Volume 6, Number 14                                  3 April 1989
    +---------------------------------------------------------------+
    |                                                  _            |
    |                                                 /  \          |
    |                                                /|oo \         |
    |        - FidoNews -                           (_|  /_)        |
    |                                                _`@/_ \    _   |
    |        International                          |     | \   \\  |
    |     FidoNet Association                       | (*) |  \   )) |
    |         Newsletter               ______       |__U__| /  \//  |
    |                                 / FIDO \       _//|| _\   /   |
    |                                (________)     (_/(_|(____/    |
    |                                                     (jm)      |
    +---------------------------------------------------------------+
    Editor in Chief:                                  Vince Perriello
    Editors Emeritii:                                     Dale Lovell
                                                       Thom Henderson
    Chief Procrastinator Emeritus:                       Tom Jennings
    Contributing Editors:                                   Al Arango

    FidoNews  is  published  weekly  by  the  International   FidoNet
    Association  as  its  official newsletter.  You are encouraged to
    submit articles for publication in FidoNews.  Article  submission
    standards  are contained in the file ARTSPEC.DOC,  available from
    node 1:1/1.    1:1/1  is  a Continuous Mail system, available for
    network mail 24 hours a day.

    Copyright 1989 by  the  International  FidoNet  Association.  All
    rights  reserved.  Duplication  and/or distribution permitted for
    noncommercial purposes only.  For  use  in  other  circumstances,
    please contact IFNA at (314) 576-4067. IFNA may also be contacted
    at PO Box 41143, St. Louis, MO 63141.

    Fido  and FidoNet  are registered  trademarks of  Tom Jennings of
    Fido Software,  164 Shipley Avenue,  San Francisco, CA  94107 and
    are used with permission.

    We  don't necessarily agree with the contents  of  every  article
    published  here.  Most of these materials are  unsolicited.    No
    article will be rejected which is properly attributed and legally
    acceptable.    We   will  publish  every  responsible  submission
    received.


                       Table of Contents
    1. ARTICLES  .................................................  1
       Policy4 Draft Released for Comment  .......................  1
       ZOW, Yet Another Fantastically New File Packer! (Part 2  .. 35
    2. COLUMNS  .................................................. 37
       The Veterinarian's Corner: Winter Weather & Antifreeze  ... 37
    3. LETTERS TO THE EDITOR  .................................... 38
    4. LATEST VERSIONS  .......................................... 39
       Latest Software Versions  ................................. 39
    5. NOTICES  .................................................. 40
       The Interrupt Stack  ...................................... 40
    FidoNews 6-14                Page 1                    3 Apr 1989


    =================================================================
                                ARTICLES
    =================================================================

                             FidoNet Policy4
                            Comments Solicited
             David Dodell, FidoNet International Coordinator
                            1:114/15  -- 1:1/0

    Included in this  article  is  a  proposed  policy  document  for
    FidoNet.  The  existing  policy has served well,  but FidoNet has
    grown and changed  a  great  deal  since  it  was  adopted.  This
    proposal has been prepared by the Regional Coordinators, and your
    comments are sincerely solicited.

    Discussion at the net level is encouraged,  and Network Coordina-
    tors will represent their net to the  Regional  Coordinator.  The
    RC's  realize that the net has significant input into the process
    of preparing policy,  and  your  comments  will  be  thoughtfully
    considered.

    The  deadline for comments is April 30.  A final proposal will be
    issued on May 8,  and a vote will be conducted of NC's and  RC's.
    The  voting  period  will  end  on  June  5,  and results will be
    announced in the nodediff which is released on June 9.

    You are encouraged to read the proposal in its entirity, but here
    are a few of the differences between this proposal and Policy3.

    Greater detail:  Throughout the document,  more detail  has  been
    provided  in  an  effort to clarify procedures.  The intent is to
    make expectations clear for new and existing sysops to reduce the
    potential for unintentional policy violations,  and  to  simplify
    the resolution of disputes when they do occur.  This is an admin-
    istrative  document  which  will  assist  both  coordinators  and
    sysops.

    Description of "new" developments:  Routing hubs,  point systems,
    and  zone coordinators are described.  None of these existed when
    Policy3 was written.

    Change procedure: A procedure is included to modify policy.  This
    procedure will be used to adopt or reject Policy4.

    Dispute resolution:  A statute of  limitations  and  a  limit  on
    response  time  by  a  coordinator  have  been added.  The appeal
    process has  been  clarified.  Specific  requirements  have  been
    added  for  a  dialog  between the complaining parties before the
    filing of a formal complaint.

    Mail:   Specific  procedures  are  included  for  private   mail,
    echomail, and mail routing.

    Index: An index has been added to help you find that section that
    you know is there, but can't seem to locate.

    FidoNews 6-14                Page 2                    3 Apr 1989


    The full text of the proposal follows:


                        FidoNet Policy Document        Version 4.03
                             *** DRAFT ***           March 24, 1989


    This policy document has been released for comment, and is not
    yet in force.  Please direct comments to your Network Coordi-
    nator.



    1  Overview


    1.0  Language

    The official language of FidoNet is English.  All documents
    must exist in English.  Translation into other languages is
    encouraged.


    1.1  Introduction

    FidoNet is an amateur electronic mail system.  As such, all of
    its participants and operators are unpaid volunteers.  From
    its early beginning as a few friends swapping messages back
    and forth (1984), it now (1989) includes over 5,000 systems on
    six continents.

    FidoNet is not a common carrier or a value-added service
    network and is a public network only in as much as the inde-
    pendent, constituent nodes may individually provide public
    access to the network on their system.

    FidoNet is large enough that it would quickly fall apart of
    its own weight unless some sort of structure and control were
    imposed on it.  Multinet operation provides the structure.
    Decentralized management provides the control.  This document
    describes the procedures which have been developed to manage
    the network.


    1.2  Organization

    FidoNet nodes are grouped on several levels.

    Separate documents may be issued at the zone, region, or net
    level to provide additional detail on local procedures.  Ordi-
    narily, these lower-level policies may not contradict this
    policy.  However, with the approval of the International
    Coordinator, local policy can be used to implement differences
    required due to local requirements.  The Zone Coordinator
    Council may reverse the decision of the International Coordi-
    nator.  These local policies may not place additional restric-
    FidoNews 6-14                Page 3                    3 Apr 1989


    tions on members of FidoNet beyond those included in this
    document, other than enforcement of local mail periods.


    1.2.1  Points

    A point is a FidoNet-compatible system that is not in the
    nodelist, but communicates with FidoNet through a node re-
    ferred to as a bossnode.  A point is generally regarded in the
    same manner as a user, for example, the bossnode is responsi-
    ble for mail from the point.  (See section 2.1.3.)  Points are
    addressed by using the bossnode's nodelist address; for exam-
    ple, a point system with a bossnode of 114/15 might be known
    as 114/15.12.  Mail destined for the point is sent to the
    bossnode, which then routes it to the point.

    In supporting points, the bossnode makes use of a private net
    number which should not be visible outside of the bossnode-
    point relationship except as the first entry in the ^aPATH
    line.  Unfortunately, should the point call another system
    directly (to do a file request, for example), the private
    network number will appear as the caller's address.  In this
    way, points are different from users, since they operate
    FidoNet-compatible mailers which are capable of contacting
    systems other than the bossnode.

    1.2.2  Nodes

    A node is a single FidoNet address, and is the smallest offi-
    cial unit of FidoNet.


    1.2.3  Networks

    A network is a collection of nodes in a local geographic area.
    Networks coordinate their mail activity to decrease cost.

    1.2.3  Regions

    A region is a well-defined geographic area containing nodes
    which may or may not be combined into networks.  A typical
    region will contain many nodes in networks, and a few indepen-
    dent nodes which are not a part of any network.

    1.2.5  Zones

    A zone is a large geographic area containing many regions,
    covering one or more countries and/or continents.


    1.2.6  FidoNet

    FidoNet indicates the entire amateur mail network as defined
    by the weekly nodelist (see section 1.3.4).


    FidoNews 6-14                Page 4                    3 Apr 1989


    1.3  Definitions

    1.3.1  FidoNews

    FidoNews is a weekly newsletter distributed throughout the
    network by the coordinator structure.  It is an important
    medium by which FidoNet sysops communicate with each other.
    FidoNews provides a sense of being a community of people with
    common interests.  Accordingly, sysops and users are encour-
    aged to contribute to FidoNews.  Contributions are submitted
    to node 1/1; a file describing the format to be used is avail-
    able on many systems.


    1.3.2  Geography

    Each level of FidoNet is geographically contained by the level
    immediately above it.  A given geographic location is covered
    by one zone and one region within that zone, and is either in
    one network or not in a network.  There are never two zones,
    two regions, or two networks which cover the same geographic
    area.

    If a node is in the area of a network, it should be listed in
    that network, not as an independent in the region.  (The
    primary exception to this is a node receiving inordinate
    amounts of host-routed mail; see section 4.2).  Network bound-
    aries are based on calling areas as defined by the local
    telephone company.  Even in the case of areas where node
    density is so great that more than one network is needed to
    serve one local calling area, a geographic guideline is used
    to decide which nodes belong to what network.  Network member-
    ship is based on geographic or other purely technical ratio-
    nale.  It is not based on personal or social factors.

    There are cases in which the local calling areas lead to
    situations where logic dictates that a node physically in one
    FidoNet Region should be assigned to another.  In those cases,
    with the agreement of the Regional Coordinators and Zone
    Coordinator involved, exemptions may be granted.  Such exemp-
    tions are described in section 5.6.

    1.3.3  Zone Mail Hour

    Zone Mail Hour (ZMH) is a defined time during which all nodes
    in a zone are required to be able to accept netmail.  Each
    Fidonet zone defines a ZMH and publishes the time of its ZMH
    to all other Fidonet zones.  See sections 2.1.8 and 10.2.

    Zone Mail Hour has previously been referred to as National
    Mail Hour and Network Mail hour.  The term Zone Mail Hour is
    more accurate.

    1.3.4  Nodelist

    The nodelist is a file updated weekly which contains the ad-
    FidoNews 6-14                Page 5                    3 Apr 1989


    dresses of all recognized FidoNet nodes.  This file is cur-
    rently made available by the Zone Coordinator not later than
    Zone Mail Hour each Saturday, and is available electronically
    for download or file request at no charge.  To be included in
    the nodelist, a system must meet the standards defined by this
    document.  No other requirements may be imposed.

