissakes. And only last thing, I just want to emphasize yet
|
||
AGAIN that when I say CID harms privacy I am not refer- ring to
|
||
sysops, but rather to less savoury folks. By forcing caller ID,
|
||
sysops in effect demand that we send caller ID info to ALL
|
||
numbers. When the telcos come up with all call blocking that
|
||
can be temporarily disabled with a keypad code to dial one
|
||
number, then fine, CID your heart out. Until that time comes
|
||
you are doing everyone as disservice by demanding Caller ID
|
||
info. Why not USE CID if it is given, and voice verify the rest
|
||
without a hassle? Simple.
|
||
FidoNews 10-13 Page: 11 29 Mar 1993
|
||
|
||
|
||
PS: the idea that having CID blocking would make someone
|
||
prosecutable for un- authorized access is a very silly fantasy.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Caller Id....Curse or Help?
|
||
|
||
by Mike Phillips
|
||
1:3602/1015
|
||
|
||
I have been following the discussion of the benefits/risks of using
|
||
and/or having caller id installed as a first line of defense for some
|
||
time now both here on Fido and on other networks as well.
|
||
|
||
It would seem that most of the gripes, complaints and general bitching is
|
||
really being blown out of proportion. Here in Talladega where I live, we
|
||
have yet to be able to get Caller-ID. Because >I< want to ensure that I
|
||
REALLY am calling the person who left the phone number information
|
||
during logon I voice verify. If you call in long distance, expect the
|
||
call to be collect....my phone bill is high enough already.
|
||
|
||
You can rest assured that I will install Caller-ID as soon as I can
|
||
along with control software that will control access to my BBS via this
|
||
technology. IF you feel that having the teleco "giving" me your number
|
||
than more than likely you wouldn't enter the correct number when you
|
||
logon any ways and definitely would not allow me to call you collect. It
|
||
all boils down to one thing ladies and gentleman....you are calling MY
|
||
HOUSE, using MY COMPUTER and downloading software that I have spent GOOD
|
||
money to collect. IF you do not want to allow my system to automatically
|
||
verify you then....DONT CALL ME!
|
||
|
||
I have set up several BBS 's for business use (before the advent of
|
||
Caller-ID) and in several circumstances, Caller-ID would have provided a
|
||
level of security that nothing else will. In one instance, there are two
|
||
stores that need to transfer sales data at the end of the day...with
|
||
Caller-ID, the ONLY modem that will "get through" is the one that is
|
||
calling from the number programmed into the Caller-ID software. This
|
||
feature alone allowed me to make a custom software sale (along with
|
||
hardware) that I would not have made otherwise. There is so much to gain
|
||
by using Caller-ID that I think every SYSOP should investigate using it.
|
||
Hell, even some of the newer modems are incorporating the Caller-ID
|
||
"box" into the modems....does that tell us something?
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
$50 or $100 reward offered
|
||
BY J. Alec West (1:105/135)
|
||
|
||
Recently, I called the National Computer Virus Association
|
||
BBS in California (aka McAfee Associates) to download the latest
|
||
version of their SCAN.EXE and CLEAN.EXE shareware and associated
|
||
documentation. It might be good to include in the next issue of
|
||
FidoNews that these recent versions are available for download
|
||
from the NCVA BBS, 1-408-988-4004. Callers don't have to be
|
||
FidoNews 10-13 Page: 12 29 Mar 1993
|
||
|
||
'registered users' to download from this board and there is no
|
||
charge for doing so (beyond the cost of Ma Bell for the LD
|
||
call). But, besides that, the opening screens at logon showed
|
||
the following information:
|
||
|
||
***********************************************************************
|
||
NOTICE: $50 REWARD.
|
||
|
||
Old Timers. If you were a user of McAfee Associates first Scan program
|
||
from late 1987 or early 1988 PLEASE contact John McAfee at 408-980-3601 or
|
||
40-988-3832. Your call will be much appreciated. Thanks.
|
||
|
||
P.S. If you were a REGISTERED user double the reward!!!
|
||
**********************************************************************
|
||
|
||
Methinks Mr. McAfee 'misplaced' his original software and is
|
||
willing to pay for copies of it. Since his software has been in
|
||
widespread use throughout the modem community, surely someone
|
||
out there could have it...and profit from finding it and letting
|
||
McAfee have it back. Unfortunately, I only got my system 2
|
||
years ago...and can't cash in. But someone might have this
|
||
software in their archives. Is this FidoNews-applicable?
|
||
|
||
Editors note: We thought so ...
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Nodelist Troubles
|
||
|
||
Nodelist Troubles
|
||
By Roland van der Put, 2:285/301.1
|
||
|
||
Hello!
|
||
|
||
In the last couple of FidoNews issues there appeared a few articles
|
||
about the FidoNet nodelist. This is anther one. I will introduce
|
||
myself first. I am Roland van der Put, living in Holland and I am a
|
||
student. Being the author of the program Nodelist Updater, I have a
|
||
lot of experience with the FidoNet nodelist and difference files.
|
||
Therefor, I would like to react on several articles which appeared in
|
||
FidoNews.
|
||
|
||
Vol. 10 No. 6: Is there a programmer in the house?!, by Tom Jennings.
|
||
|
||
Tom, I can answer this question with yes. At the moment I am working
|
||
on a program called Nodelist Generator. It is my intention that this
|
||
program becomes the replacement for MakeNl. I already have an alfa
|
||
version which can handle nodelist segments for Hubs, but I have just
|
||
started and programming takes a lot of time. Because I will be very
|
||
busy with examinations the next 8 weeks, it may take some time before
|
||
the first working beta version comes out. I planned to release the
|
||
first beta version somewhere in June. Stay tuned...
|
||
|
||
Vol. 10 No. 6: Nodelist Problems Cost Sysops *MEGA* Bucks!, by Tom
|
||
Hall.
|
||
FidoNews 10-13 Page: 13 29 Mar 1993
|
||
|
||
|
||
Thanks for explaining why things went wrong. It seems that we have
|
||
come to the same conclusion. MakeNl fails to handle these errors. I
|
||
will try to correct these kinds of errors in Nodelist Generator. I
|
||
also want to make it a bit more user-friendly. Because generating
|
||
difference files is a complicated business, it can not be done within
|
||
a few weeks. After a busy period of 8 weeks, I will have three months
|
||
of holiday: lot's of time to continue programming.
|
||
|
||
Vol. 10 No. 9: *A FidoNet (FTN) Domain Name Service, by Robert Heller.
|
||
|
||
It is my opinion that your proposal is to difficult to understand, at
|
||
least for some of us. The FidoNet nodelist works, but it is getting
|
||
big. Many BBS'es only use a Zone nodelist or a Region nodelist. This
|
||
helps a lot. Having three different addresses is too complicated. I
|
||
have another solution which I will explain in the next part of my
|
||
article.
|
||
|
||
Vol. 10 No. 10: Interfacing FidoNet with the Internet, by Gavin
|
||
Hurlbut.
|
||
|
||
I agree with you that exchanging mail with other networks is not as
|
||
easy as it should. But I already see that FidoNet echomail is gated to
|
||
and from InterNet! I have a different solution for the same problem.
|
||
If I want to send mail to someone on Internet then I will have to use
|
||
an UFGATE system. Now I have to look for myself to which node I should
|
||
send my mail. The message also needs to have a special format. Why
|
||
can't I send mail to 'gjhurlbut@1302.watstar.waterloo.ca' just by
|
||
entering this address in my editor? Why does it have to be so
|
||
complicated? If I could enter an Internet address at the address
|
||
prompt then my mailer and routing software should be able to take care
|
||
of it. If an address does not end with 'fidonet.org' then it should be
|
||
gated to Internet. The only thing that needs to be modified are some
|
||
software programs. The UFGATE system(s) can be obtained from the
|
||
nodelist.
|
||
|
||
Well, that's it for now. I hope to see some comments on my thoughts...
|
||
|
||
Roland van der Put
|
||
|
||
BTW: Nodelist Updater can be frekked with 'NU' at 2:285/301 and
|
||
2:285/307 in case you are interested.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
CorelDRAW! ECHO
|
||
|
||
By Mike Griffin
|
||
CorelDRAW! Echo
|
||
|
||
With the growing number of DTP (Desk Top Publishing) people, CorelDRAW!
|
||
has gained it's share of popularity. With version 2.0, the product was
|
||
a good tool for graphic illustrations and DTP. With version 3.0, the product
|
||
has matured into one of the most powerful tools for DTP and graphic art.
|
||
Soon version 4.0 will be released and promises to be the best all around
|
||
FidoNews 10-13 Page: 14 29 Mar 1993
|
||
|
||
collection of graphics programs.
|
||
|
||
I have decided that I would try and get a worldwide echo going that would
|
||
cover topics concerning CorelDRAW's ability. This would be a great place
|
||
to swap tips, clip art and sample drawings. Questions could be answered by
|
||
our expert users and together we could all learn some shortcuts.
|
||
Whether you are a professional publisher or commercial artist, or just a
|
||
hobbyist, this echo will enhance your ability to express yourself.
|
||
|
||
If you are interested in receiving it, please contact me via netmail at the
|
||
following address.
|
||
|
||
Mike Griffin
|
||
CorelDRAW! Echo
|
||
1:106/5999
|
||
|
||
Thank You and Happy Publishing!
|
||
Mike Griffin
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
An open letter to the people who waste bandwidth
|
||
Steve Mulligan, 1:163/307.30
|
||
|
||
Why! Why do you waste my time and money! Don't ya think I
|
||
needed that money? Well, I did. We're in a recession ya know.
|
||
Well, so come on eh!?
|
||
|
||
When are ya gonna stop quoting 80% of message text when you
|
||
reply? When are you gonna get rid of those long signature lines at
|
||
the end of your messages? When are you gonna start using an origin
|
||
line, to show your origin? And did you know that origin lines are
|
||
supposed to be a certain length or else some software crashes? I
|
||
found that out the other day. So shorten your origin lines okay?
|
||
|
||
I don't care how many addresses you have! I don't care how
|
||
many echo's you moderate! So don't tell me! Leave that waste of
|
||
my money out of your messages okay? I don't want them.
