Volume 5, Number 26                                  27 June 1988
    +---------------------------------------------------------------+
    |                                                  _            |
    |                                                 /  \          |
    |                                                /|oo \         |
    |        - FidoNews -                           (_|  /_)        |
    |                                                _`@/_ \    _   |
    |        International                          |     | \   \\  |
    |     FidoNet Association                       | (*) |  \   )) |
    |         Newsletter               ______       |__U__| /  \//  |
    |                                 / FIDO \       _//|| _\   /   |
    |                                (________)     (_/(_|(____/    |
    |                                                     (jm)      |
    +---------------------------------------------------------------+
    Editor in Chief                                       Dale Lovell
    Editor Emeritus:                                   Thom Henderson
    Chief Procrastinator Emeritus:                       Tom Jennings
    Contributing Editors:                                   Al Arango

    FidoNews  is  published  weekly  by  the  International   FidoNet
    Association  as  its  official newsletter.  You are encouraged to
    submit articles for publication in FidoNews.  Article  submission
    standards  are contained in the file ARTSPEC.DOC,  available from
    node 1:1/1.

    Copyright 1988 by  the  International  FidoNet  Association.  All
    rights  reserved.  Duplication  and/or distribution permitted for
    noncommercial purposes only.  For  use  in  other  circumstances,
    please contact IFNA at (314) 576-4067. IFNA may also be contacted
    at PO Box 41143, St. Louis, MO 63141.

    Fido  and FidoNet  are registered  trademarks of  Tom Jennings of
    Fido Software,  164 Shipley Avenue,  San Francisco, CA  94107 and
    are used with permission.

    The  contents  of  the  articles  contained  here  are  not   our
    responsibility,   nor   do   we   necessarily  agree  with  them.
    Everything here is  subject  to  debate.  We  publish  EVERYTHING
    received.



                            Table of Contents

    1. ARTICLES  .................................................  1
       A By Law proposal  ........................................  1
       EchoMail, Blessing or Bane?  ..............................  7
       Killing Viruses  ..........................................  9
    2. NOTICES  .................................................. 23
       The Interrupt Stack  ...................................... 23
       Latest Software Versions  ................................. 23
       FidoCon '88 Registration Form  ............................ 25
    FidoNews 5-26                Page 1                   27 Jun 1988


    =================================================================
                                ARTICLES
    =================================================================

    Neal Curtin
    1:343/1

                    Change to the By Laws


      The following is submitted as a set of proposed amendments to
    the BY-LAWS of the International FidoNet Association. They are
    proposed to the Chairman of the Bylaws Committee, and to the
    Board of Directors of the said International FidoNet Association.


     Proposal 1.


     Current Wording.

      Preamble:

        IFNA NODELIST: The list, prepared by the IFNA Vice President
        - Technical Coordinator, of active nodes in the IFNA NETWORK.

        IFNA NETWORK: The current set of systems  which have been
        certified as FidoNet compatible and conform to policies
        established by the Board of Directors.

        PUBLIC ACCESS: A system that has a telephone number published
        in the IFNA Nodelist, and in addition provides services to
        the public.



      Suggested Wording:

        Nodelist: The list, prepared by the various Zone
        Coordinators, of active nodes within their zone, and on file
        with the International Coordinator.

        Network: The current set of systems which have been certified
        as Fidonet compatible, and conform to the policies
        established by their respective net, region, and zone.

        PUBLIC ACCESS: A system that has a telephone number published
        in the Nodelist, and in addition provides services to the
        public.

      Added wording:

        International Coordinator: The individual elected by the
        various zones and regional coordinators to arbitrate and rule
        on inter-zonal disputes. In addition, the International
        Coordinator is the person responsible for coordination
    FidoNews 5-26                Page 2                   27 Jun 1988


        between the zones and is responsible for establishing new
        zones as the case may arise.


     Rationale:

     These changes are proposed to eliminate the implication, real
     or perceived, that the association owns, controls, or
     manipulates the FidoNet network.



     Proposal #2
     Proposed changes to section 1
      Current wording:

        1(a) Regular Member. To be eligible, an applicant: must be
        the system operator in good standing of a PUBLIC ACCESS node;
        must have paid any dues required; is entitled to one vote.

        1(b) Associate Member. Any person who is not eligible to be a
        Regular Member, but who is interested in electronic
        communications, is eligible to be an Associate Member by
        paying required dues. Associate Members have all of the
        rights of a Regular Member except the right to vote.

        1(c) Commercial Member. Any entity using the IFNA NETWORK for
        the conduct of any business is eligible to be a Commercial
        Member by paying required dues. Any Commercial Member also
        satisfying the requirements to be a Regular Member shall be
        entitled to vote.

      Proposed wording:

        1(a) Regular Member. To be eligible, an applicant: must be
        the system operator in good  standing of a PUBLIC ACCESS
        node; must be listed in a nodelist; must have paid any dues
        required; is entitled to one vote.

        1(b) Associate Member. Any person who is listed in a
        nodelist. or who is interested in electronic communications,
        is eligible to be an Associate Member by making application
        for membership. Associate Members have all of the rights of a
        Regular Member except the right to vote.

        1(c) Commercial Member. Any entity using the IFNA NETWORK for
        the conduct of any business is eligible to be a Commercial
        Member by paying required dues. Any Commercial Member also
        satisfying the requirements to be a Regular Member shall be
        entitled to vote.

     Rational:
     These changes are designed to broaden the scope of eligibility,
     and include all sysops who are listed in a  FidoNet Compatible
     nodelist.

    FidoNews 5-26                Page 3                   27 Jun 1988


     Proposal 3.
     Proposed changes to Section 2 and 3.

      Current wording

        2. Applications for membership shall be submitted to the
        Secretary. In the case of any applicant whose character,
        reputation or conduct might make him an undesirable member,
        the Secretary shall refer the application to the Executive
        Committee for review; in all other cases, the Secretary shall
        have the authority to grant membership.

        3. The Secretary shall notify members of the expiration of
        their membership not less than thirty days prior to
        expiration. In determining membership status, memberships
        renewed within thirty days of expiration shall be regarded as
        continuous.

      Proposed changes

        2. Applications for membership shall be submitted to the
        Membership Committee. In the case of any applicant whose
        character, reputation or conduct might make him an
        undesirable member, the membership Committee shall refer the
        application to the Executive Committee for review; in all
        other cases, the Membership Committee shall have the
        authority to grant membership.

        3. The Membership Committee shall notify members of the
        expiration of their membership not less than thirty days
        prior to expiration. In determining membership status,
        memberships renewed within thirty days of expiration shall be
        regarded as continuous.