    Partial nodelists (single-zone, for example) may be made
    available at different levels in FidoNet.  The full list as
    published by the International Coordinator is regarded as the
    official FidoNet nodelist, and is used in circumstances such
    as determination of eligibility for voting.  All parts that
    make up the full nodelist are available on each Zone Coordina-
    tor's and each Regional Coordinator's system.


    1.3.5  Excessively Annoying Behavior

    There are references throughout this policy to "excessively
    annoying behavior", especially in section 9 (Resolution of
    Disputes).  It is difficult to define this term, as it is
    based upon the judgement of the coordinator structure.  Gener-
    ally speaking, annoying behavior irritates, bothers, or causes
    harm to some other person.  It is not necessary to break a law
    to be annoying.  Refer to section 9 and the case studies
    (section 10.3) for more information.

    1.4  Administration of FidoNet


    FidoNet has a hierarchical structure for administration of the
    network, with the following levels:


    1.4.1  International Coordinator

    The International Coordinator is the "first among equals" Zone
    Coordinator.  He coordinates the joint production of the
    master nodelist by his fellow Zone Coordinators.

    The International Coordinator acts as the chair of the Zone
    Coordinator Council and as the overseer of elections -- ar-
    ranging the announcement of referenda, the collection and
    counting of the ballots, and announcing the results for those
    issues that affect FidoNet as a whole.


    1.4.2  Zone Coordinator Council

    In certain cases, the Zone Coordinators work as a council to
    provide advice to the International Coordinator.  The arrange-
    ment is similar to that between a president and advisors.  In
    particular, this council considers inter-zonal issues.  This
    includes, but is not limited to: working out the details of
    nodelist production, mediating inter-zonal disputes, and such
    issues not addressed at a lower level of FidoNet.
    FidoNews 6-14                Page 6                    3 Apr 1989


    1.4.3  Zone Coordinator

    The Zone Coordinator compiles the nodelists from all of the
    regions in the zone, and creates the master nodelist and
    difference file, which is then distributed over FidoNet in the
    zone.  A Zone Coordinator does not perform routing services
    for the zone.


    1.4.4  Regional Coordinator

    The Regional Coordinator maintains the list of independent
    nodes in the region and accepts nodelists from the Network
    Coordinators in the region.  He compiles these lists to create
    a regional nodelist, which he then sends to the Zone Coordina-
    tor.  A Regional Coordinator does not perform routing services
    for any nodes in the region.


    1.4.5  Network Coordinator

    The Network Coordinator is responsible for maintaining the
    list of nodes for the network, and for forwarding netmail sent
    to the network from other FidoNet nodes.  The Network Coordi-
    nator may make arrangements to handle outgoing netmail, but is
    not required to do so.  The Network Coordinator is not re-
    quired to provide a source for echomail.


    1.4.6  Network Routing Hub

    Network Routing Hubs exist only in some networks.  They share
    duties of the Network Coordinator, in order to ease the man-
    agement of a large network.  The exact duties and procedures
    are a matter for the Network Coordinator and his hubs to
    arrange, and will not be discussed here, except that a network
    coordinator cannot delegate responsibility to mediate dis-
    putes.


    1.4.7  System Operator

    The system operator (sysop) formulates a policy for running
    his board and dealing with users.  The sysop must mesh with
    the rest of the FidoNet system if he is to send and receive
    mail, and the local policy must be consistent with other
    levels of FidoNet.


    1.4.8  User

    The sysop is responsible for the actions of any user when they
    affect the rest of FidoNet.  (If a user is annoying, the sysop
    is annoying.)  Any traffic entering FidoNet via a given node,
    if not from the sysop, is considered to be from a user, and is
    the responsibility of the sysop.  This includes messages from
    FidoNews 6-14                Page 7                    3 Apr 1989


    point systems.


    1.4.9  Summary

    These levels act to distribute the administration and control
    of FidoNet to the lowest possible level, while still allowing
    for coordinated action over the entire mail system.  Adminis-
    tration is made possible by operating in a top-down manner.
    That is, a person at any given level is responsible to the
    level above, and responsible for the level below.

    For example, a Regional Coordinator is responsible to the Zone
    Coordinator for anything that happens in the region.  From the
    point of view of the Zone Coordinator, the Regional Coordina-
    tor is completely responsible for the smooth operation of the
    region.  Likewise, from the point of view of the Regional
    Coordinator, the Network Coordinator is completely responsible
    for the smooth operation of the network.

    If a person at any level above sysop is unable to properly
    perform their duties, the person at the next level may replace
    them.  For example, if a Regional Coordinator fails to per-
    form, the Zone Coordinator can replace him.

    The exceptions to this top down organization are the Zone and
    International Coordinators.  See sections 6.2 and 7.2.


    2  Sysop Procedures

    2.1  General

    2.1.1  The Basics

    The sysop of an individual node can generally do as he
    pleases, as long as he observes the mail events, is not exces-
    sively annoying to other nodes on FidoNet, and does not pro-
    mote or participate in the distribution of pirated copyrighted
    software or other illegal behavior via FidoNet.


    2.1.2  Familiarity with Policy

    In order to understand the meaning of "excessively annoying",
    it is incumbent upon all sysops to occasionally re-read Fido-
    Net policy.  New sysops must familiarize themselves with
    policy before requesting a node number.


    2.1.3  Responsible for All Traffic Entering FidoNet Via His
    Node

    A Sysop is responsible for all traffic entering FidoNet via
    his system.  This includes (but is not limited to) traffic
    entered by his users, points, and any other networks for which
    FidoNews 6-14                Page 8                    3 Apr 1989


    he might act as a gateway.  If a sysop allows "outside" mes-
    sages to enter FidoNet via his system, he has a responsibility
    to ensure his system is clearly identified by FidoNet node
    number as the point of origin of that message, and a responsi-
    bility to act as a gateway in the reverse direction.  Should
    such traffic result in a violation of Policy, the sysop must
    rectify the situation.


    2.1.4  Encryption and Review of Mail

    FidoNet is an amateur system.  Our technology is such that the
    privacy of messages cannot be guaranteed.  Any sysop has the
    right to review traffic flowing through his system, if for no
    other reason than to ensure that the system is not being used
    for illegal purposes.  Encryption obviously makes this review
    impossible.  Therefore, encrypted and/or commercial traffic
    that is routed without the express permission of all the links
    in the delivery system constitutes annoying behavior.


    2.1.5  No Alteration of Routed Mail

    A sysop may not modify, other than as required for routing or
    other technical purposes, any message, netmail or echomail,
    passing through the system from one FidoNet node to another.
    If a sysop is offended by the content of a message, he must
    follow the procedure described in section 2.1.7.


    2.1.6  Private Netmail

    The word "private" should be used with great care, especially
    with users of a BBS.  Some countries have laws which deal with
    "private mail", and it should be made clear that the word
    "private" does not imply that no person other than the recipi-
    ent can read messages.  Sysops who cannot provide this dis-
    tinction should consider not offering users the option of
    "private mail".

    If a user sends a "private message", the user has no control
    over the number of intermediate systems through which that
    message is routed.  A sysop who  sends a message to another
    sysop can control this aspect by sending the message direct to
    the recipient's system, thus guaranteeing that only the recip-
    ient or another individual to whom that sysop has given autho-
    rization can read the message.  Thus, a sysop may have differ-
    ent expectations than a casual user.

    2.1.6.1  No Disclosure of in-transit mail

    Disclosing or in any way using information contained in pri-
    vate netmail traffic not addressed to you or written by you is
    considered annoying behavior, regardless of how you come upon
    that traffic.  This does not apply to echomail which is by
    definition a broadcast medium, and where private mail is often
    FidoNews 6-14                Page 9                    3 Apr 1989


    used to keep a sysop-only area restricted.

    2.1.6.2  Private mail addressed to you

    The issue of private mail which is addressed to you is more
    difficult than the in-transit question treated in the previous
    section.  A common legal opinion holds that when you receive a
    message it becomes your property and you have a legal right to
    do with it what you wish.  Your legal right does not excuse
    you from annoying others.

    In general, sensitive material should not be sent using Fido-
    Net.  This ideal is often compromised, as FidoNet is our
    primary mode of communication.  In general, if the sender of a
    message specifically requests in the text of the message that
    the contents be kept confidential, release of the message into
    a public forum may be considered annoying.

    There are exceptions.  If someone is saying one thing in
    public and saying the opposite in private mail, the recipient
    of the private mail should not be subjected to harassment
    simply because the sender requests that the message not be
    released.  Judgement and common sense should be used in this
    area as in all other aspects of FidoNet behavior.

    2.1.7  Not Routing Mail

    A sysop is not required to route traffic if he has not agreed
    to do so.  He is not obligated to route traffic for all if he
    routes it for any, unless he holds a Network Coordinator or
    Hub Coordinator position.  Routing traffic through a node not
    obligated to perform routing without the permission of that
    node may be annoying behavior.  This includes unsolicited
    echomail.

    If a sysop does not forward a message when he had previously
    agreed to perform such routing, the message must be returned
    to the sysop of the node at which it entered FidoNet with an
    explanation of why it was not forwarded.  (It is not necessary
    to return messages which are addressed to a node which is not
    in the current nodelist.)  Intentionally stopping an in-tran-
    sit message without following this procedure constitutes
    annoying behavior.  In the case of a failure to forward traf-
    fic due to some technical problem, it does not become annoying
    unless it persists after being pointed out to the sysop.


    2.1.8  Exclusivity of Zone Mail Hour

    Zone Mail Hour is the heart of FidoNet, as this is when net-
    work mail is passed between systems.  Any system which wishes
    to be a part of FidoNet must be able to receive mail from any
    node in the nodelist during this time.  This time is exclu-
    sively reserved for netmail.  Many phone systems charge on a
    per-call basis, regardless of whether a connect, no connect,
    or busy signal is encountered.  For this reason, any activity
    FidoNews 6-14                Page 10                   3 Apr 1989


    other than normal network mail processing that ties up a
    system during ZMH is considered annoying behavior.  Echomail
    should not be transferred during ZMH.  User (BBS) access to a
    system is prohibited during ZMH.