|
||
|
||
Thank you. That's all I gotta say. For now.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
More on the point nodelist
|
||
Steve Mulligan, 1:163/307.30
|
||
|
||
Well, a lot of people have sent me mail about the point
|
||
nodelist. People have told me that Version 7 nodelists support 4D
|
||
points so, any point who wants to be in, just NetMail me and you'll
|
||
be added to the point nodelist. Please send what city you live in
|
||
and what you want to call your BBS in the nodelist.
|
||
|
||
A few other people have also sent me their own point lists.
|
||
What I am asking is for every sysop reading this who has a point
|
||
list on their system, to send it to me via NetMail. Please, help
|
||
FidoNews 10-13 Page: 15 29 Mar 1993
|
||
|
||
the point nodelist grow so we can shrink the size of the full
|
||
nodelist.
|
||
|
||
Don't forget, the point nodelist can be freq'ed each Friday as
|
||
PRIVLIST.* from 1:163/307.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Rebuttal to an Anonymous Critic
|
||
|
||
A Non-Anonymous Reply on Policy Draft Differences
|
||
Ken Tuley, 1:374/98
|
||
|
||
Having openly asked for comments and suggestions in every
|
||
echomail and netmail contact in which I have discussed ideas for
|
||
future Policy, I was a little disappointed to see the level of
|
||
disinformation included in the article in FNEWSA12 by an
|
||
anonymous "analyst". Hopefully, those who went on to read the
|
||
draft itself could see through the smoke and mirrors of selective
|
||
quoting and recombination of statements, but I feel compelled to
|
||
respond for the sake of clarity. Also for clarity, I have taken
|
||
the liberty of replacing references to the draft with its name as
|
||
distributed [DRAFT008].
|
||
|
||
> [DRAFT008] 4.1C
|
||
> NC,RC selection not specific, each net Democratic
|
||
> has its own method elections
|
||
> one sysop
|
||
one
|
||
> vote. Term
|
||
is
|
||
> No term two years
|
||
|
||
These are specifically designated as being determined by local
|
||
policies developed by the SYSOPS of those nets/regions.
|
||
|
||
> (Policy 4.1C requires a 2/3 majority of the Zone Coordinators
|
||
to
|
||
> elect an Internation Coordinator. [DRAFT008] requires just a
|
||
> majority of the ZCs and give control of the election to the RCs
|
||
if
|
||
> the ZCs can't seem to come up with a winner.)
|
||
|
||
Given the difficulty 10 zone 1 RCs had deciding on a ZC, it
|
||
seemed reasonable to allow a fall-back selection process that
|
||
involved a larger voting pool. The difference between "majority"
|
||
and "2/3" is a single person.
|
||
|
||
> Replacement of By RC,ZC regardless 20% below can
|
||
call > NC,RC of sysops a sysop
|
||
election.
|
||
> wishes. to
|
||
replace,limited
|
||
|
||
The interesting distinction here is that 4.1c continues to make
|
||
FidoNews 10-13 Page: 16 29 Mar 1993
|
||
|
||
the RC responsible for the NCs (and ZC for RCs), but provides no
|
||
authority to act. DRAFT008 provides for the TEMPORARY
|
||
replacement of an RC or NC sho is not performing his duties only
|
||
until the local policy can be invoked to select a replacement.
|
||
The *C is obligated to support the wishes of the majority of
|
||
sysops in the affected net/region.
|
||
|
||
> The Policy 4.1C proposal gives SYSOPS the authority to recall
|
||
or
|
||
> replace coordinators whom they feel are not performing.
|
||
|
||
What about the *C above who is responsible for his actions??
|
||
|
||
> [DRAFT008] on the other hand, gives unlimited authority to the
|
||
RCs
|
||
> to replace an NC, and unlimited authority to the ZC to replace
|
||
an
|
||
> RC.
|
||
|
||
Not unlimited... The RC may remove an NC for failure to perform
|
||
the duties listed in Fidonet Policy and HAVE THE NET MEMBERSHIP
|
||
SELECT A REPLACEMENT. The same applies to the ZC for an RC.
|
||
|
||
Under [DRAFT008], all 2000 sysops in a Region could object to
|
||
the
|
||
removal of their RC, yet the ZC would still have the authority to
|
||
do
|
||
so.)
|
||
|
||
> Local policies
|
||
|
||
> The 4.1C proposal keeps a unified Fidonet under one basic set
|
||
of
|
||
> guidelines. It also provides for the implementation of local
|
||
> policies provided that they are not more RESTRICTIVE than 4.1C
|
||
> itself.
|
||
|
||
This is essentially the same in both drafts, except that DRAFT008
|
||
gives an example of one thing that might "ordinarily" be in a
|
||
local policy.
|
||
|
||
> [DRAFT008] allows for local definition of what should be
|
||
net-wide.
|
||
> Like what "excessively annoying" is.)
|
||
|
||
Wrong! DRAFT008 refers to "Fidonet Policy" for the definition of
|
||
excessively annoying. It simply requires that applicants for
|
||
node numbers familiarize themselves with applicable local
|
||
policies as well.
|
||
|
||
> Points Access can be refused no change
|
||
from
|
||
> existing
|
||
|
||
Since any sysop may refuse access to any user, neither of these
|
||
FidoNews 10-13 Page: 17 29 Mar 1993
|
||
|
||
is a change from existing policy. DRAFT008 simply reinforces the
|
||
fact than running a mailer as a point does not automatically
|
||
grant you access to all systems.
|
||
|
||
> Excommunications Notice to next level no change
|
||
from
|
||
> required existing
|
||
|
||
No argument here. I would expect most excommunications to be
|
||
appealed, so I believe it reasonable to notify the *C above if
|
||
you have done so. It just prevents surprises.
|
||
|
||
> Policy Ratification Can be selectively Whole
|
||
document
|
||
> changed by section. must be
|
||
presented
|
||
|
||
> (Fidonet has always adopted entire policy documents, not
|
||
amendments
|
||
> by section. The reasons why are even stated in current policy.
|
||
|
||
The reason stated is "to simplify the process". I think the
|
||
sysops of Fidonet are capable of dealing with sectional
|
||
amendments, and allowing them helps to focus attention on the
|
||
specific changes offered. Besides, "always" is a misdirected
|
||
term, since provisions for adoption of new policies didn't even
|
||
exist prior to the current policy.
|
||
|
||
> (A significant change in 4.1C over current policy is that it
|
||
moves
|
||
> the level of approval of policy referendums DOWN a notch to the
|
||
NC
|
||
> level. [DRAFT008] still gives complete control over policy
|
||
> referendums to the RCs)
|
||
|
||
I have already stated in public discussions that I would support
|
||
addition of a threshold for NCs to trigger a referendum, but the
|
||
4.1c proposal of 5% is absurd (that's 29 NCs at the present
|
||
time). There are more nets than that in the state of Florida
|
||
alone! Something like 50% of the RCs 'or' 20% of the NCs would
|
||
be more reasonable (IMO).
|
||
|
||
> How local policy comes into existence is not specified in
|
||
> [DRAFT008], yet the *C structure is required to abide by it
|
||
when
|
||
> judging "excessively annoying".
|
||
|
||
I don't know where this came from. The *C structure is required
|
||
to abide by local policies in recognizing the *C selected under
|
||
it, but the section on resolution of disputes that talks about
|
||
excessively annoying behavior makes no reference to local
|
||
policies.
|
||
|
||
> [DRAFT008] introduces more uncertainty into Fidonet as there
|
||
can be
|
||
FidoNews 10-13 Page: 18 29 Mar 1993
|
||
|
||
> as many "policies" on a local level as there are
|
||
nets+regions+zones
|
||
> and they may CONFLICT with each other.
|
||
Granted, but they may not conflict with any policy above them.
|
||
This is already the case. Some nets have policies on cost
|
||
recovery, outbound netmail routing, hub responsibilities and
|
||
other procedures that vary from one net to another. I don't see
|
||
this as a problem.
|
||
|
||
The biggest difference between DRAFT008 and 4.1c is in where the
|
||
responsibility lies to make the democratic process work.
|
||
DRAFT008 puts it in the hands of the local sysops through
|
||
encouragement of local policies consistent with Fidonet Policy.
|
||
4.1c puts it in the hands of the IC to develop some unknown
|
||
future procedure for accomplishing its goals.
|
||
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
The TRULY democratic policy proposal revealed
|
||
By Glen Johnson 1:2605/269
|
||
|
||
If you all read the 'anonymous' article in last week's Snooze,
|
||
then this really needs no introduction.
|
||
|
||
This is Fidonet Policy Draft version 4.1c, submitted to the
|
||
RCs for consideration of referendum on January 17, 1993.
|
||
|
||
This document is the one that opened the floodgates and caused
|
||
a bunch of other "policies" to be drafted. 4.1c is the standard
|
||
against which others are being compared. I urge you all to read
|
||
it, and when you do, you'll understand why it has such strong
|
||
support around the world. It is the first, and only, proposal
|
||
that puts Fidonet squarely in hands of the sysops, where it
|
||
belongs. One sysop, one vote.
|
||
|
||
Significant contributions were made to this policy by Howie Ducat,
|
||
NC 278; yours truly, NC 2605; Rich Wood, NEC 278; Bob Moravsik,
|
||
1:2606/583; and Ron Dwight, ZC2. And many other folks.
|
||
|
||
Yes Virginia, democracy IS a popular idea ....
|
||
|
||
FidoNet Policy Document Version 4.1c January 17, 1993
|
||
|
||
REVISION SUMMARY:
|
||
|
||
1. *C's elected by sysops for two year terms, except IC which is
|
||
appointed (or removed) by 2/3 ZC's. There is a replacement
|
||
election procedure added (recall), impeachment removed. THIS IS
|
||
THE MOST SUBSTANTIAL CHANGE.
|
||
2. Election rules issued by IC
|
||
3. Fidonews address changed
|
||
4. Updated to agree with present practice.
|
||
5. Appeal of ZC decision now ONLY to IC.
|
||
6. Referendum on policy changes may now be tripped by 5% of NCs
|
||
FidoNews 10-13 Page: 19 29 Mar 1993
|
||
|
||
7. Examples in section 10 removed.
|
||
8. Duplicate statements removed.
|
||
9. Minor clean up.
|
||
_______________________
|
||
|
||
This policy document is being submitted for ratification in
|
||
accordance with the provisions of version 4.07. If ratified it
|
||
supersedes version 4.07 passed June 9, 1989
|
||
|
||
1 Overview
|
||
|
||
This document establishes the policy for sysops who are members of
|
||
the FidoNet organization of electronic mail systems. FidoNet is
|
||
defined by the NodeList segments issued weekly under the direction
|
||
and supervision of the the International Coordinator.