     Rational:
     The secretary does not now, nor has he ever been, involved in
     membership. The application goes to the Treasurer, who  notifies
     the Membership Services Committee, who sends out the  membership
     card.


     Proposal #4
     Proposed changes to section 25

      Current wording:

        25. The following voting divisions are established:
         Division 2 Europe, Africa
         Division 10 CA NV
         Division 11 IL IN KY MI OH WI - USA and ON PQ PEI NS NB NF
           -Canada
         Division 12 HI Asia, Australia, Antarctica
         Division 13 DE DC MD NJ NY PA VA
         Division 14 IA KS MN MO NB ND SD
         Division 15 AZ CO NM UT WY
    FidoNews 5-26                Page 4                   27 Jun 1988


         Division 16 CT ME MA NH RI VT
         Division 17 AK ID MT OR WA - USA and BC ALB SSK -Canada
         Division 18 AL FL GA MS NC SC TN
         Division 19 AR LA OK TX, South America,
         Mexico, Central America

      Proposed change:
        25. The following voting divisions are established:
         Division 2 Europe, Africa
         Division 3 Australia, Southern Pacific
         Division 4 AlterNet
         Division 5 GoodEggNet
         Division 6 Canada
         Division 7 Central and South America
         Division 8 IL IN KY MI OH WI
         Division 9 DE DC MD NJ NY PA VA
         Division 10 IA KS MN MO NB ND SD
         Division 11 AZ CO NM UT WY
         Division 12 CT ME MA NH RI VT
         Division 13 AK HI ID MT OR WA
         Division 14 AL FL GA MS NC SC TN
         Division 15 AR LA OK TX

        These divisions may be changed by a two thirds vote of the
        Board of Directors, and should include new zones and new
        Nodelists of over 100 systems.

     Rational:

     The current system does not give enough representation on the
     board to overseas areas and tends to be inflexible.


     Proposal #5
     Proposed changes to section 28

      Current Wording:

        28. The Secretary shall: record the proceedings of all
        meetings of the Board and of the Executive Committee;
        promptly furnish copies of the minutes of these meetings to
        all officers and members of the Board;publish such minutes in
        FidoNews; be responsible for the maintenance of the corporate
        status of IFNA and the filing of all reports and certificates
        which may be required of IFNA under the corporation laws of
        the State of Missouri; be the archivist of IFNA; maintain the
        corporate membership and voting records of IFNA; performs
        other duties as described in applicable Bylaws. To the extent
        that may from time to time be required by law, he shall act
        as agent for the service of process but only while present in
        the State of Missouri and he is not authorized to accept
        service of process elsewhere.

      Proposed Change:

        28. The Secretary shall: record the proceedings of all
    FidoNews 5-26                Page 5                   27 Jun 1988


        meetings of the Board and of the Executive Committee;
        promptly furnish copies of the minutes of these meetings to
        all officers and members of the Board; publish such minutes
        in FidoNews; be responsible for the maintenance of the
        corporate status of IFNA and the filing of all reports and
        certificates which may be required of IFNA under the
        corporation laws of the State of Missouri; be the archivist
        of IFNA; maintain voting records of IFNA; performs other
        duties as described in applicable Bylaws. To the extent that
        may from time to time be required by law, he shall act as
        agent for the service of process but only while present in
        the State of Missouri and he is not authorized to accept
        service of process elsewhere.

     Rational:
     Eliminates the requirement that the secretary maintain the
     membership roster.

     Proposal #6
     Proposed changes to section 30

        Current wording:

        30. The Vice President - Technical Coordinator shall: be
        responsible for maintenance and distribution of the master
        NODELIST; creation and distribution of the weekly update file
        for the master NODELIST; ensuring the smooth operation of
        the IFNA NETWORK as prescribed by the Board of Directors;
        serve as a member of the Technical Standards Committee.

        Proposed change:

        30. The Vice President - Technical Coordinator shall: serve
        as a member of the Technical Standards Committee, and be
        responsible for the development and publication of standards
        for system software so as to ensure compatibility between the
        various nodes. The VP-TC will assist the various Coordinators
        in technical matters.

     Rational:
     This change to eliminate the implied or perceived implication
     of that IFNA desires or wants to control the nodelist. The
     reference to the IC is dropped and would no longer be a IFNA
     position.


     Proposal #7
     Proposed changes to section 40
      Current wording:

        40. There shall be an official publication maintained by
        IFNA, in the form of a weekly journal, the name of which
        shall be FidoNews. A copy of this journal shall be available
        each week to every member of IFNA in good standing. The
        General management of this journal shall be in the hands
        of the President. The policy of the journal shall be
    FidoNews 5-26                Page 6                   27 Jun 1988


        determined by the Board of Directors.

      Proposed change:

        40. There shall be an official publication maintained by
        IFNA, in the form of a weekly journal, the name of which
        shall be FidoNews. A copy of this journal shall be available
        each week to all listed nodes. The general management of this
        journal shall be in the hands of the President. The policy of
        the journal shall be to publish all submitted articles of
        interest to the FidoNet community, within the bounds of
        legality and good  taste.

     Rational:
     This change is to eliminate the reference that the journal is
     only for IFNA members, and to give some firm direction to the
     editorial staff.


    Respectively submitted by Neal Curtin, Network Coordinator, Net
    1:343.


    -----------------------------------------------------------------

    FidoNews 5-26                Page 7                   27 Jun 1988


    Bob Morris
    FN 1:141/333, 1:141/386
    AN 7/1, 7/13, 7:46/1, 7:46/2 and 7:46/3

    Echomail, the thing which allows our users (you remember them)
    to communicate with the rest of the world on things that are
    bothering them, technical issues, as well as speciality areas.

    EchoMail has become something of a monster, what we all
    use to help support and have become "HOOKED" on is now being
    used as the carrot which the EchoMail Backbone, REC's, NEC's
    and what ever use to limit our links to other systems across
    the world.

    EchoMail was designed by Jeff Rush and it was a GREAT idea of
    getting the same message out to a lot of people at the same
    time.  But in today's environment, EchoMail has established
    a new power point to control what we all do for our users,
    including what type modems are utilized, the hours that
    echomail can be picked up, the systems which can called to
    pick up these areas and last, but not least, who we
    can align ourselves with when it comes time to use software
    to process this whole mess.

    In this Sysop's mind, it has become a monster which in the last
    20 months has accomplished the following items without the
    least amount of trouble.