    A system which is a member of a local network may also be re-
    quired to observe additional mail events, as defined by the
    Network Coordinator.  Access restrictions during local network
    periods are left to the discretion of the Network Coordinator.


    2.1.9  Private Nodes

    The rare exception to ZMH compliance is Private Nodes.  Per-
    sons requesting private nodes should be supported as points if
    possible.  A private listing is justified when the system must
    interface with many others, such as an echomail distributor.
    In these cases, the exact manner and timing of mail delivery
    is arranged between the private node and other systems.  Such
    an agreement between a private system and a hub is not binding
    on any replacement for that hub.  A private node must be a
    part of a network (they cannot be independents in the region.)
    Private nodes are encouraged to honor ZMH.


    2.1.10  Observing Mail Events

    Failure to observe the proper mail events is grounds for any
    node to be dropped from FidoNet without notice (since notice
    is generally given by netmail).


    2.1.11  Use of Current Nodelist

    Network mail systems generally operate unattended, and place
    calls at odd hours of the night.  If a system tries to call an
    incorrect or out-of-date number, it could cause some poor
    citizen's phone to ring in the wee hours of the morning, much
    to the annoyance of innocent bystanders and civil authorities.
    For this reason, a sysop who sends mail is obligated to obtain
    and use the most recent edition of the nodelist as is practi-
    cal.


    2.1.12  Excommunication

    A system which has been dropped from the network is said to be
    excommunicated (i.e. denied communication).  If you find that
    you have been excommunicated without warning, your coordinator
    was unable to contact you.  You should rectify the problem and
    contact your coordinator.

    Systems may also be dropped from the nodelist for cause.  See
    section 9, and sections 4.3 and 5.2.

    It is considered annoying behavior to assist a system which
    FidoNews 6-14                Page 11                   3 Apr 1989


    was excommunicated in circumventing that removal from the
    nodelist.  For example, if you decide to provide an echomail
    feed to your friend who has been excommunicated, it is likely
    that your listing will also be removed.


    2.1.13  Timing of Zone Mail Hour

    The exact timing of Zone Mail Hour for each zone is set by the
    Zone Coordinator.  See section 10.2.


    2.1.14  Non-observance of Daylight Savings Time

    FidoNet does not observe daylight savings time.  In areas
    which observe daylight savings time the FidoNet mail schedules
    must be adjusted in the same direction as the clock change.
    Alternatively, you can simply leave your system on standard
    time.


    2.2  How to obtain a node number


    You must first obtain a current nodelist so that you can send
    mail.  You do not need a node number to send mail, but you
    must have one in order for others to send mail to you.

    The first step in obtaining a current nodelist is to locate a
    FidoNet bulletin board.  Most bulletin board lists include at
    least a few FidoNet systems, and usually identify them as
    such.  Use a local source to obtain  documents because many
    networks have detailed information available which explains
    the coverage area of the network and any special requirements
    or procedures.

    Once you have a nodelist, you must determine which network or
    region covers your area.  Regions are numbered 1-99; network
    numbers are greater than 99.  Networks are more restricted in
    area than regions, but are preferred since they improve the
    flow of mail and provide more services to their members.  If
    you cannot find a network which covers your area, then pick
    the region which does.

    Once you have located the network or region in your area, send
    a message containing a request for a node number to node zero
    of that network or region.  The request must be sent by net-
    mail, use address -1/-1, and include the following:

         1) Your name.
         2) The name of your system.
         3) The city and state where your system is located.
         4) The phone number to be used when calling your system.
         5) Your hours of operation, netmail and BBS.
         6) The maximum baud rate you can support.

    FidoNews 6-14                Page 12                   3 Apr 1989


    You must indicate that you have read, and agree to abide by,
    this document and all the current and future policies of Fido-
    Net.

    Using a node number other than -1/-1 can cause problems for
    the coordinator involved.  Simply assigning yourself a
    net/node number can be annoying, and can be grounds to reject
    your request.

    Your coordinator may want additional information.  If so, he
    will contact you.

    Please allow at least two weeks for a node number request to
    be processed.  If you send your request to a Regional Coordi-
    nator, he may forward it to the appropriate Network Coordina-
    tor.


    2.3  If You are Going Down

    If your node will be down for an extended period (more than a
    day or two), inform your coordinator as soon as possible.  If
    you do not do this,  other systems will try to reach you while
    you are down, much to their annoyance.  Never put an answering
    machine or similar device on your phone line while you are
    down. If you do, calling systems will get the machine repeat-
    edly, racking up large phone bills, which is very annoying.

    If you will be leaving your system unattended for an extended
    period of time (such as while you are on vacation), you should
    notify your coordinator.  Systems have a tendency to "crash"
    now and then, so you will probably want your coordinator to
    know that it is a temporary condition if it happens while you
    are away.


    2.4  How to Form a Network

    If there are several nodes in your area, but no network, a new
    network can be formed.  This has advantages to both you and to
    the rest of FidoNet.  You receive better availability of
    nodelist difference files and FidoNews, and everyone else can
    take advantage of host-routing netmail to the new network.

    The first step is to contact the other sysops in your area.
    You must decide which nodes will comprise the network, and
    which of those nodes you would like to be the Network Coordi-
    nator.  Then consult your Regional Coordinator.  You must send
    the following information:

       1) The region number(s), or network number(s) if a net-
       work is splitting up, that are affected by the formation
       of your network.  The Regional Coordinator will inform
       the Zone Coordinator and the coordinators of any affected
       networks that a new network is in formation.

    FidoNews 6-14                Page 13                   3 Apr 1989


       2) A copy of the proposed network's nodelist segment.
       This file should be attached to the message of applica-
       tion for a network number, and should use the nodelist
       format described in the current version of the appro-
       priate FTSC publication.  Please elect a name that re-
       lates to your grouping, for example SoCalNet for nodes in
       the Southern California Area and MassNet West for the
       Western Massachusetts Area.  Remember if you call your-
       self DOGNET it doesn't identify your area.

    Granting a network number is not automatic.  Even if the
    request is granted, the network might not be structured exact-
    ly as you request.  Your Regional Coordinator will review your
    application and inform you of the decision.

    Do not send a network number request to the Zone Coordinator.
    All network number requests must be processed by the Regional
    Coordinator.



    3  General Procedures for All Coordinators

    3.1  Make Available Nodelists, Difference Files, and FidoNews

    Any Coordinator is responsible for obtaining and making avail-
    able, on a weekly basis, nodelist difference files and Fido-
    News.


    3.2  Processing Nodelist Changes and Passing Them Upstream

    Each coordinator is responsible for obtaining nodelist infor-
    mation from the level below, processing it, and passing the
    results to the level above.  The timing of this process is
    determined by the requirements imposed by the level above.


    3.3  Ensure the Latest Policy is Available

    A Coordinator is responsible to make the current version of
    this document available to the level below, and to encourage
    familiarity with it.

    In addition, a coordinator is required to forward any local
    policies he receives to the level above, and to review such
    policies.  Although not required, common courtesy dictates
    that when formulating a local policy, the participation of the
    level above should be solicited.


    3.4  Minimize the Number of Hats Worn

    Coordinators are encouraged to limit the number of FidoNet
    functions they perform.  In particular, a coordinator's system
    should be readily available to the levels immediately above
    FidoNews 6-14                Page 14                   3 Apr 1989


    and below, and a coordinator should not rule on the appeal of
    his own decision.

    Coordinators are discouraged from acting as echomail and soft-
    ware-distribution hubs.  If they do so, they should handle
    echomail (or other volume distribution) on a system other than
    the administrative system.

    Another reason to discourage multiple hats is the difficulty
    of replacing services if someone leaves the network.  For
    example, if a coordinator is the echomail hub and the soft-
    ware-distribution hub, those services will be  difficult to
    restore when he resigns.

    3.5  Be a Member of the Area Administered

    A coordinator must be a member of the area administered. That
    is, a Network Coordinator must be a member of that network by
    virtue of geography.  A Regional Coordinator must be either a
    member of a network in his region, or an independent of the
    region.


    3.6  Encourage New Sysops to Enter FidoNet

    A coordinator is encouraged to operate a public bulletin board
    system which is freely available for the purpose of distribut-
    ing Policy, FidoNews, and Nodelists to potential new sysops.
    Dissemination of this information to persons who are potential
    FidoNet sysops is important to the growth of FidoNet, and
    coordinators should encourage development of new systems.


    3.7  Tradition and Precedent

    A coordinator is not bound by the practices of his predecessor
    or peers beyond the scope of this document.

    In addition, a new coordinator has the right to review any
    decision made by his predecessors for compliance with Policy,
    and take whatever actions may be necessary to rectify any
    situations not in compliance.


    3.8  Technical Management

    The primary responsibility of any coordinator is technical
    management of network operations.  Decisions must be made on
    technical grounds.



    4  Network Coordinator Procedures

    4.1  Responsibilities

    FidoNews 6-14                Page 15                   3 Apr 1989


    A Network Coordinator has the following responsibilities:

       1) To receive incoming mail for nodes in his network, and
       arrange delivery to its recipients.

       2) To assign node numbers to nodes in his network.

       3) To maintain the nodelist for his network, and to send
       a copy of it to his Regional Coordinator whenever it
       changes.

       4) To make available to his nodes new nodelist difference
       files, new issues of FidoNews, and new revisions of
       Network Policy Documents as they are received, and to
       periodically check to insure that his nodes use up to
       date nodelists.


    4.2  Routing Inbound Mail

    It is your responsibility as Network Coordinator to coordinate
    the receipt and forwarding of host-routed inbound netmail for
    nodes in your network.  The best way to accomplish this is
    left to your discretion.

    If a node in your network is receiving large volumes of mail
    you can request that he cease and desist routing these vol-
    umes.  If he refuses to do so, then you can request your
    Regional Coordinator to assign the node a number as an inde-
    pendent and drop him from your network.

    Occasionally a node will make a "bombing run" (sending one
    message to a great many nodes).  If a node in another network
    is making bombing runs on your nodes and routing them through
    your inbound host, then you can complain to the network coor-
    dinator of the offending node.  (If the node is an indepen-
    dent, complain to the regional coordinator.)  Bombing runs are
    considered to be annoying.

