textfiles/bbs/FIDONET/FIDONEWS/fido0940.nws

1275 lines
60 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

F I D O N E W S -- | Vol. 9 No. 40 (5 October 1992)
The newsletter of the |
FidoNet BBS community | Published by:
_ |
/ \ | "FidoNews" BBS
/|oo \ | (415)-863-2739
(_| /_) | FidoNet 1:1/1
_`@/_ \ _ | Internet:
| | \ \\ | fidonews@fidonews.fidonet.org
| (*) | \ )) |
|__U__| / \// | Editors:
_//|| _\ / | Tom Jennings
(_/(_|(____/ | Tim Pozar
(jm) |
|
| Newspapers should have no friends.
| -- JOSEPH PULITZER
----------------------------+---------------------------------------
Published weekly by and for the Members of the FidoNet international
amateur network. Copyright 1992, Fido Software. All rights reserved.
Duplication and/or distribution permitted for noncommercial purposes
only. For use in other circumstances, please contact FidoNews.
Electronic Price: . . . . . . . . . . . . . . . . . . . . . free!
Paper price: . . . . . . . . . . . . . . . . . . . . . . $10.00US
For more information about FidoNews refer to the end of this file.
--------------------------------------------------------------------
Table of Contents
1. EDITORIAL ..................................................... 1
Editorial: Now less than ever ................................. 1
2. ARTICLES ...................................................... 2
Error in FidoNews 9-39 "REGION25" article ..................... 2
Did I Dream All This, or What ? ............................... 2
Private Communications... Are you listening? .................. 9
Book Review: SYSLAW, 2nd ed. - Legal Guide for Online Servic .. 11
Bucking World Trends : Powermongery in Cold Places * .......... 12
Why No Protection For Us?? .................................... 14
User Origin Door for Remote Access ............................ 19
PUBLIC_KEYS Echo is born! ..................................... 19
Of Controversey and Discovery ................................. 21
3. FIDONEWS INFORMATION .......................................... 22
FidoNews 9-40 Page 1 5 Oct 1992
======================================================================
EDITORIAL
======================================================================
Editorial: Now less than ever
by Tom Jennings (1:1/1)
Look I've got nothing to say this week, so I won't say it. Well, just
this one thing...
I managed to screw up an article sent to me, and apparently totally
garbage it. The format of the file sent didn't conform to
ARTSPEC.DOC, like about 40% of all articles received here. So, I did
my usual, which is to manually edit the three files into an article.
Well, I mashed it.
So from now on, I am going to simply BOUNCE BACK ARTICLES THAT DO NOT
CONFORM TO ARTSPEC.DOC. It is *your* responsibility to get a copy of
it, and read it. I'll run it as an article next week as well. Fair
enough?
* * * * *
PRIVACY: expect to hear lots about privacy in the coming months...
PGP version 2.0 is out, and it's been sufficiently improved to be
useful in FidoNet.
Expect *lots* of "trouble" caused by the privacy issue. I'd always
assumed everyone thought the right to privacy was a good thing. Not
so! Mere days ago, a FidoNet sysop wrote me, saying all this privacy
stuff was fine, but he wants to be able to read all the mail passing
through his system! Innaresting, huh?!
POLICY4 specifically prohibits "encrypted" mail. A very naive
viewpoint. We'll see...
----------------------------------------------------------------------
FidoNews 9-40 Page 2 5 Oct 1992
======================================================================
ARTICLES
======================================================================
From : Peter Burnett - 2:441/80@fidonet
Ref : Fidonews Vol. 9 No. 39 (28 September 1992)
I would like to point out that the below article in the above
mentioned version of Fidonews has some errors.
On page 14, an article called "FIDONET REGION25 ( UK ) EXCEPTION
POLICY" starts and ends on page 18. I would like to point out at
this moment in time 2 items for your attention.
1. The 'Exception Policy' is at this current moment in time is a
discussion document and holds no status other than a discussion
document with Region 25. This was not pointed out by the
contributor of the said document in thier footnotes.
2. The 6 paragraphs that start on line 40 of page 17 and continue
through to line 29 of page 18 are not part of the draft version
D.1 held here at my system and are the thoughts of the contributor
to Fidonews of the said document. The list of authors contained
on lines 32 to 34 inclusive of page 18 is correct, however, in
the manner in which this has been presented as an article for
fidonews, it would seem that Paul Dickie and myself were the
contributors of the whole article to fidonews, including the 6
paragraphs identified above. This is indeed not the case on my own
part and as such, I dissasociate myself with those 6 paragraphs.
I really dont know why the contributor to fidonews did not point out
that the closing 6 paragraphs were his/hers own thoughts and sign them
as such instead of attaching Paul Dickie's and my own name as well as
a lot of other sysops name to them.
(* ED NOTE: This is at least partly my doing. The article in question
came in three separate files, none of which conformed to ARTSPEC.DOC
requirements. I assembled them into a single article, which looked OK
to me, and ran it. Ooops.
This points out *why* ARTSPEC.DOC is important. I will be more
vigilant in enforcing ARTSPEC.DOC requirements. My apologies to Peter
and Nick both, for allowing this to happen. *)
----------------------------------------------------------------------
Did I Dream All This, or What ?
FidoNews 9-40 Page 3 5 Oct 1992
I went to a party. It was held in a multi-room house built on
the side of a rocky hill. The slope led down to a lake. I later
learned it was my house. I remember loud music, dancing and some
kind of small train ride. Was it FidoCon ?
After a while, I was feeling better, finally sitting down to eat at
a large table. Everyone was still there. I guess we never know
quite what to expect.
Well anyway --
I'd slept 3 hours Sat. morning, and 4 hours Sun. morning. I
fell, asleep about 6 pm. Sunday. This was Labor Day morning.