    1.   The splitting of the Network (FidoNet as we knew it in
         January of 1987) into different Networks.

    2.   The demise of good working relationships.

    3.   The phrase "FLAME ON".

    4.   The inability of people to "read" humor or anything else
         within the written word.  This has lead to many people not
         being able to understand the context of many of the
         messages that we all read on a daily basis.

    5.   The demise of IFNA as well as causing it to become
         unable to accomplish anything based upon the problems
         associated with Electronic Mail especially that of Echo-
         Mail.

    6.   The establishment of the *EC positions, which when they
         started, were needed, but now they duplicate the *C
         positions and are now wielding more power and control
         than their contemporaries within the FidoNet Administrator
         Positions.

    7.   The disenchantment of Sysops as a whole about the world
         of BBSing, causing them to DROP OUT entirely, or at the
         least the seeking of Alternatives to the HATEMail which
         now proliferates the AREAS.BBS today.

    FidoNews 5-26                Page 8                   27 Jun 1988


    8.   The establishment of EchoMail areas which do nothing but
         allow people who moderate EchoMail areas a place to
         discuss what is happening within the world of echomail
         and to discuss how to furthur control who can get
         direct access to an EchoMail area.
    If you read this article as "Sour Grapes" (one less than a
    FLAME) then that is what I intended it to do.  If you read it
    as an indictment of the EchoMail process as it exists today,
    then, again, it is something that I intended to do.  If you
    read this article and feel as though I am saying that the need
    for an enforcement procedure is bad, then I have again
    accomplished what I set out to do.  If you read this and find
    that someone is imposing a set of rules upon the manner in
    which you and your USER must share ideas, thoughts and
    other information which is posted in the EchoMail Areas, then
    again, I have accomplished what I set out to do.

    I am NOT saying that EchoMail Coordination is bad, I am saying
    that the people who Coordinate the running of the EchoMail
    distribution are imposing a set of rules and regulations which
    have not been accepted by the Sysop Community as a whole.  I am
    also stating that pickups outside of a region, as long as they
    are closed loops, stand little if any chance of generating
    duplicates within any given region.  Links outside of a given
    Region provide for a backup link in case of disaster or full
    disk drives.

    Within AlterNet, there is a stated Policy concerning EchoMail,
    that Policy is to "Be Polite, and if you cannot add anything to
    a conference which is Positive, then do not use the conference"
    this Policy is followed by the vast majority of the AlterNet
    Community, unfortunately, it does not have to apply to the
    FidoNet Community.

    EchoMail, from my view point, has broadened my scope as far as
    what is happening within the Networks, but it has soured me as
    far as my view point of other Sysops and also the way that they
    look at me.  It is a two way street, no one wins, and only AT&T,
    SPRINT, MCI, GTE and PCP have won as they get all the neat
    profits from our expenses.

    A few last points, do we really need all 225 conferences?  Do
    we really need all of this to make sure that our users get a
    couple of EchoMail areas?  Or are we doing this just so that
    our Blood Pressure gets up at least once a day?


    Bob Morris
    FN 141/333, 141/386
    AN 7/1, 7/13, 46/1, 46/2, 46/3

    -----------------------------------------------------------------

    FidoNews 5-26                Page 9                   27 Jun 1988


    Lee Kemp, Communet 1:221/162.14

    7 June 1988

    K I L L I N G   V I R U S E S

    1. INTRODUCTION

    Numerous utilities have been released for detecting "virus"
    programs before they damage hard disks or get passed on.

    Unfortunately this won't work. Existing viruses will continue to
    spread from diskettes already infected, and will re-infect
    computers that have been through it before. New more virulent
    strains will be developed to overcome each new detection utility
    released (perhaps by infecting the utilities themselves!)

    I believe I've figured out a method that WILL work. The World
    Health Organization managed to stamp out smallpox through a
    coordinated international campaign and I believe we can do the
    same for ALL computer viruses - but it will require a coordinated
    campaign.

    This article lays out the basic idea and asks for help. Help
    through any constructive criticisms or alternative proposals,
    help through negative, destructive "flames" if the idea is all
    wrong, so I'll stop wasting time on it, and help from any
    software developers willing to "send code".

    However I am not interested in corresponding about whether
    destructive Trojan viruses actually exist and whether they will
    become a serious problem. Its far too late to be discussing THAT.

    First, some reasons why its worth working on the solution I
    propose.

    1.1 There is NO way to detect viruses

    None of the methods currently used have the SLIGHTEST chance of
    detecting a reasonably well designed Trojan, let alone a genuine
    virus. Tests that are just done when software is first received,
    and just consist of running a utility over it once, or installing
    a TSR monitor, are ALREADY completely useless.

    Any jerk can write a Trojan that won't do anything suspicious
    while it's being tested, and the test utilities themselves are
    likely to be a target for more sophisticated viruses.

    Ideas like continually monitoring disk writes are ok for the
    first generation of Trojans but simply won't work with the next
    generation. Actually they will become positively dangerous. A
    virus could simply recognize the particular TSR that's monitoring
    it, grab the interrupts back, and send reassuring messages to the
    SysOp, while it doesn't even bother to WAIT before starting to
    infect other software! A false sense of security is MUCH worse
    than the knowledge that anything you make available for download
    FidoNews 5-26                Page 10                  27 Jun 1988


    COULD be a virus.

    Source code for IBM ROM BIOS is available in the Technical
    Reference manuals for anyone who wants to write Trojans that
    access disk controllers directly. Also there are ways to do
    apparently "legitimate" disk writes that do no immediate damage
    but can trigger an infection later.

    Much more sophisticated approaches to delayed action are
    available than using the DOS date function.

    Checksums of operating system files and their dates and times are
    easily bypassed.

    Proper testing requires at least the sort of insulation from the
    hardware and operating system that is provided by a 386 running
    in virtual 8086 mode. Worse, there are even ways around THAT,
    which I won't go into here.

    Anyone familiar with the secure design of operating systems
    understands that there is NO way an application program can be
    prevented from doing whatever it damn well pleases when the
    underlying CPU hardware doesn't run in a protected mode. OS/2 and
    Unix run in a protected mode but MSDOS normally doesn't, and
    CAN'T on XTs and ATs.

    Even protected mode isn't enough, given the practical realities
    of normal security precautions. Controlled experiments with Unix
    viruses have achieved root privileges in less than an hour, with
    an average of 30 minutes. (F. Cohen, "Computer Viruses: Theory
    and Experiments", University of Southern California, August 1984,
    cited in Wood and Kochan, "Unix System Security", Hayden Book
    Company, 1985)

    The SERIOUS work in computer security is being done on how to
    protect a system when you have complete source code for
    everything run on it - and THAT is damn difficult. ADA and Pascal
    are languages intended to allow you to figure out what the source
    code actually does, but C is the language of micro applications
    and its designed for efficiency, not correctness proofs. Take a
    look at the fast table driven CRC routines used in most FidoNet
    mailers these days. How many C programmers have the faintest idea
    what they ACTUALLY do?