|
||
|
||
Separate policy documents may be issued at the zone, region, or net
|
||
level to provide additional detail on local procedures.
|
||
Ordinarily, these lower-level policies may not contradict this
|
||
policy. However, with the approval of the International
|
||
Coordinator, local policy can be used to implement differences
|
||
required due to local conditions. These local policies may not
|
||
place additional restrictions on members of FidoNet beyond those
|
||
included in this document, other than enforcement of local mail
|
||
periods.
|
||
|
||
1.0 Language
|
||
|
||
The official language of FidoNet is English. All documents must
|
||
exist in English. Translation into other languages is encouraged.
|
||
|
||
1.1 Introduction
|
||
|
||
FidoNet is an amateur electronic mail system. As such, all of its
|
||
participants and operators are unpaid volunteers. From its early
|
||
beginning as a few friends swapping messages back and forth (1984),
|
||
it now (1993) includes over 20,000 systems on six continents.
|
||
|
||
FidoNet is not a common carrier or a value-added service network
|
||
and is a public network only in as much as the independent,
|
||
constituent nodes may individually provide public access to the
|
||
network on their system.
|
||
|
||
FidoNet is large enough that it would quickly fall apart of its own
|
||
weight unless some sort of structure and control were imposed on
|
||
it. Multi-net operation provides the structure. Decentralized
|
||
management provides the control. This document describes the
|
||
procedures which have been developed to manage the network.
|
||
|
||
1.2 Organization
|
||
|
||
FidoNet systems are grouped on several levels, and administration
|
||
is decentralized to correspond with these groupings. This overview
|
||
provides a summary of the structure; specific duties of the
|
||
coordinator positions are given later in the document.
|
||
FidoNews 10-13 Page: 20 29 Mar 1993
|
||
|
||
|
||
1.2.1 Individual Systems and System Operators
|
||
|
||
The smallest subdivision of FidoNet is the individual system,
|
||
corresponding to a single entry in the nodelist. The system
|
||
operator (Fidonet Sysop) formulates a policy for running the board
|
||
and dealing with users. The sysop must mesh with the rest of the
|
||
FidoNet system to send and receive mail, and the local policy must
|
||
be consistent with other levels of FidoNet.
|
||
|
||
1.2.1.1 Users
|
||
|
||
The sysop is responsible for the actions of any user when they
|
||
affect the rest of FidoNet. (If a user is annoying, the sysop is
|
||
annoying.) Any traffic entering FidoNet via a given node, if not
|
||
from the sysop, is considered to be from a user and is the
|
||
responsibility of the sysop. (See section 2.1.3.)
|
||
|
||
1.2.1.2 Points
|
||
|
||
A point is a FidoNet-compatible system that is not in the nodelist,
|
||
but communicates with FidoNet through a node referred to as a
|
||
bossnode. A point is generally regarded in the same manner as a
|
||
user, for example, the bossnode is responsible for mail from the
|
||
point. (See section 2.1.3.) Points are addressed by using the
|
||
bossnode's nodelist address; for example, a point system with a
|
||
bossnode of 114/15 might be known as 114/15.12. Mail destined for
|
||
the point is sent to the bossnode, which then routes it to the
|
||
point.
|
||
|
||
In supporting points, the bossnode may make use of a private net
|
||
number which should not be generally visible outside of the
|
||
bossnode-point relationship. Unfortunately, should the point call
|
||
another system directly (to do a file request, for example), the
|
||
private network number will appear as the caller's address. In
|
||
this way, points are different from users, since they operate
|
||
FidoNet-compatible mailers which are capable of contacting systems
|
||
other than the bossnode.
|
||
|
||
1.2.3 Networks and Network Coordinators
|
||
|
||
A network is a collection of nodes in a local geographic area,
|
||
usually defined by an area of convenient telephone calling.
|
||
Networks coordinate their mail activity to decrease cost.
|
||
The Network Coordinator is responsible for maintaining the list of
|
||
nodes for the network, and for forwarding netmail sent to members
|
||
of the network from other FidoNet nodes. The Network Coordinator
|
||
may make arrangements to handle outgoing netmail, but is not
|
||
required to do so.
|
||
|
||
The Network Coordinator is elected by a majority of votes cast by
|
||
Fidonet Sysops in a Net, and serves a term of two years.
|
||
|
||
1.2.3.1 Network Routing Hubs
|
||
|
||
FidoNews 10-13 Page: 21 29 Mar 1993
|
||
|
||
Network Routing Hubs exist only in some networks. They may be
|
||
appointed by the Network Coordinator, in order to assist in the
|
||
management of a large network. The exact duties and procedures are
|
||
a matter for the Network Coordinator and the hubs to arrange, and
|
||
will not be discussed here, except that a network coordinator
|
||
cannot delegate responsibility to mediate disputes.
|
||
|
||
1.2.4 Regions and Regional Coordinators
|
||
|
||
A region is a well-defined geographic area containing nodes which
|
||
may or may not be combined into networks. A typical region will
|
||
contain many nodes in networks, and a few independent nodes which
|
||
are not a part of any network.
|
||
|
||
The Regional Coordinator maintains the list of independent nodes
|
||
in the region and accepts nodelists from the Network Coordinators
|
||
in the region. These are compiled to create a regional nodelist,
|
||
which is then sent to the Zone Coordinator. A Regional Coordinator
|
||
does not perform message-forwarding services for any nodes in the
|
||
region.
|
||
|
||
The Regional Coordinator is elected by a majority of votes cast by
|
||
the Fidonet Sysops in the Region, and serves a term of two years.
|
||
|
||
1.2.5 Zones and Zone Coordinators
|
||
|
||
A Zone is a large geographic area containing many regions, covering
|
||
one or more countries and/or continents.
|
||
|
||
The Zone Coordinator compiles the nodelists from all of the regions
|
||
in the zone, and creates the master nodelist and difference file,
|
||
which is then distributed over FidoNet in the zone. A Zone
|
||
Coordinator does not perform message-forwarding services for any
|
||
nodes in the zone.
|
||
|
||
Zone Coordinators are elected by a majority of votes cast by the
|
||
Fidonet Sysop in the Zone. They serve a term of two years.
|
||
|
||
1.2.6 Zone Coordinator Council
|
||
|
||
In certain cases, the Zone Coordinators work as a council to
|
||
provide advice to the International Coordinator. The arrangement
|
||
is similar to that between a president and advisors. In
|
||
particular, this council considers inter-zonal issues. This
|
||
includes, but is not limited to: working out the details of
|
||
nodelist production, mediating inter-zonal disputes, and such
|
||
issues not addressed at a lower level of FidoNet.
|
||
|
||
1.2.7 International Coordinator
|
||
|
||
The International Coordinator coordinates the joint production of
|
||
the master nodelist by the Zone Coordinators.
|
||
|
||
The International Coordinator acts as the chair of the Zone
|
||
Coordinator Council and as the overseer of elections -- arranging
|
||
FidoNews 10-13 Page: 22 29 Mar 1993
|
||
|
||
the announcement of referenda, the collection and counting of the
|
||
ballots, and announcing the results for those issues that affect
|
||
FidoNet as a whole.
|
||
|
||
The International Coordinator is selected (or removed) by a two
|
||
thirds majority of the Zone Coordinators, and serves a term of two
|
||
years.
|
||
|
||
1.2.8 Top-down Organization. Checks and Balances.
|
||
|
||
These levels act to distribute the administration and control of
|
||
FidoNet to the lowest possible level, while still allowing for
|
||
coordinated action over the entire mail system. Administration is
|
||
made possible by operating in a top-down manner. That is, a person
|
||
at any given level is responsible to the level above, and
|
||
responsible for the level below.
|
||
|
||
For example, a Regional Coordinator is responsible to the Zone
|
||
Coordinator for anything that happens in the region. From the
|
||
point of view of the Zone Coordinator, the Regional Coordinator is
|
||
completely responsible for the smooth operation of the region.
|
||
Likewise, from the point of view of the Regional Coordinator, the
|
||
Network Coordinator is completely responsible for the smooth
|
||
operation of the network.
|
||
|
||
Understanding that there may be rare occassions where a coordinator
|
||
may need to be replaced, a replacement election may be held upon
|
||
petition of 20% of the number of individuals on one level lower.
|
||
Only TWO such elections may be held during the term of a
|
||
coordinator. In the event such an election results in a
|
||
replacement coordinator, the replacement coordinator shall serve
|
||
out the remainder of the term without being subject to a
|
||
replacement election. (Choose your candidates wisely).
|
||
|
||
Nothing in this section shall be interpreted to allow a replacement
|
||
coordinator to violate this policy.
|
||
|
||
1.2.9 Election Procedures
|
||
|
||
The International Coordinator shall issue such reasonable rules and
|
||
regulations to carry out the elections required herein, provided
|
||
however, no sysop shall be prevented from running for any elected
|
||
position .
|
||
|
||
1.3 Definitions
|
||
|
||
1.3.1 FidoNews
|
||
|
||
FidoNews is a weekly newsletter distributed in electronic form
|
||
throughout the network. It is an important medium by which FidoNet
|
||
sysops communicate with each other. FidoNews provides a sense of
|
||
being a community of people with common interests. Accordingly,
|
||
sysops and users are encouraged to contribute to FidoNews.
|
||
Contributions are submitted to node 1:1/23; a file describing the
|
||
format to be used is available from 1:1/23 and many other systems.
|
||
FidoNews 10-13 Page: 23 29 Mar 1993
|
||
|
||
|
||
1.3.2 Geography
|
||
|
||
Each level of FidoNet is geographically contained by the level
|
||
immediately above it. A given geographic location is covered by
|
||
one zone and one region within that zone, and is either in one
|
||
network or not in a network. There are never two zones, two
|
||
regions, or two networks which cover the same geographic area.
