3320 lines
129 KiB
Plaintext
3320 lines
129 KiB
Plaintext
F I D O N E W S -- Volume 14, Number 18 5 May 1997
|
||
+----------------------------+-----------------------------------------+
|
||
| The newsletter of the | ISSN 1198-4589 Published by: |
|
||
| FidoNet community | "FidoNews" |
|
||
| _ | 1-904-409-7040 [1:1/23] |
|
||
| / \ | |
|
||
| /|oo \ | |
|
||
| (_| /_) | |
|
||
| _`@/_ \ _ | |
|
||
| | | \ \\ | Editor: |
|
||
| | (*) | \ )) | Christopher Baker 1:18/14 |
|
||
| |__U__| / \// | |
|
||
| _//|| _\ / | |
|
||
| (_/(_|(____/ | |
|
||
| (jm) | Newspapers should have no friends. |
|
||
| | -- JOSEPH PULITZER |
|
||
+----------------------------+-----------------------------------------+
|
||
| Submission address: FidoNews Editor 1:1/23 |
|
||
+----------------------------------------------------------------------+
|
||
| MORE addresses: |
|
||
| |
|
||
| submissions=> cbaker84@digital.net |
|
||
+----------------------------------------------------------------------+
|
||
| For information, copyrights, article submissions, |
|
||
| obtaining copies of FidoNews or the internet gateway FAQ |
|
||
| please refer to the end of this file. |
|
||
+----------------------------------------------------------------------+
|
||
|
||
|
||
ANOTHER YEAR, ANOTHER NO IC?
|
||
|
||
|
||
Table of Contents
|
||
1. EDITORIAL ................................................ 1
|
||
How about that ZEC Election process? ..................... 1
|
||
2. LETTERS TO THE EDITOR .................................... 2
|
||
NEW Opus Version 1.79 Available! ......................... 2
|
||
Response to BBS Week notice .............................. 2
|
||
3. ARTICLES ................................................. 4
|
||
New Beanie Babies Echo! .................................. 4
|
||
NOT the death of a friend! ............................... 4
|
||
4. COLUMNS .................................................. 6
|
||
Lock and Load: Guerilla Marketing for BBSes ............. 6
|
||
5. GETTING TECHNICAL ........................................ 8
|
||
FSC-0064 - InterDomain Message Identification ............ 8
|
||
FSC-0065 - Type 3 ASCII .................................. 12
|
||
FSC-0066 - Type 3 Binary ................................. 22
|
||
FSC-0067 - Proposal for Sensible New Kludge Lines ........ 24
|
||
6. WE GET EMAIL ............................................. 28
|
||
More security holes in Internet Explorer? ................ 28
|
||
7. NET HUMOR ................................................ 32
|
||
The Microsoft Restaurant ................................. 32
|
||
8. COMIX IN ASCII ........................................... 34
|
||
Animated ASCII? .......................................... 34
|
||
9. NOTICES .................................................. 45
|
||
Future History ........................................... 45
|
||
Action Alert for Privacy on the Internet ................. 46
|
||
And more!
|
||
FIDONEWS 14-18 Page 1 5 May 1997
|
||
|
||
|
||
=================================================================
|
||
EDITORIAL
|
||
=================================================================
|
||
|
||
|
||
Lots of fun and interesting stuff in today's Issue although I did not
|
||
receive the usual Z2 stats file this week from ZC2.
|
||
|
||
For those of you who still run BBSes, Opus has FINALLY released a new
|
||
version this week. Opus 1.79 is making the rounds and has also been
|
||
hatched into SDSOPUS file echo. For those of you who've never heard of
|
||
it, Opus was the first multi-function BBS/Mailer developed after Fido.
|
||
There is an announcement further down the page with sources.
|
||
|
||
Still no IC. [sigh]
|
||
|
||
C.B.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-18 Page 2 5 May 1997
|
||
|
||
|
||
=================================================================
|
||
LETTERS TO THE EDITOR
|
||
=================================================================
|
||
|
||
|
||
Sender: trev@guard.bbs.org
|
||
Date: Fri, 02 May 1997 01:10:38 +1000
|
||
From: Trev Roydhouse <trev@ibm.net>
|
||
Organization: Worldwide Opus Consortium
|
||
To: Bill Swisher <bswisher@micronet.net>,
|
||
Christopher Baker <cbaker84@digital.net>,
|
||
Eelco de Graaff <EELCO@humako.nl>,
|
||
Jim Barchuk <jbarchuk@worldnet.att.net>,
|
||
Joe Rowehl <jhrowehl@juno.com>,
|
||
Mike Burgett <mburgett@cmnsens.zoom.com>,
|
||
Peter Bruneau <pbruneau@ican.net>,
|
||
Rob Lerman <rlerman@treknet.gigo.com>,
|
||
Roger Dunk <roger@arcadiatech.com.au>, Ron Stalzer
|
||
<ron@futureone.com>, Ronald Bruintjes
|
||
<ronald.bruintjes@deimos.nl>,
|
||
Sue Blake <sue@welearn.com.au>
|
||
Subject: Opus v1.79
|
||
|
||
Last night, May 1st, a brick was hurled through the window with the
|
||
following scrawled note attached:
|
||
|
||
"On behalf of the Opus Covert Action Committee and the Not Ready for
|
||
Mainframe Players, Sydney and Elsewhere ...
|
||
|
||
OEXE179.ZIP Opus v1.79 Main executables
|
||
OUTIL179.ZIP Opus v1.79 Utility files
|
||
OMAKE179.ZIP Opus v1.79 Installation kit
|
||
OSOM179.ZIP Opus v1.79 Sysop Operations Manual
|
||
OTEC179.ZIP Opus v1.79 Technical Reference Manual
|
||
|
||
File requestable from 3:3/113 aka 3:711/401 and 1:1/113.
|
||
|
||
Available on the WWW at http://www.suburbia.com.au/~trev
|
||
|
||
Anonymous FTP at ftp://ftp.fido.net/pub/bbs/ibmpc/opus
|
||
|
||
FTP by mail by sending email to opsu179@deimos.nl
|
||
|
||
Guido & Nunzio."
|
||
|
||
Cheers, TREV.
|
||
|
||
-30-
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
|
||
From: newsbob@kwhn.com
|
||
To: -david.chord@cobra.galaxy.gen.nz, cbaker84@digital.net
|
||
Date: Mon, 28 Apr 1997 16:05:06 -0700
|
||
Subject: International BBS Week
|
||
FIDONEWS 14-18 Page 3 5 May 1997
|
||
|
||
|
||
Hi, David!
|
||
|
||
Saw your note in Fidonews about International BBS Week. Thought I'd
|
||
let you know I'll do what I can to help. I'm a Broadcast Journalist
|
||
by trade, author of the BBS Guide to Public Relations, a BBS user (not
|
||
a sysop), and few weeks ago I started writing a column on BBS
|
||
Marketing for Fidonews.
|
||
|
||
I can lend my expertise to anyone who wishes it, but I have no money
|
||
to spend (a wife and three kids pretty well take care of that). I'm
|
||
drawing up a draft news release that Sysops can adapt for their own
|
||
use. I should have it done by Wednesday (April 30).
|
||
|
||
Warmest regards,
|
||
|
||
Robert Parson
|
||
Fidonet 1:3822/1
|
||
Internet newsbob@ipa.net
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-18 Page 4 5 May 1997
|
||
|
||
|
||
=================================================================
|
||
ARTICLES
|
||
=================================================================
|
||
|
||
|
||
New Beanie Babies Echo
|
||
by Ronnie Toth, 1:135/71
|
||
|
||
BEANIE BABIES * BEANIE BABIES * BEANIE BABIES * BEANIE BABIES *
|
||
|
||
They're here! They're there! They're everywhere!
|
||
(If you can find them.)
|
||
|
||
And now the FidoNet Beanie Baby echo, BEANIES, is here too!
|
||
|
||
If you're into BEANIE BABIES, join the fun in the new BEANIES echo.
|
||
|
||
It's all about having fun with these adorable critters, and a forum
|
||
for Private Collectors to chat, exchange ideas and stories about
|
||
them, and trade, buy and sell them. Commercial pricing and
|
||
availability is NOT permitted.
|
||
|
||
Links are available at 1:135/71 until the echo is backboned, which
|
||
we hope will be very soon.
|
||
|
||
A netmail to the above FidoNet node will link you up immediately!
|
||
|
||
Ronnie Toth
|
||
FidoNet 1:135/71
|
||
Tagname: BEANIES
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
|
||
NOT the death of a friend!
|
||
by Louie Gonsalves, 1:2808/100, sysop@phosphor.datasync.com
|
||
|
||
----------------------------------------------------------------
|
||
|
||
NOT the death of a friend!
|
||
|
||
I was saddened by the news of Clay Tannacore's (1:372/4) dog's
|
||
death. However, it is my opinion that Clay let his companion of
|
||
years, Fido, to die.
|
||
|
||
You see, Fido *is* a sick little pup... but he can't get better if
|
||
we don't help him. Fido is getting old, true, and there are other
|
||
animals in town that are better looking, and bigger... but Fido is
|
||
not ready for the gas just yet.
|
||
|
||
Fido is NOT dying. He's going through a rebellious period. You
|
||
remember those, right? When you decided that enough was enough, and
|
||
rebelled against your parents, your school. Long hair, loud,
|
||
strange music.
|
||
|
||
Fido is rebelling. It is rebelling against those that for so long
|
||
FIDONEWS 14-18 Page 5 5 May 1997
|
||
|
||
|
||
have ignored him. Fido is trying to get attention, and frankly, he
|
||
needs all of it.
|
||
|
||
Fido can be nursed back to health. The first thing that must be
|
||
done is make his masters realize that his last proper training was
|
||
done in 1989... his masters must realize that no longer dogs run at
|
||
300 bits per second. His masters MUST realize that things have
|
||
changed.
|
||
|
||
Only us, the folks that have taken Fido as a friend can help our
|
||
sick dog's masters realize all that.
|
||
|
||
Netmail the masters, email them, send them letters, what have you.
|
||
|
||
The masters:
|
||
|
||
Bob Satti (Z1C)
|
||
David Nugent (FTSC Chair)
|
||
And all the RC's and NC's.
|
||
|
||
AND MOST IMPORTANTLY: ALL THE NODES.
|
||
|
||
It is time for action. Or Fido will die.
|
||
|
||
Or will it?
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-18 Page 6 5 May 1997
|
||
|
||
|
||
=================================================================
|
||
COLUMNS
|
||
=================================================================
|
||
|
||
|
||
Lock and Load: Guerilla Marketing for BBSes
|
||
Robert Parson 1:3822/1
|
||
|
||
I've spent the last twenty years writing for a living. You'd think
|
||
I'd know by now that I shouldn't entirely trust my spell checker when
|
||
proofreading articles. But that's what I did last time. And of
|
||
course, I found three errors when it was published in Fidonews. (I
|
||
checked, and they were indeed my mistakes, not the fault of Editor
|
||
Chris Baker's). I've learned my lesson.
|
||
|
||
I know I promised we would discuss how to deal with journalists today.
|
||
But the sun is out, the temperature is fairly warm and I need to whack
|
||
the grass. Instead, we'll take our modems for a walk. Anything to
|
||
get out of mowing.
|
||
|
||
Good word of mouth is the key to growth. But in order to get good
|
||
word of mouth, you have to get the word out in the first place. Last
|
||
time, we talked about writing news releases. While that's a good
|
||
start, you can't rely on getting published or aired. You have to find
|
||
other ways to get the word out.
|
||
|
||
A prime example of this is Apple Computer. In the early to mid '80s,
|
||
they came out with the revolutionary Macintosh. But they didn't rely
|
||
on getting good press. Apple was out beating the bushes, scraping for
|
||
every possible user. Contrast this with the Amiga. Another
|
||
incredible system. They also got good reviews in the media. But it
|
||
failed, in large part, because Commodore didn't proselytize (Apple is
|
||
down, but I wouldn't count them out quite yet).
|
||
|
||
So where does this fit in with your BBS?
|
||
|
||
If you answered "Get out of the house" you win the grand prize.
|
||
|
||
Sure, you will likely get some new callers, or attract a few old ones
|
||
who haven't called in a while, by advertising your BBS on other BBS in
|
||
the area. But you are preaching to the converted.
|
||
|
||
What we're looking for is fresh blood. We're going hunting. (How
|
||
many different metaphors can I sneak into this article?)
|
||
|
||
Today, I want you to procrastinate. You can put off for another day
|
||
adding yet another door game to the BBS, or tweaking the color in the
|
||
bulletins. Grab your business cards, put on some shades and hit the
|
||
road.
|
||
|
||
Amazingly enough, there are people EVERYWHERE! Everytime you turn
|
||
around, THERE'S ANOTHER ONE! Okay, I'm being facetious here, but the
|
||
point is you are going to have to get out and find new potential
|
||
callers. And springtime is the perfect time to find them.
|
||
|
||
Your Chamber of Commerce probably publishes a monthly calendar of
|
||
FIDONEWS 14-18 Page 7 5 May 1997
|
||
|
||
|
||
events or knows where to find one. Try to get on their mailing list.
|
||
It may not be possible to be placed on the mailing list unless you are
|
||
a member, which is quite expensive. Worst case: you'll have to go
|
||
down to the Chamber offices and get one.
|
||
|
||
Right about now there are little arts and crafts shows popping up all
|
||
over the place. There are civic groups such as the Rotary and
|
||
Exchange Clubs. Kids groups such as the Boy Scouts or school
|
||
carnivals. We're getting set for the summer parade season. Later
|
||
this year, county fairs. If there is some kind of public event going
|
||
on, you have an opportunity to invite new folks to call your BBS.
|
||
Make yourself available.
|
||
|
||
Steve Prado, the Sysop of my friendly neighborhood BBS (Jackalope
|
||
Junction 1:3822/1), has visited with the local Genealogical Society to
|
||
talk about the genealogical echos he carries and how useful they would
|
||
be for people researching their ancestors.
|
||
|
||
In many cases, you can get involved in something at no cost. Civic
|
||
groups are always looking for speakers and could be an easy mark. You
|
||
may have to pop a few bucks for some events, such as a table at a
|
||
county fair or an entry in a parade (now that's something I'd like to
|
||
see: a float for a BBS. Maybe something like those flying creatures
|
||
in the Macy's parade).
|
||
|
||
If you have an annual picnic for users, invite the local media to come
|
||
around.
|
||
|
||
Now suppose you run into someone that doesn't know how to do anything
|
||
other than call their local Internet Service Provider or one of the
|
||
commercial services. Make sure you are well versed enough in Windows
|
||
Terminal to at least tell them how to log on. It probably couldn't
|
||
hurt to create a little fact sheet, or maybe even give them a disk
|
||
that has the appropriate configuration (if you're like me, you've got
|
||
disks to burn). Once they get on, then you can get them set up with
|
||
other comm programs and/or offline readers.
|
||
|
||
No. This is not easy work. But you can't expect users to come
|
||
running when they don't know you even exist.
|
||
|
||
So stop reading right now and head out the do--*
|
||
|
||
Hey! Where'd everybody go!?
|
||
|
||
|
||
Robert Parson
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-18 Page 8 5 May 1997
|
||
|
||
|
||
=================================================================
|
||
GETTING TECHNICAL
|
||
=================================================================
|
||
|
||
|
||
[This is part of the continuing series of FidoNet History publishing
|
||
all of the FTSC Standards and Proposals. These docs have been
|
||
reformatted to 70 columns where required and Node and phone numbers
|
||
may be outdated.] Ed.
|
||
|
||
|
||
Document: FSC-0064
|
||
Version: 007
|
||
Date: 10-May-1992
|
||
|
||
InterDomain Message Identification, Gating,
|
||
Reply Linking and Addressing
|
||
Jamie Penner
|
||
1:153/1025
|
||
|
||
Status of this document:
|
||
|
||
This FSC suggests a proposed protocol for the FidoNet(r)
|
||
community, and requests discussion and suggestions for
|
||
improvements. Distribution of this document is unlimited.