    Serious computer security work also deals with problems like
    "compiler viruses", that install themselves in any software
    compiled, including new versions of the compiler. Who REALLY
    knows what's in most microcomputer object code - not even the
    authors!

    There is NO serious work being done on protection from real mode
    applications running on 80x86 machines. Because it SIMPLY CAN'T
    BE DONE.

    Now sit back and think about the implications of that for 3000
    FidoNet nodes around the world continually exchanging software
    FidoNews 5-26                Page 11                  27 Jun 1988


    with each other and their users! This network can spread a deadly
    virus around the world within DAYS (if not hours).


    1.2 We don't have time for testing

    ANY partially useful testing system for the next generation of
    viruses would require tests EVERY time a copy of ANY software is
    made available for distribution, and fairly elaborate procedures
    to ensure the testing is done on an uninfected machine with
    uninfected test utilities.

    Even factory fresh diskettes from major software houses have
    ALREADY been infected, so what's to stop the latest upgrade of
    some commercial package infecting a machine that's been carefully
    kept "clean"? Even Harvard couldn't persuade Lotus to let them
    retain their policy of ONLY running software for which they had
    compiled the source code themselves.

    BBS SysOps just don't have the time to properly test files they
    make available for download, even to detect fairly crude Trojans.
    Neither do end users. Even PARTIALLY useful serious tests simply
    won't be widely used until AFTER there has been some MAJOR damage
    done. The time wasted on serious testing will then be almost as
    damaging as actual loss of data.


    1.3 We can't afford to just keep quiet and hope

    The first generation of diskette based viruses has now become of
    sufficient public interest for full page articles in daily
    newspapers as well as computer magazines. It is therefore CERTAIN
    that some warped people will take up the challenge to design the
    next generation. It is also very likely to happen SOON.

    In case anybody thinks that mentioning all this could give people
    ideas, I should point out that the technical points made above
    will be obvious to anybody TRYING to figure out how to get past
    present detection utilities. People who have ALREADY shown much
    more sophistication with Unix viruses will now be focussing their
    attention on personal computer diskette based viruses as a result
    of the newspaper publicity if nothing else.

    I am deliberately refraining from mentioning some approaches that
    are obvious to me, but that may not be thought of immediately by
    just ANYBODY contemplating a virus program, in case that can give
    an extra breathing space. But I KNOW that there ARE ways to
    unleash delayed action virus programs that CANNOT be detected by
    ANY feasible method. I don't think it will be long before these
    more sophisticated approaches become general public knowledge
    too.

    A basic issue is that viruses involve quite different problems
    from simple Trojans. They can spread WITHOUT doing overt damage.

    I am writing a separate technical paper on all this, which shows
    FidoNews 5-26                Page 12                  27 Jun 1988


    that FidoNet itself is in special "clear and present danger" with
    more than the usual problems faced by all BBSes. Anyone wanting a
    copy should NetMail me direct, explaining why they have a
    legitimate "need to know" and with an undertaking not to pass on
    the information. This paper is not available for file request but
    will be crashed direct to responsible software developers
    interested in working on solutions.

    I sent a message about these problems to the International
    Coordinator of FidoNet nearly three months ago. He replied to
    other matters in the same message in a manner indicating that he
    had not understand anything I said to him, and he did not reply
    at all on this issue. Judging from that and other indications, I
    do not believe that the authorities within FidoNet who ought to
    take the initiative to do something about this situation are
    likely to do so. (For that matter my experience with the IC is
    that he also thinks he can avoid other serious problems by
    sticking his head in the sand). I see no choice but to now pass
    on the information direct to interested and responsible software
    developers.

    There's no point refraining from public discussion, when full
    page articles about computer viruses are appearing in daily
    newspapers, and when people responsible for administration of
    FidoNet won't listen AT ALL.

    Ok, now as well as being necessary to look at new solutions, it's
    also URGENT to do so.


    2. WHY ITS URGENT

    "Computer AIDS" is likely to have as devastating an effect on
    BBSes and FidoNet as the original AIDS has already had on gays,
    and is now having on the wider community. Unless something is
    done NOW, we are CERTAIN to eventually be hit by some really
    deadly virus that has been spread to literally thousands of
    public access BBS systems through FidoNet and will then, months
    later, cause literally millions of dollars worth of damage to
    data on literally tens of thousands of users hard disks. The
    problem is THAT serious.

    Apart from jerks, there are economic interests that actually
    stand to GAIN from destructive viruses, because public domain
    software, and the "sharing" of other software that often occurs
    among people who use public domain software, directly competes
    with their own commercial interests.

    As Nicholas Rothwell points out in his article on "Computer
    AIDS":

              But what if one does not want to create trouble, but
              rather to destroy trust? For that is what is at stake.
              Without open communication, without "public domain"
              software, without free exchange of academic and
              technical software, the personal computer revolution is
    FidoNews 5-26                Page 13                  27 Jun 1988


              hamstrung.

    There are plenty of technically competent people in FidoNet who
    are out to destroy trust and are opposed to open communication.
    I'll be going into that in a later article.

    Last month a report for the European Commission issued a formal
    blunt warning that computer networks across the member nations of
    the European Community were not safe:

              Unless action is taken to improve levels of computer
              and network security, the consequences for individual
              enterprises could be severe, even catastrophic.

    For FidoNet the consequences would be catastrophic, not just
    "severe". It is one of the world's largest computer networks, but
    with virtually NO security and LOTS of jerks.

    We are supposed to be a network dedicated to the free exchange of
    information. If instead we become known as a network that has
    done millions of dollars worth of PREDICTABLE damage that COULD
    have been avoided by SIMPLE countermeasures, then both individual
    SysOps and IFNA could be held legally responsible for the damage
    resulting from negligently failing to take those countermeasures.

    Quite apart from the legal consequences, a really devastating
    virus attack would give the words "BBS" and "FidoNet" a brand
    recognition somewhere between Tylenol and anal sex.

    If the countermeasures aren't in place BEFORE major damage is
    done, there will be an atmosphere of incredible paranoia about
    using ANY software from BBSes and user groups. It could even be
    quite difficult working on solutions in that atmosphere. Also
    interests opposed to public domain software and the free exchange
    of information could take the opportunity to impose regulation
    and controls on a VERY unpopular minority.