Pretty weird.
Last thangs first :
92 Dallas, Tx
91 Denver, Co
90 Lyndhurst, Nj
89 San Jose, Ca
88 Cincinatti, Oh
87 Alexandria, Va
86 Colorado Springs, Co
First thangs first :
Thurs. afternoon :
The hotel guarantee.
Oh look out.
This is when it gets tough. Not everyone registers early, not
everyone even says "I wanna". How many mouths to feed ? How many
rooms to clean ? This is definately the hard part. Check out the
Fidocon planning session, S9 below.
I had a list of early arrivers. Dropped in on James Smith of Online
Systems, the Frontdoor folks. Boy, did we screw up. I'm going to
say thanks to this guy a lot in this issue, because James hung there
despite our idiocy in trying to do anything like a trade show.
FidoCon is not a trade show, and should never be. Period.
Thurs. evening :
I was pressed. Kevin's baseball practice at 6:30 meant I had to take
him, until Honey got off work and got there to relieve me. When she
shows up, I'm fixing to leave, and I hear : "We need a new
shortstop." Hmmm, Kevin plays shortstop. I turned around to find
him bleeding at the mouth. His very first tooth had come out.
Maybe it was an omen. I need another New Orleans trip to get my
cards read. Hey, New Orleans for Fidocon 93 !
FidoNews 9-40 Page 4 5 Oct 1992
The lounge.
Bless Saint Anthony
Los Gringos from San An-tone had arrived ready to paint the town red.
They hotly anticipated the Echomail Cost Sharing session and came
prepared. Cooked up my little part of the formal presentations just
right ! Thanks guys.
Fri. afternoon
The scramble.
Hey Zues, Remember ?
I had already stole the truck. Loading it was another thing. I took
everything. Needed it too. Got checked in and oriented and then the
work started.
The check-in.
Here they come. Walking in the suite. You get the funniest looks
from, all the nerds you meet. Hey hey we're the Sysops, oh sorry.
People were stopping by in droves. We were passing out schedules and
name tags left and right. Eventually, things settled down, and the
bunch of them took off for the local pizza joint.
Fri. 19:00 Dinner
Who's who.
<
Ron and John will fill you in on the pizza party, since I didn't go.
Hey, somebody had to watch the suite and make huge business deals.
>
So anyway, James was real easy and I bargained Fidocon 93 down from 1
vendor to 0 vendors. Another thang to add to simply signing up for a
Fidocon is to also specify to release your NAME to the world so
everyone begins to get a picture of who all can make it. We knew
there were some big-time-Fido-luminaries going to be there, but we
hadn't made any allowance for non-privacy.
You know, one of problems with working for the conference committee,
is, you don't get much time to visit the gatherings. Next time we
get late fees, let's hire some skirted ones to take money and make
name tags. OK, tight jeans are fine too.
Sat. 9:00 S1 Jeff Rush, Fidonet Newcomers.
10:00 S2 Bruce Bodger, Remote Access.
11:00 S3 Ken Rucker, IBM OS/2.
12:00 Lunch
14:00 S4 John Souvestre, Filebone panel.
15:00 S5 James Smith, Frontdoor.
FidoNews 9-40 Page 5 5 Oct 1992
16:00 S6 Phil Becker, TBBS.
Well, I'm pretty sure all this happened. About the time Phil was
warming up, Ron and I dashed off in a mild frenzy to get computer
oriented banquet prizes. It should be a rule of all FidoCons that
late fees get to be spent by the accountant and the nametag maker
on neat stuff that won't run under OS/2. Everytime I looked in on
one of these conferences, everyone was dead silent listening to the
answer of some extreme import. Cool stuff, indeed.
17:00 Water Volleyball Tournament
Tim Flynn, Patty Pickett : The Sportsters
Tim and Patty won this sporting event hands down. But then, they are
Lake Party alumni, after all. I dare say the hotel management simply
declined to show support for the 'other<tm>' guests.
19:00 Banquet
OK, $30 bucks was too much. Write it down so you remember next year.
Actually it was $24 plus tax and tip. Also, I had the feeling that
everyone was itching to do a repeat, only bigger, of Friday night.
The kind of 'house party', milling about and talking I remember doing
before I got married with children.
Sun. 10:00 S7 Jeff Rush, Privacy.
<
Jeff sent this over. I imagine everyone who reads this having a
differing set of opinions on each issue.
>
In the privacy session at Fidocon'92, the question was raised whether
privacy was truly out of fashion, as some popular authors claim. An
informal poll was taken to determine if the attendees believed
technology was increasing or tearing down individual privacy, with a
vast majority saying it was tearing it down. Also discussed was the
issue of Sysop Rights versus User Rights, addressing the metaphor of
a person's right to know who is at the front door of his home, versus
a person's right to know all about someone coming into his store. The
concept of the traditional "Sysop as Benevolent Dictator" was
explored.
The movement toward availability of Caller ID whereby when the phone
rings you know who is calling was discussed. In Texas, where Fidocon
was being held, caller id is not yet available but some of the
attendees were from states where it is relatively common. They were
asked what impact it had had on both their boards and their personal
lives. Most present were in favor of caller id by far. This was
surprising to the moderator since those with unlisted phone numbers
are usually dead set against it. The use of CDROM databases combined
with caller id to allow a sysop to know the name, address, marital
status, income bracket, education level and names/phone numbers of
physical neighbors was discussed and how the BBS community could draw
upon the technology of collection agencies. Needless to say, this
FidoNews 9-40 Page 6 5 Oct 1992
was not viewed as a positive development.