|
||
|
||
Fido and FidoNet are registered marks of Tom Jennings and Fido
|
||
Software.
|
||
|
||
Copyright (C) 1990, 1991, 1992 by Jamie Penner
|
||
All Rights Reserved
|
||
|
||
Originally written: Sept 3, 1990
|
||
Revised: November 12, 1990
|
||
Revised: June 23, 1991
|
||
Revised: August 26, 1991
|
||
Revised: January 22, 1992
|
||
Revised: February 4, 1992
|
||
Revised: February 12, 1992
|
||
|
||
Use of this proposal is encouraged and permitted by the author without
|
||
further notification in any software which is being written to conform
|
||
to FTSC specifications.
|
||
|
||
Suggestions and discussion are strongly encouraged. The author may
|
||
be reached at:
|
||
|
||
jamie.penner@f1025.n153.z1.fidonet
|
||
jamie.penner@f0.n24.z24.signet.admin
|
||
|
||
Echomail Basics:
|
||
|
||
All echomail passing through an interdomain echomail gateway
|
||
must have all information in the message header changed to
|
||
reflect the proper address of the domain in which the messages
|
||
are entering. The PATH and SEEN-BY lines should also reflect
|
||
FIDONEWS 14-18 Page 9 5 May 1997
|
||
|
||
|
||
these changes with only the SEEN-BY line containing any
|
||
information from the domain previous. This information shall
|
||
be the single address of the system passing the mail to the
|
||
gateway system. In addition, all gateway software should
|
||
recognize, by the message itself, whether it has EVER passed
|
||
through the gateway in the past. CRC records, SEEN-BY lines,
|
||
PATH lines and MSGID lines are not sufficient for this purpose
|
||
as most systems purge recorded logs of this info after a given
|
||
time.
|
||
|
||
InterDomain Echomail/Netmail Flags:
|
||
-----------------------------------
|
||
|
||
^ADOMORG:
|
||
usr.nme@[!][p.f.n.z.]network[.nid][[#nodelist_name][#point[x]]
|
||
^ADOMDES:
|
||
usr.nme@[!][p.f.n.z.]network[.nid][[#nodelist_name][#point[x]]
|
||
|
||
These lines would be a complete domain signature for any user
|
||
on any system in any FTN network.
|
||
|
||
The DOMORG line would be the actual origin information of the
|
||
user and system sending the information.
|
||
|
||
The DOMDES line would be the actual destination information of
|
||
the recipient user and system.
|
||
|
||
There are essentially two variations to the domain signature.
|
||
The ! immediately following the @ denotes a Type B, otherwise
|
||
defaulting to Type A.
|
||
|
||
Type A:
|
||
|
||
e.g. jamie.penner@f1025.n153.z1.fidonet
|
||
|
||
This has the complete FTN information needed for any
|
||
processor to send the message.
|
||
|
||
Type B:
|
||
|
||
e.g. jamie.penner@!signet.admin#ic.signet
|
||
|
||
The ! immediately preceeding the network signifies
|
||
that no FTN information is available but the
|
||
information after the # will give the name of the
|
||
system as denoted in the nodelist for that network.
|
||
This way, processors can be designed in a fashion that
|
||
they can look up the system name. Should this be
|
||
going to a point, the domain may be:
|
||
|
||
jamie.penner@!signet.admin#ic.signet#point
|
||
|
||
If I have two points and I want to send it to a
|
||
different point, I might use:
|
||
|
||
jamie.penner@!signet.admin#ic.signet#point2
|
||
FIDONEWS 14-18 Page 10 5 May 1997
|
||
|
||
|
||
The domain identifier in a Type B signature can be
|
||
further used for further locating a system if needed.
|
||
In both signature types, the nid (network identifier)
|
||
is optional (eg fidonet.org or signet.admin - only the
|
||
first field actually identifies the network name).
|
||
This information is completely dependant upon each
|
||
domain. For example I might send this:
|
||
|
||
rob.macare@!signet.eur.r331#maasstad.bbs
|
||
|
||
This kind of structure would get the message to the
|
||
right system. If there was two of the same system in
|
||
Region 331, I could use:
|
||
|
||
rob.macare@!signet.eur.n4601#maasstad.bbs
|
||
|
||
This format of domain signatures is provided solely for
|
||
compatibility purposes to provide software developers with a
|
||
platform on which they can structure new programming
|
||
techniques and can be used in conjunction with the other flags
|
||
as laid out in this document.
|
||
|
||
# GateOrigin: zzz:NNN/nnn.ppp@dmn (note leading space)
|
||
|
||
This line is currently inserted into all stripped down
|
||
echomail passing through interdomain gateways by GateWorks.
|
||
This allows the message overhead to be cut down by properly
|
||
replacing the origin line for users to read in the text yet,
|
||
not creating a second full originline. This line shall be
|
||
added immediately before the tearline with a single blank line
|
||
following it.
|
||
|
||
e.g. # GateOrigin: 24:24/0.0@signet
|
||
|
||
^AGATECHK: zzz.NNN.nnn.ppp [zzz.NNN.nnn.ppp] [zzz.NNN.nnn.ppp]
|
||
Any echomail passing through a particular gateway should have
|
||
this line inserted at the beginning of the message text.
|
||
Everytime the message passes through another echomail gateway,
|
||
the address would be added to the line. This way, if a
|
||
message passes back through with the same ID, it is a known
|
||
duplicate and can be vaporized.
|
||
|
||
e.g. ^AGATECHK: 24.24.0.0 8.8.7001.0
|
||
|
||
^AMSGORG: <originating-address> <originating-ID>
|
||
|
||
The MSGORG line keeps a standard original address and message
|
||
id in the message for reply, identification, dupe checking,
|
||
and origination purpose. This line would vanish and be
|
||
replaced with the necessary lines if passed through a gateway.
|
||
|
||
e.g. ^AMSGORG: 24:24/0.0@signet 0123456789abcdef
|
||
|
||
The originating ID is no different than other 16 bit IDs being
|
||
generated. It must be unique in a sense that no other
|
||
message originating from that system will have the same number
|
||
FIDONEWS 14-18 Page 11 5 May 1997
|
||
|
||
|
||
(at least within a short time span).
|
||
|
||
^AGATEWAY: <zonegate-address>
|
||
|
||
This field is inserted by the packer. The user-defined
|
||
zonegate fields give the message its destination to the
|
||
zonegate and may be routed through whatever channels to get
|
||
there.
|
||
|
||
e.g. ^AGATEWAY: 1:153/1025.0@fidonet.org
|
||
|
||
^GRPLY: <zonegate-address> <originating-address>
|
||
|
||
When replying to a message, this line would be looked up so as
|
||
to find the actual message destination and give the system its
|
||
zonegate information. If the message passes through a
|
||
gateway, the MSGORG line would be removed upon insertion of
|
||
this line.
|
||
|
||
e.g. ^AGRPLY: 1:153/1025@fidonet.org 24:24/0.0@signet
|
||
|
||
An example echomail message from 24:11/7777.0@signet across the domain
|
||
to 1:153/85.0@fidonet should read:
|
||
|
||
To: Bill Herringshaw, 1:153/85.0@fidonet
|
||
From: Jamie Penner, 1:153/1025.0@fidonet
|
||
Subject: Testing
|
||
AREA: TEST_ECHO
|
||
^AGATECHK: 24.24.0.0
|
||
^AGRPLY: 1:153/1025.0@fidonet 24:11/7777.0@signet
|
||
^ADOMORG: jamie.penner@f7777.n11.z24.signet.admin
|
||
^ADOMDES: bill.herringshaw@f85.n153.z1.fidonet.org
|
||
^APID: RA 1.01
|
||
|
||
Hi Bill, just testing out this new software
|
||
|
||
# GateOrigin: 24:11/7777.0@signet
|
||
|
||
--- GateWorks v4.00a
|
||
* Origin: Home of GateWorks!! (1:153/1025.0)
|
||
SEEN-BY: 24/0 153/1025
|
||
^APATH: 153/1025
|
||
|
||
An editor programmed to handle these fields would recognize GRPLY line
|
||
and know that the message had passed through a gateway. An echomail
|
||
reply would simply pass through the gateway. If a netmail reply was
|
||
required, this would be the reply message:
|
||
|
||
To: Jamie Penner, 24:11/7777@signet
|
||
From: Bill Herringshaw, 1:153/85.0@fidonet
|
||
Subject: Testing
|
||
^AGATEWAY: 1:153/1025.0@signet
|
||
^AGRPLY: 24:24/0.0@signet 1:153/85.0@fidonet
|
||
^ADOMORG: bill.herringshaw@f85.n153.z1.fidonet.org
|
||
^ADOMDES: jamie.penner@f7777.n11.z24.signet.admin
|
||
|
||
FIDONEWS 14-18 Page 12 5 May 1997
|
||
|
||
|
||
> Hi Bill, just testing out this new software
|
||
|
||
Got it here!
|
||
|
||
via InterMail @ 24:24/0.0@signet, 17:23:17 22 Jan 92
|
||
|
||
The mailer and/or packer would check for the GATEWAY flag and route
|
||
the message through that gateway.
|
||
|
||
Under this method of flags, all systems in all domains should have
|
||
access to the ability to reply via netmail to a system in a different
|
||
domain. In addition, by following this specification, all
|
||
interdomain echomail should be clean and troublefree. This
|
||
eliminates the need for some of the other ^A lines being used.
|
||
|
||
It is the intention that all addresses in these flags may use the 5d
|
||
addressing scheme, or either of the Type A or B domain signatures.
|
||
The software should be written to determine the type of address used
|
||
and manipulate the situation accordingly.
|
||
|
||
The following list of software may be incomplete but lists all
|
||
software currently available or under development using this spec:
|
||
|
||
GateWorks v4.00
|
||
ContactBBS
|
||
TOSSworks
|
||
FASTmail
|
||
|
||
<EOF>
|
||
|
||
-30-
|
||
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
|
||
Document: FSC-0065
|
||
Version: 001
|
||
Date: 02-Aug-1992
|
||
|
||
Type 3 ASCII: A proposal
|
||
=========================
|
||
|
||
Mark Kimes
|
||
FidoNet 1:380/16
|
||
|
||
Status of this document:
|
||
|
||
This FSC suggests a proposed protocol for the FidoNet(r)
|
||
community, and requests discussion and suggestions for
|
||
improvements. Distribution of this document is unlimited.
|
||
|
||
Fido and FidoNet are registered marks of Tom Jennings and Fido
|
||
Software.
|
||
|
||
FIDONEWS 14-18 Page 13 5 May 1997
|
||
|
||
|
||
Introduction:
|
||
============
|
||
|
||
This document describes a type of mail packet called type 3 ASCII.
|
||
Type 3 ASCII was designed with how Fidonet Technology Networks (FTNs)
|
||
handle mail (netmail, echomail, groupmail) in mind. It was also
|
||
designed to allow new distribution methods to be introduced. For
|
||
instance, it is possible to combine the best of echomail and groupmail
|
||
methods using type 3 ASCII packets. Finally, type 3 ASCII provides
|
||
reliability, space and speed advantages over the current mail packet
|
||
type 2 (see "Type 3 ASCII vs. Type 2" section below).
|
||
|
||
Packet structure:
|
||
================
|
||
|
||
(See "Definitions" section below for the meaning of any arcane
|
||
symbols)
|
||
|
||
Type 3 ASCII packets and archived bundles will ride existing transport
|
||
services (mailers) as attached files. Type 2 mail and type 3 ASCII
|
||
mail can both be sent to a node without conflicts. Naturally, the
|
||
receiving node should be able to process type 3 ASCII mail before it
|
||
is sent.
|
||
|
||
Type 3 ASCII packets are named <fileroot><.><3KT> when sent to a
|
||
remote site. Archives containing type 3 packets are named
|
||
<fileroot><.><3?A> when sent to remote sites. How these files are
|
||
stored or named locally is not within the scope of this document.
|
||
|
||
A type 3 ASCII packet consists of a packet header, followed by a
|
||
carriage return, followed by zero or more messages, followed by a NUL.
|
||
A type 3 ASCII message consists of a message header, followed by a
|
||
carriage return, followed by zero or more characters of message text,
|
||
followed by a NUL.
|
||
|
||
Diagramatically speaking,
|
||
|
||
(Text in brackets [] indicates optional data)
|
||
|
||
Type 3 ASCII packet: header
|
||
<cr>
|
||
[messagehdr1
|
||
<cr>
|
||
[text]
|
||
NUL
|
||
messagehdr2
|
||
<cr>
|
||
[text]
|
||
NUL
|
||
...
|
||
messagehdrn
|
||
<cr>
|
||
[text]
|
||
NUL
|
||
]
|
||
NUL
|
||
FIDONEWS 14-18 Page 14 5 May 1997
|
||
|
||
|
||
Breakdown:
|
||
=========
|
||
|
||
(See "Description of Fields" section below for information on
|
||
individual fields.)
|
||
|
||
Packet header:
|
||
=============
|
||
|
||
<3ASCII><cr>
|
||
From<cr>
|
||
[To]<cr>
|
||
Creator<cr>
|
||
[Password]<cr>
|
||
[Area]<cr>
|
||
[Tag1<sp>data1<cr>]
|
||
[Tag2[<sp>data2]<cr>]
|
||
...
|
||
[Tagn[<sp>datan]<cr>]
|
||
|
||
Message header:
|
||
==============
|
||
|
||
From<cr>
|
||
[To]<cr>
|
||
[Subject]<cr>
|
||
Date<cr>
|
||
[Area]<cr>
|
||
ID<cr>
|
||
[Ref]<cr>
|
||
[Tag1<sp>data1<cr>]
|
||
[Tag2[<sp>data2]<cr>]
|
||
...
|
||
[Tagn[<sp>datan]<cr>]
|
||
|
||
Message body:
|
||
============
|
||
|
||
Free-flowing, NUL-terminated text. May be composed of any
|
||
combination of ASCII characters > 31 (from the space character,
|
||
ASCII character 32, onward) and may include <cr> as a "paragraph
|
||
terminator." Systems which display message text should wrap long
|
||
lines to suit their application.
|
||
|
||
To be in compliance with this document, implementations must be
|
||
able to forward messages with at least 131,072 (128K) characters
|
||
of text (including the terminating NUL). Network politics may
|
||
outlaw messages of lesser size, but that is beyond the scope of
|
||
this document. If a compliant implementation encounters a message
|
||
longer than the 128K limit, it may truncate the message text
|
||
before forwarding. However, since it is easy to support messages
|
||
of a length limited only by available disk space, it is encouraged
|
||
that you do so and not impose artificial restrictions. The
|
||
purpose of this limit is to guarantee a minimum size that will be
|
||
passed, _not_ to restrict implementations to the "minimum."
|
||
|
||
FIDONEWS 14-18 Page 15 5 May 1997
|
||
|
||
|
||
Line feeds (ASCII character 10) are reserved and should not
|
||
normally appear in message text. Future plans call for their use
|
||
as "escape codes." So called "soft carriage returns" (ASCII
|
||
character 141) should not be contained in transmitted message text
|
||
unless the actual character itself is desired.
|
||
|
||
Tabs (ASCII character 9) should not be used in message text as
|
||
their use often leads to unreadable messages. How many spaces
|
||
should be used at a remote site to represent them?
|
||
|
||
Description of Fields:
|
||
=====================
|
||
|
||
Note: the maximum length of any field line (excluding, of course,
|
||
message text) is 255 characters including the terminating
|
||
<cr>. In practice, a bit of restraint should be practiced to
|
||
keep fields as small as possible. The maximum length of any
|
||
header is 32767 bytes, including terminating <cr>. In
|
||
practice, this limit should never be approached.