    3. WHAT IS TO BE DONE?

    Fortunately there IS an approach that CAN stop viruses, and COULD
    be widely used as soon as its available. I hope I've given enough
    reasons for people to take a serious interest in my proposals
    despite their unfamiliarity. Here goes.

    The way biological immune systems develop antibodies to attack
    foreign bodies is to first identify what SHOULD be present and
    then deduce what should not. We can do that using "digital
    signatures" just as the immune system recognizes molecular
    signatures.

    Since there is NO practical way to determine whether unknown
    software is a virus or not, the ONLY feasible approach to "safe
    software" is to identify KNOWN software and use nothing else.

    The logic of that is both compelling and frightening. It has
    FidoNews 5-26                Page 14                  27 Jun 1988


    already led to quite serious restrictions on the "promiscuous"
    way that people exchange software. If the current trend
    continues, open BBSes will become less and less viable and the
    "free exchange of information" will be replaced by tightly
    controlled distribution channels.

    AT PRESENT the only way to identify "known" software, is through
    writing and compiling it yourself, or buying it from a commercial
    distributor in a shrink wrapped package. Even these precautions
    aren't worth much against compiler viruses and given the level of
    security at most software publishers.

    Turned around, the same logic suggests we need to find another
    way to identify "known" software. Fortunately there IS another
    way, suitable for BBS public domain and shareware software.


    3.1 Authentication by digital signature

    Software authors and publishers can use public key encryption or
    other digital signature techniques to authenticate their software
    releases with their personal "signature". This merely requires
    that they run a standard encryption utility on each package
    before distribution. An explanation of how public key encryption
    works is in FidoNews 428.

    Authentication is the key to killing viruses while preserving the
    free exchange of information. It doesn't actually kill them, but
    it provides a way we can only use "known" software WITHOUT
    tightly controlled distribution channels.

    Essentially the use of public key digital signatures just
    establishes that any two items that can be decrypted with the
    same "public key" signature MUST have both come from the same
    person. It's that person's personal signature and there is no way
    that anybody else could "forge" it.

    Because an item can be decrypted with a particular public key, it
    must have been encrypted using the corresponding "secret key"
    that was generated simultaneously with the public key by the
    person who published that public key. Since this "secret key"
    cannot be deduced from knowledge of the public key, the person
    who encrypted using it must therefore be the person who published
    the original public key (unless they let somebody else get hold
    of a copy!)

    A digital signature doesn't prove who the person that uses it
    really is, or how trustworthy they are, or whether they
    originally wrote the document they are signing.

    But it DOES allow each software author (or other distributor) to
    establish their own "reputation".

    In practice most users won't want to keep the public keys of
    large numbers of software authors and publishers, and new authors
    and publishers need a way to get their software accepted.
    FidoNews 5-26                Page 15                  27 Jun 1988


    This requires intermediary "recommenders" and "software
    certifiers" who publish "signed" lists of signatures which they
    recommend as trustworthy, or reissue software they trust under
    their own "signatures". They may also issue signed "warnings"
    about infected software they have come across, and who signed it.

    Some SysOps and user groups may want to advise their users which
    signatures they personally recommend as trustworthy. That's up to
    them and it's up to their users what notice to take of their
    advice.

    Some software collectors may want to keep close tabs on who
    releases what, and reissue copies under their own signature as
    evidence that they consider an item to be uninfected. That's
    equivalent to the responsibility that anyone takes now, when they
    pass on a copy of ANYTHING to anybody else. A valuable service
    can be performed by such "software certifiers". When things
    settle down, end users should be able to rely on relatively few
    signatures, and with the side benefit of automatically produced
    catalogs of software available.

    It's very important that there be convenient ways for
    recommendations and warnings to be passed on and accepted or
    rejected automatically according to users preferences as to which
    advice they consider trustworthy. It's equally important that
    there be no central authority who is the sole source of such
    advice.

    It IS possible for such "advice" to be processed automatically,
    by users, with no hassles, despite coming from a multitude of
    sources. I'll explain that later.

    The essential point is that we ALL rely on such advice and
    recommendations now, including published lists of Trojans. The
    difference with my proposal is that we can automate it and know
    where it's really coming from. More important, we can know which
    software EXACTLY is being recommended or warned against.

    Instead of lists warning about certain utility names and version
    numbers, we will see (automatically processed) lists warning
    about signatures. Although anybody can just adopt another
    signature, getting other people to accept it will be a lot harder
    than just using the RENAME command on a Trojan!

    Life will actually be EASIER for SysOps as a result.


    3.2 Establishing Reputations

    For their recommendations and warnings to be accepted, a SysOp or
    other software certifier needs a reputation for giving good
    advice.

    For their signatures to be recommended, or for their software to
    be reissued under other people's signatures, a software author or
    distributor needs a reputation for taking adequate precautions to
    FidoNews 5-26                Page 16                  27 Jun 1988


    not release infected software. (For reissue most people would
    want to read and recompile the source code themselves before
    staking their own reputations on it.)

    In both cases anybody can start again under another signature,
    but the signatures that users will accept will be the ones that
    have established a reputation over a period.


    3.2.1 "I've never released infected software"

    If an infected program is released under a particular signature,
    anybody can PROVE that signature should not be trusted again.
    (Although nobody can prove whether a virus was released
    deliberately, accidentally, or as a result of allowing a secret
    key to become known to somebody else, the effects are the same
    and the consequences should be the same - don't trust the
    signature of anybody who signed that software. They should never
    have signed it. Whether it was deliberate or not is a matter for
    law courts, not protection schemes.)

    Proof consists of a copy of the infected software, as originally
    signed by the person releasing it, together with details of the
    infection, that can be tested by anyone reading about it.


    3.2.2 "I've never signed bad advice"

    If anybody gives signed bad advice that would be adopted
    automatically by users who have decided to trust their advice,
    anybody damaged can PROVE the advice was bad. Proof consists of a
    copy of the signed advice, together with the proof that the
    advisor got it wrong.

    This can result in other software certifiers issuing signed
    warnings to disregard advice from the signature that has been
    proved to them to be unreliable.

    Issuing a signed warning, without being able to provide the proof
    when requested, can also be dealt with. Having asked for proof,
    other software certifiers will be willing to stake their
    reputations by issuing signed warnings that warnings from a
    particular signature should be disregarded.

    Signed warnings from software certifiers they trust can
    automatically prompt users to revise their lists of who to trust,
    and to review what software on their systems may be dangerous as
    a result of having accepted bad advice.