Also covered was the pros and cons of using 'handles' or aliases on
various systems. While most were against handles, some attendees had
legitimate uses for them, such as to hide gender in conferences
likely to attract the adolescent male element. Some of the men
present did not seem to understand this issue, considering this is a
male-dominated hobby. The need for handles in potentially dangerous
international situations was brought up, where the rights we expect in
the US are not respected. It was mentioned that most Sysops who
collect information about users do not publicly state that it is only
for internal use only and several pondered the possibility of Sysops
making money on the side by selling mailing lists to firms. And then
the hybrid case of where the Sysop knows a caller's true name but not
the other users was mentioned.
Lastly, there was some talk about the reading of private mail by a
Sysop, the editing of mail-in-transit, and whether the Fidonet
community would even tolerate encrypted messages being exchanged,
with or without prior notice, across international links. In
particular, between Croatia citizens who fear for message
interception and those who wish to correspond with them. The FBI
bill to build a backdoor into all encryption devices was discussed
toward the end.
The session was lively and there were very strong but diverse opinions
held by all. Privacy is definitely a sensitive area for the Fidonet
community and I believe, an important one for the future. If we do
not take intentional steps to safeguard it, we will, by default,
construct an environment hostile to privacy without realizing it. The
various US agencies are pleased to see this movement toward an 'open
and self-accountable' communications environment where what a person
says can be directly traced back to them, for good or ill.
11:00 S8 Henry Clark, Echomail Cost Sharing.
In an open discussion between members of a dozen or so networks, I
started by soliciting procedures and plans for Echomail Cost Sharing.
What we arrived at were two basic methods for payment of a long
distance bill to receive echomail. We called them
The Voluntary Sugar Daddy Methods, and
The Mandatory Cooperative Methods
It was noted that some nets have lots of Sugar Daddys who pay for
echomail, and some nets have one Sugar Daddy who pays. Both are
voluntary payment methods. On the other hand, the Cooperative
approach generally divides the echomail cost amougst the participants
of the cooperative with a mandatory payment plan. You don't pay, you
aren't a participant. There were arguments for flat-rate and pay
by the volume.
FidoNews 9-40 Page 7 5 Oct 1992
Prior to the session, I had received from the San Antonio bunch a
draft of their new cost sharing plan, and they had decided on the
flat-rate approach at 3 dollars per month. About 10 cents per day.
Then we heard about the highly successful Denver net plan, also, 3
dollars per month. What was it about this figure ? It is very
important to realize that 10 cents per day is about what it
would cost to make a one minute long distance call every day. So
that the question for any sysop becomes, "Do I go get echomail
myself, or do I join the co-op".
Well, is that such a hard question ? If your echomail volume fits
into one minute, or you don't need to have daily responsiveness, then
you might save money compared to the co-op's rate.
Looking at the cost from the other end, it was estimated that at 1600
characters per second, about 1 hour per day was required to get ALL
the backbone echos; ie. about $150 per month. At 3 dollars per
sysop, you can see how having 50 people in your co-op would be
perfect.
Everyone agreed that long distance costs were the primary costs to
recover regardless of the sharing method chosen. When you get
sufficient support for the cost sharing plan, the group can decide to
purchase hardware, such as a hard disk or even an entirely dedicated
machine. Historically, the equipment used was rarely counted as a
part of the cost because that equipment belonged to the echomail hub,
and usually would be in use anyway by the sysop. The advantages for
having a dedicated machine include security, responsiveness and
easier accounting for usage.
I did receive a note suggesting that a "Flat rate promotes a 'get my
monies worth' attitude that increases the distribution workload
unnecessarily". There were other concerns about low speed modems and
their affect on the distribution system and responsiveness. Local
networks may or may not have free local calling available for local
distribution. There is ample room for differences in the way any
local plan is implemented.
The Backbone Operating Procedures document was mentioned with
reference to a sysops ability to choose between a sharing plan and
getting a separate feed for him/herself. The backbone seems to
desire a structured routing plan for the purpose of problem solving.
A related issue concerning 'unauthorized' distribution was raised.
The basic question is "If a sysop pays the coop for mail, can he/she
then route it to other sysops, who do not participate in the coop".
Here we have the essential echomail question, and it should be
obvious to everyone that no definitive answer is available. Perhaps
this a part of the evolution that we haven't gotten to yet.
Certainly with respect to Policy4, a sysop's membership in Fidonet,
and inclusion in the nodelist, should be completely independent of
these echomail cost sharing issues.
FidoNews 9-40 Page 8 5 Oct 1992
Having worn out the 'receive' side issue, we attacked the 'transmit'
side. How significant are the costs to send the upstream side?
Estimates ranged from none ( using a bi-direction protocol ) to about
5%. When you send echomail to someone else, they probably incur a
cost to forward it on towards the backbone. Most participants felt
that this cost was negligible and could be included and accounted for
more easily in the flat-rate. Now the picture emerges.
The coops that have reached sufficient size locally to support a full
feed, are in a natural position to begin providing regional hub
functions. Rising closer to the backbone systems provides better
responsiveness ( turnaround ) for their echomail. There is no doubt
that the Souvestre backbone system is well supported by the sysops of
the New Orleans area. In terms of reliability, the cooperative
stands a better chance of remaining in place than the individual who
is acting on behalf of the members of a voluntary plan.
Finally, we entered into the dark realm of business, taxes, the IRS
and Accounting 101. Hold on to your checkbook. In fact, keep
records of everything. While we didn't have any tax theologians
available, it was pretty well understood that keeping good records
was of primary concern. It may be harder for the keeper of the
voluntary fund to maintain proper records than it would be for a
separate and legal 'cooperative entity'. It is definately harder for
an individual to claim the income and report the expenses than it
would be for a separate legal entity.
12:00 Lunch
The checkout.