|
||
|
||
Date:
|
||
====
|
||
|
||
YYYYMMDDhhmmss<optional time zone>
|
||
|
||
where
|
||
YYYY = year with century, as in 1991 or 2001
|
||
MM = month, as in 01 to 12
|
||
DD = day of month, as in 01 or 28
|
||
hh = hour of day, as in 00 to 23
|
||
mm = minute of hour, as in 00 to 59
|
||
ss = second of minute, as in 00 to 59
|
||
<optional time zone> = offset from GMT in 15 min. increments
|
||
(i.e. "+4" (sans quotes) for GMT + one
|
||
hour)
|
||
|
||
All numbers are represented in decimal.
|
||
|
||
Samples: 19990419143200
|
||
(April 19, 1999 at 2:32:00 pm)
|
||
19921223020303+8
|
||
(December 23, 1922 at 02:03:03 GMT + 2 hours)
|
||
|
||
The Date field is required.
|
||
|
||
From and To:
|
||
===========
|
||
|
||
The From field contains the writer's name followed by a valid FTN
|
||
network address. For the purposes of this document and current
|
||
implementations of type 3 ASCII packets, the format of a valid FTN
|
||
network address is:
|
||
|
||
Domain<#>Zone<:>Net</>Node[<.>Point]
|
||
|
||
where
|
||
FIDONEWS 14-18 Page 16 5 May 1997
|
||
|
||
|
||
Domain is a text string from 1 to 8 characters in length
|
||
containing only alphabetical [A-Za-z] and/or numerical [0-9]
|
||
characters.
|
||
|
||
Zone is a decimal number from 1 to 65533.
|
||
|
||
Net is a decimal number from 1 to 65533.
|
||
|
||
Node is a decimal number from 0 to 65533.
|
||
|
||
Point is a decimal number from 0 to 65535 (may be omitted if
|
||
0).
|
||
|
||
The FTSC or whatever body guards tech specs may change this
|
||
definition in the future as it sees fit.
|
||
|
||
The full format of a type 3 ASCII From or To field is:
|
||
|
||
[User Name<@>]Domain<#>Zone<:>Net</>Node[<.>Point]
|
||
|
||
If User Name<@> is missing, assume user name is Sysop. User Name
|
||
may be composed of any combination of ASCII characters > 31 (from
|
||
the space character, ASCII character 32, onward) excluding <@>.
|
||
|
||
If <.>point is missing, assume point 0.
|
||
|
||
The To field contains the recepient's name and address as above.
|
||
The To field is optional. If it is missing, message/packet is
|
||
broadcast mail (no definite, single recipient). In this case
|
||
there must be an area (if the To field is omitted in the packet
|
||
header, there must be an area in the packet header and all
|
||
messages must be broadcast mail for that area. If omitted in the
|
||
message header, the message or the packet must have an area and
|
||
message may be displayed as being addressed to "All@Anywhere"). A
|
||
<cr> must still be present as a "space holder." In broadcast
|
||
mail, it is permissible to give only the name of the user (without
|
||
following address) in a message header; however, the name must end
|
||
with <@> (to distinguish it from an address with no User Name).
|
||
Note this means a single broadcast mail packet can be sent to many
|
||
nodes.
|
||
|
||
The From field is required.
|
||
|
||
In the case of From and To fields in the packet header,
|
||
[user name<@>] is probably unimportant.
|
||
|
||
In the interests of saving space, domains such as "Fidonet.org"
|
||
should be replaced with just "Fidonet," as the ".org" modifier has
|
||
no meaning to an FTN site. Domains should be treated case
|
||
insensitively.
|
||
|
||
Sample: John Doe@Fidonet#1:380/16
|
||
(User "John Doe" in domain "Fidonet" zone 1 net 380
|
||
node 16, implied point 0)
|
||
|
||
Creator:
|
||
FIDONEWS 14-18 Page 17 5 May 1997
|
||
|
||
|
||
=======
|
||
|
||
Name of the product that produced the packet. This field is
|
||
required.
|
||
|
||
Password:
|
||
========
|
||
|
||
A password to use for security. This field is optional. If
|
||
omitted, a <cr> must still be present as a "space holder." How
|
||
this field is used is implementation-defined.
|
||
|
||
Subject:
|
||
=======
|
||
|
||
The subject field should contain text hinting at the subject of
|
||
the message text. It may be composed of any combination of ASCII
|
||
characters > 31 (from the space character, ASCII character 32,
|
||
onward). The subject field is optional. If omitted, a <cr> must
|
||
still be present as a "space holder."
|
||
|
||
Area:
|
||
====
|
||
|
||
Area fields consist of a string of alphanumeric characters plus
|
||
space, "-" and "_" (ASCII characters 32, 45 and 95 respectively).
|
||
Area fields are optional with the following consequences:
|
||
|
||
If the area field in a packet header is missing, the messages in
|
||
the packet will have area fields present for broadcast mail,
|
||
omitted for personal mail.
|
||
|
||
If the area field in a packet header is present, all the
|
||
messages in the packet will be broadcast mail for the area
|
||
specified in the packet header. The message area fields will
|
||
not be present.
|
||
|
||
When an area field is omitted, a <cr> must still be present as a
|
||
"space holder."
|
||
|
||
ID:
|
||
==
|
||
|
||
An ID consists of the originating address of the message plus a
|
||
serial number, in the form:
|
||
|
||
origaddr<sp>serialno
|
||
|
||
The originating address should be specified in a form that
|
||
constitutes a valid return address for the originating network.
|
||
If the originating address is enclosed in double-quotes, the
|
||
entire string between the beginning and ending double-quotes is
|
||
considered to be the orginating address. A double-quote
|
||
character within a quoted address is represented by by two
|
||
consecutive double-quote characters. The serial number may be
|
||
any eight character hexadecimal number, as long as it is unique
|
||
FIDONEWS 14-18 Page 18 5 May 1997
|
||
|
||
|
||
- no two messages from a given system may have the same serial
|
||
number within one year. The manner in which this serial number
|
||
is generated is left to the implementor.
|
||
|
||
Notes: The "old" format of
|
||
Zone<:>Net</>Node[<.>Point][<@>Domain]
|
||
for FTN addresses is allowed in this field.
|
||
|
||
The address portion of the ID may be omitted if it is
|
||
exactly the same as the From address (less User
|
||
Name<@>). In this case, the ID field should begin with
|
||
a space followed immediately by the serial number.
|
||
|
||
In the case of foreign network addresses, this address
|
||
gives you the "true" origin, and the From address gives
|
||
you the gateway at which the message entered FTN
|
||
territory. This allows you to gate replies to
|
||
"foreign" sites.
|
||
|
||
|
||
Samples: some.other.net.addr ABCDEF12
|
||
12345ABC
|
||
|
||
(Assume From field of second sample contained
|
||
"Joe Blow@Fidonet#1:380/16",so complete constructed ID would
|
||
be Fidonet#1:380/16 12345ABC
|
||
Note address would be copied exactly from the From field.)
|
||
|
||
The ID field is required.
|
||
|
||
Ref:
|
||
===
|
||
|
||
A Ref consists of the ID of the original message to which this
|
||
message refers (usually as a reply).
|
||
|
||
Sample: Fidonet#1:380/16 12345ABC
|
||
(would reference the second ID sample above)
|
||
|
||
The reference field is optional. If omitted, a <cr> must still be
|
||
present as a "place holder."
|
||
|
||
Tag<sp>Data:
|
||
===========
|
||
|
||
The tag+data lines are type 3 ASCII's method of automatically
|
||
expanding its headers. A tag consists of a sequence of uppercase
|
||
alphabetic (A-Z inclusive) and/or numeric sequence of characters
|
||
and possibly a hyphen (ASCII character 45) and/or underline (ASCII
|
||
character 95), up to 12 characters in length (a name). A tag name
|
||
can be followed optionally by a space (ASCII character 32) and
|
||
data. Data may be composed of any combination of ASCII characters
|
||
> 31 (from the space character, ASCII character 32, onward).
|
||
|
||
To aid in developer experimentation with tags in type 3 ASCII, it
|
||
is guaranteed that the FTSC or whatever body guards tech specs
|
||
FIDONEWS 14-18 Page 19 5 May 1997
|
||
|
||
|
||
will never "canonize" a tag beginning with the two characters "X-"
|
||
(ASCII character 88 followed immediately by ASCII character 45).
|
||
Thus, tags may use this combination before tag names to guarantee
|
||
uniqueness.
|
||
|
||
Experimental tags may be stripped by conforming implementations
|
||
during message passthrough. This helps prevent experimental tags
|
||
from escaping from test sites.
|
||
|
||
Samples (tag names are invented):
|
||
|
||
FOLLOW AFILEN.AME
|
||
X-TAG SOMEDATA
|
||
LONETAG
|
||
|
||
Tag<sp>data fields are optional and may be completely omitted when
|
||
creating a packet. Exception: all tag<sp>data fields except,
|
||
possibly, experimental fields, should be passed through with a
|
||
message being forwarded.
|
||
|
||
Predefined tags:
|
||
===============
|
||
|
||
Tag Where Data Meaning
|
||
--- ----- ---- -------
|
||
PRIV Msg Hdr None Message is private
|
||
FOROK Pkt Hdr None Packet may be forwarded
|
||
without unpacking -- all
|
||
messages are
|
||
to the To: address in the
|
||
packet header
|
||
|
||
Type 3 ASCII vs. Type 2:
|
||
=======================
|
||
|
||
Type 3 ASCII saves between 6% to 11% in raw packet size over type 2
|
||
(using Tiny Seenbys with the type 2 packets to make the test as fair
|
||
as possible), depending on how area tags for echos are used in the
|
||
type 3 ASCII packet (in packet header vs. message headers). 7%
|
||
smaller would be the norm for the way we do echomail business now.
|
||
The tests conducted were most unscientific but should be close to
|
||
everyday echomail-oriented reality.
|
||
|
||
Compressed packets are a slightly different story. Type 3 ASCII
|
||
compresses the same as type 2 when using area tags for echos in the
|
||
message headers. Type 2 compresses approximately 2.5% better when
|
||
area tags are used in the type 3 ASCII packet headers instead. Either
|
||
way, compressed type 3 ASCII packets are smaller than comparable type
|
||
2 packets due to the smaller raw packet size. Even compression ratios
|
||
would be the norm for the way we do echomail business now.
|
||
|
||
Type 3 ASCII imports between 2% to 5% faster (depending on algorithms
|
||
used). There is no discernable difference on export. Keep in mind
|
||
that this particular test has too many variables (software, hardware,
|
||
relative efficiency of code, etc.) to be considered a real benchmark.
|
||
Most of the speed savings is in not having to process SEEN-BY and PATH
|
||
FIDONEWS 14-18 Page 20 5 May 1997
|
||
|
||
|
||
lines. The lack of end-of-text control information is a real boon.
|
||
|
||
Type 2 has no method for reliably obtaining the full 5-D origin
|
||
address of a message. Type 3 ASCII provides a reliable method of
|
||
obtaining full origin address information for both the true origin (in
|
||
whatever network) and the gateway which brought the message into FTN
|
||
territory (if from a foreign network). This means that even if a
|
||
message originated in a network with which your software has no idea
|
||
how to communicate, you can still send a reply to an FTN node for
|
||
gating.
|
||
|
||
Type 2 has no reliable method for stopping dupes. Type 3 ASCII has a
|
||
mandatory ID field, very similar to type 2's optional MSGID, which can
|
||
be used for reliable dupe checking.
|
||
|
||
Type 2 echomail has control information scattered throughout the
|
||
message body, including SEEN-BY and PATH information at the end of the
|
||
message. This causes problems for developers, who often opt for
|
||
fixed-length buffers and arbitrary message length limits. All control
|
||
information for Type 3 ASCII is in the extensible message header.
|
||
Moreover, type 3 ASCII has generous set limits to which programmers
|
||
can work, and which users can therefore rely on.
|
||
|
||
Definitions:
|
||
===========
|
||
|
||
Except where noted otherwise, numbers are in decimal.
|
||
|
||
Although the ASCII character set is normally defined as being
|
||
limited to characters from 0 to 127, this document acknowledges the
|
||
existence of an eighth bit in most bytes and uses the term (loosely)
|
||
to mean characters from 0-255. Network politics may or may not
|
||
"outlaw" the use of some of those bytes; that is outside the scope
|
||
of this document.
|
||
|
||
Note: text in brackets [] indicates an optional field. See
|
||
"Definitions" section below for meaning of text in <>. See
|
||
"Description of Fields" section below for information on
|
||
individual fields.
|
||
|
||
Alphabetic:
|
||
==========
|
||
|
||
A-Z and a-z, ASCII characters 65 to 90 and 97 to 122 inclusive.
|
||
|
||
Numeric:
|
||
=======
|
||
|
||
0-9, ASCII characters 48 to 57 inclusive.
|
||
|
||
Alphanumeric:
|
||
============
|
||
|
||
All characters alphabetic and numeric.
|
||
|
||
Hexadecimal:
|
||
FIDONEWS 14-18 Page 21 5 May 1997
|
||
|
||
|
||
===========
|
||
|
||
0-9 and A-F (or a-f), ASCII characters 48 to 57 and 65 to 70 (or 97
|
||
to 102) inclusive.
|
||
|
||
NUL:
|
||
===
|
||
|
||
ASCII character 0.
|
||
|
||
<cr>:
|
||
====
|
||
|
||
Carriage return, ASCII character 13.
|
||
|
||
<lf>:
|
||
====
|
||
|
||
Line feed, ASCII character 10.
|
||
|
||
<sp>:
|
||
====
|
||
|
||
Space, ASCII character 32.
|
||
|
||
<@>:
|
||
===
|
||
|
||
@, ASCII character 64.
|
||
|
||
<#>:
|
||
===
|
||
|
||
#, ASCII character 35.
|
||
|
||
<:>:
|
||
===
|
||
|
||
:, ASCII character 58.
|
||
|
||
</>:
|
||
===
|
||
|
||
/, ASCII character 47.
|
||
|
||
<.>:
|
||
===
|
||
|
||
., ASCII character 46.
|
||
|
||
<3ASCII>:
|
||
========
|
||
|
||
The literal string "3ASCII" (not including quotation marks). This
|
||
text, followed by a <cr>, identifies a type 3 ASCII packet.
|
||
Implementations should *not* processes a file unless this
|
||
FIDONEWS 14-18 Page 22 5 May 1997
|
||
|
||
|
||
identifier is found on the first line, but should probably log the
|
||
occurrence.
|
||
|
||
<fileroot>:
|
||
==========
|
||
|
||
Eight alphanumeric characters that serve as the "root" of a
|
||
filename.
|
||
|
||
<3KT>:
|
||
=====
|
||
|
||
The literal string "3KT" (not including quotation marks).
|
||
|
||
<3?A>:
|
||
=====
|
||
|
||
The literal string "3?A" (not including quotation marks) with the
|
||
question mark (?) being replaced by a decimal integer from 0 to
|
||
9 (ASCII 48 to 57 inclusive).
|
||
|
||
Miscellaneous notes:
|
||
===================
|
||
|
||
jim nutt invented MSGIDs and REPLYids (ref. FTS-0009), which were
|
||
lifted very nearly whole to become IDs and Refs in this document. Tom
|
||
Jennings invented Fido and Fidonet <tm and stuff> from whole cloth and
|
||
RAM chips. NET_DEV's continual foolishness inspired me to do instead
|
||
of whine. Let's see if this cuts down on the whining...