    Another source of routing overload is echomail.  Echomail
    cannot be allowed to degrade the ability of FidoNet to handle
    normal message traffic.  If a node in your network is routing
    large volumes of echomail, you can ask him to either limit the
    amount of echomail or to stop routing his echomail.

    You are not required to forward encrypted, commercial, or
    illegal mail.  However, you must follow the procedures de-
    scribed in section 2.1.7 if you do not forward the mail.


    4.3  Assigning Node Numbers

    It is your responsibility to assign node numbers to new nodes
    in your network.  You may also change the numbers of existing
    nodes in your network, though you should check with your
    member nodes before doing so.  You may assign any numbers you
    FidoNews 6-14                Page 16                   3 Apr 1989


    wish, so long as each node has a unique number within your
    network.

    You must not assign a node number to any system until you have
    received a formal request from that system by FidoNet mail.
    This will ensure that the system is minimally operational.
    The strict maintenance of this policy has been one of the
    great strengths of FidoNet.

    It is also recommended, though not required, that you call a
    board which is applying for a node number before assigning it
    a node number.

    You may not assign a node number to a node in an area covered
    by an existing network.  Further, if you have nodes in an area
    covered by a network in formation, those nodes must be trans-
    ferred to the new network.

    You should use network mail to inform a new node of his node
    number, as this helps to insure that he is capable of receiv-
    ing network mail.

    If a node in your network is acting in a sufficiently annoying
    manner, then you can take whatever action you deem fit, ac-
    cording to the circumstances of the case.


    4.4  Maintaining the Nodelist


    You should to implement name changes, phone number changes,
    and so forth in your segment of the nodelist as soon as possi-
    ble after the information is received from the affected node.
    You should also on occasion send a message to every node in
    your network to ensure that they are operational.  If a node
    turns out to be "off the air" with no prior warning, you can
    either mark the node down or remove it from the nodelist.
    (Nodes are to marked DOWN for a maximum of two weeks, after
    which the line should be removed from the nodelist.)

    At your discretion, you may distribute a portion of this work-
    load to routing hubs.  In this case, you should receive the
    nodelists from the Hub Coordinators within your network.  You
    will need to maintain a set of nodelists for each hub within
    your network, since you cannot count on getting an update from
    each Hub Coordinator every week.  You should assemble a master
    nodelist for your network every week and send it to your
    Regional Coordinator by the day and time he designates.  It is
    suggested that you do this as late as is practical, so as to
    accommodate any late changes, balanced with the risk of miss-
    ing the connection with your Regional Coordinator and thus
    losing a week.

    4.5  Making Available Policies, Nodelists and FidoNews

    As a Network Coordinator you should obtain a new issue of
    FidoNews 6-14                Page 17                   3 Apr 1989


    FidoNews and a new nodelist difference file every week from
    your Regional Coordinator.  The nodelist difference file is
    currently made available each Saturday, and FidoNews is pub-
    lished each Monday.  You must make these files available to
    all nodes in the network, and you are encouraged to make them
    available to the general public for download.

    You should also obtain the most recent versions of the Policy
    documents that bind the members of your network, and make
    those available to the nodes in your network.  Policies are
    released at sporadic intervals, so you should also inform the
    nodes in your network when such events occur, and ensure the
    nodes are generally familiar with the changes.

    Policy, FidoNews, and the nodelist are the glue that holds us
    together.  Without them, we would cease to be a community, and
    become just another random collection of bulletin boards.



    5  Regional Coordinator Procedures

    5.1  Responsibilities

    A Regional Coordinator has the following responsibilities:

       1) To assign node numbers to independent nodes in the
       region.

       2) To encourage independent nodes in the region to join
       existing networks, or to form new networks.

       3) To assign network numbers to networks in the region
       and define their boundaries.

       4) To compile a nodelist of all of the networks and
       independents in the region, and to send a copy of it to
       the Zone Coordinator whenever it changes.

       5) To ensure the smooth operation of networks within the
       region.

       6) To make new nodelist difference files, Policies, and
       issues of FidoNews available to the Network Coordinators
       in the region as soon as is practical.


    5.2  Assigning Node Numbers

    It is your responsibility to assign node numbers to indepen-
    dent nodes in your region. You may also change the numbers of
    existing nodes in your region, though you should check with
    the respective nodes before doing so.  You may assign any
    numbers you wish, so long as each node has a unique number
    within your region.

    FidoNews 6-14                Page 18                   3 Apr 1989


    You should not assign a node number to any system until you
    have received a formal request from that system by FidoNet
    mail.  This will ensure that the system is minimally opera-
    tional.  The strict maintenance of this policy has been one of
    the great strengths of FidoNet.

    It is also recommended, though not required, that you call a
    board which is applying for a node number before assigning it
    a node number.

    You should use network mail to inform a new node of his node
    number, as this helps to insure that he is capable of receiv-
    ing network mail.

    If a node in your region is acting in a sufficiently annoying
    manner, then you can take whatever action you deem fit, ac-
    cording to the circumstances of the case.

    If you receive a node number request from outside your region,
    you must forward it to the most local coordinator for the
    requestor as you can determine.  If you receive a node number
    request from a new node that is in an area covered by an
    existing network, then you must forward the request to the
    Coordinator of that network instead of assigning a number
    yourself.

    If a network forms in an area for which you have independent
    nodes, those nodes will be transferred to the local network as
    soon as is practical.


    5.3  Encouraging the Formation and Growth of Networks

    One of your main duties as a Regional Coordinator is to pro-
    mote the growth of networks in your region.

    You should avoid having independent nodes in your region which
    are within the coverage area of a network.  There are, howev-
    er, certain cases where a node should not be a member of a
    network, such as a system with a large amount of inbound
    netmail; see section 4.2.

    If several independent nodes in your region are in a local
    area you should encourage them to form a network, and if
    necessary you may require them to form a network.  Refer to
    section 2.4.  Note that this is not intended to encourage the
    formation of trivial networks.  Obviously, one node does not
    make a network.  The exact number of nodes required for an
    effective network must be judged according to the circumstan-
    ces of the situation, and is left to your discretion.


    5.4  Assigning Network Numbers

    It is your responsibility to assign network numbers to new
    networks forming within your region.  You are assigned a pool
    FidoNews 6-14                Page 19                   3 Apr 1989


    of network numbers to use for this purpose by your Zone Coor-
    dinator.  As a part of this function, it is the responsibility
    of the Regional Coordinator to define the boundaries of the
    networks in the region.


    5.5  Maintaining the Nodelist

    As a Regional Coordinator, you have a dual role in maintaining
    the nodelist for your region.

    First, you must maintain the list of independent nodes in your
    region.  You should attempt to implement name changes, phone
    number changes, and so forth in this nodelist as soon as
    possible.  You should also on occasion send a message to every
    independent node in your region to ensure that they are opera-
    tional.  If a node turns out to be "off the air" with no prior
    warning, you can either mark the node down or remove it from
    the nodelist.  (Nodes are to marked DOWN for a maximum of two
    weeks, after which the line should be removed from the node-
    list.)

    Second, you must receive the nodelists from the Network Coor-
    dinators within your region.  You will need to maintain a set
    of nodelists for each network within your region, since you
    cannot count on getting an update from each Network Coordina-
    tor every week.  You should assemble a master nodelist for
    your region every week and send it to your Zone Coordinator by
    the day and time he designates.  It is suggested that you do
    this as late as practical, so as to accommodate late changes,
    balanced with the risk of missing the connection with your
    Zone Coordinator and thus losing a week.


    5.6  Geographic Exemptions

    There are cases where local calling geography does not follow
    FidoNet regions.  In exceptional cases, exemptions to normal
    geographic guidelines are agreed upon by the Regional Coordi-
    nators and Zone Coordinator involved.  Such an exemption is
    not a right, and is not permanent.  When a network is formed
    in the proper region that would provide local calling access
    to the exempted node, it is no longer exempt.  An exemption
    may be reviewed and revoked at any time by any of the coordi-
    nators involved.


    5.7  Overseeing Network Operations

    It is your responsibility as Regional Coordinator to ensure
    that the networks within your region are operating in an ac-
    ceptable manner.  This does not mean that you are required to
    operate those networks; that is the responsibility of the
    Network Coordinators.  It means that you are responsible for
    assuring that the Network Coordinators within your region are
    acting responsibly.
    FidoNews 6-14                Page 20                   3 Apr 1989


    If you find that a Network Coordinator within your region is
    not properly performing his duties (as outlined in Section 4),
    then you should take whatever action you deem necessary to
    correct the situation.

    If a network grows so large that it cannot reasonably accommo-
    date traffic flow during the Zone Mail Hour, the Regional
    Coordinator can direct the creation of one or more new net-
    works from that network.  These new networks, although they
    may be within a single local-calling area, must still conform
    to a geographical basis for determining membership.

    It is your obligation as Regional Coordinator to maintain
    direct and reasonably frequent contact with the networks in
    your region. The exact method of accomplishing this is left to
    your discretion.


    5.8  Making Available Nodelists, Policies, and FidoNews

    As a Regional Coordinator, it is your responsibility to obtain
    the latest nodelist difference file, network policies, and the
    latest issues of FidoNews as they are published, and to make
    them available to the Network Coordinators within your region.
    The nodelist is posted weekly on Saturday by the Zone Coordi-
    nator, and FidoNews is published weekly on Monday by node 1/1.
    Contact them for more details on how to obtain the latest
    copies each week.

    It is your responsibility to make these available to all Net-
    work  Coordinators in your region as soon as is practical
    after you receive them.  The method of distribution is left to
    your discretion.  You are not required to distribute them to
    any independent nodes in your region, though you may if you
    wish.  You are encouraged to make all these documents avail-
    able for downloading by the general public.



    6  Zone Coordinator Procedures

    6.1  General

    A Zone Coordinator for FidoNet has the primary task of main-
    taining the nodelist for his Zone, sharing it with the other
    Zone Coordinators, and ensuring the distribution of the master
    nodelist (or difference file) to the Regions in his Zone.  He
    is also responsible for coordinating the distribution of
    Network Policy documents and FidoNews to the Regional Coordi-
    nators in his zone.