|
||
|
||
If a node is in the area of a network, it should be listed in that
|
||
network, not as an independent in the region. (The primary
|
||
exception to this is a node receiving inordinate amounts of host-
|
||
routed mail; see section 4.2). Network boundaries are based on
|
||
calling areas as defined by the local telephone company. Even in
|
||
the case of areas where node density is so great that more than one
|
||
network is needed to serve one local calling area, a geographic
|
||
guideline is used to decide which nodes belong to what network.
|
||
Network membership is based on geographic or other purely technical
|
||
rationale. It is not based on personal or social factors.
|
||
|
||
There are cases in which the local calling areas lead to situations
|
||
where logic dictates that a node physically in one FidoNet Region
|
||
should be assigned to another. In those cases, with the agreement
|
||
of the Regional Coordinators and Zone Coordinator involved,
|
||
exemptions may be granted. Such exemptions are described in
|
||
section 5.6.
|
||
|
||
1.3.3 Zone Mail Hour
|
||
|
||
Zone Mail Hour (ZMH) is a defined time during which all nodes in
|
||
a zone are required to be able to accept netmail. Each Fidonet
|
||
zone defines a ZMH and publishes the time of its ZMH to all other
|
||
Fidonet zones. See sections 2.1.8 and 10.2.
|
||
|
||
Zone Mail Hour has previously been referred to as National Mail
|
||
Hour and Network Mail hour. The term Zone Mail Hour is more
|
||
accurate.
|
||
|
||
1.3.4 Nodelist
|
||
|
||
The nodelist is a file updated weekly which contains the addresses
|
||
of all recognized FidoNet nodes. This file is currently made
|
||
available by the Zone Coordinator not later than Zone Mail Hour
|
||
each Saturday, and is available electronically for download or file
|
||
request at no charge. To be included in the nodelist, a system
|
||
must meet the requirements defined by this document. No other
|
||
requirements may be imposed.
|
||
|
||
Partial nodelists (single-zone, for example) may be made available
|
||
at different levels in FidoNet. The full list, produced under the
|
||
direction and supervision of the International Coordinator is
|
||
regarded as the official FidoNet nodelist, and is used in
|
||
circumstances such as determination of eligibility for voting. All
|
||
parts that make up the full nodelist are available on each Zone
|
||
Coordinator's and each Regional Coordinator's system.
|
||
FidoNews 10-13 Page: 24 29 Mar 1993
|
||
|
||
|
||
1.3.5 Excessively Annoying Behavior
|
||
|
||
There are references throughout this policy to "excessively
|
||
annoying behavior", especially in section 9 (Resolution of
|
||
Disputes). It is difficult to define this term, as it is based
|
||
upon the judgement of the coordinator structure. Generally
|
||
speaking, annoying behavior irritates, bothers, or causes harm to
|
||
some other person. It is not necessary to break a law to be
|
||
annoying.
|
||
|
||
There is a distinction between excessively annoying behavior and
|
||
(simply) annoying behavior. For example, there is a learning curve
|
||
that each new sysop must climb, both in the technical issues of how
|
||
to set up the software and the social issues of how to interact
|
||
with FidoNet. It is a rare sysop who, at some point in this
|
||
journey, does not manage to annoy others. Only when such behavior
|
||
persists, after being pointed out to the sysop, does it becomes
|
||
excessively annoying. This does not imply that it is not possible
|
||
to be excessively annoying without repetition (for example,
|
||
deliberate falsification of mail would likely be excessively
|
||
annoying on the very first try), but simply illustrates that a
|
||
certain amount of tolerance is extended.
|
||
|
||
1.3.6 Commercial Use
|
||
|
||
FidoNet is an amateur network. Participants spend their own time
|
||
and money to make it work for the good of all the users. It is not
|
||
appropriate for a commercial enterprise to take advantage of these
|
||
volunteer efforts to further their own business interests. On the
|
||
other hand, FidoNet provides a convenient and effective means for
|
||
companies and users to exchange information, to the mutual benefit
|
||
of all.
|
||
|
||
Network Coordinators could be forced to subsidize commercial
|
||
operations by forwarding host-routed netmail, and could even find
|
||
themselves involved in a lawsuit if any guarantee was suggested for
|
||
mail delivery. It is therefore FidoNet policy that commercial mail
|
||
is not to be routed. "Commercial mail" includes mail which
|
||
furthers specific business interests without being of benefit to
|
||
the net as a whole. Examples include company-internal mail, inter-
|
||
corporate mail, specific product inquiries (price quotes, for
|
||
instance), orders and their follow-ups, and all other subjects
|
||
specifically related to business.
|
||
|
||
2 Sysop Procedures
|
||
|
||
2.1 General
|
||
|
||
2.1.1 The Basics
|
||
|
||
As the sysop of an individual node, you can generally do as you
|
||
please, as long as you observe mail events, are not excessively
|
||
annoying to other nodes in FidoNet, and do not promote or
|
||
participate in the distribution of pirated copyrighted software or
|
||
FidoNews 10-13 Page: 25 29 Mar 1993
|
||
|
||
other illegal behavior via FidoNet.
|
||
|
||
2.1.2 Familiarity with Policy
|
||
|
||
In order to understand the meaning of "excessively annoying", it
|
||
is incumbent upon all sysops to occasionally re-read FidoNet
|
||
policy. New sysops must familiarize themselves with policy before
|
||
requesting a node number.
|
||
|
||
2.1.3 Responsible for All Traffic Entering FidoNet Via the Node
|
||
|
||
The sysop listed in the nodelist entry is responsible for all
|
||
traffic entering FidoNet via that system. This includes (but is
|
||
not limited to) traffic entered by users, points, and any other
|
||
networks for which the system might act as a gateway. If a sysop
|
||
allows "outside" messages to enter FidoNet via the system, the
|
||
gateway system must be clearly identified by FidoNet node number
|
||
as the point of origin of that message, and it must act as a
|
||
gateway in the reverse direction. Should such traffic result in
|
||
a violation of Policy, the sysop must rectify the situation.
|
||
|
||
2.1.4 Encryption and Review of Mail
|
||
|
||
FidoNet is an amateur system. Our technology is such that the
|
||
privacy of messages cannot be guaranteed. As a sysop, you have the
|
||
right to review traffic flowing through your system, if for no
|
||
other reason than to ensure that the system is not being used for
|
||
illegal or commercial purposes. Encryption obviously makes this
|
||
review impossible. Therefore, encrypted and/or commercial traffic
|
||
that is routed without the express permission of all the links in
|
||
the delivery system constitutes annoying behavior. See section
|
||
1.3.6 for a definition of commercial traffic.
|
||
|
||
2.1.5 No Alteration of Routed Mail
|
||
|
||
You may not modify, other than as required for routing or other
|
||
technical purposes, any message, netmail or echomail, passing
|
||
through the system from one FidoNet node to another. If you are
|
||
offended by the content of a message, the procedure described in
|
||
section 2.1.7 must be used.
|
||
|
||
2.1.6 Private Netmail
|
||
|
||
The word "private" should be used with great care, especially with
|
||
users of a BBS. Some countries have laws which deal with "private
|
||
mail", and it should be made clear that the word "private" does not
|
||
imply that no person other than the recipient can read messages.
|
||
Sysops who cannot provide this distinction should consider not
|
||
offering users the option of "private mail".
|
||
|
||
If a user sends a "private message", the user has no control over
|
||
the number of intermediate systems through which that message is
|
||
routed. A sysop who sends a message to another sysop can control
|
||
this aspect by sending the message direct to the recipient's
|
||
system, thus guaranteeing that only the recipient or another
|
||
FidoNews 10-13 Page: 26 29 Mar 1993
|
||
|
||
individual to whom that sysop has given authorization can read the
|
||
message. Thus, a sysop may have different expectations than a
|
||
casual user.
|
||
|
||
2.1.6.1 No Disclosure of in-transit mail
|
||
|
||
Disclosing or in any way using information contained in private
|
||
netmail traffic not addressed to you or written by you is
|
||
considered annoying behavior, unless the traffic has been released
|
||
by the author or the recipient as a part of a formal policy
|
||
complaint. This does not apply to echomail which is by definition
|
||
a broadcast medium, and where private mail is often used to keep
|
||
a sysop-only area restricted.
|
||
|
||
2.1.6.2 Private mail addressed to you
|
||
|
||
The issue of private mail which is addressed to you is more
|
||
difficult than the in-transit question treated in the previous
|
||
section. A common legal opinion holds that when you receive a
|
||
message it becomes your property and you have a legal right to do
|
||
with it what you wish. Your legal right does not excuse you from
|
||
annoying others.
|
||
|
||
In general, sensitive material should not be sent using FidoNet.
|
||
This ideal is often compromised, as FidoNet is our primary mode of
|
||
communication. In general, if the sender of a message specifically
|
||
requests in the text of the message that the contents be kept
|
||
confidential, release of the message into a public forum may be
|
||
considered annoying.
|
||
|
||
There are exceptions. If someone is saying one thing in public and
|
||
saying the opposite in private mail, the recipient of the private
|
||
mail should not be subjected to harassment simply because the
|
||
sender requests that the message not be released. Judgement and
|
||
common sense should be used in this area as in all other aspects
|
||
of FidoNet behavior.
|
||
|
||
2.1.7 Not Routing Mail
|
||
|
||
You are not required to route traffic if you have not agreed to do
|
||
so. You are not obligated to route traffic for all if you route
|
||
it for any, unless you hold a Network Coordinator or Hub
|
||
Coordinator position. Routing traffic through a node not obligated
|
||
to perform routing without the permission of that node may be
|
||
annoying behavior. This includes unsolicited echomail.
|
||
|
||
If you do not forward a message when you previously agreed to
|
||
perform such routing, the message must be returned to the sysop of
|
||
the node at which it entered FidoNet with an explanation of why it
|
||
was not forwarded. (It is not necessary to return messages which
|
||
are addressed to a node which is not in the current nodelist.)
|
||
Intentionally stopping an in-transit message without following this
|
||
procedure constitutes annoying behavior. In the case of a failure
|
||
to forward traffic due to a technical problem, it does not become
|
||
annoying unless it persists after being pointed out to the sysop.
|
||
FidoNews 10-13 Page: 27 29 Mar 1993
|
||
|
||
|
||
2.1.8 Exclusivity of Zone Mail Hour
|
||
|
||
Zone Mail Hour is the heart of FidoNet, as this is when network
|
||
mail is passed between systems. Any system which wishes to be a
|
||
part of FidoNet must be able to receive mail during this time using
|
||
the protocol defined in the current FidoNet Technical Standards
|
||
Committee publication (FTS-0001 at this writing). It is
|
||
permissible to have greater capability (for example, to support
|
||
additional protocols or extended mail hours), but the minimum
|
||
requirement is FTS-0001 capability during this one hour of the day.