|
||
|
||
-end-
|
||
|
||
Mark Kimes
|
||
1:380/16.0@Fidonet
|
||
(318)222-3455 data
|
||
542 Merrick
|
||
Shreveport, LA, USA 71104
|
||
|
||
-30-
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
|
||
Document: FSC-0066
|
||
Version: 001
|
||
Date: 02-Aug-1992
|
||
|
||
Type 3 Binary: A proposal
|
||
==========================
|
||
|
||
Mark Kimes
|
||
FidoNet 1:380/16
|
||
|
||
Status of this document:
|
||
|
||
This FSC suggests a proposed protocol for the FidoNet(r)
|
||
FIDONEWS 14-18 Page 23 5 May 1997
|
||
|
||
|
||
community, and requests discussion and suggestions for
|
||
improvements. Distribution of this document is unlimited.
|
||
|
||
Fido and FidoNet are registered marks of Tom Jennings and Fido
|
||
Software.
|
||
|
||
Preliminary specifications for type 3 binary mail format:
|
||
========================================================
|
||
|
||
Type 3 binary is a new form of mail for Fidonet Technology Networks
|
||
(FTN).
|
||
|
||
The basic unit of type 3 binary mail is a chunk. A chunk looks like
|
||
this:
|
||
|
||
+-------------------------------------+
|
||
| 2-byte integer length (type + data) | (A 2-byte integer is
|
||
+-------------------------------------+ a signed integer in
|
||
| 2-byte integer type | Intel format, giving
|
||
+-------------------------------------+ a length range of
|
||
| length - 2 of data | 2-32767 (0 is unused))
|
||
+-------------------------------------+
|
||
|
||
Predefined chunk types:
|
||
======================
|
||
Mnemonic VAL Where Data format
|
||
-------- --- ----- -----------
|
||
|
||
*EOP 0 PKT None
|
||
*FROM 1 BOTH FTN address in packet, name + FTN address in msg
|
||
TO 2 BOTH [FTN address in packet,] name + [FTN address] in
|
||
msg
|
||
SUBJECT 3 MSG Text
|
||
*ID 4 MSG 4-byte long integer
|
||
REF 5 MSG 4-byte long integer followed by FTN address
|
||
*DATE 6 MSG Packed date
|
||
ATTRIB 7 BOTH 2-byte integer (bit field)
|
||
PASSWORD 8 PKT Text
|
||
*PRODUCT 9 PKT Text
|
||
AREA 10 BOTH Text
|
||
*MSG 11 MSG 4-byte long integer (length of total msg)
|
||
TEXT 12 MSG Text
|
||
ORIG 13 BOTH origin address in native network's format
|
||
|
||
Notes:
|
||
-----
|
||
|
||
* = required field
|
||
Addresses are always in text.
|
||
An FTN address is in the form: domain<#>zone<:>net</>node<.>point
|
||
Name + address form is: user
|
||
name<@>domain<#>zone<:>net</>node<.>point Address in TO field may be
|
||
omitted for broadcast mail.
|
||
Defined attributes: 1 = PRIVATE in messages, Forward ok in pkt
|
||
header Packed date:
|
||
+---------------------------------------------------------+
|
||
FIDONEWS 14-18 Page 24 5 May 1997
|
||
|
||
|
||
| unsigned int year |
|
||
+---------------------------------------------------------+
|
||
| unsigned byte month (1-12) |
|
||
+---------------------------------------------------------+
|
||
| unsigned byte day-of-month |
|
||
+---------------------------------------------------------+
|
||
| unsigned byte hour |
|
||
+---------------------------------------------------------+
|
||
| unsigned byte minute |
|
||
+---------------------------------------------------------+
|
||
| unsigned byte second |
|
||
+---------------------------------------------------------+
|
||
| signed int gmt offset (15 min increments, -32767 = n/a) |
|
||
+---------------------------------------------------------+
|
||
|
||
|
||
A type 3 binary packet always begins with a single byte containing the
|
||
binary number 3. This is followed by the first chunk. A packet
|
||
"header" is composed of all chunks until the first MSG chunk is
|
||
encountered. A header should contain at least a FROM chunk, either a
|
||
TO chunk or an AREA chunk, and a PRODUCT chunk. PASSWORD, ORIG and
|
||
ATTRIB chunks might also be used.
|
||
|
||
The rest of the "specs" can be gleaned or clarified from the (working)
|
||
code included in the 3bcsrc.lzh archive. Personally, I don't think
|
||
this type of packet is much suited to FTN mail; too much of what we do
|
||
is text oriented. But here it is, to possibly get your tails moving
|
||
(or convince you that type 2 or type 3 ASCII is more what we need).
|
||
The main reasons for the 3binary archive are to show you I've done my
|
||
homework, to give working examples of the "other type" of type 3 mail
|
||
some folks advocate, and for comparison to type 3 ASCII and type 2.
|
||
|
||
Mark Kimes
|
||
fidonet#1:380/16.0
|
||
(318)222-3455 data USA
|
||
|
||
-30-
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
|
||
Document: FSC-0067
|
||
Version: 001
|
||
Date: 02-Aug-1992
|
||
|
||
A Proposal For Sensible New Kludge Lines
|
||
========================================
|
||
|
||
Mark Kimes
|
||
FidoNet 1:380/16
|
||
|
||
Status of this document:
|
||
|
||
This FSC suggests a proposed protocol for the FidoNet(r)
|
||
community, and requests discussion and suggestions for
|
||
FIDONEWS 14-18 Page 25 5 May 1997
|
||
|
||
|
||
improvements. Distribution of this document is unlimited.
|
||
|
||
Fido and FidoNet are registered marks of Tom Jennings and Fido
|
||
Software.
|
||
|
||
MSGTO: This kludge line, together with a MSGID: kludge (see FTS-
|
||
0009), would provide full address specs for both the
|
||
originating and destination nodes of a netmail message (MSGTO
|
||
should _not_ be used in echo mail). Its format is simple:
|
||
^aMSGTO: <FTN address>
|
||
MSGTO (coupled with MSGID) would eliminate the need for the
|
||
INTL, FMPT, TOPT and DOMAIN kludges. A MSGTO kludge line
|
||
should go just below any MSGID and REPLY kludge lines. See
|
||
also discussion on FTN address representation below.
|
||
|
||
ASSOC: ASSOC introduces a filename that should follow the message (is
|
||
associated with the message). Format is, again, simple:
|
||
^aASSOC: <filename>
|
||
A message tosser would forward the file along with the
|
||
message, if so configured for the AREA: of the message
|
||
(assuming echomail) or other criteria. Paths would probably
|
||
not be useful in the <filename> field and should not normally
|
||
be included or used if found to be present. ASSOC kludge
|
||
lines should go below any addressing kludge lines.
|
||
|
||
SPTH: Clint Adams described this as a "5D, sensible order, top-of-
|
||
the-message path" line. I like that. Stands for "Sticky
|
||
PaTH." SPTH displaces the current PATH line. Instead of
|
||
being located at the bottom of the message, it's located at
|
||
the top of the message. Instead of being 2-D (net/node), it's
|
||
5-D (domain#zone:net/node.point). It's sticky like a normal
|
||
PATH line so that the size doesn't get outrageous. Because
|
||
it's 5-D instead of 2-D it can be used for dupe checking
|
||
(which a normal 2-D PATH line cannot; is 1/1 Fidonet#1:1/1 or
|
||
Dufusnet#2:1/1?). Because it's 5-D we would no longer have to
|
||
go through hideous gyrations when gating echo mail from one
|
||
domain to another; just let it flow. Using SPTH it becomes
|
||
trivial to cut SEEN-BYs down to Tiny Seenbys (only required
|
||
for backward compatibility with old mail processors that barf
|
||
without some SEEN-BYs, and to protect fully enclosed polygon
|
||
topology).
|
||
|
||
SPTH is to be used only in echo mail. It's format is
|
||
basically:
|
||
|
||
^aSPTH: <address> <address> ... <address>
|
||
|
||
SPTH lines, like PATH lines, contain only addresses of mail
|
||
processors that actually processed the message. SPTH lines
|
||
are specifically not sorted and are "sticky" so that they
|
||
carry the least amount of information that will convey a full
|
||
address when coupled with preceding addresses. For example,
|
||
if 1:380/16.0@Fidonet, 1:380/16.1@Fidonet,
|
||
1:380/100.0@Fidonet, 1:396/100.0@Fidonet, 2:4177/1.0@Fidonet
|
||
and 2:4177/1.0@Othernet processed a message, in that order,
|
||
you'd have:
|
||
FIDONEWS 14-18 Page 26 5 May 1997
|
||
|
||
|
||
^aSPTH: Fidonet#1:380/16 .1 100 :396 #2:4177/1 Othernet
|
||
|
||
Note that point 0 is assumed if missing and that punctuation
|
||
*precedes* an address element except in the case of a domain
|
||
change (and when the net element is the first change -- this
|
||
dictates that domain names begin with an alphabetical
|
||
character). This compacts SPTH entries as much as possible
|
||
for most typical topologies.
|
||
|
||
When an SPTH-aware processor forwards a message containing (a)
|
||
PATH line(s) but no SPTH line(s), it should create a new SPTH
|
||
line (or lines as required; SPTH lines shouldn't get longer
|
||
than 80 characters, including terminating carriage return)
|
||
containing "fleshed-out" addresses from the PATH line(s), then
|
||
add itself. If this is done at all zone/domain gates, the
|
||
SPTH will always be current even if intermediate nodes are not
|
||
SPTH-aware. In the event an SPTH-aware processor receives a
|
||
message containing both SPTH line(s) and PATH line(s), it
|
||
should concatenate the "fleshed-out" addresses from the PATH
|
||
line(s) to the SPTH line(s), then add itself. The PATH
|
||
line(s) may then be discarded from the message. When
|
||
exporting new messages, only a SPTH line should be created; no
|
||
PATH line should be generated. Tiny Seenbys should be added
|
||
at the end of the message for the reasons noted above.
|
||
|
||
Note that all the kludge lines above are in actual use and have been
|
||
for some time; they do work, and work as presented. Code is available
|
||
on request, but implementation is trivial (only SPTH takes any real
|
||
work at all).
|
||
|
||
FTN address representation:
|
||
==========================
|
||
|
||
The current convention for representing an FTN address has become:
|
||
|
||
zone:net/node[.point]@domain
|
||
|
||
I propose we change this to:
|
||
|
||
domain#zone:net/node[.point]
|
||
|
||
Why? It's all in one order, highest to lowest; it's consistent. "@"
|
||
is used, in the former method, in a way rather opposed to normal usage
|
||
in network addressing.
|
||
|
||
While we're on the subject of domains, let's knock off using
|
||
"fidonet.org" in FTN addresses. That only means something in
|
||
Internet. It's going to gum up the works for FTN domains, where we'll
|
||
want things like "fidonet.eu" to mean Fidonet Europe some day.
|
||
|
||
I'm done now.
|
||
|
||
Mark Kimes
|
||
Fidonet#1:380/16
|
||
(318)222-3455 data
|
||
|
||
FIDONEWS 14-18 Page 27 5 May 1997
|
||
|
||
|
||
-30-
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-18 Page 28 5 May 1997
|
||
|
||
|
||
=================================================================
|
||
WE GET EMAIL
|
||
=================================================================
|
||
|
||
|
||
From: "Mike Riddle" <mriddle@monarch.papillion.ne.us>
|
||
To: "Baker, Christopher" <cbaker84@digital.net (Christopher Baker)
|
||
Date: Sat, 03 May 97 11:50:28 -0600
|
||
Reply-To: "Mike Riddle" <mriddle@monarch.papillion.ne.us>
|
||
Subject: Fwd: Norton/Microsoft Security Breach (Long)
|
||
|
||
==================BEGIN FORWARDED MESSAGE==================
|
||
>Sender: rkodner@popd.ix.netcom.com
|
||
>X-Mailer: Windows Eudora Pro Version 3.0.1 (32)
|
||
>Date: Sat, 03 May 1997 11:29:30 -0500
|
||
>To: network2d-l@austin.onu.edu, solosez@abanet.org,
|
||
>lawtech@abanet.org >From: Ross Kodner <rkodner@ix.netcom.com>
|
||
>Subject: Norton/Microsoft Security Breach (Long)
|
||
>Sender: owner-solosez@mail.abanet.org
|
||
|
||
Holy Moley! The latest chapter in the Internet Explorer Security Hole
|
||
of the Day saga from www.winsources.com:
|
||
|
||
Norton Utilities, Internet Explorer Combo Puts Systems in Harm's Way
|
||
(by Jesse Berst)
|
||
|
||
Combination of NU 2.0 for Windows 95 and Internet Explorer 3.x
|
||
highlights security weaknesses in ActiveX controls
|
||
|
||
Your worst fears have come true. McAfee Associates has discovered, and
|
||
Windows Sources has confirmed, a flaw in the underlying architecture
|
||
of Internet Explorer and Windows 95 that renders users of the Web
|
||
vulnerable to a range of catastrophes. These disasters range from an
|
||
involuntary reformatting of your hard drive to breach of information
|
||
once thought to be secure.
|
||
|
||
Users running the combination of Windows 95, Internet Explorer 3.x,
|
||
and Symantec's Norton Utilities 2.0 for Windows 95, one of the most
|
||
popular and widely used software utility products for Windows 95, are
|
||
currently known to be at risk. (In the spirit of disclosure, users
|
||
should be aware that McAfee Associates and Symantec Corp. are
|
||
competitors in the utilities and anti-virus software market.)
|
||
|
||
Neither Verisign's Authenticode (which is built-in to Internet
|
||
Explorer) or recent IE security patches posted on Microsoft's Web site
|
||
offer any protection. According to Reston, VA-based research firm PC
|
||
Data, 143,559 licenses have been issued for Norton Utilities, and
|
||
125,825 users have Internet Explorer. The number of users who have
|
||
actually deployed both at the same time is unknown.
|
||
|
||
The problem lies in TUNEOCX.OCX, a core component of Norton Utilities'
|
||
System Genie. When installed, this OCX is marked as scriptable, which
|
||
allows ActiveX-aware Web page scripts to make use of this ActiveX
|
||
control. This control supports a "run" option that allows the script
|
||
to execute any local application, such as the FORMAT or FTP (net-based
|
||
file transfer) commands.
|
||
FIDONEWS 14-18 Page 29 5 May 1997
|
||
|
||
|
||
Windows Sources analysis of Norton Utilities found that this component
|
||
essentially granted unauthorized access to any system resource that is
|
||
normally accessible from the desktop itself. As a result, any
|
||
programmer with access to one of Microsoft's scripting tools
|
||
(VBScript, MS C++, Visual C++, Visual J++, etc.) can leverage this
|
||
control to perform any task on the target system -- unbeknownst to the
|
||
system's user.
|
||
|
||
For example, a Web page hacker could build a page that, when viewed by
|
||
Internet Explorer, runs a few lines of VBScript code that wipes out a
|
||
hard drive, installs a Trojan horse, or invokes file transfer and
|
||
directory utilities to retrieve confidential information. Worse yet,
|
||
all these tasks could be performed in the background without the user
|
||
ever knowing what's happening to their system.
|
||
|
||
Verisign's Authenticode, billed by Microsoft as a protection mechanism
|
||
built into Internet Explorer that allows users to intervene before
|
||
potentially dangerous code is downloaded, is ineffective against this
|
||
sort of invasion. That's because Authenticode watches for software
|
||
that's about to be downloaded, but not VBScripts that activate
|
||
software components that are already installed on the system (e.g.:
|
||
TUNEOCX.OCX).
|
||
|
||
Although the aforementioned combination of software is currently the
|
||
only known group at risk, there could be other combinations of
|
||
application and ActiveX-based browsers that are equally vulnerable.
|
||
|
||
The smoking gun in this example is Norton Utilities 2.0, but NU simply
|
||
exposes an important and oft-debated feature/weakness in Microsoft's
|
||
ActiveX architecture. Other products that are already deployed en
|
||
masse could be "offering" the same service to those with malicious
|
||
intent.
|
||
|
||
In tests, Windows Sources found the same combination running on
|
||
Windows NT (including the NT-based version of NU) to be safe.