Those fool Washington 'Sunburns' football, they think, playing team
were wanting their little hospitality suite. Oh, dear. I'm glad the
Cowboys kicked their butts. Anyway, it was all I could do to stack
everything on a cart and push it down to the lobby by 1. Then, of
course, the 'Final Bill Settling'. Probably like getting an echomail
hubs long distance bill. The real question is would they have us
back. I'll call 'em sometime and ask.
14:00 S9 Ron Bemis, Planning FidoCon '93.
Early planning. Earlier planning. Earliest planning. We didn't do
things far enough in advance. Change the name of Late Fee to Normal
price, and change Normal Price to Early Discount. Tie all other
revenues directly to costs. It works. You can put together a good
convention with 40 good man- ( uh-hum) person-hours.
15:00 S10 Question and Answer
Where's the door ? Where's my keys ? How do I get home ? Did I
survive ?
FidoNews 9-40 Page 9 5 Oct 1992
Sun. evening.
The sleep. The dream. See you next year.
----------------------------------------------------------------------
Privacy - Do you have when you think you do?
by: G. K. Pace 1:374/26@Fidonet <gk.pace@f26.n374.z1.fidonet.org>
Welcome to the future... new technology abounds! Today we have the
ability to see and hear further than man could have imagined a mere
hundred years ago... We cook our food with RF energy... we command
huge databases of information from our homes with little gagits that
give us the ability to communicate around the world in minutes... Life
is wonderful for those of us fortunate to live in the "developed
world".
This technology advances at an ever increasing rate... as engineers
and scientists around the world continually build upon the dreams of
yesterday. But is it all for the good of the people? What about
those scientists and engineers employed by those who feel a need to
insure that the people are obeying laws, living as they would have
them, those who would manipulate public events if they could? Is
there a technological void in the tool kits of those who would invade
the privacy of an individual? NO! The tool kits of those interested
in monitoring the lives and actions of private individuals find
themselves armed with a virtual array of sophisticated tools that
enable them to monitor communications of any type, undetected.
There are ways to make such eaves-dropping more difficult. The use of
"Public Key encryption" to protect private files and E-mail is one
method that can make the job of monitoring such communications more
difficult and add a degree of "privacy"!
A new Echo-Conference named "PUBLIC_KEYS" has been formed for the
purpose of discussing and promoting the use of Public Key encryption
schemes. The echo-conference is being monitored by Chrisopher Baker
@1:374/14, and myself. If it isn't being carried in your area, it can
be obtained from either of us (my system runs a 2400 baud, Chris has
9600+) just ask...!
For you that have a copy of PGP 2.0, I have drafted an encrypted story
as an example (the rest of you may want to get PGP 2.0). To read this
story you should edit the following block to a separate file and run
PGP on it. PGP will ask you for the password used to encrypt it, you
would then enter the word: "privacy" (that is privacy without the "")
The story follows:
-----BEGIN PGP MESSAGE-----
Version: 2.0
FidoNews 9-40 Page 10 5 Oct 1992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 9-40 Page 11 5 Oct 1992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=7mJt
-----END PGP MESSAGE-----
Privacy is a right every person should have... but to have it you must
often demand, and hold it. Once lost it is not easy to regain!
-gk
(* ED NOTE: you'll need to edit out page breaks if they occur in the
middle of the PGP block. If for some reason PGP won't digest this
FIDONEWS formatted article, you can filerequest it from the FidoNews
BBS as magicfilename "PRIVACY.ART". *)
----------------------------------------------------------------------
Michael H. Riddle, Esq.
Riddle Law Office
1:285/27.151
SYSLAW, 2nd Edition
A Legal Guide for Online Services
First, an announcement:
> Newsgroups: misc.int-property
> From: elrose@well.sf.ca.us (Lance Rose)
> Subject: SysLaw, 2nd ed. - Legal Guide for Online Service Providers
> Date: Thu Oct 1 16:27:51 1992
>
> NEW SYSLAW BOOK! MASSIVELY REVISED AND EXPANDED!
>
> SysLaw, Second Edition: The Legal Guide for Online Service
> Providers
> by Lance Rose, Esq., and Jonathan Wallace, Esq.
>
> SysLaw provides BBS sysops, network moderators and other online
> service providers with basic information on their rights and
> responsibilities, in a form that non-lawyers can easily understand.
> Subjects covered include the First Amendment, copyrights and
> trademarks, the user agreement, negligence, privacy, criminal law,
FidoNews 9-40 Page 12 5 Oct 1992
> searches and seizures, viruses and adult materials. SysLaw not
> only explains the laws, it gives detailed advice enabling system
> operators to create the desired balance of user services, freedom,
> and protection from risk on their systems.
>
> SysLaw is available from PC Information Group, 800-321-8285 or 507-
> 452-2824, and located at 1126 East Broadway, Winona, MN 55987. You
> may order by credit card or by mail. Price is $34.95 plus $3.00
> shipping and (if applicable) sales tax. Price is subject to change
> after January 1, 1993. For additional information, please contact
> publisher Brian Blackledge at 800-321-8285.
Second: I have the book at my office, and (third?) have actually read
it. Messrs. Rose and Wallace have done an excellent job in explaining
the law as applied to BBSes, including the places where the law is
"unsettled."
In the places where the law is unsettled, they do a good job
explaining the legal, social and sometimes moral considerations that a
court would consider if the question arose. They sometimes tell you
what they think the result might be, or what they think it should be.
They caution at the start that until courts consider several cases,
and/or until we get appellate decisions, the users and operators incur
some degree of risk in engaging in certain activities, such as
XXX.GIF.
Overall, well worth the cost.
----------------------------------------------------------------------
By: Gordon R.V. Chapman
Sysop, Grace and Danger, 1:163/150, Ottawa, Canada
It snowed here yesterday, Unseptember the 30th, 1992. This
represents a couple of firsts as far as I know - even in this cold
part of the world, the snow usually holds off a few more weeks.