|
||
|
||
This time is exclusively reserved for netmail. Many phone systems
|
||
charge on a per-call basis, regardless of whether a connect, no
|
||
connect, or busy signal is encountered. For this reason, any
|
||
activity other than normal network mail processing that ties up a
|
||
system during ZMH is considered annoying behavior. Echomail should
|
||
not be transferred during ZMH. User (BBS) access to a system is
|
||
prohibited during ZMH.
|
||
|
||
A system which is a member of a local network may also be required
|
||
to observe additional mail events, as defined by the Network
|
||
Coordinator. Access restrictions during local network periods are
|
||
left to the discretion of the Network Coordinator.
|
||
|
||
2.1.9 Private Nodes
|
||
|
||
The rare exception to ZMH compliance is private nodes. Persons
|
||
requesting private nodes should be supported as points if possible.
|
||
A private listing is justified when the system must interface with
|
||
many others, such as an echomail distributor. In these cases, the
|
||
exact manner and timing of mail delivery is arranged between the
|
||
private node and other systems. Such an agreement between a
|
||
private system and a hub is not binding on any replacement for that
|
||
hub. A private node must be a part of a network (they cannot be
|
||
independents in the region.)
|
||
|
||
Private listings impact each member of FidoNet, since they take up
|
||
space in everyone's nodelist. Private listings which are for the
|
||
convenience of one sysop (at the expense of every other sysop in
|
||
FidoNet) are a luxury which is no longer possible. Non-essential
|
||
redundant listings (more than one listing for the same telephone
|
||
number, except as mandated by FTSC standards) also fall into this
|
||
category. Sysops requesting private or redundant listings must
|
||
justify them with a statement explaining how they benefit the local
|
||
net or FidoNet as a whole. The Network, Regional or Zone
|
||
Coordinator Coordinator may review this statement at any time and
|
||
listings which are not justified will be removed.
|
||
|
||
2.1.10 Observing Mail Events
|
||
|
||
Failure to observe the proper mail events is grounds for any node
|
||
to be dropped from FidoNet without notice (since notice is
|
||
generally given by netmail).
|
||
|
||
FidoNews 10-13 Page: 28 29 Mar 1993
|
||
|
||
2.1.11 Use of Current Nodelist
|
||
|
||
Network mail systems generally operate unattended, and place calls
|
||
at odd hours of the night. If a system tries to call an incorrect
|
||
or out-of-date number, it could cause some poor citizen's phone to
|
||
ring in the wee hours of the morning, much to the annoyance of
|
||
innocent bystanders and civil authorities. For this reason, a
|
||
sysop who sends mail is obligated to obtain and use the most recent
|
||
edition of the nodelist as is practical.
|
||
|
||
2.1.12 Excommunication
|
||
|
||
A system which has been dropped from the network is said to be
|
||
excommunicated (i.e. denied communication). If you find that you
|
||
have been excommunicated without warning, your coordinator was
|
||
unable to contact you. You should rectify the problem and contact
|
||
your coordinator.
|
||
|
||
Systems may also be dropped from the nodelist for cause. See
|
||
section 9, and sections 4.3 and 5.2.
|
||
|
||
It is considered annoying behavior to assist a system which was
|
||
excommunicated in circumventing that removal from the nodelist.
|
||
For example, if you decide to provide an echomail feed to your
|
||
friend who has been excommunicated, it is likely that your listing
|
||
will also be removed.
|
||
|
||
2.1.13 Timing of Zone Mail Hour
|
||
|
||
The exact timing of Zone Mail Hour for each zone is set by the Zone
|
||
Coordinator. See section 10.2.
|
||
|
||
2.1.14 Non-observance of Daylight Savings Time
|
||
|
||
FidoNet does not observe daylight savings time. In areas which
|
||
observe daylight savings time the FidoNet mail schedules must be
|
||
adjusted in the same direction as the clock change. Alternatively,
|
||
you can simply leave your system on standard time.
|
||
|
||
2.2 How to obtain a node number
|
||
|
||
You must first obtain a current nodelist so that you can send mail.
|
||
You do not need a node number to send mail, but you must have one
|
||
in order for others to send mail to you.
|
||
|
||
The first step in obtaining a current nodelist is to locate a
|
||
FidoNet node. Most bulletin board lists include at least a few
|
||
FidoNet systems, and usually identify them as such. Use a local
|
||
source to obtain
|
||
documents because many networks have detailed information available
|
||
which explains the coverage area of the network and any special
|
||
requirements or procedures.
|
||
|
||
Once you have a nodelist, you must determine which network or
|
||
region covers your area. Networks are more restricted in area
|
||
FidoNews 10-13 Page: 29 29 Mar 1993
|
||
|
||
than regions, but are preferred since they improve the flow of
|
||
mail and provide more services to their members. If you cannot
|
||
find a network which covers your area, then pick the region which
|
||
does.
|
||
|
||
Once you have located the network or region in your area, send a
|
||
message containing a request for a node number to node zero of that
|
||
network or region. The request must be sent by netmail, as this
|
||
indicates that your system has FidoNet capability.
|
||
|
||
You must set up your software so that the from-address in your
|
||
message does not cause problems for the coordinator who receives
|
||
it. If you pick the address of an existing system, this will cause
|
||
obvious problems. If your software is capable of using address
|
||
-1/-1, this is the traditional address used by potential sysops.
|
||
Otherwise use net/9999 (e.g. if you are applying to net 123, set
|
||
your system up as 123/9999). Many nets have specific instructions
|
||
available to potential sysops and these procedures may indicate a
|
||
preference for the from-address.
|
||
|
||
The message you send must include at least the following
|
||
information:
|
||
|
||
1) Your name.
|
||
2) Your voice telephone number
|
||
3) The name of your system.
|
||
4) The city and state where your system is located.
|
||
5) The phone number to be used when calling your system.
|
||
6) Your hours of operation, netmail and BBS.
|
||
7) The maximum baud rate you can support.
|
||
8) The type of mailer software and modem you are using.
|
||
|
||
Your coordinator may contact you for additional information. All
|
||
information submitted will be kept confidential and will not be
|
||
supplied to anyone except the person who assumes the coordinator
|
||
position at the resignation of the current coordinator. You must
|
||
indicate that you have read, and agree to abide by, this document
|
||
and all the current policies of FidoNet.
|
||
|
||
Please allow at least two weeks for a node number request to be
|
||
processed. If you send your request to a Regional Coordinator, it
|
||
may forwarded to the appropriate Network Coordinator.
|
||
|
||
2.3 If You are Going Down
|
||
|
||
If your node will be down for an extended period (more than a day
|
||
or two), inform your coordinator as soon as possible. It is not
|
||
your coordinator's responsibility to chase you down for a status
|
||
report, and if your system stops accepting mail it will be removed
|
||
from the nodelist.
|
||
|
||
Never put an answering machine or any other device which answers
|
||
the phone on your phone line while you are down. If you do,
|
||
calling systems will get the machine repeatedly, racking up large
|
||
phone bills, which is very annoying. In short, the only thing
|
||
FidoNews 10-13 Page: 30 29 Mar 1993
|
||
|
||
which should ever answer the telephone during periods when the
|
||
nodelist indicates that your node will accept mail is FidoNet-
|
||
compatible software which accepts mail.
|
||
|
||
If you will be leaving your system unattended for an extended
|
||
period of time (such as while you are on vacation), you should
|
||
notify your coordinator. Systems have a tendency to "crash" now and
|
||
then, so you will probably want your coordinator to know that it
|
||
is a temporary condition if it happens while you are away.
|
||
|
||
2.4 How to Form a Network
|
||
|
||
If there are several nodes in your area, but no network, a new
|
||
network can be formed. This has advantages to both you and to the
|
||
rest of FidoNet. You receive better availability of nodelist
|
||
difference files and FidoNews, and everyone else can take advantage
|
||
of host-routing netmail to the new network.
|
||
|
||
The first step is to contact the other sysops in your area. You
|
||
must decide which nodes will comprise the network, and which of
|
||
those nodes you would like to be the Network Coordinator. Then
|
||
consult your Regional Coordinator. You must send the following
|
||
information:
|
||
|
||
1) The region number(s), or network number(s) if a network is
|
||
splitting up, that are affected by the formation of your network.
|
||
The Regional Coordinator will inform the Zone Coordinator and the
|
||
coordinators of any affected networks that a new network is in
|
||
formation.
|
||
|
||
2) A copy of the proposed network's nodelist segment. This file
|
||
should be attached to the message of application for a network
|
||
number, and should use the nodelist format described in the current
|
||
version of the appropriate FTSC publication. Please elect a name
|
||
that relates to your grouping, for example SoCalNet for nodes in
|
||
the Southern California Area and MassNet West for the Western
|
||
Massachusetts Area. Remember if you call yourself DOGNET it
|
||
doesn't identify your area.
|
||
|
||
Granting a network number is not automatic. Even if the request
|
||
is granted, the network might not be structured exactly as you
|
||
request. Your Regional Coordinator will review your application
|
||
and inform you of the decision.
|
||
|
||
Do not send a network number request to the Zone Coordinator. All
|
||
network number requests must be processed by the Regional
|
||
Coordinator.
|
||
|
||
3 General Procedures for All Coordinators
|
||
|
||
3.1 Make Available Difference Files and FidoNews
|
||
|
||
Any Coordinator is responsible for obtaining and making available,
|
||
on a weekly basis, nodelist difference files and FidoNews.
|
||
|
||
FidoNews 10-13 Page: 31 29 Mar 1993
|
||
|
||
3.2 Processing Nodelist Changes and Passing Them Upstream
|
||
|
||
Each coordinator is responsible for obtaining nodelist information
|
||
from the level below, processing it, and passing the results to the
|
||
level above. The timing of this process is determined by the
|
||
requirements imposed by the level above.
|
||
|
||
3.3 Ensure the Latest Policy is Available
|
||
|
||
A Coordinator is responsible to make the current version of this
|
||
document available to the level below, and to encourage familiarity
|
||
with it.