|
||
HealthyPC, another PC tune-up utility from Symantec also tested safe
|
||
at Windows Sources.
|
||
|
||
SYMANTEC, MICROSOFT RESPOND
|
||
|
||
According to Symantec Sr. Product Manager Tom Andrus, "It is a
|
||
problem. We know how serious it is. But we think that it is very
|
||
uncommon. To our knowledge, there are no Norton Utilities users in the
|
||
world that have run into this."
|
||
|
||
To Symantec's credit, Norton Utilities 2.0 includes a feature called
|
||
Live Update that automatically updates a user's system with new
|
||
drivers and software, when that system is connected to the Internet.
|
||
"We've worked out a fix and it's in the hands of our quality assurance
|
||
group right now," said Andrus. "By this afternoon, a fix will be up
|
||
on-line so that any PC that connects to the Internet while running
|
||
Live Update will be automatically fixed so as not to allow this
|
||
again." For more information, users can go to www.symantec.com.
|
||
|
||
Microsoft sought to put this situation in a more positive light,
|
||
highlighting the ability to quickly fix the problem rather than the
|
||
FIDONEWS 14-18 Page 30 5 May 1997
|
||
|
||
|
||
problem itself.
|
||
|
||
"The fact that [Symantec] could fix it so quickly is a major testament
|
||
to the flexibility of the ActiveX architecture," said Microsoft
|
||
Program Marketing Manager Cornelius Willis. "Yes, this is a threat but
|
||
there are so many threats. Vendors can mark off-the-shelf software
|
||
safe-to-script or not-safe-to-script. For example, Microsoft Excel is
|
||
marked not-safe-to-script because it has access to system resources.
|
||
Therefore Excel is invulnerable to such attack. VBScript and
|
||
JavaScript will only instantiate controls that are marked safe-to-
|
||
script and this was one of them."
|
||
|
||
"Plug-ins (a la Netscape's Navigator) have no digital certificates or
|
||
safe-to-script toggles and we feel that ActiveX is the only
|
||
architecture that offers any kind of accountability for downloaded
|
||
software," added Willis.
|
||
|
||
But, in Windows Sources tests of the Norton Utilities example, ActiveX
|
||
offered no opportunity to engage this accountability since it involved
|
||
a script acting against an already installed component (from shrink-
|
||
wrapped software) rather than the downloading of software.
|
||
|
||
SOLVING THE PROBLEM
|
||
|
||
There are preventative measures users can take to protect themselves.
|
||
Following one of these five steps will help protect your system from
|
||
the effects of the toxic software combination:
|
||
|
||
1) Download the patch from Symantec
|
||
2) Uninstall Norton Utilities
|
||
3) Disable support for ActiveX-scripting in Internet Explorer
|
||
4) Switch to a non-ActiveX-based browser such as
|
||
Netscape's Navigator,
|
||
5) Stay off the Net.
|
||
|
||
Be warned also that, going forward, addressing the problem through
|
||
Norton Utilities is not a complete fix. Downloading a patch or
|
||
uninstalling NU will not protect a system if other equally vulnerable
|
||
software is already installed. Additionally, disabling ActiveX
|
||
scripting or switching to a non-ActiveX browser may disable other web-
|
||
and ActiveX-based applications. Manually disabling Norton Utilities
|
||
without uninstalling it is unlikely to safeguard the system and
|
||
therefore is not recommended.
|
||
|
||
Corporate sites that use Windows 95's centralized policy management
|
||
features may also disable the ability to run Internet Explorer
|
||
throughout their local area networks. Unfortunately, the same policy
|
||
management feature doesn't provide centralized management of Internet
|
||
Explorer's run options, making it impossible to reach across corporate
|
||
nets and just disable support for ActiveX scripting.
|
||
|
||
Finally, for those who are really paranoid, switching to Windows NT
|
||
might be one last measure of assurance. Under Windows NT, software
|
||
cannot be executed without a security token that authenticates the
|
||
code's privileges to the system's resources. Such code usually
|
||
inherits the rights of the user sitting at the machine, thus limiting
|
||
FIDONEWS 14-18 Page 31 5 May 1997
|
||
|
||
|
||
intruding code to only the resources the user has rights to access.
|
||
Provided that the user doesn't have administrator-level rights, the
|
||
malicious code's impact could be far less catastrophic.
|
||
|
||
For further discussion on this important issue, ask questions and
|
||
express your opinions in the ActiveX Expert Answers Forum."
|
||
|
||
Ross
|
||
______________________________________________________
|
||
|
||
Ross L. Kodner, Esq. Voice: 414-476-8433
|
||
MicroLaw, Inc. FAX: 414-476-8461
|
||
825 S. 60th St. E-Mail: rkodner@ix.netcom.com
|
||
Milwaukee, WI 53214
|
||
|
||
Web1: http://www.microlaw.com
|
||
Web2: http://www.wisbar.org/legalres/rosslegal.html
|
||
Web3: http://www.microlaw.com/kodner/index.htm
|
||
|
||
ABA LPM "Network 2d" Ass't Editor Always Seeking Great Articles!
|
||
______________________________________________________
|
||
|
||
|
||
===================END FORWARDED MESSAGE===================
|
||
|
||
-30-
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-18 Page 32 5 May 1997
|
||
|
||
|
||
=================================================================
|
||
NET HUMOR
|
||
=================================================================
|
||
|
||
|
||
From: "Mike Riddle" <mriddle@monarch.papillion.ne.us>
|
||
To: "Baker, Christopher" <cbaker84@digital.net (Christopher Baker)
|
||
Date: Thu, 24 Apr 97 11:31:50 -0600
|
||
Reply-To: "Mike Riddle" <mriddle@monarch.papillion.ne.us>
|
||
Subject: Fwd: The Microsoft Restaurant
|
||
|
||
==================BEGIN FORWARDED MESSAGE==================
|
||
|
||
"If restaurants functioned like Microsoft:
|
||
|
||
Patron: Waiter!
|
||
|
||
Waiter: Hi, my name is Bill and I'll be your Support Waiter. What
|
||
seems to be the problem?
|
||
|
||
Patron: There's a fly in my soup!
|
||
|
||
Waiter: Try again, maybe the fly won't be there this time.
|
||
|
||
Patron: No, it's still there.
|
||
|
||
Waiter: Maybe it's the way you're using the soup; try eating it
|
||
with a fork instead.
|
||
|
||
Patron: Even when I use the fork, the fly is still there.
|
||
|
||
Waiter: Maybe the soup is incompatible with the bowl; what kind
|
||
of bowl are you using?
|
||
|
||
Patron: A SOUP bowl!
|
||
|
||
Waiter: Hmmm, that should work. Maybe it's a configuration
|
||
problem; how was the bowl set up?
|
||
|
||
Patron: You brought it to me on a saucer; what has that to do with
|
||
the fly in my soup?
|
||
|
||
Waiter: Can you remember everything you did before you noticed
|
||
the fly in your soup?
|
||
|
||
Patron: I sat down and ordered the Soup of the Day!
|
||
|
||
Waiter: Have you considered upgrading to the latest Soup of the Day?
|
||
|
||
Patron: You have more than one Soup of the Day each day?
|
||
|
||
Waiter: Yes, the Soup of the Day is changed every hour.
|
||
|
||
Patron: Well, what is the Soup of the Day now?
|
||
|
||
Waiter: The current Soup of the Day is tomato.
|
||
FIDONEWS 14-18 Page 33 5 May 1997
|
||
|
||
|
||
Patron: Fine. Bring me the tomato soup and the check. I'm running
|
||
late now.
|
||
|
||
[Waiter leaves and returns with another bowl of soup and the check.]
|
||
|
||
Waiter: Here you are, Sir. The soup and your check.
|
||
|
||
Patron: This is potato soup.
|
||
|
||
Waiter: Yes, the tomato soup wasn't ready yet.
|
||
|
||
Patron: Well, I'm so hungry now, I'll eat anything.
|
||
|
||
[Waiter leaves.]
|
||
|
||
Patron: Waiter! There's a gnat in my soup!
|
||
|
||
----------
|
||
The check:
|
||
|
||
Soup of the Day . . . . . . . . . . . $ 5.00
|
||
|
||
Upgrade to newer Soup of the Day. . . $ 2.50
|
||
|
||
Access to support . . . . . . . . . . $10.00
|
||
|
||
|
||
Editors Note:
|
||
Bug in the soup........included at no extra charge
|
||
(will be fixed with Tomorrow's soup of the day)"
|
||
|
||
:-)
|
||
Ross
|
||
______________________________________________________
|
||
|
||
Ross L. Kodner, Esq. Voice: 414-476-8433
|
||
MicroLaw, Inc. FAX: 414-476-8461
|
||
825 S. 60th St. E-Mail: rkodner@ix.netcom.com
|
||
Milwaukee, WI 53214
|
||
|
||
Web1: http://www.microlaw.com
|
||
Web2: http://www.wisbar.org/legalres/rosslegal.html
|
||
Web3: http://www.microlaw.com/kodner/index.htm
|
||
|
||
ABA LPM "Network 2d" Ass't Editor Always Seeking Great Articles!
|
||
______________________________________________________
|
||
|
||
|
||
===================END FORWARDED MESSAGE===================
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-18 Page 34 5 May 1997
|
||
|
||
|
||
=================================================================
|
||
COMIX IN ASCII
|
||
=================================================================
|
||
|
||
|
||
--- Following message extracted from MENSANS_ONLY @ 1:18/14 ---
|
||
By Christopher Baker on Wed Apr 30 12:31:45 1997
|
||
|
||
From: Francois Thunus
|
||
To: All
|
||
Date: 29 Apr 97 20:16:00
|
||
Subj: Learning to dive (fwd)
|
||
|
||
======================================================================
|
||
* Forwarded by Francois Thunus (2:270/25.2)
|
||
======================================================================
|
||
|
||
|
||
Dear Friends, this is a work of art, that I hope will work on all
|
||
your screens.
|
||
|
||
Yours
|
||
Martin
|
||
|
||
Start scrolling down with the arrow key, and AS SOON AS
|
||
"** Start Hitting Spacebar Now **" appears on the bottom line of you
|
||
screen, start hitting the spacebar/page down slowly.
|
||
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> o ___
|
||
>>> /|\ /___\______
|
||
>>>__/_\___/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>
|
||
>>> ** Start Hitting Spacebar Now **
|
||
>>>
|
||
>>>
|
||
>>
|
||
>>
|
||
>>>
|
||
>>> o ___
|
||
>>> /|\ /___\______
|
||
>>>___/_\__/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
FIDONEWS 14-18 Page 35 5 May 1997
|
||
|
||
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> o ___
|
||
>>> |=/___\_______
|
||
>>>_____/>/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> o
|
||
>>> |=___
|
||
>>> /|/___\_______
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> o
|
||
>>> /|\
|
||
>>> //_\\_______
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
FIDONEWS 14-18 Page 36 5 May 1997
|
||
|
||
|
||
>>>
|
||
>>>
|
||
>>> o
|
||
>>> _/|\
|
||
>>> /_/_\_______
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> o
|
||
>>> ___/|\
|
||
>>> /___/_\_____
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> o
|
||
>>> ___ /|\
|
||
>>> /___\/_\____
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> o
|
||
>>> ___ /|\
|
||
>>> /___\_/_\____
|
||
FIDONEWS 14-18 Page 37 5 May 1997
|
||
|
||
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> o
|
||
>>> ___ /|\
|
||
>>> /___\__/_\_
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> o
|
||
>>> ___ /|\
|
||
>>> /___\____/_\
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> o
|
||
>>> ___ |=
|
||
>>> /___\______|
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
FIDONEWS 14-18 Page 38 5 May 1997
|
||
|
||
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> ___ o
|
||
>>> /___\__ |=
|
||
>>>_______/____|_ ---_>
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> o
|
||
>>> ___ |=
|
||
>>> /___\______>
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> o
|
||
>>> /=
|
||
>>> ___ _>
|
||
>>> /___\___---
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
FIDONEWS 14-18 Page 39 5 May 1997
|
||
|
||
|
||
>>>
|
||
>>>
|
||
>>> o
|
||
>>> /=
|
||
>>> /
|
||
>>> ___
|
||
>>> /___\_______
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> __o
|
||
>>> / \
|
||
>>> ___
|
||
>>> /___\_____
|
||
>>>_______/____|_ --
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> ____o
|
||
>>> ___ \
|
||
>>> /___\_______
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> __
|
||
FIDONEWS 14-18 Page 40 5 May 1997
|
||
|
||
|
||
>>> ___ \o
|
||
>>> /___\_______ \
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> ___ \
|
||
>>> /___\_______ \o
|
||
>>>_______/____|_ \
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> ___
|
||
>>> /___\_______ \
|
||
>>>_______/____|_ \
|
||
>>> | |o
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> ___
|
||
>>> /___\_______
|
||
>>>_______/____|_ \|
|
||
>>> | |
|
||
>>> | |o
|
||
FIDONEWS 14-18 Page 41 5 May 1997
|
||
|
||
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> ___
|
||
>>> /___\_______
|
||
>>>_______/____|_
|
||
>>> | \|
|
||
>>> | ' |..'
|
||
>>> |~~~~~~~~~~~~~~~~~~~/o'~~~~~~
|
||
>>>
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> ___
|
||
>>> /___\_______
|
||
>>>_______/____|_ . .
|
||
>>> | . '. '
|
||
>>> | '.\/..'.
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~/,~~~~
|
||
>>> /o
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> ___
|
||
>>> /___\_______
|
||
>>>_______/____|_
|
||
>>> | .'..''..
|
||
>>> | . .'.' '
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~;|/,~~
|
||
>>> _o/
|
||
>>>- /
|
||
>>>
|
||
>>>
|
||
FIDONEWS 14-18 Page 42 5 May 1997
|
||
|
||
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> ___
|
||
>>> /___\_______
|
||
>>>_______/____|_
|
||
>>> | . .
|
||
>>> | ..'.'.