    Being able to PROVE these things, makes it possible to establish
    a completely informal decentralized and automatic system for
    distributing recommendations along with software. Such a system
    can be fully automated so that it is almost completely
    transparent to users, who only have to decide on accepting the
    signatures of a few people whose recommendations and warnings
    they will trust.
    FidoNews 5-26                Page 17                  27 Jun 1988


    3.3 Implementation

    All encrypted files would have a standard header including the
    public key to be used (about 150 bytes). Decryption software can
    look up the key (or a shorter hash of it) automatically in a
    user's database of acceptable keys. Thus to decrypt a file, users
    wouldn't even have to specify keys along with filenames. To
    decide whether to trust some software, users wouldn't have to
    look up their database manually. The key is either there or it
    isn't, when the decryption software tries to process an encrypted
    file.

    Initially trusted signatures could be in standard format files
    called PUBLIC.KEY, similar to individual nodelist lines. These
    would normally be obtained direct by downloading or file request
    from the trusted phone number contained within them.

    Acceptance of those initial signatures as trustworthy would
    result in automatic acceptance of subsequent files containing
    recommendations or warnings signed with those signatures - until
    the end user decides otherwise. After decrypting the
    recommendation or warning the software would automatically apply
    to the user's keys database.

    Standard formats similar to the St Louis nodelist can be used to
    distribute (signed) lists of recommendations and warnings about
    particular public key signatures. Utilities similar to MAKENL and
    XLATLIST (but with a "user friendly" interface) can be used
    automatically together with the encryption software, to produce
    customized end user databases of what signatures they will
    automatically accept or reject.

    End users just decide on a few signatures they INITIALLY consider
    trustworthy, and then simply pass any encrypted files they
    receive, whether software, recommendations or warnings, through
    their encryption utility to automatically update their keys
    database as well as to decrypt the software recommended by people
    they trust and not warned against by people they trust.

    The main complication for a full protection system is to avoid
    the encryption utilities and key databases themselves becoming
    infected, despite end users not fully understanding what it's all
    about.

    This can be achieved by writing the software so it HAS to be used
    in a secure way, eg coldbooting from a "safe" floppy, encouraging
    floppy backups of the encrypted versions of all software that is
    accepted, and keyboard entry of checksums of PUBLIC.KEY files.

    I'm drafting some proposed standards, specifications and end user
    instructions for immediate and future software development.
    Anyone interested in details of these proposals please file
    request CRYPLIST from 1:221/162 for a list of what's available so
    far. If anyone can suggest a simpler approach that is foolproof,
    or can see loopholes in this one, please send NetMail to me at
    1:221/162.14. Likewise for anyone interested in working on
    FidoNews 5-26                Page 18                  27 Jun 1988


    software and standards. I'd like to start an echo, AREA:PUBKEY,
    for serious discussions among interested software developers. It
    really has to happen NOW.


    3.4 Free Exchange of Information

    Using this approach, software distributors, BBS SysOps and user
    groups etc can freely distribute the encrypted versions of
    software, recommendations and warnings from anybody, without
    worrying about whether the software is infected or whether the
    recommendations and warnings are reliable.

    They simply notify end users not to accept anything that has not
    been encrypted with a digital signature that the USER trusts
    (whether directly or as a result of trusting recommendations and
    ignoring warnings). The recommendations and warnings just get
    distributed along with encrypted software.

    This is an unfamiliar concept, but it can be implemented with
    simple, "user friendly" utilities. It requires NO work "testing"
    software and will ultimately be much easier to get across to end
    users than the idea of software celibacy.

    It also requires NO centralized authorities to put their stamp of
    approval on things. Apart from the unlikelihood of such
    authorities being established or accepted, there would be real
    dangers of abuse judging from the way I've seen FidoNet
    coordinators treat the nodelist. I'll be going into that in later
    articles.


    3.5 Isn't it too complicated?

    Yes, for now. I'm hoping there will be SOME people who understand
    AND agree with the point I'm making and will work on designing a
    system as easy to use as possible for when its needed. Once its
    needed, it will be needed BADLY, and the alternatives will be FAR
    more complicated and basically won't work.

    In that situation, which could come SOON, some SysOps and user
    groups may go on distributing unencrypted software. But they will
    lose popularity either gradually or very suddenly.

    At least this proposal provides an alternative to pretending that
    viruses can't get past detection utilities, and then wondering
    why use of BBSes has suddenly become unpopular.

    HOW safe to play it is up to each user. Some will be silly enough
    to trust any PUBLIC.KEY they are offered. Each time their hard
    disk gets trashed they will at least learn not to trust THAT
    signature again, and eventually they may learn more. Once enough
    users have been educated through experience, it will become
    pointless attempting to release viruses - they aren't going to
    travel far unencrypted and each signature used successfully is
    going to reduce the number of gullible fools willing to accept
    FidoNews 5-26                Page 19                  27 Jun 1988


    unknown signatures.

    Of course some "software certifiers" may irresponsibly issue
    software or recommendations under their signatures without
    sufficient care. But they will quickly AND AUTOMATICALLY be
    discredited and others more reliable will take their place.

    Major software publishers will probably prefer to encourage users
    to rely only on shrink wrapped factory fresh disks. They may even
    welcome the additional incentive to do so. But they could end up
    in the same position as religious moralists claiming that
    monogamy is the only answer to AIDS. If a really devastating
    virus gets out on a factory fresh diskette, that publisher will
    probably go out of business and others may start publishing their
    public keys in magazine ads and printed manuals (or shorter
    hashes of the full keys).


    3.6 How could this proposal get widely adopted?

    End users that receive encrypted software and recommendations
    distributed by BBSes, user groups or other end users are FORCED
    to apply the encryption utility before they can use the software.

    There are VERY good reasons why developers of FidoNet mailers and
    related utilities should be using this system NOW, as I'm
    explaining in a separate technical paper. If they do so,
    responsible FidoNet SysOps will start accepting only the
    encrypted versions (although initially decrypted versions would
    continue circulating).

    Once encrypted software starts being released, using it just
    involves running the encryption utility on the files received,
    with minimal inconvenience. Once FidoNet SysOps are doing that
    for essential network software updates, it will be easy for other
    software authors and publishers to adopt the same system and for
    SysOps to make it available directly to their users. Thus the
    system could take off rapidly, once it gains a foothold.

    The "inconvenience" of running an encryption utility, can be
    hidden by the "convenience" of having a system that automatically
    keeps track of ALL the user's software installation and backups,
    superior to the cataloging utilities available now and with the
    advantage of automatic enforcement of use. It can also be
    integrated with concepts like Megalist, for automatic tracking of
    what's available and where to get it.