|
||
|
||
In addition, a coordinator is required to forward any local
|
||
policies received to the level above, and to review such policies.
|
||
Although not required, common courtesy dictates that when
|
||
formulating a local policy, the participation of the level above
|
||
should be solicited.
|
||
|
||
3.4 Minimize the Number of Hats Worn
|
||
|
||
Coordinators are encouraged to limit the number of FidoNet
|
||
functions they perform. A coordinator who holds two different
|
||
positions compromises the appeal process. For example, if the
|
||
Network Coordinator is also the Regional Coordinator, sysops in
|
||
that network are denied one level of appeal.
|
||
|
||
Coordinators are discouraged from acting as echomail and software
|
||
distribution hubs. If they do so, they should handle echomail (or
|
||
other volume distribution) on a system other than the
|
||
administrative system. A coordinator's system should be readily
|
||
available to the levels immediately above and below.
|
||
|
||
Another reason to discourage multiple hats is the difficulty of
|
||
replacing services if someone leaves the network. For example, if
|
||
a coordinator is the echomail hub and the software-distribution
|
||
hub, those services will be difficult to restore when that person
|
||
resigns.
|
||
|
||
3.5 Be a Member of the Area Administered
|
||
|
||
A coordinator must be a member of the area administered. That is,
|
||
a Network Coordinator must be a member of that network by virtue
|
||
of geography. A Regional Coordinator must be either a member of
|
||
a network in the region, or an independent in the region.
|
||
|
||
3.6 Encourage New Sysops to Enter FidoNet
|
||
|
||
A coordinator is encouraged to operate a public bulletin board
|
||
system which is freely available for the purpose of distributing
|
||
Policy, FidoNews, and Nodelists to potential new sysops.
|
||
Dissemination of this information to persons who are potential
|
||
FidoNet sysops is important to the growth of FidoNet, and
|
||
coordinators should encourage development of new systems.
|
||
|
||
FidoNews 10-13 Page: 32 29 Mar 1993
|
||
|
||
3.7 Tradition and Precedent
|
||
|
||
A coordinator is not bound by the practices of predecessor or peers
|
||
beyond the scope of this document.
|
||
|
||
In addition, a new coordinator has the right to review any decision
|
||
made by predecessors for compliance with Policy, and take whatever
|
||
actions may be necessary to rectify any situations not in
|
||
compliance.
|
||
|
||
3.8 Technical Management
|
||
|
||
The primary responsibility of any coordinator is technical
|
||
management of network operations. Decisions must be made on
|
||
technical grounds.
|
||
|
||
4 Network Coordinator Procedures
|
||
|
||
4.1 Responsibilities
|
||
|
||
A Network Coordinator has the following responsibilities:
|
||
|
||
1) To receive incoming mail for nodes in the network, and arrange
|
||
delivery to its recipients.
|
||
|
||
2) To assign node numbers to nodes in the network.
|
||
|
||
3) To maintain the nodelist for the network, and to send a copy of
|
||
it to the Regional Coordinator whenever it changes.
|
||
|
||
4) To make available to nodes in the network new nodelist
|
||
difference files, new issues of FidoNews, and new revisions of
|
||
Network Policy Documents as they are received, and to periodically
|
||
check to insure that nodes use up to date nodelists.
|
||
|
||
4.2 Routing Inbound Mail
|
||
|
||
It is your responsibility as Network Coordinator to coordinate the
|
||
receipt and forwarding of host-routed inbound netmail for nodes in
|
||
your network. The best way to accomplish this is left to your
|
||
discretion.
|
||
|
||
If a node in your network is receiving large volumes of mail you
|
||
can request that the sysop contact the systems which are sending
|
||
this mail and request that they not host-route it. If the problem
|
||
persists, you can request your Regional Coordinator to assign the
|
||
node a number as an independent and drop the system from your
|
||
network.
|
||
|
||
Occasionally a node will make a "bombing run" (sending one message
|
||
to a great many nodes). If a node in another network is making
|
||
bombing runs on your nodes and routing them through your inbound
|
||
host, then you can complain to the network coordinator of the
|
||
offending node. (If the node is an independent, complain to the
|
||
regional coordinator.) Bombing runs are considered to be annoying.
|
||
FidoNews 10-13 Page: 33 29 Mar 1993
|
||
|
||
|
||
Another source of routing overload is echomail. Echomail cannot
|
||
be allowed to degrade the ability of FidoNet to handle normal
|
||
message traffic. If a node in your network is routing large
|
||
volumes of echomail, you can ask the sysop to either limit the
|
||
amount of echomail or to stop routing echomail.
|
||
|
||
You are not required to forward encrypted, commercial, or illegal
|
||
mail. However, you must follow the procedures described in section
|
||
2.1.7 if you do not forward the mail.
|
||
|
||
4.3 Assigning Node Numbers
|
||
|
||
It is your responsibility to assign node numbers to new nodes in
|
||
your network. You may also change the numbers of existing nodes
|
||
in your network, though you should check with your member nodes
|
||
before doing so. You may assign any numbers you wish, so long as
|
||
each node has a unique number within your network.
|
||
|
||
You must not assign a node number to any system until you have
|
||
received a formal request from that system by FidoNet mail. This
|
||
will ensure that the system is minimally operational. The strict
|
||
maintenance of this policy has been one of the great strengths of
|
||
FidoNet.
|
||
|
||
It is also recommended, though not required, that you call a board
|
||
which is applying for a node number before assigning it a node
|
||
number.
|
||
|
||
You may not assign a node number to a node in an area covered by
|
||
an existing network. Further, if you have nodes in an area covered
|
||
by a network in formation, those nodes must be transferred to the
|
||
new network.
|
||
|
||
You should use network mail to inform a new sysop of the node
|
||
number, as this helps to insure that the system is capable of
|
||
receiving network mail.
|
||
|
||
If a node in your network is acting in a sufficiently annoying
|
||
manner, then you can take whatever action you deem fit, according
|
||
to the circumstances of the case.
|
||
|
||
4.4 Maintaining the Nodelist
|
||
|
||
You should implement name changes, phone number changes, and so
|
||
forth in your segment of the nodelist as soon as possible after the
|
||
information is received from the affected node. You should also
|
||
on occasion send a message to every node in your network to ensure
|
||
that they are operational. If a node turns out to be "off the air"
|
||
with no prior warning, you can either mark the node down or remove
|
||
it from the nodelist. (Nodes are to be marked DOWN for a maximum
|
||
of two weeks, after which the line should be removed from the
|
||
nodelist.)
|
||
|
||
At your discretion, you may distribute a portion of this workload
|
||
FidoNews 10-13 Page: 34 29 Mar 1993
|
||
|
||
to routing hubs. In this case, you should receive the nodelists
|
||
from the Hub Coordinators within your network. You will need to
|
||
maintain a set of nodelists for each hub within your network, since
|
||
you cannot count on getting an update from each Hub Coordinator
|
||
every week. You should assemble a master nodelist for your network
|
||
every week and send it to your Regional Coordinator by the day and
|
||
time designated. It is suggested that you do this as late as is
|
||
practical, so as to accommodate any late changes, balanced with the
|
||
risk of missing the connection with your Regional Coordinator and
|
||
thus losing a week.
|
||
|
||
4.5 Making Available Policies, Nodelists and FidoNews
|
||
|
||
As a Network Coordinator you should obtain a new issue of FidoNews
|
||
and a new nodelist difference file every week from your Regional
|
||
Coordinator. The nodelist difference file is currently made
|
||
available each Saturday, and FidoNews is published each Monday.
|
||
You must make these files available to all nodes in the network,
|
||
and you are encouraged to make them available to the general public
|
||
for download.
|
||
|
||
You should also obtain the most recent versions of the Policy
|
||
documents that bind the members of your network, and make those
|
||
available to the nodes in your network. Policies are released at
|
||
sporadic intervals, so you should also inform the nodes in your
|
||
network when such events occur, and ensure the nodes are generally
|
||
familiar with the changes.
|
||
|
||
Policy, FidoNews, and the nodelist are the glue that holds us
|
||
together. Without them, we would cease to be a community, and
|
||
become just another random collection of bulletin boards.
|
||
|
||
5 Regional Coordinator Procedures
|
||
|
||
5.1 Responsibilities
|
||
|
||
A Regional Coordinator has the following responsibilities:
|
||
|
||
1) To assign node numbers to independent nodes in the region.
|
||
|
||
2) To encourage independent nodes in the region to join existing
|
||
net works, or to form new networks.
|
||
|
||
3) To assign network numbers to networks in the region and define
|
||
their boundaries.
|
||
|
||
4) To compile a nodelist of all of the networks and independents
|
||
in the region, and to send a copy of it to the Zone Coordinator
|
||
whenever it changes.
|
||
|
||
5) To ensure the smooth operation of networks within the region.
|
||
|
||
6) To make new nodelist difference files, Policies, and issues of
|
||
FidoNews available to the Network Coordinators in the region as
|
||
soon as is practical.
|
||
FidoNews 10-13 Page: 35 29 Mar 1993
|
||
|
||
|
||
5.2 Assigning Node Numbers
|
||
|
||
It is your responsibility to assign node numbers to independent
|
||
nodes in your region. You may also change the numbers of existing
|
||
nodes in your region, though you should check with the respective
|
||
nodes before doing so. You may assign any numbers you wish, so
|
||
long as each node has a unique number within your region.
|
||
|
||
You should not assign a node number to any system until you have
|
||
received a formal request from that system by FidoNet mail. This
|
||
will ensure that the system is minimally operational. The strict
|
||
maintenance of this policy has been one of the great strengths of
|
||
FidoNet.
|
||
|
||
It is also recommended, though not required, that you call a board
|
||
which is applying for a node number before assigning it a node
|
||
number.
|
||
|
||
You should use network mail to inform a new sysop of the node
|
||
number, as this helps to insure that the system is capable of
|
||
receiving network mail.
|
||
|
||
If a node in your region is acting in a sufficiently annoying
|
||
manner, then you can take whatever action you deem fit, according
|
||
to the circumstances of the case.
|
||
|
||
If you receive a node number request from outside your region, you
|
||
must forward it to the most local coordinator for the requestor as
|
||
you can determine. If you receive a node number request from a new
|
||
node that is in an area covered by an existing network, then you
|
||
must forward the request to the Coordinator of that network instead
|
||
of assigning a number yourself.