And, we usually have September this time of the year, but this year
we seem to have missed it. Not that it isn't cold here a lot, but
it's getting much colder up here all of the sudden, and a lot of
us aren't too happy about it. This has nothing to do with the
weather, either. This has to do with the removal of our democratic
privileges. Here in Net163 we happily elect an NC, and, in Region
12, we've elected our RCs in the past.
Democratic traditions are mixed blessings. Up here we know that you
folks below the 49th parallel (I believe you call yourself
"Murricans") are rabidly democratic, voting on everything that
moves, or doesn't - everything from county sheriff to proposition
13 to installing your president. We folks up here (you can call us
"Canajans") vote a lot too, even if our political system is
incomprehensible. In Region12, we've traditionally held a one-vote
per sysop election for our RC. We *have* had some bad luck with
RCs, though.
FidoNews 9-40 Page 13 5 Oct 1992
One RC experimented with a Fax machine on his line to the point
that many local sysops wore out their nerf bats and bit the arms
off their mirror shades. Another RC suddenly resigned last June,
leaving us RC-less a few months prior to our usual election.
Strangely, despite the inconvenience of democracy, our region works
well. The mail gets through, the nodelist gets updated, and, all
sysops are, or rather, *were* franchised by their right to vote.
June is a funny time for it to start to get cold, even up here, but
as soon as the ZC appointed an interim RC, it started getting
chilly. The interim RC indicated that he was only an interim
appointment, and that he would attend to sorting out a problem in
one of the nets, keep the nodelist working, and, sooner or later,
we'd have an election.
This lack of commitment on a time for an election did not go down
well. The regional sysop echo has been peppered for months with
messages from sysops in all our nets to request an election. We
were told that something would be done about it in September.
While much grumbling ensued, most of us hunkered down to wait. A
straw poll was taken among NCs as to whether or not an election was
wanted at this time. It was reported that fully three quarters of
the NCs did not want an RC election at this time. Then we found out
that not all NCs had even bothered to ask us grunt sysops what we
thought. My NC did, and 26 to 1 voted in favour of an election. We
also found out that some NCs did ask grunts, and decided that "I
don't care" votes should be lumped in with the "No" votes. NCs from
nets with only a few nodes were given one vote, the same as nets
with hundreds of nodes, entirely distorting the response.
Whether or not this obviously flawed poll was used to impress
George Peace, we grunts will never know. What is certain is that
September never arrived, because on Unseptember 29, our interim RC
posted a message stating that he had put the mechanism in place to
have an election, but that the ZC, George Peace, had declined to
call it, and that the ZC would wait another 30 days to see "what
happened." We, of course, only have the messages of Mr. Peace
transmitted to us via the interim RC, so we have to assume that
George actually said such things. (Yes, I've tried, but Mr. Peace
doesn't answer the netmail of mere grunts.)
It looks like we'll have a cold winter here in Region12. All over
the world, democracy is flourishing. The USA will hold a
Presidential election this year, Canada will vote on its
constitution, France voted to join the ECM, the entire Warsaw Pact
has collapsed for the chance to become democratic, but here, in
Darkest Region12, the palace coup is complete - our democratic
tradition has evidently been ordered out of existence by the whim
of George Peace. I hope my snowblower works.
FidoNews 9-40 Page 14 5 Oct 1992
It's hard to imagine that the ZC, a citizen of the USA, Home of
the Brave, Land of the Free, Bastion of Democracy would be the one
to stomp democracy out in our region. I'd have thought you folks
south of the border would send the Marines in to preserve
democracy, if anything.
Say it ain't so, George. Call an election.
----------------------------------------------------------------------
By Janis Kracht
IC Programmer's Distribution Network, 1:272/38
After I survived the assault on my BBS described in this article, I
thought the rest of FidoNet might profit from hearing of my experience.
One thing I've realized from this episode and the resulting court case
is that there is really very little "protection" or "recourse" for the
sysop of a BBS. The legal system (at least in this part of the
country) needs to be made computer literate to a much greater degree,
especially at lower levels (i.e., the police departments) and that some
type of legislation encompassing the rights of Sysops who run BBS
systems might benefit us all.
Towards the middle of March, 1992 (or there about) I agreed to take
over the Programmer's Distribution Network from Erik VanRiper. By the
beginning of April, 1992, my hook-ups were in full swing, enabling me to
distribute and receive files for the PDN as well as other file areas on
the FileBone.
On May 25th, 1992, I received a disturbing call on my BBS on Node 1 (my
mailer node with Dual Standard). I watched as a "user", who logged on
with an obvious phony name, proceeded to leave me an obnoxious and
obscene message. Now, obscene messages don't bother me per se; I just
delete them and take appropriate action with the author of such
nonsense, but this one drew my attention because he was so malicious in
his language. Insults in this message were directed at myself and
specifically to members of my family, causing me to wonder who could
know such details of our life. I disconnected this person, figuring
someone was having a bad day ;-)
At least three more calls were logged that day, obviously from the same
person, since reference was made to earlier messages. I deleted his
messages and his accounts. The next morning around 7:00AM the same
nonsense started again.
At this time, I was polling for new files three times a day - my 5:30PM
and Midnight polls were not getting through since the "activity" of this
caller had intensified dramatically. He alternated calling (and
immediately disconnecting from) both nodes of my BBS attempting to
disrupt all functioning of my BBS. As the calls continued, my husband
decided to get a trace on the phone lines to find out where the calls
were originating.
FidoNews 9-40 Page 15 5 Oct 1992
Around the same time, the caller started calling my voice line and
screaming obscenities at whoever picked up the phone when both nodes
were busy with legitimate users... I put an answering machine on that
line, and recorded some choice ones...