    The Zone Coordinator is responsible for the maintenance of the
    nodelist for his administrative region.  The Administrative
    Region has the same number as his zone, and consists of nodes
    assigned for administrative purposes not related to the send-
    ing and receiving of normal network mail.
    FidoNews 6-14                Page 21                   3 Apr 1989


    A Zone Coordinator is charged with the task of ensuring the
    smooth operation of his Zone.  He does this by supervising the
    Regional Coordinators.

    If a Zone Coordinator determines that a Regional Coordinator
    is not properly performing his duties (as outlined in section
    5), he should seek a replacement for that Regional Coordina-
    tor, or take other action as he sees fit.

    The Zone Coordinator defines the geographic boundaries of the
    regions within  his zone and sets the time for the Zone Mail
    Hour.

    The Zone Coordinator is responsible for reviewing and approv-
    ing any geographic exemptions as described elsewhere in this
    document.

    The Zone Coordinator is responsible for insuring the smooth
    operation of gates between his zone and all other zones for
    the transfer of interzonal mail.

    The Zone Coordinators are responsible for the selection of the
    International Coordinator from among their ranks.


    6.2  Selection

    The Zone Coordinator is selected by an absolute majority vote
    of the Regional Coordinators within his zone.


    7  International Coordinator Procedures

    7.1  General

    The International Coordinator is the "first among equals" Zone
    Coordinator.

    The International Coordinator has the primary task of coordi-
    nating the creation of the master nodelist by managing the
    distribution between the Zones of the Zone nodelists.  The
    International Coordinator is responsible for definition of new
    zones and for negotiation of agreements for communication with
    other networks.  ("Other network" in this context means other
    networks with which FidoNet communicates as peer-to-peer, not
    "network" in the sense of the FidoNet organizational level.)

    The International Coordinator is also responsible for coordi-
    nating the distribution of Network Policies and FidoNews to
    the Zone Coordinators.

    The International Coordinator is responsible for coordinating
    the activities of the Zone Coordinator Council.  The Interna-
    tional Coordinator acts as the spokesman for the Zone Coordi-
    nator Council.

    FidoNews 6-14                Page 22                   3 Apr 1989


    In cases not specifically covered by this document, the Inter-
    national Coordinator may issue specific interpretations or
    extensions to this policy.  The Zone Coordinator Council may
    reverse such rulings by a majority vote.

    7.2  Selection

    The International Coordinator is selected (or removed) by an
    absolute majority vote of the Zone Coordinators.


    8  Referenda

    The procedures described in this section are used to ratify a
    new version of FidoNet policy, which is the mechanism by which
    policy is changed.  This procedure is also used to impeach a
    Zone Coordinator.


    8.1  Initiation

    A referendum on policy modification is invoked when a majority
    of the FidoNet Regional Coordinators inform the International
    Coordinator that they wish to consider a proposed new version
    of Policy.


    8.2  Announcement and Results Notification

    Proposed changes to Policy are distributed using the same
    structure which is used to distribute nodelist difference
    files and FidoNews.  Results and announcements related to the
    referendum are distributed by the coordinator structure as a
    part of the weekly nodelist difference file.  The Interna-
    tional Coordinator provides copies to the editor of FidoNews
    for inclusion there, although the official announcement and
    voting dates are tied to nodelist distributions.

    If it is adopted, the International Coordinator sets the
    effective date for a new policy through announcement in the
    weekly nodelist difference file.  The effective date will be
    not more than one month after the close of balloting.


    8.3  Eligibility to Vote

    Each member of the FidoNet coordinator structure at and above
    Network Coordinator is entitled to one vote.  (Hub coordina-
    tors do not vote.)  In the case of the position changing hands
    during the balloting process, either the incumbent or the new
    coordinator may vote, but not both.

    Network coordinators are expected to assess the opinions of
    the members of their network, and to vote accordingly.  A
    formal election is not necessary, but the network coordinator
    must inform the net of the issues and solicit input.  The
    FidoNews 6-14                Page 23                   3 Apr 1989


    network coordinator functions as the representative of the
    rank and file members of FidoNet.


    8.4  Voting Mechanism

    The actual voting mechanism, including whether the ballot is
    secret and how the ballots are to be collected, verified, and
    counted, is left to the discretion of the International Coor-
    dinator.  Ideally, ballot collection should be by some secure
    message system, conducted over FidoNet itself.

    In order to provide a discussion period, the announcement of
    any ballot must be made at least two weeks before the date of
    voting commencement.  The balloting period must be at least
    two weeks.


    8.5  Voting is on a whole Policy Document

    Given that Policy is intertwined and self referencing, a rela-
    tively simple change may require several alterations of the
    document.  In order to simplify the process, balloting is done
    on choices between whole documents, rather than individual
    amendments.  In the simplest case, this means voting yea or
    nay to a new document.  If a number of alternatives are to be
    considered,  they must be presented as whole documents, from
    which one is chosen.


    8.6  Dual Majorities

    A Policy amendment is considered in force if, at the end of
    the balloting period, it has received a majority of the votes
    cast, and has received a majority of the network-coordinator
    votes cast, and has received a majority of the regional-coor-
    dinator votes cast.

    In the case of multiple policy changes which are considered on
    the same ballot, a version must receive more than 50% of the
    votes cast to be considered ratified.  "Abstain" is a valid
    vote in this case, effectively being a vote for not changing
    the current policy as it simply increases the number of votes
    required to ratify the proposed change.


    8.7  Impeachment of a Zone Coordinator

    8.7.1  Initiation

    In extreme cases, a Zone Coordinator may be impeached by
    referendum.  Impeachment of a Zone Coordinator does not re-
    quire a Policy violation.  An impeachment proceeding is in-
    voked when a majority of the Regional Coordinators in a zone
    request the International Coordinator to institute it.

    FidoNews 6-14                Page 24                   3 Apr 1989


    8.7.2  Procedure as in Policy Referendum

    The provisions of sections 8.2 and 8.3 apply to impeachment
    referenda.

    The dual majority described in section 8.6 applies.  Only
    coordinators in the affected zone vote (even if the zone
    coordinator is also the International Coordinator).

    8.7.3  Voting Mechanism

    The balloting procedures are set, the votes are collected, and
    the results are announced by a Regional Coordinator chosen by
    the Zone Coordinator who is being impeached.  The removal of
    the Zone Coordinator is effective two weeks after the end of
    balloting if the impeachment carries.

    8.7.4  Limited to once per year

    The removal of a Zone Coordinator is primarily intended to be
    a mechanism by which the net as a whole expresses displeasure
    with the way Policy is being interpreted.  At one time or
    another, everyone is unhappy with the way policy is inter-
    preted.  In order to keep the Zone Coordinators interpreting
    policy as opposed to defending themselves, at least one full
    calendar year must elapse between impeachment referenda (re-
    gardless of how many people hold the position of Zone Coor-
    dinator during that year.)

    Should a Zone Coordinator resign during an impeachment pro-
    cess, the process is considered null and void, and does not
    consume the "once per year quota".


    9  Resolution of Disputes

    9.1  General

    The FidoNet judicial philosophy can be summed up in two rules:

         1) Thou shalt not excessively annoy others.

         2) Thou shalt not be too easily annoyed.

    In other words, there are no hard and fast rules of conduct,
    but reasonably polite behavior is expected.  Also, in any
    dispute both sides are examined, and action could be taken
    against either or both parties. ("Judge not, lest ye be
    judged!")

    The coordinator structure has the responsibility for defining
    "excessively annoying".  Like a common definition of pornogra-
    phy ("I can't define it, but I know it when I see it."), a
    hard and fast definition of acceptable FidoNet behavior is not
    possible.  The guidelines in this policy are deliberately
    vague to provide the freedom that the coordinator structure
    FidoNews 6-14                Page 25                   3 Apr 1989


    requires to respond to the needs of a growing and changing
    community.

    The first step in any dispute between sysops is for the sysops
    to attempt to communicate directly, at least by netmail,
    preferably by voice.  Any complaint made that has skipped this
    most basic communication step will be rejected.

    Filing a formal complaint is not an action which should be
    taken lightly.  Investigation and response to complaints
    requires time which coordinators would prefer to spend doing
    more constructive activities.  Persons who persist in filing
    trivial policy complaints may find themselves on the wrong
    side of an annoying-behavior complaint.  Complaints must be
    accompanied with verifiable evidence, generally copies of
    messages; a simple word-of-mouth complaint will be dismissed
    out of hand.

    Failure to follow the procedures herein described (in particu-
    lar, by skipping a coordinator, or involving a coordinator not
    in the appeal chain) is in and of itself annoying behavior.


    9.2  Problems with Another Node

    If you are having problems with another node, you should first
    try to work it out via netmail or voice conversation with the
    other sysop.

    If this fails to resolve the problem, you should complain to
    your Network Coordinator and his Network Coordinator.  If one
    or both of you is not in a network, then complain to the
    appropriate Regional Coordinator.  Should this fail to provide
    satisfaction, you have the right to follow the appeal process
    described in section 9.5.


    9.3  Problems with your Network Coordinator

    If you are having problems with your Network Coordinator and
    feel that you are not being treated properly, you are entitled
    to a review of your situation.  As with all disputes, the
    first step is to communicate directly to attempt to resolve
    the problem.

    The next step is to contact your Regional Coordinator. If he
    feels that your case has merit, there are several things he
    may do.  For example, he may order a change of Network Coordi-
    nators, or even the disbanding of your network, though this is
    unlikely.  If you have been excommunicated by your Network
    Coordinator, that judgement may be reversed, at which point
    you will be reinstated into your net.

    If you fail to obtain relief from your Regional Coordinator,
    you have the right to follow the appeal process described in
    section 9.5.
    FidoNews 6-14                Page 26                   3 Apr 1989


    9.4  Problems with Other Coordinators

    Complaints concerning annoying behavior on the part of any
    coordinator are treated as in section 9.2 and should be filed
    with the next level of coordinator.  For example, if you feel
    that your Regional Coordinator is guilty of annoying behavior
    (as opposed to a failure to fulfill his duties as a coordina-
    tor) you should file your complaint with the Zone Coordinator.

    Complaints concerning the performance of a coordinator in
    carrying out the duties mandated by policy are accepted only
    from the level immediately below.  For example, complaints
    concerning the performance of Regional Coordinators would be
    accepted from Network Coordinators and independents in that
    region.  Such complaints should be addressed to the Zone
    Coordinator after an appropriate attempt to work them out by
    direct communications.