|
||
|
||
If a network forms in an area for which you have independent nodes,
|
||
those nodes will be transferred to the local network as soon as is
|
||
practical.
|
||
|
||
5.3 Encouraging the Formation and Growth of Networks
|
||
|
||
One of your main duties as a Regional Coordinator is to promote the
|
||
growth of networks in your region.
|
||
|
||
You should avoid having independent nodes in your region which are
|
||
within the coverage area of a network. There are, however, certain
|
||
cases where a node should not be a member of a network, such as a
|
||
system with a large amount of inbound netmail; see section 4.2.
|
||
|
||
If several independent nodes in your region are in a local area you
|
||
should encourage them to form a network, and if necessary you may
|
||
require them to form a network. Refer to section 2.4. Note that
|
||
this is not intended to encourage the formation of trivial
|
||
networks. Obviously, one node does not make a network. The exact
|
||
number of nodes required for an effective network must be judged
|
||
according to the circumstances of the situation, and is left to
|
||
FidoNews 10-13 Page: 36 29 Mar 1993
|
||
|
||
your discretion.
|
||
|
||
5.4 Assigning Network Numbers
|
||
|
||
It is your responsibility to assign network numbers to new networks
|
||
forming within your region. You are assigned a pool of network
|
||
numbers to use for this purpose by your Zone Coordinator. As a
|
||
part of this function, it is the responsibility of the Regional
|
||
Coordinator to define the boundaries of the networks in the region.
|
||
|
||
5.5 Maintaining the Nodelist
|
||
|
||
As a Regional Coordinator, you have a dual role in maintaining the
|
||
nodelist for your region.
|
||
|
||
First, you must maintain the list of independent nodes in your
|
||
region. You should attempt to implement name changes, phone number
|
||
changes, and so forth in this nodelist as soon as possible. You
|
||
should also on occasion send a message to every independent node
|
||
in your region to ensure that they are operational. If a node
|
||
turns out to be "off the air" with no prior warning, you can either
|
||
mark the node down or remove it from the nodelist. (Nodes are to
|
||
marked DOWN for a maximum of two weeks, after which the line should
|
||
be removed from the nodelist.)
|
||
|
||
Second, you must receive the nodelists from the Network
|
||
Coordinators within your region. You will need to maintain a set
|
||
of nodelists for each network within your region, since you cannot
|
||
count on getting an update from each Network Coordinator every
|
||
week. You should assemble a master nodelist for your region every
|
||
week and send it to your Zone Coordinator by the day and time
|
||
designated. It is suggested that you do this as late as practical,
|
||
so as to accommodate late changes, balanced with the risk of
|
||
missing the connection with your Zone Coordinator and thus losing
|
||
a week.
|
||
|
||
5.6 Geographic Exemptions
|
||
|
||
There are cases where local calling geography does not follow
|
||
FidoNet regions. In exceptional cases, exemptions to normal
|
||
geographic guidelines are agreed upon by the Regional Coordinators
|
||
and Zone Coordinator involved. Such an exemption is not a right,
|
||
and is not permanent. When a network is formed in the proper
|
||
region that would provide local calling access to the exempted
|
||
node, it is no longer exempt. An exemption may be reviewed and
|
||
revoked at any time by any of the coordinators involved.
|
||
|
||
5.7 Overseeing Network Operations
|
||
|
||
It is your responsibility as Regional Coordinator to ensure that
|
||
the networks within your region are operating in an acceptable
|
||
manner. This does not mean that you are required to operate those
|
||
networks; that is the responsibility of the Network Coordinators.
|
||
|
||
If a network grows so large that it cannot reasonably accommodate
|
||
FidoNews 10-13 Page: 37 29 Mar 1993
|
||
|
||
traffic flow during the Zone Mail Hour, the Regional Coordinator
|
||
can suggest that the nodes consider the creation of one or more new
|
||
networks from that network.
|
||
|
||
It is your obligation as Regional Coordinator to maintain direct
|
||
and reasonably frequent contact with the networks in your region.
|
||
The exact method of accomplishing this is left to your discretion.
|
||
|
||
5.8 Making Available Nodelists, Policies, and FidoNews
|
||
|
||
As a Regional Coordinator, it is your responsibility to obtain the
|
||
latest nodelist difference file, network policies, and the latest
|
||
issues of FidoNews as they are published, and to make them
|
||
available to the Network Coordinators within your region. The
|
||
nodelist is posted weekly on Saturday by the Zone Coordinator, and
|
||
FidoNews is published weekly on Monday by node 1:1/23. Contact
|
||
them for more details on how to obtain the latest copies each week.
|
||
|
||
It is your responsibility to make these available to all Network
|
||
Coordinators in your region as soon as is practical after you
|
||
receive them. The method of distribution is left to your
|
||
discretion. You are not required to distribute them to any
|
||
independent nodes in your region, though you may if you wish. You
|
||
are encouraged to make all these documents available for
|
||
downloading by the general public.
|
||
|
||
6 Zone Coordinator Procedures
|
||
|
||
6.1 General
|
||
|
||
A Zone Coordinator for FidoNet has the primary task of maintaining
|
||
the nodelist for the Zone, sharing it with the other Zone
|
||
Coordinators, and ensuring the distribution of the master nodelist
|
||
(or difference file) to the Regions in the Zone. The Zone
|
||
Coordinator is also responsible for coordinating the distribution
|
||
of Network Policy documents and FidoNews to the Regional
|
||
Coordinators in the zone.
|
||
|
||
The Zone Coordinator is responsible for the maintenance of the
|
||
nodelist for the administrative region. The Administrative Region
|
||
has the same number as the zone, and consists of nodes assigned for
|
||
administrative purposes not related to the sending and receiving
|
||
of normal network mail.
|
||
|
||
A Zone Coordinator is charged with the task of ensuring the smooth
|
||
operation of the Zone, which is done by coordinating the activities
|
||
of the Regional Coordinators.
|
||
|
||
The Zone Coordinator defines the geographic boundaries of the
|
||
regions within the zone and sets the time for the Zone Mail Hour.
|
||
|
||
The Zone Coordinator is responsible for reviewing and approving any
|
||
geographic exemptions as described in section 5.6.
|
||
|
||
The Zone Coordinator is responsible for insuring the smooth
|
||
FidoNews 10-13 Page: 38 29 Mar 1993
|
||
|
||
operation of gates between that zone and all other zones for the
|
||
transfer of interzonal mail.
|
||
|
||
7 International Coordinator Procedures
|
||
|
||
7.1 General
|
||
|
||
The International Coordinator has the primary task of coordinating
|
||
the creation of the master nodelist by managing the distribution
|
||
between the Zones of the Zone nodelists. The International
|
||
Coordinator is responsible for definition of new zones and for
|
||
negotiation of agreements for communication with other networks.
|
||
("Other network" in this context means other networks with which
|
||
FidoNet communicates as peer-to-peer, not "network" in the sense
|
||
of the FidoNet organizational level.)
|
||
|
||
The International Coordinator is also responsible for coordinating
|
||
the distribution of Network Policies and FidoNews to the Zone
|
||
Coordinators.
|
||
|
||
The International Coordinator is responsible for coordinating the
|
||
activities of the Zone Coordinator Council. The International
|
||
Coordinator acts as the spokesman for the Zone Coordinator Council.
|
||
|
||
In cases not specifically covered by this document, the
|
||
International Coordinator may issue specific interpretations or
|
||
extensions to this policy. The Zone Coordinator Council may
|
||
reverse such rulings by a majority vote.
|
||
|
||
8 Referenda
|
||
|
||
The procedures described in this section are used to ratify a new
|
||
version of FidoNet policy, which is the mechanism by which policy
|
||
is changed.
|
||
|
||
8.1 Initiation
|
||
|
||
A referendum on policy modification is invoked when 5% of the Net
|
||
Coordinators as determined from the first nodelist of a calender
|
||
year, petition the International Coordinator that they wish to
|
||
consider a proposed new version of Policy. Net Coordinators of
|
||
Networks formed after the first nodelist of the year may be
|
||
petitioners.
|
||
|
||
8.2 Announcement and Results Notification
|
||
|
||
Proposed changes to Policy are distributed using the same structure
|
||
which is used to distribute nodelist difference files and FidoNews.
|
||
Results and announcements related to the referendum are distributed
|
||
by the coordinator structure as a part of the weekly nodelist
|
||
difference file. The International Coordinator provides copies to
|
||
the editor of FidoNews for inclusion there, although the official
|
||
announcement and voting dates are tied to nodelist distributions.
|
||
|
||
If it is adopted, the International Coordinator sets the effective
|
||
FidoNews 10-13 Page: 39 29 Mar 1993
|
||
|
||
date for a new policy through announcement in the weekly nodelist
|
||
difference file. The effective date will be not more than one
|
||
month after the close of balloting.
|
||
|
||
8.3 Eligibility to Vote
|
||
|
||
Each individual FidoNet Sysop is entitled to one vote. (One
|
||
person, one vote.)
|
||
|
||
8.4 Voting Mechanism
|
||
|
||
The actual voting mechanism, including whether the ballot is secret
|
||
and how the ballots are to be collected, verified, and counted, is
|
||
left to the discretion of the International Coordinator. Ideally,
|
||
ballot collection should be by some secure message system,
|
||
conducted over FidoNet itself.
|
||
|
||
In order to provide a discussion period, the announcement of any
|
||
ballot must be made at least two weeks before the date of voting
|
||
commencement. The balloting period must be at least two weeks.
|
||
|
||
8.5 Voting on a whole Policy Document
|
||
|
||
Given that Policy is intertwined and self referencing, a relatively
|
||
simple change may require several alterations of the document. In
|
||
order to simplify the process, balloting is done on choices between
|
||
whole documents, rather than individual amendments. In the
|
||
simplest case, this means voting yea or nay to a new document. If
|
||
a number of alternatives are to be considered, they must be
|
||
presented as whole documents, from which one is chosen.
|
||
|
||
8.6 Decision of vote
|
||
|
||
A Policy amendment is considered in force if, at the end of the
|
||
balloting period, it has received a majority of the votes cast.
|
||
For example, if there were 350 eligible voters, 100 of which cast
|
||
a vote, then at least 51 affirmative votes would be required to
|
||
declare the amendment in force.