    Keeping track is ESSENTIAL for virus killing, to recover from
    having trusted irresponsible recommendations by restoring
    original uninfected software, and to be able to track down,
    remove, and warn others about, the signatures that caused the
    problem. It has to be done automatically, or it won't be done
    properly.

    However this can be implemented later, after basic FidoNet
    software has been protected by a preliminary system. Initially
    FidoNews 5-26                Page 20                  27 Jun 1988


    FidoNet utilities could just be protected with publication of the
    PUBLIC.KEY files of their authors, (eg in FidoNews, or shorter
    hashes as nodelist flags), without the full mechanism for
    exchanging recommendations and warnings and keeping track etc.


    4. POSSIBLE PROBLEMS

    4.1 Legal Hassles

    The US National Security Agency has a policy opposed to the
    widespread use of secure encryption techniques and has classified
    some commercial public key encryption packages such as
    Cryptmaster and PKcrypt as "weapons" subject to munitions export
    controls. However this does NOT apply to publicly available
    information including shareware and public domain software
    available for download from BBSes (although some people have been
    bluffed into believing it might).

    Under the US Export Administration Regulations there is a General
    Licence "GTDA" (part 379.3) which covers all such publicly
    available technical data and is NOT overridden by the munitions
    regulations (logical when you think about it - the US Government
    is not so silly as to even TRY to prohibit export of publicly
    available data!). Full details for anyone interested are
    contained in a USEnet discussion as file GTDA.ARC (10K) available
    for file request from 1:221/162.

    Books containing detailed algorithms are readily available and
    public domain or shareware source code would be in the same
    category. (Some has already been released through BBSes and
    USEnet).

    I would recommend the following books for a thorough professional
    understanding of secure cryptographic techniques:

    Alan G. Konheim, "Cryptography: A Primer", John Wiley & Sons, New
    York, 1981.

    Carl H. Meyer and Stephen M. Matyas, "Cryptography: A new
    dimension in computer data security", John Wiley & Sons, New
    York, 1982.


    4.2 Developing Encryption Software

    Development of a standard public key encryption utility that can
    be used widely involves no significant technical problems at all.

    Its true that software with even the best key generation
    algorithms runs extremely slowly, but each software author or
    publisher only needs to generate their keys once and end users
    don't need to do it at all (although there are extra benefits if
    they do).

    Actual encryption and decryption operates at quite acceptable
    FidoNews 5-26                Page 21                  27 Jun 1988


    speeds with existing commercial packages and can no doubt be
    further improved with the superior programming resources
    available within FidoNet.

    For our purposes a high speed "hybrid" implementation could be
    quite acceptable, at least initially. This would use relatively
    slow public key encryption to authenticate only a short hash of
    the attached software, using a cryptographically secure hashing
    method. The actual software need not be encrypted at all, but
    just hashed with a more complex algorithm than the usual CRC and
    producing at least 10 bytes of output. (That could also keep NSA
    happy).

    A smooth transition could be achieved by using a normal ARC file,
    which can just be used to unARC the software directly or ALSO
    used to check a file within it that contains the "signed" hash of
    the rest of the ARC file. In the long run though, once things get
    really bad, it would be better to force users to actually run the
    software provided for authentication, by actually encrypting
    entire files. The transitional system would be useful for secure
    distribution of a better system released later.

    I am writing a draft proposal for the FidoNet Technical Standards
    Committee suggesting standards to ensure utilities developed will
    be secure, compatible, fast, widely adopted, suitable for porting
    to all common computers and suitable for other FidoNet uses.
    (Other uses with further software development include: private
    and authenticated Email; a convenient, decentralized and secure
    means for exchanging nodelist information and session passwords
    between nodes; and Email voting systems.)


    4.2 Is Public Key Encryption Secure?

    Most digital signature techniques rely on the computational
    difficulty of factorizing large composite numbers. This problem
    has defied mathematicians for some 200 years but has not been
    proved cryptographically secure or even "NP complete" (a measure
    of computational complexity which does NOT prove cryptographic
    security). There is some indication that these methods CAN
    eventually be cracked or MAY have already been cracked, with the
    results classified.

    Fortunately this problem need not concern us unduly as it is
    unlikely that a major breakthrough in higher mathematics will
    first come to light as a result of its discovery by someone
    warped enough to want to launch destructive viruses! (Not that
    some mathematicians aren't pretty warped, but they'd probably
    prefer to take the public kudos for announcing the solution!)

    If new developments make any particular digital signature system
    insecure, alternatives are available and can be implemented
    quickly. (Unlike virus detection programs which just simply won't
    work AT ALL against the next generation of viruses.) Standards
    for file headers etc should provide for later upgrades.
    The main thing is to have the machinery in place for when its
    FidoNews 5-26                Page 22                  27 Jun 1988


    needed, and improve it later.


    4.4 Developing End User Software

    Some pretty neat software will need to be written quickly for end
    users automatic key databases and tracking etc. It has to end up
    being a lot more professional and "user friendly" than most
    public domain and shareware software and provide lots of extra
    benefits like software cataloging, to gain wide acceptance BEFORE
    a disaster hits.

    That's why I wrote this article. Now who's going to do the hard
    stuff?

    Oh well, there it is. Sorry about the length, but if nobody pays
    any attention, guess who'll be saying "I told you so".


    -----------------------------------------------------------------

    FidoNews 5-26                Page 23                  27 Jun 1988


    =================================================================
                                 NOTICES
    =================================================================

                         The Interrupt Stack


    16 Jul 1988
       A new  areacode, 508, will  form in eastern  Massachusetts and
       will  be effective on  this date.  The  new area  code will be
       formed  from the  current  areacode 617.  Greater Boston  will
       remain areacode 617  while the  rest of eastern  Massachusetts
       will form the new areacode 508.

    25 Aug 1988
       Start  of the  Fifth  International  FidoNet Conference, to be
       held  at  the Drawbridge Inn  in Cincinnati, OH.  Contact  Tim
       Sullivan at 108/62 for more information. This is FidoNet's big
       annual get-together, and is your chance to meet all the people
       you've  been talking with  all this time.  We're hoping to see
       you there!

    24 Aug 1989
       Voyager 2 passes Neptune.


    If you have something which you would like to see on this
    calendar, please send a message to FidoNet node 1:1/1.