Initiating a phone trace in New York requires that a complaint be filed
with the police. My husband took a day off from work to take me to the
phone company (to get the appropriate forms), the police station to file
the complaint and get the forms filled out, and back to the phone
company to initiate the trace. I found it interesting that the police
officer who took the original complaint thought that all we really
needed to do was to "change the phone number".
The trace was activated by the phone company at 1pm on May, 27th, 1992.
To prevent any more grief than had already been caused, I made node 1
available to high speed callers only (I'd noticed that this person
always called at 2400). Later, the phone company told me that on the
day that the trace was initiated 28 calls had come in from same source.
I was told when I initiated the trace that if the calls did not
originate from our local phone company (GTE) I'd be out of luck. In our
area we have a number of different companies serving a fairly small
area. The calls to my BBS might be 'local' with respect to billing but
originate with another company. If they were from a neighboring
telephone company, the other phone company would have to agree to
trace the calls as well. The other phone company was under no obligation
to trace these calls.
Two days after initiating the trace, the GTE repair service, which
handled "nuisance calls", told me that they had determined the calls
were 'local' but were originating from another phone company. They were
very sympathetic to my plight and indicated they would contact the
neighboring company to extend the trace through their lines.
My board is, foolishly some may think, a very open system in that I
don't really mind if all you want to do is download, or all you want to
do is read messages, or use Online games or whatever. I put up <<PRISM
BBS 3 years ago because I had the resources, and because I remembered 10
years ago what it was like to call a long distance board and be asked to
UPLOAD C source code in order to download some <Grin>.
This had to change during the course of this assault, and bothered me
more than I suppose anything else did... Callers had to be validated,
like I didn't trust a single human on earth, and severe limits had to be
put on first time callers.
I successively disabled new user capabilities as I watched this caller
upload 'trojans', leave insulting messages to other users in local
message areas and doors, and try to send ANSI keyboard remapping codes
via my message area (thank you Scott Dudley for filtering out ANSI). His
obscene and insulting 'new user' messages and disruptive calling
patterns continued.
FidoNews 9-40 Page 16 5 Oct 1992
He actually did let me know in a few of his inane messages that he
intended to continue until I was 'old and gray' or I took my board down.
He also stated clearly his intent to tie up the board in ways that would
(1) make it impossible for me to function as an FDN head, and (2)
frustrate my users so much they would stop calling.
As the calls continued, I was informed by GTE that the other phone
company had agreed to trace the calls, and we'd have some results (they
hoped) in a few days. These calls had now been going on for over 7 days
and I was wearing thin trying to limit the damage he could do.
Figuring his unmasking was near, I temporarily made my board a private
board, restricted to only those who had previously been validated. This
didn't stop him from trying, however, and my BBS logs filled with his
inane messages in the User name field. My log caught it all. He asked
if I had read any messages in SWASHNET or in MagNet, two other networks
to which I did not belong.
He had left messages in these networks inviting "pirates" to log onto
<<PRISM, and boasted of over 4gig of the latest "warez" (and me, at the
time, with my 240 meg of disk space!). He left these messages as my son
Matt, who is also my co-sysop. He also posted my voice number as the
"third node" of <<PRISM BBS.
The message posted in MagNet had an obviously phony origin line. One of
my sysop friends had a friend of his who was a MagNet sysop trace the
path back through the phony origin line. This seemed to indicate the
origin was a local pirate board, who has always had it in for my
"easy-going" ways with users. Things started to make sense...
I was waiting now for the police to contact me, since GTE indicated
they'd gotten clear confirmation that all these nuisance calls I
reported had originated from one number in the Highland Telephone
Company. GTE and Highland Telephone wouldn't give me any more
information other than what they had. For any details I'd have to wait
for the City of Middletown Police department to call me.
In the meantime, my nuisance caller had been busy again. Since he now
realized I'd limited the damage he could do on my board, he'd found a
BBS in the my net, in which he could post FidoNet Echo messages without
being validated. He logged on as my son and posted in three FidoNet
echo messages similar to the one which had appeared in SWASHNET and in
MagNet. The apologetic sysop of this board net mailed me to say he was
sorry it had happened, and that in re-working some of his message areas
he had inadvertently allowed new users to post in a few echoes. He
deleted the account and plugged the holes in his security.
I net mailed moderators of the appropriate echoes telling them of the
circumstance at <<PRISM, and that they should know that any messages
which did not originate on my board were not from myself or Matt.
I net mailed my NC to let him know what was going on. I posted a message
in our SENY Net sysop echo letting everyone know to keep their guard up.
FidoNews 9-40 Page 17 5 Oct 1992
I was sick of waiting for the police to call by now, so I called them
myself. After three calls the detective in charge of the case finally
spoke to me and asked me if a particular name meant anything to me...
something Johnson... It didn't at first, until I was suddenly reminded
of a caller I'd had on my board last year by the name of Max Johnson...
Max Johnson had become only the second person to be locked out of my
board. He logged on as a neighbor of his (who didn't even have a
computer or modem) and left insulting messages about this neighbor. I
was able to piece this together by contacting the 'new user'. The next
time Max logged on, I asked him about this incident and he immediately
got abusive.
I told the detective this story and told him I wanted to press whatever
charges possible... he assured me with a "Don't worry, Ma'm.., we have
to question this boy first" - somehow I felt like not much was going
to happen to Max...
When confronted by the material I'd brought to the police, Max said that
he, age 19, was not the only one involved in this. He had left some
messages, but younger brother, Seth, age 16, had posted a number of
them.
My experience with the local police was very disheartening. They never
seemed to understand the nature of electronic communications - they
insisted in having the "originals" of all of Max's messages. It didn't
take long for me to realize that the detective in charge never took this
case seriously, or considered Max's calls dangerous or annoying.