    9.5  Appeal Process

    A decision made by a coordinator may be appealed to the next
    level.  Appeals must be made within two weeks of the decision
    which is being appealed.  All appeals must follow the chain of
    command; if levels are skipped the appeal will be dismissed
    out of hand.

    An appeal will not result in a full investigation, but will be
    based upon the documentation supplied by the parties at the
    lower level.  For example, an appeal of a Network Coordina-
    tor's decision will be decided by the Regional Coordinator
    based upon information provided by the coordinator and the
    sysop involved; the Regional Coordinator is not expected to
    make an independent attempt to gather information.

    The appeal structure is as follows:

       Network Coordinator decisions may be appealed to the
       appropriate Regional Coordinator.

       Regional Coordinator decisions may be appealed to the
       appropriate Zone Coordinator.  At this point, the Zone
       Coordinator will make a decision and communicate it to
       the Regional Coordinators in that zone.  This decision
       may be reversed by a majority vote of the Regional Coor-
       dinators.

       Zone Coordinator decisions may be appealed to the Inter-
       national Coordinator.  The International Coordinator will
       make a decision and communicate it to the Zone Coordina-
       tor Council, which may reverse it by majority vote.

    If your problem is with a Zone Coordinator per se, that is, a
    Zone Coordinator has committed a Policy violation against you,
    your complaint should be filed with the International Coordi-
    nator, who will make a decision and submit it to the Zone
    FidoNews 6-14                Page 27                   3 Apr 1989


    Coordinator Council for possible reversal, as described above.


    9.6  Statute of Limitations

    A complaint may not be filed more than 60 days after the date
    of discovery of the source of the infraction, either by admis-
    sion or technical evidence.  Complaints may not be filed more
    than 120 days after the incident unless they involve explicit-
    ly illegal behavior.


    9.7  Right to a Speedy Decision

    A coordinator is required to render a final decision and
    notify the parties involved within 30 days of the receipt of
    the complaint or appeal.


    9.8  Return to Original Network

    Once a policy dispute is resolved, any nodes reinstated on
    appeal are returned to the local network or region to which
    they geographically or technically belong.


    9.9  Echomail

    Echomail is an important and powerful force in FidoNet.  For
    the purposes of Policy Disputes, echomail is simply a differ-
    ent flavor of netmail, and is therefore covered by Policy.  By
    its nature, echomail places unique technical and social de-
    mands on the net over and above those covered by this version
    of Policy.  In recognition of this, an echomail policy which
    extends (and does not contradict) general Policy, maintained
    by the Echomail Coordinators, and ratified by a process simi-
    lar to that of this document, is recognized by the FidoNet
    Coordinators as a valid structure for dispute resolution on
    matters pertaining to echomail.  At some future date the
    echomail policy document may be merged with this one.


    9.10  Case Histories

    Most of FidoNet Policy is interpretive in nature.  No one can
    see what is to come in our rapidly changing environment.
    Policy itself is only a part of what is used as the ground
    rules for mediating disputes -- as or more important are the
    precedents.

    In order to accommodate this process, case histories may be
    added to or removed from this document by the International
    Coordinator, with such a revision subject to reversal by the
    Zone Coordinator Council.  Should Policy be amended in such a
    way to invalidate a precedent, Policy supersedes said prece-
    dent.  (A carefully prepared amendment would address this by
    FidoNews 6-14                Page 28                   3 Apr 1989


    removing the precedent reference as a part of the amendment.)

    Although a case may be removed, the text of a case history may
    not be modified by any mechanism.  Case history is written
    close to the time of the decision, by those involved with it.
    Amending the text of a case history is the same as revising
    history, something quite inappropriate in an organization
    dedicated to moving information.



    10  Appendices

    10.1  General

    The Appendices of this document are exceptions to the normal
    ratification process.  Section 10.2 can be changed by the
    appropriate Zone Coordinator, and section 10.3 may be modified
    by the International Coordinator (see Section 9.10).


    10.2  Timing of Zone Mail Hour

    Zone Mail Hour is observed each day, including weekends and
    holidays.  The time is based upon Universal Coordinated Time
    (UTC), also known as Greenwich Mean time (GMT).  In areas
    which observe Daylight Savings Time during part of the year,
    the local time of zone mail hour will change because FidoNet
    does not observe Daylight Savings Time. The exact timing of
    Zone Mail Hour is set for each zone by the Zone Coordinator.

    In FidoNet Zone 1, Zone Mail Hour is observed from 0900 to
    1000 UTC.  In each of the time zones, this is:

         Eastern Standard Time          4 AM to 5 AM
         Central Standard Time          3 AM to 4 AM
         Mountain Standard Time         2 AM to 3 AM
         Pacific Standard Time          1 AM to 2 AM
         Hawaii Standard Time          11 PM to Midnight

    In FidoNet Zone 2, Zone Mail Hour is observed from 0230 to
    0330 UTC.

    In Fidonet Zone 3, Zone Mail Hour is observed from 1800 to
    1900 UTC.  In each of the time Zones involved this is:


      GMT +12 Zone                        6:00 AM to 7:00 AM
      (New Zealand)

      GMT +10 Zone                        4:00 AM to 5:00 AM
      (East Australia)
      (Papua New Guinea)
      (Micronesia)

      GMT +9.5 Zone                       3:30 AM to 4:30 AM
    FidoNews 6-14                Page 29                   3 Apr 1989


      (Central Australia)

      GMT +9 Zone                         3:00 AM to 4:00 AM
      (Japan)
      (Korea)
      (Eastern Indonesia)

      GMT +8 Zone                         2:00 AM to 3:00 AM
      (Hong Kong)
      (Taiwan)
      (Central Indonesia)
      (Philippines)

      GMT +7 Zone                         1:00 AM to 2:00 AM
      (Malaysia)
      (Singapore)
      (Thailand)
      (Western Australia)
      (Western Indonesia)


    10.3  Case Histories


    Case histories of past disputes are instructive to show gener-
    al procedures and methods.  Any decision may be included in
    this document by a majority vote of either the Zone Coordina-
    tor Council or the Regional Coordinators.

    Policy4 significantly changes the functions of the Zone and
    International Coordinators.  In the following cases which were
    decided using Policy3, substitute "Zone Coordinator" for all
    occurrences of "International Coordinator(*)".


    10.3.1  The Case of the Crooked Node

    A sysop of a local node was using network mail to engage in
    unethical business practices.  His Network Coordinator became
    very annoyed at this, and dropped the local from his nodelist.

    The local appealed to his Regional Coordinator for assignment
    as an independent node.  The Regional Coordinator, after
    checking with the Network Coordinator, decided that the Net-
    work Coordinator was right to be annoyed.  Independent status
    was denied.

    The International Coordinator(*) did not intervene.


    10.3.2  The Case of the Hacker Mailer

    A sysop of a local node made use of file attaches for extra
    users to mail himself the USER.BBS file from several local
    boards.  The sysops of these boards felt annoyed at this, and
    appealed to their Network Coordinator, who agreed and dropped
    FidoNews 6-14                Page 30                   3 Apr 1989


    the offending node from the nodelist.

    The Regional Coordinator was not consulted.

    The International Coordinator(*) did not intervene.


    10.3.3  The Case of the Bothered Barker

    A local node became annoyed with his Network Coordinator for
    failing to provide services.  Repeated complaints to his Net-
    work Coordinator did not satisfy him, so he appealed to the
    International Coordinator(*).

    The International Coordinator(*) dismissed the complaint
    because the Regional Coordinator had not been consulted.

    The local node submitted his complaint to his Regional Coordi-
    nator, who investigated the case and discovered that there was
    some justice to the complaint.  He advised and assisted the
    Network Coordinator in configuring his system to provide an
    improved level of service to the local nodes.

    The Regional Coordinator also decided that the local node was
    being too easily annoyed, in that he was expecting services
    not normally required of a Network Coordinator.  The local
    node was informed as to the true duties of a Network Coordina-
    tor, and was advised to lower his expectations.


    10.3.4  The Case of the Busy Beaver

    A local node which was operated by a retail establishment was
    engaged in making "bombing runs" to mail advertisements over
    FidoNet.  His Network Coordinator felt annoyed and handling
    the outgoing traffic for a commercial operation, and asked the
    local node to leave the network.

    The local node applied to the Regional Coordinator, and was
    granted status as an independent node in his region.


    10.3.5  The Mark of the Devil

    A local sysop whose board was used in conjunction with voodoo
    rites, hacking, phreaking, and obscene material applied to a
    Network Coordinator for a node number.  The Network Coordina-
    tor deemed that this board was exceptionally annoying, and
    denied the request.

    The Regional Coordinator was not consulted.

    The International Coordinator(*), on seeing that the Regional
    Coordinator had not been consulted, dismissed the case out of
    hand.  No further appeals were made.

    FidoNews 6-14                Page 31                   3 Apr 1989


    10.3.6  The Case of the Sysop Twit

    A patron of various local nodes had been roundly recognized by
    all sysops as a twit.  The user obtained his own system,
    became a sysop, and applied for a node number.  The Network
    Coordinator denied the request.  No appeals were made.


    10.3.7  The Case of the Echomail Junkie

    A local node became enamored with echomail and joined several
    conferences, routing his outbound mail through his network.
    He then started an echomail conference of his own and began
    relaying echomail between several systems, again routing it
    all through his network.

    His Network Coordinator observed that network performance was
    becoming seriously impaired.  The offending node was told to
    hold it down.  A compromise was reached whereby much of the
    echomail traffic was no longer routed through the network, and
    routed echomail was limited to twenty messages per night.  No
    appeals were made.


    10.3.8  The Case of the Bouncing Board

    A local user decided to establish a node to promote a worthy
    charity.  The machine being used was also used for various
    other activities during the day, and the sysop was often
    called away.  His coworkers would often forget to bring the
    board up at the end of the day while he was away, so the node
    was often down for extended periods.  The Network Coordinator,
    finding the node unable to receive mail, would mark it down.
    The sysop would return, restart the board, and ask to be
    reinstated.

    The Network Coordinator eventually decided that the sysop was
    not able to maintain a reliable system, and removed him from
    the nodelist completely.  Subsequent requests for a node
    number from the same sysop were turned down.  No appeals were
    made.