    -----------------------------------------------------------------

                         Latest Software Versions

    BBS Systems            Node List              Other
    & Mailers   Version    Utilities   Version    Utilities   Version

    Dutchie        2.90*   EditNL         4.00*   ARC            5.21
    Fido            12h    MakeNL         2.12*   ARCmail         1.1
    Opus          1.03b    Prune          1.40    ConfMail       3.31
    SEAdog         4.10    XlatList       2.86    EchoMail       1.31
    TBBS           2.0M    XlaxNode       1.02    MGM             1.1
    BinkleyTerm    1.50    XlaxDiff       1.02
    QuickBBS       2.01    ParseList      1.10

    * Recently changed

    Utility authors:  Please help  keep  this  list  up  to  date  by
    reporting  new  versions  to 1:1/1.  It is not our intent to list
    all utilities here, only those which verge on necessity.

    -----------------------------------------------------------------

    FidoNews 5-26                Page 24                  27 Jun 1988


           OFFICERS OF THE INTERNATIONAL FIDONET ASSOCIATION

    Ken Kaplan       100/22   Chairman of the Board
    Don Daniels      107/210  President
    Mark Grennan     147/1    Vice President
    Dave Dodell      114/15   Vice President - Technical Coordinator
    David Garrett    103/501  Secretary
    Leonard Mednick  345/1    Treasurer



                        IFNA BOARD OF DIRECTORS

        DIVISION                               AT-LARGE

    10  Steve Jordan      102/2871        Don Daniels     107/210
    11  Bill Allbritten   11/301          Hal DuPrie      101/106
    12  Leonard Mednick   345/1           Mark Grennan    147/1
    13  Rick Siegel       107/27          Brad Hicks      100/523
    14  Ken Kaplan        100/22          Ted Polczyinski 154/5
    15  Jim Cannell       128/13          Kurt Reisler    109/74
    16  Vince Perriello   141/491         Robert Rudolph  261/628
    17  Rob Barker        138/34          Greg Small      148/122
    18  Christopher Baker 135/14          Bob Swift       140/24
    19  Vernon Six        19/0            Larry Wall      15/18
     2  Henk Wevers       2:500/1         Gee Wong        107/312

    -----------------------------------------------------------------

    FidoNews 5-26                Page 25                  27 Jun 1988


                      FidoCon '88 - Cincinnati, Ohio
               At The Drawbridge Inn and Convention Center
                            August 25-28, 1988

                        Attendee Registration Form


       Name:    ____________________________________________________

    Address:    ____________________________________________________

    Address:    ____________________________________________________

       City:    _______________________ State: ____ Zip: ___________

    Country:    ____________________________________________________



    Phone Numbers:

        Day:    ____________________________________________________

    Evening:    ____________________________________________________

       Data:    ____________________________________________________


        Zone:Net/
        Node.Point:  _______________________________________________

     Your BBS Name:  _______________________________________________


      BBS Software:  _____________________ Mailer: _________________

       Modem Brand:  _____________________ Speed:  _________________


    What Hotel will you be Staying at:  ____________________________

          Do you want to share a room?  ______

                 Are you a non-smoker?  ______

         Do you want an in room point?  ______
      (Tower rooms at Drawbridge only)



    Do you need special accommodations? ______

              (If so, please explain)   ____________________________

                                        ____________________________

    FidoNews 5-26                Page 26                  27 Jun 1988


                  Are you a non-Sysop?  ______

               Are you an IFNA Member?  ______

     If so, will you be attending the
       Sunday IFNA brunch/BoD meeting?  ______


                    Additional Guests:  ______
           (not attending conferences)




    Comments:   ____________________________________________________

                ____________________________________________________

                ____________________________________________________


    Costs                                   How Many?   Cost
    ---------------------------             --------    -------

    Conference fee $60..................... ________    _______
    ($75.00 after 7/31)

    Thursday Lunch    $10.95 .............. ________    _______

    Thursday Dinner   $18.95 .............. ________    _______

    Friday Lunch      $10.95 .............. ________    _______

    Friday Banquet    $24.95 .............. ________    _______

    Saturday Lunch    $10.95 .............. ________    _______
                                            ========    =======

    Totals ................................ ________    _______


    You may pay by Check, Money Order or Visa/MC
    Please send no cash.  All monies must be in U.S. Funds.
    Checks should be made out to: "FidoCon '88"

    This form should be completed and mailed to:

                         FidoCon '88 Registration
                              P.O. Box 9294
                           Cincinnati, OH 45209


    If you pay by Credit Card you may also register by Netmailing
    this completed form to 108/62 or 1/88 for processing.  Please
    complete the information below and be sure to include a voice
    phone number above so that we can contact you for Credit Card
    FidoNews 5-26                Page 27                  27 Jun 1988


    verification.  Rename this file ZNNNXXXX.REG where Z is your Zone
    number, N is your Net number, and X is your Node number.


                         [ ] Visa     [ ] MasterCard


    Name as it appears
        on credit card:  ___________________________________________

    Credit Card Number:  ___________________________________________

       Expiration Date:  ___________________________________________

             Signature:  ___________________________________________
                         (If you mail in registration)

    -----------------------------------------------------------------

    FidoNews 5-26                Page 28                  27 Jun 1988


                    INTERNATIONAL FIDONET ASSOCIATION
                                ORDER FORM

                               Publications

    The IFNA publications can be obtained by downloading from Fido
    1:1/10 or  other FidoNet compatible  systems, or by purchasing
    them directly from IFNA.  We ask that  all our  IFNA Committee
    Chairmen   provide  us   with  the  latest  versions  of  each
    publication, but we can make no written guarantees.

    Hardcopy prices as of October 1, 1986

       IFNA Fido BBS listing                       $15.00    _____
       IFNA Administrative Policy DOCs             $10.00    _____
       IFNA FidoNet Standards Committee DOCs       $10.00    _____

                                                 SUBTOTAL    _____

                     IFNA Member ONLY Special Offers

       System Enhancement Associates SEAdog        $60.00    _____
       SEAdog price as of March 1, 1987
       ONLY 1 copy SEAdog per IFNA Member

       Fido Software's Fido/FidoNet               $100.00    _____
       Fido/FidoNet price as of November 1, 1987
       ONLY 1 copy Fido/FidoNet per IFNA Member

       International orders include $10.00 for
              surface shipping or $20.00 for air shipping    _____

                                                 SUBTOTAL    _____

                   HI. Residents add 4.0 % Sales tax         _____

                                                 TOTAL       _____

       SEND CHECK OR MONEY ORDER IN US FUNDS:
       International FidoNet Association
       c/o Leonard Mednick, MBA, CPA
       700 Bishop Street, #1014
       Honolulu, HI.  96813-4112
       USA

    Name________________________________
    Zone:Net/Node____:____/____
    Company_____________________________
    Address_____________________________
    City____________________  State____________  Zip_____
    Voice Phone_________________________

    Signature___________________________

    -----------------------------------------------------------------