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~;,;~~~
|
||
>>> _o__/'
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> ___
|
||
>>> /___\_______
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> | . .
|
||
>>> |~~~~~~~~~~~~~~~~~~~~~~~;~~~~
|
||
>>> o__// ''
|
||
>>>- //
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> ___
|
||
>>> /___\_______
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> |
|
||
>>> |~~~~~~~~~~~~o~~~~~~~~~~~~~~~
|
||
>>> |\__
|
||
>>>- \
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
FIDONEWS 14-18 Page 43 5 May 1997
|
||
|
||
|
||
>>>
|
||
>>>
|
||
>>> ___
|
||
>>> /___\_______
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> | o
|
||
>>> |~~~~~~~~~/|\~~~~~~~~~~~~~~~~~~
|
||
>>> / \
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> ___
|
||
>>> /___\_______
|
||
>>>_______/____|_
|
||
>>> |
|
||
>>> | o/
|
||
>>> |~~~~~~~~~/|~~~~~~~~~~~~~~~~~
|
||
>>> / \
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>>
|
||
>>> ___
|
||
>>> /___\_______
|
||
>>>_______/____|_
|
||
>>> | , CIAO in next mail!
|
||
>>> | o/
|
||
>>> |~~~~~~~~~/|~~~~~~~~~~~~~~
|
||
>>> / \
|
||
>>>-
|
||
>>>
|
||
>>>
|
||
>>>------------ Forwarded Message ends here ------------
|
||
|
||
-+-
|
||
======================================================================
|
||
Hello All!
|
||
-= Francois =-
|
||
Thunus@Club.TeleMatique.org
|
||
http://www.telematique.org/ft
|
||
|
||
Of course I'm running Windows NO CARRIER
|
||
FIDONEWS 14-18 Page 44 5 May 1997
|
||
|
||
|
||
Origin: Gasperich - Luxembourg (zone 2!) ->> (FidoNet 2:270/25.2)
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-18 Page 45 5 May 1997
|
||
|
||
|
||
=================================================================
|
||
NOTICES
|
||
=================================================================
|
||
|
||
Future History
|
||
|
||
17 May 1997
|
||
Independence Day, Norway.
|
||
|
||
3 Jun 1997
|
||
2 years since FidoNet had an International Coordinator.
|
||
|
||
6 Jun 1997
|
||
National Commemoration Day, Sweden.
|
||
|
||
12 Jun 1997
|
||
Independence Day, Russia.
|
||
|
||
1 Jul 1997
|
||
Canada Day - Happy Birthday Canada.
|
||
|
||
9 Jul 1997
|
||
Independence Day, Argentina.
|
||
|
||
13 Oct 1997
|
||
Thanksgiving Day, Canada.
|
||
|
||
1 Dec 1997
|
||
World AIDS Day.
|
||
|
||
10 Dec 1997
|
||
Nobel Day, Sweden.
|
||
|
||
12 Jan 1998
|
||
HAL 9000 is one year old today.
|
||
|
||
22 May 1998
|
||
Expo '98 World Exposition in Lisbon (Portugal) opens.
|
||
|
||
1 Dec 1998
|
||
Fifteenth Anniversary of release of Fido version 1 by
|
||
Tom Jennings.
|
||
|
||
31 Dec 1999
|
||
Hogmanay, Scotland. The New Year that can't be missed.
|
||
|
||
1 Jan 2000
|
||
The 20th Century, C.E., is still taking place thru 31 Dec.
|
||
|
||
15 Sep 2000
|
||
Sydney (Australia) Summer Olympiad opens.
|
||
|
||
1 Jan 2001
|
||
This is the actual start of the new millennium, C.E.
|
||
|
||
-- If YOU have something which you would like to see in this
|
||
FIDONEWS 14-18 Page 46 5 May 1997
|
||
|
||
|
||
Future History, please send a note to the FidoNews Editor.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
|
||
To: vtw-announce@vtw.org, crypto-news@panix.com
|
||
From: shabbir@vtw.org (Shabbir J. Safdar)
|
||
Reply-To: shabbir@vtw.org (Shabbir J. Safdar)
|
||
Subject: ALERT: Groups urge passage of pro-crypto legislation
|
||
(4/28/1997)
|
||
Date: Mon, 28 Apr 1997 22:26:58 -0400
|
||
Sender: owner-crypto-news@lists.panix.com
|
||
Reply-To: crypto-news@lists.panix.com
|
||
|
||
======================================================================
|
||
___ _ _____ ____ _____ _
|
||
/ _ \| | | ____| _ \_ _| | HOUSE PREPARES TO ENSURE ENCRYPTION
|
||
| |_| | | | _| | |_) || | | | AND PRIVACY ON THE INTERNET; SAFE
|
||
| _ | |___| |___| _ < | | |_| BILL (HR 695) ABOUT TO BE VOTED ON!
|
||
|_| |_|_____|_____|_| \_\|_| (_) April 28, 1997
|
||
|
||
Do not forward this alert after June 1, 1997.
|
||
|
||
This alert brought to you by:
|
||
|
||
Americans for Tax Reform Center for Democracy and
|
||
Technology
|
||
Eagle Forum EF-Florida
|
||
Electronic Frontier Foundation Electronic Privacy Information
|
||
Ctr.
|
||
Voters Telecommunications Watch Wired Magazine
|
||
|
||
______________________________________________________________________
|
||
Table of Contents
|
||
What's Happening Right Now
|
||
What You Can Do To Help Privacy And Security On The Internet
|
||
Background On SAFE (HR 695)
|
||
Why Is This Issue Important To Internet Users?
|
||
About This Alert / Participating Organizations
|
||
|
||
______________________________________________________________________
|
||
WHAT'S HAPPENING RIGHT NOW
|
||
|
||
HOUSE JUDICIARY COMMITTEE TO VOTE ON "SAFE" PRO-INTERNET PRIVACY BILL
|
||
|
||
The House Judiciary Committee is set to vote on a bill designed to
|
||
protect privacy and promote electronic commerce on the Internet as
|
||
early as the second week of May. The SAFE bill will also be
|
||
considered by a Judiciary subcommittee this week and is expected to
|
||
pass without difficulty.
|
||
|
||
The House Judiciary committee vote on HR695 will mark a critical stage
|
||
in the effort to pass real reform of US encryption policy in a way
|
||
that protects privacy, promotes electronic commerce, and recognizes
|
||
the realities of the global Internet.
|
||
|
||
FIDONEWS 14-18 Page 47 5 May 1997
|
||
|
||
|
||
Although no bill is perfect, Internet advocates including CDT, EFF,
|
||
EPIC, VTW and others, including the Internet Privacy Coalition, have
|
||
expressed support for the bill. Supporters agree that the SAFE bill
|
||
holds great promise for enhancing privacy and security on the Internet
|
||
and have offered their strong support and suggestions to improve it in
|
||
a detailed letter at http://www.privacy.org/ipc/safe_letter.html
|
||
|
||
Please take a moment to read the attached alert, and make a phone call
|
||
to urge the committee to pass the bill.
|
||
|
||
______________________________________________________________________
|
||
WHAT YOU CAN DO TO HELP PRIVACY AND SECURITY ON THE INTERNET
|
||
|
||
1. Check out the information on the SAFE bill below.
|
||
|
||
2. Call the Representative on the Judiciary committee from your state.
|
||
Note that there may be more than one person from your state on the
|
||
committee. The list is enclosed below the telephone script.
|
||
|
||
SAMPLE SCRIPT
|
||
|
||
You: <dial Capitol switchboard +1.202.224.3121>
|
||
May I speak to the office of Rep. (INSERT NAME FROM LIST
|
||
BELOW)
|
||
|
||
Them: Hello, Rep. Mojo's office!
|
||
|
||
You: May I speak with the staffer who deals with Internet or
|
||
telecom issues?
|
||
|
||
Them: One minute..
|
||
|
||
SAY THIS-> You: Hello! HR695 will be voted on by the Judiciary
|
||
committee in a couple of weeks. I'm calling to urge Rep.
|
||
Mojo to pass the bill because it's important to security
|
||
and privacy on the Internet.
|
||
|
||
Them: Thanks, goodbye!
|
||
|
||
You: Goodbye! <click>
|
||
|
||
If you have concerns about specific improvements to the bill,
|
||
bringing them up when you're on the phone with the staffer is a
|
||
good opportunity for raising issues.
|
||
|
||
Judiciary Committee Members (from committee Web page)
|
||
|
||
MR. HYDE (ILLINOIS), CHAIRMAN
|
||
Mr. Sensenbrenner (Wisconsin) Mr. Conyers (Michigan)
|
||
Mr. McCollum (Florida) Mr. Frank (Massachusetts)
|
||
Mr. Gekas (Pennsylvania) Mr. Schumer (New York)
|
||
Mr. Coble (North Carolina) Mr. Berman (California)
|
||
Mr. Smith (Texas) Mr. Boucher (Virginia)
|
||
Mr. Schiff (New Mexico) Mr. Nadler (New York)
|
||
Mr. Gallegly (California) Mr. Scott (Virginia)
|
||
Mr. Canady (Florida) Mr. Watt (North Carolina)
|
||
FIDONEWS 14-18 Page 48 5 May 1997
|
||
|
||
|
||
Mr. Inglis (South Carolina) Ms. Lofgren (California)
|
||
Mr. Goodlatte (Virginia) Ms. Jackson Lee (Texas)
|
||
Mr. Buyer (Indiana) Ms. Waters (California)
|
||
Mr. Bono (California) Mr. Meehan (Massachusetts)
|
||
Mr. Bryant (Tennessee) Mr. Delahunt (Massachusetts)
|
||
Mr. Chabot (Ohio) Mr. Wexler (Florida)
|
||
Mr. Barr (Georgia) Mr. Rothman (New Jersey)
|
||
Mr. Jenkins (Tennessee) Mr. Hutchinson (Arkansas)
|
||
Mr. Pease (Indiana) Mr. Cannon (Utah)
|
||
|
||
3. *IMPORTANT* Touch base with us at http://www.crypto.com/feedback/
|
||
and let us know how the phone call went. Fill out the easy to use
|
||
form to let us know what happened during your phone call.
|
||
|
||
4. Pass this alert on to others until June 1
|
||
|
||
You've taken the first step to being a part of the powerful
|
||
political force of Americans concerned about the health and safety
|
||
of the Internet, but have your friends? Forward this alert to them
|
||
until June 1, 1997 and urge them to adopt their legislator at
|
||
http://www.crypto.com/adopt/
|
||
|
||
5. Be proud of yourself and relax!
|
||
|
||
You've done more to protect the Internet in five minutes than many
|
||
people will do this year.
|
||
|
||
______________________________________________________________________
|
||
BACKGROUND ON SAFE (HR 695)
|
||
|
||
In early May, the Judiciary Committee will be voting on whether to
|
||
send HR 695, the Security and Freedom Through Encryption (SAFE) Act,
|
||
on to the full House of Representatives.
|
||
|
||
The SAFE Bill, introduced by Reps. Bob Goodlatte (R-VA) and Anna Eshoo
|
||
(D-CA), would promote privacy and security on the Internet by:
|
||
|
||
* relaxing current export controls on encryption technologies;
|
||
|
||
* prohibiting the government from imposing "key-escrow" or "key-
|
||
recovery" inside the United States, and;
|
||
|
||
* addresses concerns from law enforcement about the use of encryption
|
||
in the furtherance of a crime.
|
||
|
||
The SAFE bill enjoys broad bi-partisan support and currently has 78
|
||
co-sponsors.
|
||
|
||
Although no bill is ever perfect, the SAFE bill, along with Pro-CODE,
|
||
a similar bill in the Senate sponsored by Sens. Burns (R-MT) and Leahy
|
||
(D-VT), represent the best chance yet of passing real reform of US
|
||
encryption policy. The Senate Commerce Committee is expected to hold
|
||
a markup on Pro-CODE soon.
|
||
|
||
The Clinton Administration, through the FBI and NSA, is working hard
|
||
behind the scenes to block passage of SAFE and Pro-CODE. The
|
||
FIDONEWS 14-18 Page 49 5 May 1997
|
||
|
||
|
||
Administration favors an approach which would limit the availability
|
||
of privacy-protecting encryption technologies and compel American
|
||
Citizens to ensure law enforcement access to their private online
|
||
communications.
|
||
|
||
By passing the SAFE bill and sending on to the floor, the House
|
||
Judiciary Committee will send a strong signal to the Administration
|
||
that Congress is serious about passing real reform of US encryption
|
||
policy, and would represent an important victory in the fight for
|
||
privacy on the Internet.
|
||
|
||
Detailed background information, including the full text of the bill,
|
||
and analysis is available online at http://www.crypto.com/
|
||
|
||
______________________________________________________________________
|
||
WHY IS THIS ISSUE IMPORTANT TO INTERNET USERS?
|
||
|
||
Encryption technologies are the locks and keys of the Information age
|
||
-- enabling individuals and businesses to protect sensitive
|
||
information as it is transmitted over the Internet. As more and more
|
||
individuals and businesses come online, the need for strong, reliable,
|
||
easy-to-use encryption technologies has become a critical issue to the
|
||
health and viability of the Net.
|
||
|
||
Current US encryption policy, which limits the strength of encryption
|
||
products US companies can sell abroad, also limits the availability of
|
||
strong, easy-to-use encryption technologies in the United States. US
|
||
hardware and software manufacturers who wish to sell their products on
|
||
the global market must either conform to US encryption export limits
|
||
or produce two separate versions of the same product, a costly and
|
||
complicated alternative.
|
||
|
||
The export controls, which the NSA and FBI argue help to keep strong
|
||
encryption out of the hands of foreign adversaries, are having the
|
||
opposite effect. Strong encryption is available abroad, but because of
|
||
the export limits and the confusion created by nearly four years of
|
||
debate over US encryption policy, strong, easy-to-use privacy and
|
||
security technologies are not widely available off the shelf or "on
|
||
the net" here in the US.
|
||
|
||
A recently discovered flaw in the security of the new digital
|
||
telephone network exposed the worst aspects of the Administration's
|
||
encryption policy. Because the designers needed to be able to export
|
||
their products, the system's security was "dumbed down". Researchers
|
||
subsequently discovered that it is quite easy to break the security of
|
||
the system and intrude on what should be private conversations.
|
||
|
||
This incident underscores the larger policy problem: US companies are
|
||
at a competitive disadvantage in the global marketplace when competing
|
||
against companies that do not have such hindrances. And now, for the
|
||
first time in history, the Clinton Administration has proposed
|
||
DOMESTIC RESTRICTIONS on the ability of Americans to protect their
|
||
privacy and security online.
|
||
|
||
All of us care about our national security, and no one wants to make
|
||
it any easier for criminals and terrorists to commit criminal acts.
|
||
FIDONEWS 14-18 Page 50 5 May 1997
|
||
|
||
|
||
But we must also recognize encryption technologies can aid law
|
||
enforcement and protect national security by limiting the threat of
|
||
industrial espionage and foreign spying, promote electronic commerce
|
||
and protecting privacy.
|
||
|
||
What's at stake in this debate is nothing less than the future of
|
||
privacy and the fate of the Internet as a secure and trusted medium
|
||
for commerce, education, and political discourse.
|
||
|
||
______________________________________________________________________
|
||
ABOUT THIS ALERT / PARTICIPATING ORGANIZATIONS
|
||
|
||
For more information, contact the following organizations who have
|
||
signed onto this effort at their web sites.
|
||
|
||
Americans for Tax Reform
|
||
http://www.atr.org
|
||
Center for Democracy and Technology
|
||
http://www.cdt.org
|
||
Eagle Forum
|
||
http://www.eagleforum.org
|
||
EF-Florida
|
||
http://www.efflorida.org
|
||
Electronic Frontier Foundation
|
||
http://www.eff.org
|
||
Electronic Privacy Information Center
|
||
http://www.epic.org
|
||
Voters Telecommunications Watch
|
||
http://www.vtw.org
|
||
Wired Magazine
|
||
http://www.wired.com
|
||
|
||
______________________________________________________________________
|
||
end alert
|
||
======================================================================
|
||
|
||
-30-
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-18 Page 51 5 May 1997
|
||
|
||
|
||
=================================================================
|
||
FIDONET SOFTWARE LISTING
|
||
=================================================================
|
||
|
||
|
||
Latest Greatest Software Versions
|
||
by Peter E. Popovich, 1:363/264
|
||
|
||
Note: Mid-May, I will phase out the entire "Old Info" section. As
|
||
always, I'll be happy to process any information I get, either before
|
||
or after it is phased out.
|
||
|
||
-=- Snip -=-
|
||
|
||
Submission form for the Latest Greatest Software Versions column
|
||
|
||
OS Platform :
|
||
Software package name :
|
||
Version :
|
||
Function(s) - BBS, Mailer, Tosser, etc. :
|
||
Freeware / Shareware / Commercial? :
|
||
Author / Support staff contact name :
|
||
Author / Support staff contact node :
|
||
Magic name (at the above-listed node) :
|
||
|
||
Please include a sentence describing what the package does.