I decided to see who else I could question about what had been
happening on my board. I began calling various agencies since I thought
there must be laws against the type of calls Max had made to my home and
BBS. There must be laws that govern the transmission of false
information across state lines... but FCC regulations only pertain to
calls originating outside your state, except if they are from 1-900
numbers. The NYS Public Service Commission representative I spoke with
told me that he had a similar experience, with voice communication
alone, and there was 'basically nothing anyone could do'.
The FBI told me that since the communication was intra-state they would
not get involved. The problem here was that the pest lived in the same
state. Even though he had posted messages that traversed the states, it
was the system doing the transferring, not the individual who posted the
messages, who would get in trouble.
I called Lance Rose, a lawyer who'd I heard was involved and
knowledgeable about computer related cases. Unfortunately for me, Mr.
Rose informed me that unless I was running a business I was out of luck
as not many lawyers would want to become involved in the case.
Max and his brother were finally arrested (and this, probably because I
would give the Police Dept. no rest). The detective informed me that
the case was now in the hands of the Assistant District Attorney,
Melissa Eisenberg.
FidoNews 9-40 Page 18 5 Oct 1992
I called the city court to find out what charge had been brought against
Max and his brother - Aggravated harassment, I was told. The court
explained that the case had scheduled for the end of June, 1992.
I called the DA's office in Orange County NY to find out what exactly
the charges would mean to Max and she told me that she hadn't received
anything from the detective. When I explained the nature of the case
she became very interested in seeing Max stopped.
When my husband and I attended the subsequent court dates we learned an
interesting lesson. The laws involved take no account of electronic
communication and BBS's. The law enforcement personnel who had
experience with computers and electronic mail, the Judge and the
Assistant District Attorney, were the only ones who took the case
seriously. Their ability to do anything was seriously limited by the
applicable laws. The penalties for conviction of even the most serious
charges were not enough to justify the cost and effort of a trial.
After three court appearances Max and Seth were allowed to plead guilty
to a violation. Their punishment was 20 hours of community service
(served during the month of August) and a public apology to me, to be
mailed to my home. And this incident will stay on their record. They
will be watched for a year to make sure they don't repeat this
behavior.
This incident taught me that a BBS is very vulnerable to assault from a
malicious caller. Our situation affords us very little protection. The
normal protections you would expect do not work well for us. The first
officer's belief that we didn't need to file a complaint - all we had to
do was change our phones numbers - was the start of our understanding
that this was not going to be easy. The detective's request for the
"originals" of the communications was the confirmation that we were in
for a struggle. The laws that apply were not written with BBS's in mind,
and the police, at least in our locality, have no specialized training
in dealing with such issues and no experience in applying the laws to
electronic communication. We were very fortunate in our case that the
frequency and content of the harassment (racist, anti-Semitic, obscene,
and threatening) caused the telephone company service department, the
Assistant District Attorney, and the Judge to pursue the case far enough
to effect what little punishment was possible. I was more than a little
disappointed that the death penalty was out of the question.
I am waiting for Caller-ID to be enabled in our area. I have little
faith that the threat of 'legal' punishment will stop callers like Max.
I am convinced that he and his brother hid behind the anonymity of the
modem and stopped calling only because they had been unmasked.
I am returning my board to it's 'old' self...but I watch calls that
come though now with a bit more interest than before. I still get
callers asking me for access to the board's "special" section, and I
tell these callers that ads they saw about pirated software here were
someone's idea of a bad joke, meant to make long distance callers waste
their money.
FidoNews 9-40 Page 19 5 Oct 1992
----------------------------------------------------------------------
Fredric L. Rice. The Skeptic Tank, 1:102/890.0
FileRequest U-ORIG.LZH
SYSOPS WHO PROVIDE Users access to Echo Mail pseudo-reality by using
Remote Access may allow their Users to design their own origin lines.
This is done through the program called "User Origins" or U-ORIG.LZH.
An 'execute shell' command is placed within the WELCOME.* screen which
executes the project, searching for the Users entry in a data file and
then writing the users origin line to the Remote Access folder file.
That's how each User get an origin line of his or her making. If the
User doesn't exist in U-ORIG, the SysOps default Origin Line is used.
The User may request the Door (type 7) to update his or her origin line.
This is done by the argument 'update' being offered on the command
line by Remote Access type 7 shell. U-ORIG maintains everything.
As usual, the sourCe code is included.
O O OOO OOOO O O OOOOO O O OOO
O O O O O O O OO O O OO O O
O O O OOOOO OOOO O O O O O O O O OOO
OO OO O O O O O OO O O OO O O
O O O O O O O O OOOOO O O OOO
Someone mentioned that the U-ORIG.DAT file must have an entry in it
before the project will work. I've not encountered the problem yet
it should be considered. Any text editor can create this file and
the following entry would be fine:
user name has this origin line
By the time you read this, however, if the problem really existed,
it has been violently liquidated.
- Fredric
----------------------------------------------------------------------
Christopher Baker
Rights On!, 1:374/14
GK Pace
PaceSoft Utilities, 1:374/26
PUBLIC_KEYS Echo Announcement
This is to announce the PUBLIC_KEYS Echo. The purpose of the
Echo is to provide a place to post and find public-keys for
data encryption within FidoNet and elsewhere and to discuss
data and software encryption and the various schemes thereof.
FidoNews 9-40 Page 20 5 Oct 1992
This is a technical Echo with very few rules. Those very few
rules are:
1. Stay on-topic. Topics of keys and encryption are welcome.
Others are not.
2. No politics [except as it relates to privacy issues] and
no religion.
3. No personal attacks, slurs or innuendo. Stick to issues
not personalities.
4. No Private flagged messages in Echomail! Encrypted
traffic using public-keys is permitted for the exercise
so long as it is on-topic.
5. This Echo may be traveling around the world so try to be
concise. Avoid excessive quoting for one-liner responses.