|
||
|
||
In the case of multiple policy changes which are considered on the
|
||
same ballot, a version must receive more than 50% of the votes cast
|
||
to be considered ratified. "Abstain" is a valid vote in this case,
|
||
effectively being a vote for not changing the current policy as it
|
||
simply increases the number of votes required to ratify the
|
||
proposed change.
|
||
|
||
9 Resolution of Disputes
|
||
|
||
9.1 General
|
||
|
||
The FidoNet judicial philosophy can be summed up in two rules:
|
||
|
||
1) Thou shalt not excessively annoy others.
|
||
|
||
2) Thou shalt not be too easily annoyed.
|
||
FidoNews 10-13 Page: 40 29 Mar 1993
|
||
|
||
|
||
In other words, there are no hard and fast rules of conduct, but
|
||
reasonably polite behavior is expected. Also, in any dispute both
|
||
sides are examined, and action could be taken against either or
|
||
both parties. ("Judge not, lest ye be judged!")
|
||
|
||
The coordinator structure has the responsibility for defining
|
||
"excessively annoying". Like a common definition of pornography
|
||
("I can't define it, but I know it when I see it."), a hard and
|
||
fast definition of acceptable FidoNet behavior is not possible.
|
||
The guidelines in this policy are deliberately vague to provide
|
||
the freedom that the coordinator structure requires to respond to
|
||
the needs of a growing and changing community.
|
||
|
||
The first step in any dispute between sysops is for the sysops to
|
||
attempt to communicate directly, at least by netmail, preferably
|
||
by voice. Any complaint made that has skipped this most basic
|
||
communication step will be rejected.
|
||
|
||
Filing a formal complaint is not an action which should be taken
|
||
lightly. Investigation and response to complaints requires time
|
||
which coordinators would prefer to spend doing more constructive
|
||
activities. Persons who persist in filing trivial policy
|
||
complaints may find themselves on the wrong side of an excessively-
|
||
annoying complaint. Complaints must be accompanied with verifiable
|
||
evidence, generally copies of messages; a simple word-of-mouth
|
||
complaint will be dismissed out of hand.
|
||
|
||
Failure to follow the procedures herein described (in particular,
|
||
by skipping a coordinator, or involving a coordinator not in the
|
||
appeal chain) is in and of itself annoying behavior.
|
||
|
||
9.2 Problems with Another Sysop
|
||
|
||
If you are having problems with another sysop, you should first try
|
||
to work it out via netmail or voice conversation with the other
|
||
sysop.
|
||
|
||
If this fails to resolve the problem, you should complain to your
|
||
Network Coordinator and the other sysop's Network Coordinator. If
|
||
one or both of you is not in a network, then complain to the
|
||
appropriate Regional Coordinator. Should this fail to provide
|
||
satisfaction, you have the right to follow the appeal process
|
||
described in section 9.5.
|
||
|
||
9.3 Problems with your Network Coordinator
|
||
|
||
If you are having problems with your Network Coordinator and feel
|
||
that you are not being treated properly, you are entitled to a
|
||
review of your situation. As with all disputes, the first step is
|
||
to communicate directly to attempt to resolve the problem.
|
||
|
||
The next step is to contact your Regional Coordinator. If your
|
||
case has merit, there are several possible courses of action,
|
||
including a change of Network Coordinators or even the disbanding
|
||
FidoNews 10-13 Page: 41 29 Mar 1993
|
||
|
||
of your network. If you have been excommunicated by your Network
|
||
Coordinator, that judgement may be reversed, at which point you
|
||
will be reinstated into your net.
|
||
|
||
If you fail to obtain relief from your Regional Coordinator, you
|
||
have the right to follow the appeal process described in section
|
||
9.5.
|
||
|
||
9.4 Problems with Other Coordinators
|
||
|
||
Complaints concerning annoying behavior on the part of any
|
||
coordinator are treated as in section 9.2 and should be filed with
|
||
the next level of coordinator. For example, if you feel that your
|
||
Regional Coordinator is guilty of annoying behavior (as opposed to
|
||
a failure to perform duties as a coordinator) you should file your
|
||
complaint with the Zone Coordinator.
|
||
|
||
Complaints concerning the performance of a coordinator in carrying
|
||
out the duties mandated by policy are accepted only from the level
|
||
immediately below. For example, complaints concerning the
|
||
performance of Regional Coordinators would be accepted from Network
|
||
Coordinators and independents in that region. Such complaints
|
||
should be addressed to the Zone Coordinator after an appropriate
|
||
attempt to work them out by direct communications.
|
||
|
||
9.5 Appeal Process
|
||
|
||
A decision made by a coordinator may be appealed to the next level.
|
||
Appeals must be made within two weeks of the decision which is
|
||
being appealed. All appeals must follow the chain of command; if
|
||
levels are skipped the appeal will be dismissed out of hand.
|
||
|
||
An appeal will not result in a full investigation, but will be
|
||
based upon the documentation supplied by the parties at the lower
|
||
level. For example, an appeal of a Network Coordinator's decision
|
||
will be decided by the Regional Coordinator based upon information
|
||
provided by the coordinator and the sysop involved; the Regional
|
||
Coordinator is not expected to make an independent attempt to
|
||
gather information.
|
||
|
||
The appeal structure is as follows:
|
||
|
||
Network Coordinator decisions may be appealed to the appropriate
|
||
Regional Coordinator.
|
||
|
||
Regional Coordinator decisions may be appealed to the appropriate
|
||
Zone Coordinator.
|
||
Zone Coordinator decisions may be appealed to the International
|
||
Coordinator.
|
||
|
||
The International Coordinator will make a decision and communicate
|
||
it to the Zone Coordinator Council, which may reverse it by
|
||
majority vote.
|
||
|
||
If your problem is with a Zone Coordinator per se, that is, a Zone
|
||
FidoNews 10-13 Page: 42 29 Mar 1993
|
||
|
||
Coordinator has committed a Policy violation against you, your
|
||
complaint should be filed with the International Coordinator, who
|
||
will make a decision and submit it to the Zone Coordinator Council
|
||
for possible reversal, as described above.
|
||
|
||
9.6 Statute of Limitations
|
||
|
||
A complaint may not be filed more than 60 days after the date of
|
||
discovery of the source of the infraction, either by admission or
|
||
technical evidence. Complaints may not be filed more than 120 days
|
||
after the incident unless they involve explicitly illegal behavior.
|
||
|
||
9.7 Right to a Speedy Decision
|
||
|
||
A coordinator is required to render a final decision and notify the
|
||
parties involved within 30 days of the receipt of the complaint or
|
||
appeal.
|
||
|
||
9.8 Return to Original Network
|
||
|
||
Once a policy dispute is resolved, any nodes reinstated on appeal
|
||
are returned to the local network or region to which they
|
||
geographically or technically belong.
|
||
|
||
9.9 Echomail
|
||
|
||
Echomail is an important and powerful force in FidoNet. For the
|
||
purposes of Policy Disputes, echomail is simply a different flavor
|
||
of netmail, and is therefore covered by Policy. By its nature,
|
||
echomail places unique technical and social demands on the net over
|
||
and above those covered by this version of Policy. In recognition
|
||
of this, an echomail policy which extends (and does not contradict)
|
||
general Policy, maintained by the Echomail Coordinators, and
|
||
ratified by a process similar to that of this document, is
|
||
recognized by the FidoNet Coordinators as a valid structure for
|
||
dispute resolution on matters pertaining to echomail. At some
|
||
future date the echomail policy document may be merged with this
|
||
one.
|
||
|
||
10 Appendices
|
||
|
||
10.1 General
|
||
|
||
The Appendices of this document are exceptions to the normal
|
||
ratification process. Section 10.2 can be changed by the
|
||
appropriate Zone Coordinator.
|
||
|
||
10.2 Timing of Zone Mail Hour
|
||
|
||
Zone Mail Hour is observed each day, including weekends and
|
||
holidays. The time is based upon Universal Coordinated Time (UTC),
|
||
also known as Greenwich Mean time (GMT). In areas which observe
|
||
Daylight Savings Time during part of the year, the local time of
|
||
zone mail hour will change because FidoNet does not observe
|
||
Daylight Savings Time. The exact timing of Zone Mail Hour is set
|
||
FidoNews 10-13 Page: 43 29 Mar 1993
|
||
|
||
for each zone by the Zone Coordinator.
|
||
|
||
In FidoNet Zone 1, Zone Mail Hour is observed from 0900 to 1000
|
||
UTC. In each of the time zones, this is:
|
||
|
||
Eastern Standard Time - 4 AM to 5 AM
|
||
Central Standard Time - 3 AM to 4 AM
|
||
Mountain Standard Time - 2 AM to 3 AM
|
||
Pacific Standard Time - 1 AM to 2 AM
|
||
Hawaii Standard Time - 11 PM to Midnight
|
||
|
||
In FidoNet Zone 2, Zone Mail Hour is observed from 0230 to 0330
|
||
UTC.
|
||
|
||
In Fidonet Zone 3, Zone Mail Hour is observed from 1800 to 1900
|
||
UTC. In each of the time Zones involved this is:
|
||
|
||
GMT +12 Zone 6:00 AM to 7:00 AM
|
||
(New Zealand)
|
||
|
||
GMT +10 Zone 4:00 AM to 5:00 AM
|
||
(East Australia)
|
||
(Papua New Guinea)
|
||
(Micronesia)
|
||
|
||
GMT +9.5 Zone 3:30 AM to 4:30 AM
|
||
(Central Australia)
|
||
|
||
GMT +9 Zone 3:00 AM to 4:00 AM
|
||
(Japan)
|
||
(Korea)
|
||
(Eastern Indonesia)
|
||
|
||
GMT +8 Zone 2:00 AM to 3:00 AM
|
||
(Hong Kong)
|
||
(Taiwan)
|
||
(Central Indonesia)
|
||
(Philippines)
|
||
(Western Australia)
|
||
|
||
GMT +7 Zone 1:00 AM to 2:00 AM
|
||
(Malaysia)
|
||
(Singapore)
|
||
(Thailand)
|
||
(Western Indonesia)
|
||
|
||
10.3 Credits, acknowledgments, etc.
|
||
|
||
Fido and FidoNet are registered trademarks of Fido Software, Inc.
|
||
|