    10.5  Credits, acknowledgments, etc.

    Fido and FidoNet are registered trademarks of Fido Software,
    Inc.




                                         Index

    -1/-1,  2.3
    Additional mail events in local network  2.1.8
    Administrative Region  6.1
    FidoNews 6-14                Page 32                   3 Apr 1989


    Advantages to network membership  2.2
    Alteration of mail  2.1.5
    Answering machine  2.3
    Announcement of voting results 8.2
    Annoying behavior  1.3.5, 1.4.8, 2.1.1, 2.1.2, 2.1.4, 2.1.6,
         2.1.7, 2.1.8, 2.1.11, 2.3, 4.2, 4.3, 5.2, 9, 10
    Appeal chain  9.5
    Availability of NodeList  1.3.4
    Balloting Period  8.4
    Bombing run  4.2
    BossNode  1.2.1
    Boundaries  1.3.2
    Calling areas  1.3.2, 5.6, 5.7
    Case histories  9.10, 10.3
    Changing node numbers  4.3, 5.2
    Commercial messages  2.1.4, 4.2
    Contributions to FidoNews  1.3.1
    Current nodelist  2.1.11
    Daylight Savings Time  2.1.14
    Difference file  4.5, 5.8, 8.2
    Disclosing private mail  2.1.6
    Discussion period  8.2
    Disputes  9
    Distribution of ballots  8.2
    Down  2.3, 4.4, 5.5
    Downloading by users  3.6, 4.5, 5.8
    Dual majority  8.6, 8.7.2
    EchoMail  1.4.5, 4.2, 9.9
    Effective date (policy change)  8.2
    Elections  1.4.1
    Eligibility to vote  8.3
    Encryption  2.1.4, 4.2
    Exceptions  5.6
    Excessively annoying behavior  1.3.5, 1.4.8, 2.1.1, 2.1.2, 2.1.4,
         2.1.6, 2.1.7, 2.1.8, 2.1.11, 2.3, 4.2, 4.3, 5.2, 9, 10
    Exclusivity of Zone Mail Hour  2.1.8
    Excommunication  2.1.12, 4.3, 5.2, 9
    Exemptions, node location  1.3.2, 5.6
    Familiarity with policy  2.1.2, 2.2
    FidoNet, definition  1.2.6
    FidoNews  1.3.1
         availability 3.1, 4.5, 5.8
    FTSC  2.4
    Gateway  2.1.3
    Geography  1.3.2, 5.6
    Glue  4.5
    Hats  3.4
    Host-routed mail  4.2
    How to obtain a node number  2.2
    Hub  1.4.6  4.4
    Illegal behavior  2.1.1, 9.6
    Illegal mail  4.2
    Impeachment  8.7
    In-transit mail  2.1.6.1
    Independent node  4.2, 5.2
    Inter-zonal questions  1.4.2
    FidoNews 6-14                Page 33                   3 Apr 1989


    International Coordinator  1.4.1, 1.4.9, 7
    International FidoNet Association  1.2.6
    Language  1.0
    Levels of FidoNet  1.2, 1.4
    Local calling areas  1.3.2
    Local policies  1.2, 3.3
    Mail  1.4.5, 4.2
    Majority  8.6, 8.7.2
    Member of area administrated  3.5
    Modification of mail  2.1.5
    National Mail Hour  see Zone Mail Hour
    Network
         advantages 2.2
         boundaries 1.3.2, 5.4
         definition 1.2.3
         forming 2.4, 5.3
         hub 1.4.6, 4.4
         numbers 2.2, 5.4
    Network Coordinator  1.4.5
         procedures 4
         replacement 5.7, 9.3
    Network Mail Hour  see Zone Mail Hour
    New sysops  2.1.2, 3.6
    Node numbers  4.3, 5.2
       obtaining  2.2
    Nodelist  1.3.4, 2.2, 4.4, 5.5
         availability 3.1, 4.5, 5.8
         changes 4.4, 5.2
         current 2.1.11
         definition 1.3.4
         format 10.3
         official 1.3.4
    Nodes
         definition 1.2.2
         down 2.3
    Observing mail events  2.1.8, 2.1.10
    Obtaining a node number  2.2
    Offensive messages  2.1.5
    Partial nodelist  1.3.4
    Pirated software  2.1.1
    Point of origin  2.1.3
    Points  1.2.1, 1.4.8, 2.1.3
    Policy  3.1, 3.3, 4.5, 5.8
         changing 8
         familiarity with 2.1.2, 2.2
         local 1.2, 3.3
    Precedent  3.7, 9.10, 10.3
    Private messsages  2.1.6
    Private network  1.2.1
    Private nodes  2.1.9
    Problem resolution  9
    Public BBS  3.6
    Ratification  7.1
    Referendum  1.4.1, 8
    Regional Coordinator  1.4.4
         procedures 5
    FidoNews 6-14                Page 34                   3 Apr 1989


         replacement 6.1, 9.4
    Regions  1.2.4
    Replacement of coordinators  1.4.9
    Replacing services  3.4
    Requirements to be in NodeList  1.3.4, 2.1.2, 2.2
    Resignation of ZC  8.7.4
    Resolution of disputes  9
    Results Announcement  8.2
    Review of decisions  3.7
    Review of routed traffic  2.1.4
    Routing  2.1.4 - 2.1.7, 4.2
    Routing Hub  1.4.6, 4.4
    Rules  9.1
    Speedy decision  9.7
    Statute of limitations  9.6
    Submissions to FidoNews  1.3.1
    Sysop procedures  2
    System operator (sysop)  1.4.7
    Three-tiered networks  1.4.6
    Time limit on decision  9.7
    Timing of Zone Mail Hour  2.1.13, 2.1.14, 10.2
    Top-down  1.4.9
    Tradition  3.7
    Trivial network  5.3
    Unattended systems  2.3
    Updates to nodelist  3.2
    User  1.4.8
    User access during ZMH  2.1.8
    Vacation  2.3
    Vote  8
         eligibility 8.3, 8.7.2
    ZMH see Zone Mail Hour
    Zone Coordinator  1.4.3, 6
         election 1.4.9, 6.2
         impeachment 8.7
         procedures 6
         removal 6.2
         resignation during impeachment 8.7.4
    Zone Coordinator Council  1.4.2, 7.1
    Zone Mail Hour  1.3.3, 2.1.8
         timing 2.1.13, 2.1.14, 10.2
    Zones
         definition 1.2.5
         new 1.4.2
         unique 1.3.2







    -----------------------------------------------------------------
    FidoNews 6-14                Page 35                   3 Apr 1989


    Jeff Sheese, JStek BBS
    Fidonet 1:109/116   (Netmail HOST routed via 1:109/100)
    EggNet 99:9200/1    (Netmail HOST routed via 99:9200/0)

      ZOW, Yet Another Fantastically New File Packer! (Part 2 of 2)

    Yes, yet ANOTHER fantastically new file packer is about to hit
    the public domain software scene!

    If you read last week's Fidonews article about ZOW, your probably
    wondering how I can do all this wonderful stuff in one program.
    Well, here is the English psuedo-code that I used to develop the
    software package.  Remember, I mentioned that ZOW formats are
    public domain!

    1.   The command line for calling ZOW is "ZOW cmd FILENAME.EXT",
         where 'cmd' is GET or PUT.
    2.   To pack a file of any given size to only 2K one must issue
         the command "ZOW PUT FILENAME.EXT".
    3.   To retrieve a file from it's ZOW format, one must issue the
         command "ZOW GET FILENAME.EXT".
    4.   ZOW parses the command line to determine the command,
         whether it be GET or PUT.
    5.   Method for PUT, or packing the data file:
         a.   ZOW parses the command line to get the filename and
              extender.
         b.   ZOW creates the file "FILENAME.ZOW", using ZOW as the
              filename extender.
         c.   ZOW stores a copyright notice, starting at the
              beginning of "FILENAME.ZOW", ending with an ASCII end
              of file mark.  This is so that anyone using the TYPE
              command to list the contents of the ZOW formatted file
              will see that it's a ZOW file.
         d.   ZOW stores the original "FILENAME.EXT" after the ASCII
              end of file mark.
         e.   ZOW fills the rest of the 2048 byte "FILENAME.ZOW" file
              with random numbers.  The amount of time to do this is
              determined by a random number generator, seeded with
              the number equal to the size of the original file.
         f.   ZOW closes "FILENAME.ZOW".
         g.   ZOW changes the attributes of "FILENAME.ZOW" so that
              it's a SYSTEM, HIDDEN, READ-ONLY file.

    Next the user does a directory of the floppy disk.  Notice that
    "FILENAME.EXT" is gone and "FILENAME.ZOW" is in it's place?  Also
    notice that "FILENAME.ZOW" is only 2048 bytes long!

    I'm really excited about my new file packer!  As a matter of fact
    I'm going to call a lawyer tomorrow and copyright it!  Forget you
    saw the English Pseudo code!  *I* own it now!  I can make a lot
    of money off this thing and it's mine, all mine!!!  By the time
    you read this I would have copyrighted it!  i'm going to
    copyright it so all you joust queens can forget you ever saw
    it!!!!!!!  forget i said anything about public domain!!!!!!!!
    public domain is for the birds!!!! get real!!!! get a life!!!!

    FidoNews 6-14                Page 36                   3 Apr 1989


                         DENIAL OF COPYRIGHTS

         This article has been provided pursuant to absolutely no
    License Agreement containing restrictions on its use.  This
    article contains all valuable trade secrets and proprietary
    information of JStek Enterprises and is not protected by Federal
    Copyright Law.  It may be copied or distributed in any form or
    medium, disclosed to third parties, or used in any manner not
    provided for in the aforementioned nonexistant License Agreement
    except without prior written authorization from JStek
    Enterprises.

         This article is the property of JStek Enterprises (who has
    their own FedEx account!) as its created work.  This work
    includes certain individual portions provided to JStek
    Enterprises by operators and users of the JStek Bulletin Boards.
    JStek has the right to create and distribute these articles
    based, in part, on rights granted to it by those originating such
    portions.  Other than the rights granted JStek, those creating
    and maintaining the portions retain all residual rights in and to
    each's individual portion.  Specific manure rights are hereby
    granted to whomever wants to clean up the mess.