|
||
|
||
Please send updates and suggestions to: Peter Popovich, 1:363/264
|
||
|
||
-=- Snip -=-
|
||
|
||
MS-DOS:
|
||
Program Name Version F C Contact Name Node Magic Name
|
||
----------------------------------------------------------------------
|
||
Act-Up 4.6 G D Chris Gunn 1:15/55 ACT-UP
|
||
ALLFIX 4.40 T S Harald Harms 2:281/415 ALLFIX
|
||
Announcer 1.11 O S Peter Karlsson 2:206/221 ANNOUNCE
|
||
BGFAX 1.60 O S B.J. Guillot 1:106/400 BGFAX
|
||
Binkley Docs 2.60 M F Bob Juge 1:1/102 BDOC_260.ZIP
|
||
BinkleyTerm 2.60 M F Bob Juge 1:1/102 BDOS_260.ZIP
|
||
BinkleyTerm-XE XR4 M F Thomas Waldmann 2:2474/400 BTXE_DOS
|
||
CFRoute 0.92 O G C. Fernandez Sanz 2:341/70 CFR
|
||
CheckPnt 1.0a O G Michiel vd Vlist 2:500/9 CHECKPNT
|
||
FastEcho 1.45a T S Tobias Burchhardt 2:2448/400 FASTECHO
|
||
FastEcho/16 1.45a T S Tobias Burchhardt 2:2448/400 FE16
|
||
FidoBBS (tm) 12u B S Ray Brown 1:1/117 FILES
|
||
FrontDoor 2.12 M S JoHo 2:201/330 FD
|
||
FrontDoor 2.20c M C JoHo 2:201/330 FDINFO
|
||
GEcho 1.00 T S Bob Seaborn 1:140/12 GECHO
|
||
GEcho/Plus 1.11 T C Bob Seaborn 1:140/12 GECHO
|
||
GEcho/Pro 1.20 T C Bob Seaborn 1:140/12 GECHO
|
||
GIGO 07-14-96 G S Jason Fesler 1:1/141 INFO
|
||
GoldED 2.50 O S Len Morgan 1:203/730 GED
|
||
GoldED/386 2.50 O S Len Morgan 1:203/730 GEX
|
||
GoldED Docs 2.50 O S Len Morgan 1:203/730 GEM
|
||
GoldNODE 2.50 O S Len Morgan 1:203/730 GEN
|
||
FIDONEWS 14-18 Page 52 5 May 1997
|
||
|
||
|
||
Imail 1.75 T S Michael McCabe 1:1/121 IMAIL
|
||
ImCrypt 1.04 O G Michiel vd Vlist 2:500/9 IMCRYPT
|
||
InfoMail/86 1.21 O F Damian Walker 2:2502/666 INFOMAIL
|
||
InfoMail/386 1.21 O F Damian Walker 2:2502/666 INFO386
|
||
InterEcho 1.19 T C Peter Stewart 1:369/35 IEDEMO
|
||
InterMail 2.29k M C Peter Stewart 1:369/35 IMDEMO
|
||
InterPCB 1.52 O S Peter Stewart 1:369/35 INTERPCB
|
||
IPNet 1.11 O S Michele Stewart 1:369/21 IPNET
|
||
JD's CBV 1.4 O S John Dailey 1:363/277 CBV
|
||
Jelly-Bean 1.01 T S Rowan Crowe 3:635/727 JELLY
|
||
Jelly-Bean/386 1.01 T S Rowan Crowe 3:635/727 JELLY386
|
||
JMail-Hudson 2.81 T S Jason Steck 1:285/424 JMAIL-H
|
||
JMail-Goldbase 2.81 T S Jason Steck 1:285/424 JMAIL-G
|
||
MakePl 1.9 N G Michiel vd Vlist 2:500/9 MAKEPL
|
||
Marena 1.1 beta O G Michiel vd Vlist 2:500/9 MARENA
|
||
Maximus 3.01 B P Tech 1:249/106 MAX
|
||
McMail 1.0 M S Michael McCabe 1:1/148 MCMAIL
|
||
MDNDP 1.18 N S Bill Doyle 1:388/7 MDNDP
|
||
Msged 4.10 O G Andrew Clarke 3:635/728 MSGED41D.ZIP
|
||
Msged/386 4.10 O G Andrew Clarke 3:635/728 MSGED41X.ZIP
|
||
Opus CBCS 1.73a B P Christopher Baker 1:374/14 OPUS
|
||
O/T-Track 2.66 O S Peter Hampf 2:241/1090 OT
|
||
PcMerge 2.8 N G Michiel vd Vlist 2:500/9 PCMERGE
|
||
PlatinumXpress 1.3 M C Gary Petersen 1:290/111 PX13TD.ZIP
|
||
QuickBBS 2.81 B S Ben Schollnick 1:2613/477 QUICKBBS
|
||
RAR 2.00 C S Ron Dwight 2:220/22 RAR
|
||
RemoteAccess 2.50 B S Mark Lewis 1:3634/12 RA
|
||
Silver Xpress
|
||
Door 5.4 O S Gary Petersen 1:290/111 FILES
|
||
Reader 4.4 O S Gary Petersen 1:290/111 SXR44.ZIP
|
||
Spitfire 3.51 B S Mike Weaver 1:3670/3 SPITFIRE
|
||
Squish 1.11 T P Tech 1:249/106 SQUISH
|
||
StealTag UK 1.c... O F Fred Schenk 2:284/412 STEAL_UK
|
||
StealTag NL 1.c... O F Fred Schenk 2:284/412 STEAL_NL
|
||
T-Mail 2.599I M S Ron Dwight 2:220/22 TMAIL
|
||
Telegard 3.02 B F Tim Strike 1:259/423 TELEGARD
|
||
Terminate 4.00 O S Bo Bendtsen 2:254/261 TERMINATE
|
||
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
|
||
TosScan 1.01 T C JoHo 2:201/330 TSINFO
|
||
TransNet 1.00 G S Marc S. Ressl 4:904/72 TN100ALL.ZIP
|
||
TriBBS 11.0 B S Gary Price 1:3607/26 TRIBBS
|
||
TriDog 11.0 T F Gary Price 1:3607/26 TRIDOG
|
||
TriToss 11.0 T S Gary Price 1:3607/26 TRITOSS
|
||
WaterGate 0.92 G S Robert Szarka 1:320/42 WTRGATE
|
||
WWIV 4.24a B S Craig Dooley 1:376/126 WWIV
|
||
WWIVTOSS 1.36 T S Craig Dooley 1:376/126 WWIVTOSS
|
||
xMail 2.00 T S Thorsten Franke 2:2448/53 XMAIL
|
||
XRobot 3.01 O S JoHo 2:201/330 XRDOS
|
||
|
||
OS/2:
|
||
Program Name Version F C Contact Name Node Magic Name
|
||
----------------------------------------------------------------------
|
||
ALLFIX/2 1.10 T S Harald Harms 2:281/415 AFIXOS2
|
||
BGFAX 1.60 O S B.J. Guillot 1:106/400 BGFAX
|
||
Binkley Docs 2.60 M F Bob Juge 1:1/102 BDOC_260.ZIP
|
||
BinkleyTerm 2.60 M F Bob Juge 1:1/102 BOS2_260.ZIP
|
||
FIDONEWS 14-18 Page 53 5 May 1997
|
||
|
||
|
||
BinkleyTerm-XE XR4 M F Thomas Waldmann 2:2474/400 BTXE_OS2
|
||
CFRoute 0.92 O G C. Fernandez Sanz 2:341/70 CFR
|
||
FastEcho 1.45a T S Tobias Burchhardt 2:2448/400 FE2
|
||
FleetStreet 1.19 O S Michael Hohner 2:2490/2520 FLEET
|
||
GEcho/Pro 1.20 T C Bob Seaborn 1:140/12 GECHO
|
||
GIGO 07-14-96 G S Jason Fesler 1:1/141 INFO
|
||
GoldED 2.50 O S Len Morgan 1:203/730 GEO
|
||
GoldED Docs 2.50 O S Len Morgan 1:203/730 GEM
|
||
GoldNODE 2.50 O S Len Morgan 1:203/730 GEN
|
||
ImCrypt 1.04 O G Michiel vd Vlist 2:500/9 IMCRYPT
|
||
Maximus 3.01 B P Tech 1:249/106 MAXP
|
||
Msged/2 4.10 O G Andrew Clarke 3:635/728 MSGED41O.ZIP
|
||
PcMerge 2.3 N G Michiel vd Vlist 2:500/9 PCMERGE
|
||
RAR 2.00 C S Ron Dwight 2:220/22 RAR2
|
||
Squish 1.11 T P Tech 1:249/106 SQUISHP
|
||
T-Mail 2.599I M S Ron Dwight 2:220/22 TMAIL2
|
||
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
|
||
XRobot 3.01 O S JoHo 2:201/330 XROS2
|
||
|
||
Windows (16-bit apps):
|
||
Program Name Version F C Contact Name Node Magic Name
|
||
----------------------------------------------------------------------
|
||
BeeMail 1.0 M C Andrius Cepaitis 2:470/1 BEEMAIL
|
||
FrontDoor APX 1.12 P S Mats Wallin 2:201/329 FDAPXW
|
||
|
||
Windows (32-bit apps):
|
||
Program Name Version F C Contact Name Node Magic Name
|
||
----------------------------------------------------------------------
|
||
BeeMail 1.0 M C Andrius Cepaitis 2:470/1 BEEMAIL
|
||
Binkley Docs 2.60 M F Bob Juge 1:1/102 BDOC_260.ZIP
|
||
BinkleyTerm 2.60 M F Bob Juge 1:1/102 BW32_260.ZIP
|
||
CFRoute 0.92 O G C. Fernandez Sanz 2:341/70 CFR
|
||
GoldED 2.50 O S Len Morgan 1:203/730 GEO
|
||
GoldED Docs 2.50 O S Len Morgan 1:203/730 GEM
|
||
Maximus 3.01 B P Tech 1:249/106 MAXN
|
||
Msged/NT 4.10 O G Andrew Clarke 3:635/728 MSGED41W.ZIP
|
||
PlatinumXpress 2.00 M C Gary Petersen 1:290/111 PXW-INFO
|
||
T-Mail 2.599I M S Ron Dwight 2:220/22 TMAILNT
|
||
WinFOSSIL/95 1.12 r4 F S Bryan Woodruff 1:343/294 WNFOSSIL.ZIP
|
||
WinFOSSIL/NT 1.0 beta F S Bryan Woodruff 1:343/294 NTFOSSIL.ZIP
|
||
|
||
Unix:
|
||
Program Name Version F C Contact Name Node Magic Name
|
||
----------------------------------------------------------------------
|
||
ifmail 2.10 M G Eugene Crosser 2:293/2219 IFMAIL
|
||
ifmail-tx ...tx8.2 M G Pablo Saratxaga 2:293/2219 IFMAILTX
|
||
ifmail-tx.rpm ...tx8.2 M G Pablo Saratxaga 2:293/2219 IFMAILTX.RPM
|
||
Msged 4.00 O G Paul Edwards 3:711/934 MSGED
|
||
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
|
||
|
||
Amiga:
|
||
Program Name Version F C Contact Name Node Magic Name
|
||
----------------------------------------------------------------------
|
||
CrashMail 1.23 T X Fredrik Bennison 2:205/324 CRASHMAIL
|
||
CrashTick 1.1 O F Fredrik Bennison 2:205/324 CRASHTICK
|
||
DLG Pro BBOS 1.15 B C Holly Sullivan 1:202/720 DLGDEMO
|
||
FIDONEWS 14-18 Page 54 5 May 1997
|
||
|
||
|
||
GMS 1.1.85 M S Mirko Viviani 2:331/213 GMS
|
||
Msged 4.00 O G Paul Edwards 3:711/934 MSGED
|
||
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
|
||
|
||
TrapDoor 1.86.b2 M S Maximilian Hantsch
|
||
2:310/6 TRAPDOOR
|
||
TrapDoor 1.86.b2 M S Maximilian Hantsch
|
||
2:310/6 TRAPBETA
|
||
TrapToss 1.50 T S Rene Hexel 2:310/6 TRAPTOSS
|
||
|
||
|
||
Atari:
|
||
Program Name Version F C Contact Name Node Magic Name
|
||
----------------------------------------------------------------------
|
||
BinkleyTerm/ST 3.18pl2 M F Bill Scull 1:363/112 BINKLEY
|
||
JetMail 0.99beta22
|
||
T S Joerg Spilker 2:2432/1101 JETMAIL
|
||
Semper 0.80beta M S Jan Kriesten 2:2490/1624 SMP-BETA
|
||
|
||
Function: B-BBS, P-Point, M-Mailer, N-Nodelist, G-Gateway, T-Tosser,
|
||
C-Compression, F-Fossil, O-Other. Note: Multifunction will
|
||
be listed by the first match.
|
||
|
||
Cost: P-Free for personal use, F-Freeware, S-Shareware, C-Commercial,
|
||
X-Crippleware, D-Demoware, G-Free w/ Source
|
||
|
||
Old info from: 01/27/92
|
||
---------------------------------------------------------------------
|
||
|
||
MS-DOS Systems Other Utilities Other Utilities
|
||
-------------- Name Version Name Version
|
||
-------------------- --------------------
|
||
Network Mailers 2DAPoint 1.50* Netsex 2.00b
|
||
Name Version 4Dog/4DMatrix 1.18 OFFLINE 1.35
|
||
-------------------- ARCAsim 2.31 Oliver 1.0a
|
||
D'Bridge 1.30 ARCmail 3.00* OSIRIS CBIS 3.02
|
||
Dreamer 1.06 Areafix 1.20 PKInsert 7.10
|
||
Dutchie 2.90c ConfMail 4.00 PolyXarc 2.1a
|
||
Milqtoast 1.00 Crossnet 1.5 QM 1.00a
|
||
PreNM 1.48 DOMAIN 1.42 QSort 4.04
|
||
SEAdog 4.60 DEMM 1.06 RAD Plus 2.11
|
||
SEAmail 1.01 DGMM 1.06 Raid 1.00
|
||
TIMS 1.0(mod8) DOMAIN 1.42 RBBSMail 18.0
|
||
EEngine 0.32 ScanToss 1.28
|
||
Compression EMM 2.11* ScMail 1.00
|
||
Utilities EZPoint 2.1 ScEdit 1.12
|
||
Name Version FGroup 1.00 Sirius 1.0x
|
||
-------------------- FidoPCB 1.0s@ SLMail 2.15C
|
||
ARC 7.12 FNPGate 2.70 StarLink 1.01
|
||
ARJ 2.20 GateWorks 3.06e TagMail 2.41
|
||
LHA 2.13 GMail 2.05 TCOMMail 2.2
|
||
PAK 2.51 GMD 3.10 Telemail 1.5*
|
||
PKPak 3.61 GMM 1.21 TGroup 1.13
|
||
PKZip 1.10 GROUP 2.23 TIRES 3.11
|
||
GUS 1.40 TMail 1.21
|
||
NodeList Utilities Harvey's Robot 4.10 TosScan 1.00
|
||
FIDONEWS 14-18 Page 55 5 May 1997
|
||
|
||
|
||
Name Version HeadEdit 1.18 UFGATE 1.03
|
||
-------------------- HLIST 1.09 VPurge 4.09e
|
||
EditNL 4.00 ISIS 5.12@ WEdit 2.0@
|
||
FDND 1.10 Lola 1.01d WildMail 2.00
|
||
MakeNL 2.31 Mosaic 1.00b WMail 2.2
|
||
Parselst 1.33 MailBase 4.11a@ WNode 2.1
|
||
Prune 1.40 MSG 4.5* XRS 4.99
|
||
SysNL 3.14 MsgLnk 1.0c XST 2.3e
|
||
XlatList 2.90 MsgMstr 2.03a YUPPIE! 2.00
|
||
XlaxNode/Diff 2.53 MsgNum 4.16d ZmailH 1.25
|
||
MSGTOSS 1.3 ZSX 2.40
|
||
|
||
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
|
||
Key to old info:
|
||
+ - Netmail Capable (Doesn't Require Additional Mailer Software)
|
||
* - Recently Updated Version
|
||
@ - New Addition
|
||
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
|
||
|
||
Please send updates and suggestions to: Peter Popovich, 1:363/264
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-18 Page 56 5 May 1997
|
||
|
||
|
||
=================================================================
|
||
FIDONEWS PUBLIC-KEY
|
||
=================================================================
|
||
|
||
|
||
[this must be copied out to a file starting at column 1 or
|
||
it won't process under PGP as a valid public-key]
|
||
|
||
|
||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||
Version: 2.6.2
|
||
Comment: Clear-signing is Electronic Digital Authenticity!