6. Be aware that Echomail is NOT secure. Don't take anything
at face value.
7. The posts in this Echo are the sole responsiblity of the
poster. If you need verification, use Netmail.
8. The Moderators will deal with off-topic traffic. Don't
respond for them. Links to this Echo will only be
curtailed when absolutely necessary so please don't make
it necessary. [grin]
The Moderators are Christopher Baker [KeyID: 1024/4B9A59
1992/10/03] and GK Pace [KeyID: 1024/B6B823 1992/09/28] at
1:374/14 and 1:374/26, respectively.
It is recommended that public-keys be made available via
Netmail or by file-request with the magic filename: PGPKEY
and that the public-key provided for that request by given
a distinctive filename using part or all of each provider's
name and address. For example, on my system, a file-request
of PGPKEY will give BAK37414.ASC to the requesting system.
This will avoid duplicate overwriting and make it easier to
track the keys. Using a standard magic filename will make it
easier to find keys on different systems.
This Echo is not currently on the Zone 1 Backbone
distribution list but that is expected to change as soon as
the word gets out. This Echo will be EListed in ELIST211
next month. Please feel free to announce and distribute this
Echo to all interested participants in your area.
The Echo is currently available from 1:374/14, 1:374/26,
1:374/98, 1:216/21, 1:377/14, and the Southern Star at
1:396/1 if you normally connect there for Echomail.
Thanks.
TTFN.
Christopher Baker & GK Pace
Moderators
FidoNews 9-40 Page 21 5 Oct 1992
----------------------------------------------------------------------
Of Controversey and Discovery, A Tale of Two Technologies
by Margaret Romao (1:3603/150)
Courtesy of a certain software company that is located somewhere in
the Pacific Northwest, a minor development in what I like to call "The
Great OS Holy War" appeared on the scene in early September. This
curious little wrinkle, which is a strange mutation of two separate
BASIC compilers from two different environments, has become the
subject of some controversey in several echoes. Anyone who tunes into
Quik_Bas, Windows, or Windows.Prog knows that I am, of course,
referring to the new DOS-based version of Visual Basic.
Aside from being quite interesting reading material, this news brought
to light a situation I thought to be hopeless. I had all but given up
on my career as an echo moderator, thinking that the topic I had
chosen was of little or no interest to anyone but myself, when I noted
several posts that told the tale of a long lost conference that I
believed to be dead. Imagine my surprise when I discovered cries of,
"There is a Visual Basic echo!" wafting up through the smoke of the
scattered flamettes.
These events have sparked an investigation into the inner workings of
the backbone links of the Visual Basic echo. As I type these words,
"The Mystery of the Lost Link" is in the process of being solved. I
hope this will come as good news to all the VB-WIN/VB-DOS programmers
out there who have been looking for a proper forum where they can
discuss the techniques involved in the use of these two beasts.
VISUAL_BASIC is alive and well and available on the FidoNet backbone.
Tune in and spread the word! If all goes well, I'll see you there!
----------------------------------------------------------------------
FidoNews 9-40 Page 22 5 Oct 1992
======================================================================
FIDONEWS INFORMATION
======================================================================
------- FIDONEWS MASTHEAD AND CONTACT INFORMATION ----------------
Editors: Tom Jennings, Tim Pozar
Editors Emeritii: Thom Henderson, Dale Lovell, Vince Perriello
"FidoNews" BBS
FidoNet 1:1/1
Internet fidonews@fidosw.fidonet.org
BBS (415)-863-2739 (2400 only until further notice!)
(Postal Service mailing address) (have patience)
FidoNews
c/o World Power Systems
Box 77731
San Francisco
CA 94107 USA
Published weekly by and for the members of the FidoNet international
amateur electronic mail system. It is a compilation of individual
articles contributed by their authors or their authorized agents. The
contribution of articles to this compilation does not diminish the
rights of the authors. Opinions expressed in these articles are those
of the authors and not necessarily those of FidoNews.
Authors retain copyright on individual works; otherwise FidoNews is
copyright 1992 Tom Jennings. All rights reserved. Duplication and/or
distribution permitted for noncommercial purposes only. For use in
other circumstances, please contact the original authors, or FidoNews
(we're easy).
OBTAINING COPIES: The-most-recent-issue-ONLY of FidoNews in electronic
form may be obtained from the FidoNews BBS via manual download or
Wazoo FileRequest, or from various sites in the FidoNet and Internet.
PRINTED COPIES may be obtained from Fido Software for $10.00US each
PostPaid First Class within North America, or $13.00US elsewhere,
mailed Air Mail. (US funds drawn upon a US bank only.)
BACK ISSUES: Available from FidoNet nodes 1:102/138, 1:216/21,
1:125/1212, 1:107/519.1 (and probably others), via filerequest or
download (consult a recent nodelist for phone numbers).
INTERNET USERS: FidoNews is available via FTP from ftp.ieee.org, in
directory ~ftp/pub/fidonet/fidonews. If you have questions regarding
FidoNet, please direct them to deitch@gisatl.fidonet.org, not the
FidoNews BBS. (Be kind and patient; David Deitch is generously
volunteering to handle FidoNet/Internet questions.)
FidoNews 9-40 Page 23 5 Oct 1992
SUBMISSIONS: You are encouraged to submit articles for publication in
FidoNews. Article submission requirements are contained in the file
ARTSPEC.DOC, available from the FidoNews BBS, or Wazoo filerequestable
from 1:1/1 as file "ARTSPEC.DOC".
"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
trademarks of Tom Jennings of Fido Software, Box 77731, San Francisco
CA 94107, USA and are used with permission.
Asked what he thought of Western civilization,
M.K. Gandhi said, "I think it would be an excellent idea".
-- END
----------------------------------------------------------------------