         Everyone is granted any right to use, sale, duplication or
    distribution of this article for any commercial purpose.  I
    figure if your willing to copy it and present it as your own, I
    must have done something right!

         (This article may be reproduced without permission and may
         also be excerpted out of context in a misleading way. -jes)

    -----------------------------------------------------------------
    FidoNews 6-14                Page 37                   3 Apr 1989


    =================================================================
                                 COLUMNS
    =================================================================

    The Veterinarian's Corner
    Excerpts from the ANIMED GroupMail Conference

    by Don Thomson, 1:102/1005

    With the winter weather, and more of us traveling to the ski
    slopes, the proper antifreeze in the radiator can be a lifesaver.
    Unfortunately, many 'do-it-yourselfers' who will do the radiator
    flushes and replace the old coolant with new antifreeze are
    unaware that Ethylene Glycol based antifreezes are highly toxic.

    Ethylene glycol, which acts to lower the freezing point of
    radiator coolant (and also raises the boiling point), is
    particularly attractive to animals.  It has a sweet taste, and if
    simply drained into the street gutter, or into an open catch pan
    where an animal can lap it up, may spell kidney failure in short
    order.

    The first signs of ethylene glycol poisoning are a 'drunken'
    incoordination, but as the agent is metabolized by the liver, it
    becomes a potent toxin for the kidneys.  Treatment must be
    initiated extremely early or severe damage will be done.  Very
    few pets recover without prolonged dialysis if the initial
    poisoning is not treated immediately with the appropriate
    antidotes.

      This is DEFINATELY one case where PREVENTION is paramount!

    DB Thomson, DVM
    1:102/1005
    9:871/16



    -----------------------------------------------------------------
    FidoNews 6-14                Page 38                   3 Apr 1989


    =================================================================
                          LETTERS TO THE EDITOR
    =================================================================

    From: Robert Heller @ 1:321/153.0 (Locks Hill BBS, Wendell, Mass)
    Subject:  "Will ZIP Replace ARC?" (Article by John Herro 1:363/6,
              in FidoNews V6 #11)
    Date: Sat Mar 25, 1989 12:18:24.58

    I'd like to say a few words on the whole "compression wars" that
    has been going on for some time now in various forums.

    Most of the "new" compression/packing/archiving programs only
    run on MS-DOS systems (i.e. Intel 8086 derived systems).  Of the
    many (I have not counted recently) computers I use, both at home
    (2) and at work (many others), only one has a Intel 8086 derived
    CPU, and it does not run MS-DOS.  The computer my BBS runs on is
    a 68000-based system (it presently runs CP/M-68K and will be soon
    running OS-9/68000).   There are only two archiver program that
    runs on all of them (more or less): ARC 5.12 and Zoo (2.01).  ARC
    was an extreem pain to port out of the MS-DOS world (it was not
    written in a portable fashion).  I ported Zoo to OS-9/68000 very
    easily.  While Zoo may not be the fastest (or the tightest)
    packer, it does fairly well.  ARC 5.12 tends to run like a dog
    and does not pack the best, but it is an old program.

    Because I have no way of verifying them, I won't be supporting
    the use of .ZIP files on my bbs.  I do not think it is a good
    idea to make a packing method a "standard" until some effort has
    gone into making software that can handle the proposed "standard"
    archives under many (if not most/all) different operating systems
    and processor types.  ARC was ported in self-defense (with great
    difficulty in some cases).  Zoo was written with the idea of
    being ported to different operating systems, compilers, and
    processor types.  Unless/until the same can be said of PKZIP or
    any of the other "new" compression/packer/archiver programs, I
    don't think we should be talking about establishing standards as
    yet.

    Comments, questions, etc. welcome.

                          Robert Heller
               ARPANet:   [email protected]
               BITNET:    [email protected]
               FidoNet:   1:321/153.0 (Locks Hill BBS,
                                       1-508-544-8337,
                                       300/1200/2400 BAUD)
               BIX:       locks.hill.bbs



    -----------------------------------------------------------------
    FidoNews 6-14                Page 39                   3 Apr 1989


    =================================================================
                             LATEST VERSIONS
    =================================================================

                         Latest Software Versions

                          Bulletin Board Software
    Name        Version    Name        Version    Name       Version

    Fido            12k*   Opus          1.03b    TBBS           2.1
    QuickBBS       2.03    TPBoard         5.0    TComm/TCommNet 3.4*
    Lynx           1.22    Phoenix         1.3    RBBS         17.1D


    Network                Node List              Other
    Mailers     Version    Utilities   Version    Utilities  Version

    Dutchie       2.90C*   EditNL         4.00    ARC           6.01*
    SEAdog         4.50*   MakeNL         2.12    ARCmail        2.0*
    BinkleyTerm    2.20*   Prune          1.40    ConfMail      4.00
    D'Bridge       1.18*   XlatList       2.90*   TPB Editor    1.21
    FrontDoor       2.0    XlaxNode       2.32*   TCOMMail       2.1*
    PRENM          1.40    XlaxDiff       2.32*   TMail         8901*
                           ParseList      1.30    UFGATE        1.02*
                                                  GROUP         2.04*
                                                  EMM           1.40
                                                  MSGED         1.99*
                                                  XRS            1.2*

    * Recently changed

    Utility authors:  Please help  keep  this  list  up  to  date  by
    reporting  new  versions  to 1:1/1.  It is not our intent to list
    all utilities here, only those which verge on necessity.

    -----------------------------------------------------------------
    FidoNews 6-14                Page 40                   3 Apr 1989


    =================================================================
                                 NOTICES
    =================================================================

                         The Interrupt Stack


     8 May 1989
       Digital Equipment Corporations User Society (DECUS) will be
       holding its semi-annual symposium in Atlanta, GA. Runs
       through May 12. As usual sysop's will get together and chat.

    19 May 1989
       Start of EuroCon III at Eindhoven, The Netherlands

    24 Aug 1989
       Voyager 2 passes Neptune.

    24 Aug 1989
         FidoCon '89 starts at the Holiday Inn in San Jose,
         California.  Trade show, seminars, etc. Contact 1/89
         for info.

     5 Oct 1989
       20th Anniversary of "Monty Python's Flying Circus"

    If you have something which you would like to see on this
    calendar, please send a message to FidoNet node 1:1/1.

    -----------------------------------------------------------------

    FidoNews 6-14                Page 41                   3 Apr 1989


           OFFICERS OF THE INTERNATIONAL FIDONET ASSOCIATION

    Mort Sternheim 1:321/109  Chairman of the Board
    Bob Rudolph    1:261/628  President
    Matt Whelan    3:3/1      Vice President
    Bill Bolton    3:711/403  Vice President-Technical Coordinator
    Linda Grennan  1:147/1    Secretary
    Kris Veitch    1:147/30   Treasurer


           IFNA COMMITTEE AND BOARD CHAIRS

    Administration and Finance     Mark Grennan    1:147/1
    Board of Directors             Mort Sternheim  1:321/109
    Bylaws                         Don Daniels     1:107/210
    Ethics                         Vic Hill        1:147/4
    Executive Committee            Bob Rudolph     1:261/628
    International Affairs          Rob Gonsalves   2:500/1
    Membership Services            David Drexler   1:147/1
    Nominations & Elections        David Melnick   1:107/233
    Public Affairs                 David Drexler   1:147/1
    Publications                   Rick Siegel     1:107/27
    Security & Individual Rights   Jim Cannell     1:143/21
    Technical Standards            Rick Moore      1:115/333


                     IFNA BOARD OF DIRECTORS

        DIVISION                               AT-LARGE

    10  Courtney Harris   1:130/732    Don Daniels     1:107/210
    11  Bill Allbritten   1:11/301     Mort Sternheim  1:321/109
    12  Bill Bolton       3:711/403    Mark Grennan    1:147/1
    13  Irene Henderson   1:107/9       (vacant)
    14  Ken Kaplan        1:100/22     Ted Polczyinski 1:154/5
    15  Scott Miller      1:128/12     Matt Whelan     3:3/1
    16  Ivan Schaffel     1:141/390    Robert Rudolph  1:261/628
    17  Neal Curtin       1:343/1      Steve Jordan    1:206/2871
    18  Andrew Adler      1:135/47     Kris Veitch     1:147/30
    19  David Drexler     1:147/1       (vacant)
     2  Henk Wevers       2:500/1      David Melnik    1:107/233

    -----------------------------------------------------------------
    FidoNews 6-14                Page 42                   3 Apr 1989


                                     __
                The World's First   /  \
                   BBS Network     /|oo \
                   * FidoNet *    (_|  /_)
                                   _`@/_ \    _
                                  |     | \   \\
                                  | (*) |  \   ))
                     ______       |__U__| /  \//
                    / Fido \       _//|| _\   /
                   (________)     (_/(_|(____/ (tm)

           Membership for the International FidoNet Association

    Membership in IFNA is open to any individual or organization that
    pays  a  specified  annual   membership  fee.   IFNA  serves  the
    international  FidoNet-compatible  electronic  mail  community to
    increase worldwide communications.

    Member Name _______________________________  Date _______________
    Address _________________________________________________________
    City ____________________________________________________________
    State ________________________________  Zip _____________________
    Country _________________________________________________________
    Home Phone (Voice) ______________________________________________
    Work Phone (Voice) ______________________________________________

    Zone:Net/Node Number ____________________________________________
    BBS Name ________________________________________________________
    BBS Phone Number ________________________________________________
    Baud Rates Supported ____________________________________________
    Board Restrictions ______________________________________________

    Your Special Interests __________________________________________
    _________________________________________________________________
    _________________________________________________________________
    In what areas would you be willing to help in FidoNet? __________
    _________________________________________________________________
    _________________________________________________________________
    Send this membership form and a check or money order for $25 in
    US Funds to:
                  International FidoNet Association
                  PO Box 41143
                  St Louis, Missouri 63141
                  USA

    Thank you for your membership!  Your participation will help to
    insure the future of FidoNet.

    Please NOTE that IFNA is a general not-for-profit organization
    and Articles of Association and By-Laws were adopted by the
    membership in January 1987.  The second elected Board of Directors
    was filled in August 1988.  The IFNA Echomail Conference has been
    established on FidoNet to assist the Board.  We welcome your
    input to this Conference.

    -----------------------------------------------------------------