|
||
|
||
mQCNAzINVLcAAAEEAM5dZN6t6j5Yc0kl7qegVFfiBeVoteuhDg4ay8h43u38Q4kO
|
||
eJ9Mm7J89wXFb9vgouBVb4biIN6bTWCwcXTbGhBe5OIceLvluuxuEKsaIs/UwXNe
|
||
Ogx5azIPhRfC7MJDe41Z8tMEBuHY/NE88cuxQ8yXWO126IRttavu6L/U5BwRAAUR
|
||
tCRGaWRvTmV3cyBFZGl0b3IgPDE6MS8yM0BmaWRvbmV0Lm9yZz6JAJUDBRAyGwFS
|
||
JZMgw7eCKz0BAZl0A/9xrfhpsEOqGiPfjy2qd9dv6tvSVPPVFu+Wy1lGTHYtuTtg
|
||
FIN3fQ47AM3XzqHxWRWvp/xZYgR6sRICL7UFx94ShYBQc7CyqBBZKA0IvIWqXP/g
|
||
c4Br+gQJR6CLiQK7TUyjUbqNbs6QAxuNUi4xFQM+O2Gene5/iTjHFmmSDj2C9YkB
|
||
FQMFEDIOmHDTQ6/52IG1SQEBQ78H/Rz/mleIrtZwFIOhzy3JH4Z6FUTfZuM9nPcs
|
||
1ZLjZCPptHvY7wEYJWGr03lPPJ6tj1VBXwTrWJTf/hOLsoi00GKV8t1thjqGDo23
|
||
O91/bSQ+Vn0vBQ2vOEJys8ftxdoLJAyI5YLzHVT+RsMTQLIXVuPyrNcKs1vC2ql+
|
||
UDHpU1R+9cG9JUEHpGI6z0DPnQ74SKbQH3fiVBpHhYx4BmvcBC4gWQzKMkDWFiq3
|
||
8AssIZ7b9lWl3OBgQ4UM1OIDKoJyjRewIdKyl7zboKSt6Qu8LrcsXO3kb81YshOW
|
||
ZpSS3QDIqfZC4+EElnB15l4RcVwnPHBaQY0FxUr4Vl4UWM36jbuJAJUDBRAyDpgY
|
||
q+7ov9TkHBEBAQGoA/sFfN07IFQcir456tJfBfB9R5Z6e6UKmexaFhWOsLHqbCq6
|
||
3FGXDLeivNn6NTz81QeqLIHglTuM3NP1mu8sw215klAG8G3M1NA2xLw7Eqhspze2
|
||
raGvNeEwxl8e+PY9aZwBj4UWU+CmIm6QNiP0MtvR7QYDIKn5mZCDc3CLmr942IkB
|
||
FQMFEDIOh0O8AhTPqRipPQEB4EYH/1gkDmdHL6lbEkFuQLrylF+weBl0XQ+kv7ER
|
||
vWXYrvIrkppxtc4VAge6CXXEbOGJnvkFHgyNZzO9Q9O64QsmZvjip+4lhDLeNrdH
|
||
X9DizS4YKXxkSKr9Yltmn2/AlBCx6jwcDIfkqy/P1tNWcikxZZMd6KryK0Wsres9
|
||
Ik12OmVmJjQSxb5bS6Q8aYUbV3qwosGXTqy+BzYh/UYAX/XJIWa5kxFVSPKFSZ+5
|
||
toiSzANd9SpHPEogGvQDHJlJ23lmsMx/6uHsR1LTsQ8su8zIk92XyqePJTjlMx2j
|
||
D7KJWNR7Zzu4QHCXBkga5W8l2FfPk7D3+o7bXTLRuR1yTYGdNoiJAJUCBRAyDhwt
|
||
SlKLwP4OFW0BAdaMA/9rcWQlSq44K9JuJ7fZUgt9fwxGreTud9fC8DvlbUW79+CA
|
||
AHLTLLagcEF1OKsWzVBWcA2JEAp+TUTqktRN0oD8vnaw3uNJd1G5KK59hw0WR8x1
|
||
v4ivypbSjiq95Y3gBunb7WjpyiFRWDlm0PrKrWHtbWzjnpPIpetln1UuqsSfbokB
|
||
FQIFEDIOG9C3N61ZQ4Dr/QEBIzMH/1VxxztmBPBszbjZLDO8Svcax9Ng8IcWpcDy
|
||
WqHCAA2Hoe5VtMD0v6w31ZgVqTPIvCark2Y/aTR1GofiuN9NUqbVV534AgAYLzYk
|
||
DMT1swsPvqDTpOYgQl6PCGh6A5JGAbWJfKkX9XCUHJAAmiTsEVRNnjOgL+p6qjoh
|
||
EfIG8CGehghWSRKl5eGeDAtbXupZKNjFI1t2XV+ks0RFQ/RPuTH7pF7pk7WO6Cyg
|
||
+Dk2ZMgua0HRL1fXvHKb5Xzr3MVgsbAl5gP8ooIiD9MI/x5Irh3oo58VyoEZNBs/
|
||
Kz+drGFDPljcS6fdiVCFtYIzMrshY6YsfLi0aB8fwOvFtxgBqli0J0NocmlzdG9w
|
||
aGVyIEJha2VyIDwxOjE4LzE0QGZpZG9uZXQub3JnPrQoQ2hyaXN0b3BoZXIgQmFr
|
||
ZXIgPGNiYWtlcjg0QGRpZ2l0YWwubmV0Pg==
|
||
=61OQ
|
||
-----END PGP PUBLIC KEY BLOCK-----
|
||
|
||
|
||
File-request FNEWSKEY from 1:1/23 [1:18/14] or download it from the
|
||
Rights On! BBS at 1-904-409-7040 anytime except 0100-0130 ET and Zone
|
||
1 ZMH at 1200-9600+ HST/V32B. The FidoNews key is also available on
|
||
the FidoNews homepage listed in the Masthead information.
|
||
|
||
-----------------------------------------------------------------
|
||
FIDONEWS 14-18 Page 57 5 May 1997
|
||
|
||
|
||
=================================================================
|
||
FIDONET BY INTERNET
|
||
=================================================================
|
||
|
||
This is a list of all FidoNet-related sites reported to the Editor as
|
||
of this appearance.
|
||
|
||
============
|
||
|
||
FidoNet:
|
||
|
||
Homepage http://www.fidonet.org
|
||
FidoNews http://ddi.digital.net/~cbaker84/fidonews.html
|
||
HTML FNews http://www.geocities.com/Athens/6894/
|
||
WWW sources http://www.scms.rgu.ac.uk/students/cs_yr94/lk/fido.html
|
||
FTSC page http://www2.blaze.net.au/ftsc.html
|
||
Echomail http://www.portal.ca/~awalker/index.html
|
||
WebRing http://ddi.digital.net/~cbaker84/fnetring.html
|
||
|
||
============
|
||
|
||
Zone 1: http://www.z1.fidonet.org
|
||
|
||
Region 10: http://www.psnw.com/~net205/region10.html
|
||
|
||
Region 11: http://oeonline.com/~garyg/region11/
|
||
|
||
Region 13: http://www.smalltalkband.com/st01000.htm
|
||
|
||
Region 14: http://www.netins.net/showcase/fidonet/
|
||
|
||
Region 15: http://www.smrtsys.com/region15/ [disappeared?]
|
||
|
||
Region 16: http://www.tiac.net/users/satins/region16.htm
|
||
|
||
Region 17: http://www.portal.ca/~awalker/region17.htm
|
||
|
||
Region 18: http://www.citicom.com/fido.html
|
||
|
||
Region 19: http://home1.gte.net/bhamilt/index.htm
|
||
|
||
============
|
||
|
||
Zone 2: http://www.z2.fidonet.org
|
||
|
||
ZEC2: http://fidoftp.paralex.co.uk/zec.htm [shut down?]
|
||
Zone 2 Elist: http://www.fidonet.ch/z2_elist/z2_elist.htm
|
||
|
||
Region 20: http://www.fidonet.pp.se (in Swedish)
|
||
|
||
Region 24: http://www.swb.de/personal/flop/gatebau.html (in German)
|
||
|
||
Region 25:
|
||
http://members.aol.com/Net254/
|
||
|
||
Region 27: http://telematique.org/ft/r27.htm
|
||
FIDONEWS 14-18 Page 58 5 May 1997
|
||
|
||
|
||
Region 29: http://www.rtfm.be/fidonet/ (in French)
|
||
|
||
Region 30: http://www.fidonet.ch (in Swiss)
|
||
|
||
Region 34: http://www.pobox.com/cnb/r34.htm (in Spanish)
|
||
REC34: http://pobox.com/~chr
|
||
|
||
Region 36: http://www.geocities.com/SiliconValley/7207/
|
||
|
||
Region 41: http://www.fidonet.gr (in Greek and English)
|
||
|
||
Region 48: http://www.fidonet.org.pl
|
||
|
||
============
|
||
|
||
Zone 3: http://www.z3.fidonet.org
|
||
|
||
============
|
||
|
||
Zone 4: (not yet listed)
|
||
|
||
Region 90:
|
||
Net 904: http://members.tripod.com/~net904 (in Spanish)
|
||
|
||
============
|
||
|
||
Zone 5: (not yet listed)
|
||
|
||
============
|
||
|
||
Zone 6: http://www.z6.fidonet.org
|
||
|
||
============
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-18 Page 59 5 May 1997
|
||
|
||
|
||
=================================================================
|
||
FIDONEWS INFORMATION
|
||
=================================================================
|
||
|
||
------- FIDONEWS MASTHEAD AND CONTACT INFORMATION -------
|
||
|
||
Editor: Christopher Baker
|
||
|
||
Editors Emeritii: Tom Jennings, Thom Henderson, Dale Lovell,
|
||
Vince Perriello, Tim Pozar, Sylvia Maxwell,
|
||
Donald Tees
|
||
|
||
"FidoNews Editor"
|
||
FidoNet 1:1/23
|
||
BBS 1-904-409-7040, 300/1200/2400/14400/V.32bis/HST(ds)
|
||
|
||
more addresses:
|
||
Christopher Baker -- 1:18/14, cbaker84@digital.net
|
||
cbaker84@aol.com
|
||
cbaker84@msn.com
|
||
|
||
(Postal Service mailing address)
|
||
FidoNews Editor
|
||
P.O. Box 471
|
||
Edgewater, FL 32132-0471
|
||
U.S.A.
|
||
|
||
|
||
voice: 1-904-409-3040 [1400-2100 ET only, please]
|
||
[1800-0100 UTC/GMT]
|
||
|
||
------------------------------------------------------
|
||
|
||
FidoNews is published weekly by and for the members of the FIDONET
|
||
INTERNATIONAL AMATEUR ELECTRONIC MAIL system. It is a compilation
|
||
of individual articles contributed by their authors or their
|
||
authorized agents. The contribution of articles to this compilation
|
||
does not diminish the rights of the authors. OPINIONS EXPRESSED in
|
||
these articles ARE THOSE OF THE AUTHORS and not necessarily those of
|
||
FidoNews.
|
||
|
||
Authors retain copyright on individual works; otherwise FidoNews is
|
||
Copyright 1997 Christopher Baker. All rights reserved. Duplication
|
||
and/or distribution permitted for noncommercial purposes only. For
|
||
use in other circumstances, please contact the original authors, or
|
||
the Editor.
|
||
|
||
=*=*=*=*=*=*=*=*=
|
||
|
||
OBTAINING COPIES: The most recent issue of FidoNews in electronic
|
||
form may be obtained from the FidoNews Editor via manual download or
|
||
file-request, or from various sites in the FidoNet and Internet.
|
||
PRINTED COPIES may be obtained by sending SASE to the above postal
|
||
address. File-request FIDONEWS for the current Issue. File-request
|
||
FNEWS for the current month in one archive. Or file-request specific
|
||
back Issue filenames in distribution format [FNEWSEnn.ZIP] for a
|
||
FIDONEWS 14-18 Page 60 5 May 1997
|
||
|
||
|
||
particular Issue. Monthly Volumes are available as FNWSmmmy.ZIP
|
||
where mmm = three letter month [JAN - DEC] and y = last digit of the
|
||
current year [7], i.e., FNWSFEB7.ZIP for all the Issues from Feb 97.
|
||
|
||
Annual volumes are available as FNEWSn.ZIP where n = the Volume number
|
||
1 - 14 for 1984 - 1997, respectively. Annual Volume archives range in
|
||
size from 48K to 1.4M.
|
||
|
||
|
||
INTERNET USERS: FidoNews is available via:
|
||
|
||
http://www.fidonet.org/fidonews.htm
|
||
ftp://ftp.fidonet.org/pub/fidonet/fidonews/
|
||
ftp://ftp.aminet.org/pub/aminet/comm/fido/
|
||
|
||
*=*=*
|
||
|
||
You may obtain an email subscription to FidoNews by sending email to:
|
||
|
||
jbarchuk@worldnet.att.net
|
||
|
||
with a Subject line of: subscribe fnews-edist
|
||
|
||
and no message in the message body. To remove your name from the email
|
||
distribution use a Subject line of: unsubscribe fnews-edist with no
|
||
message to the same address above.
|
||
|
||
*=*=*
|
||
|
||
You can read the current FidoNews Issue in HTML format at:
|
||
|
||
http://www.geocities.com/Athens/6894/
|
||
|
||
STAR SOURCE for ALL Past Issues via FTP and file-request -
|
||
Available for FReq from 1:396/1 or by anonymous FTP from:
|
||
|
||
ftp://ftp.sstar.com/fidonet/fnews/
|
||
|
||
Each yearly archive also contains a listing of the Table-of-Contents
|
||
for that year's issues. The total set is currently about 11 Megs.
|
||
|
||
=*=*=*=
|
||
|
||
The current week's FidoNews and the FidoNews public-key are now also
|
||
available almost immediately after publication on the Editor's new
|
||
homepage on the World Wide Web at:
|
||
|
||
http://ddi.digital.net/~cbaker84/fidonews.html
|
||
|
||
There are also links there to jim barchuk's HTML FidoNews source and
|
||
to John Souvestre's FTP site for the archives. There is also an email
|
||
link for sending in an article as message text. Drop on over.
|
||
|
||
=*=*=*=*=*=*=*=*=
|
||
|
||
A PGP generated public-key is available for the FidoNews Editor from
|
||
FIDONEWS 14-18 Page 61 5 May 1997
|
||
|
||
|
||
1:1/23 [1:18/14] by file-request for FNEWSKEY or by download from
|
||
Rights On! BBS at 1-904-409-7040 as FIDONEWS.ASC in File Area 18. It
|
||
is also posted twice a month into the PKEY_DROP Echo available on the
|
||
Zone 1 Echomail Backbone.
|
||
|
||
*=*=*=*=*
|
||
|
||
SUBMISSIONS: You are encouraged to submit articles for publication in
|
||
FidoNews. Article submission requirements are contained in the file
|
||
ARTSPEC.DOC, available from the FidoNews Editor, or file-requestable
|
||
from 1:1/23 [1:18/14] as file "ARTSPEC.DOC". ALL Zone Coordinators
|
||
also have copies of ARTSPEC.DOC. Please read it.
|
||
|
||
"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
|
||
trademarks of Tom Jennings, P.O. Box 410923, San Francisco, CA 94141,
|
||
and are used with permission.
|
||
|
||
"Disagreement is actually necessary,
|
||
or we'd all have to get in fights
|
||
or something to amuse ourselves
|
||
and create the requisite chaos."
|
||
-Tom Jennings
|
||
|
||
-30-
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
|