F I D O N E W S Volume 16, Number 13 29 March 1999
+----------------------------+---------------------------------------+
| The newsletter of the | ISSN 1198-4589 Published by: |
| FidoNet community | "FidoNews" |
| _ | +27-41-581-5913 [5:5/23] |
| / \ | |
| /|oo \ | |
| (_| /_) | |
| _`@/_ \ _ | |
| | | \ \\ | Editor: |
| | (*) | \ )) | Henk Wolsink 5:7104/2 |
| |__U__| / \// | |
| _//|| _\ / | |
| (_/(_|(____/ | |
| (jm) | Newspapers should have no friends. |
| | -- JOSEPH PULITZER |
+----------------------------+---------------------------------------+
| Submission address: FidoNews Editor 5:5/23 |
+--------------------------------------------------------------------+
| MORE addresses: |
| |
| submissions=>
[email protected] |
|
[email protected] |
+--------------------------------------------------------------------+
| For information, copyrights, article submissions, |
| obtaining copies of FidoNews or the internet gateway FAQ |
| please refer to the end of this file. |
+--------------------------------------------------------------------+
Table of Contents
1. EDITORIAL ................................................ 1
2. ARTICLES ................................................. 2
Internet newsgroup<>echomail ............................. 2
Packet type 2 ............................................ 3
3. COLUMNS .................................................. 21
What's Not Happening: Tag-Teams ......................... 21
4. NOTICES .................................................. 23
5. FIDONET BY INTERNET ...................................... 24
6. FIDONEWS INFORMATION ..................................... 28
FIDONEWS 16-13 Page 1 29 Mar 1999
=================================================================
EDITORIAL
=================================================================
Greetings,
Our summer is comming to an end, with temperatures back to normal. ;-)
What is normal you may ask? Temperatures acceptable to us humans that
is.
Happy reading,
-----------------------------------------------------------------
FIDONEWS 16-13 Page 2 29 Mar 1999
=================================================================
ARTICLES
=================================================================
Internet newsgroup<>echomail gating service now available
By Joe Jared (1:103/301@fidonet)
[email protected]
Special thanks to Remarq.com, (formerly supernews.com) for making
control messages available to me for creation of newsgroups. If what
I'm told is correct on this topic, newsgroups once added, are global
in scope.
TO ANY MODERATORS INTERESTED:
Your echo can be gated to the internet
on request. To initiate gating of your echo, simply send netmail or
an email to one of my addresses as listed above and respond to the
confirmation message. Once the echo has successfully be made global,
the moderator may assume the gating duties assuming software is
available to do so. The software I am currently using is compatable
with most news servers and works with Windows 95/98/NT and is
freeware. The key solutions however in performing this gateway are
available from
[email protected], a listserv open to all.
The structure as the echo would appear on the internet would be
fidonet.*, where the * is the name of your echo. In some cases, it
may appear as fidonet.name.*, replacing the underscores '_' with dots
if deemed appropriate to the heirarchy. For example:
SIP_ACA would be mapped to fidonet.sip.aca, because it is a part of a
group of echoes preceded with the keyword SIP.
Your message as the moderator of an echo would need to include
heirarchy if it's not readily visible as well as a request to have it
added to internet distribution. I will then respond to the elisted
moderator address for all cases except where the moderator is a known
highjacker, in which case the recognized moderator will take
precedence. No gated echo need be elisted but it would make things
easier for me if you as moderator elisted the echo.
If you are in contact with moderators of other newsgroups and would
like your echomail conference merged with their newsgroup, a request
from both moderators are required, and can be broken on request by
either party.
As a moderator the ONLY requests honored will be to add "known"
spammers to the kill list, and to add and remove it from internet
distribution. The object of this gateway is to improve the volume of
traffic while minimizing some of the hazards (Spam, Viruses, trojans,
twits etc). A gated echo will disappear from distribution if it is
deemed to be a problematic echo (I.E. too much used cowfood involved
in distributing it). This service is free and as such should have
reasonable expectations. Initially this system will be limited in
terms of echoes that can be gated (I'm using soon to be replaced and
outdated tosser that only supports 2048 echoes), but I doubt this will
FIDONEWS 16-13 Page 3 29 Mar 1999
be a problem for a few months.
As a final note, once mail leaves or enters fidonet, it is no longer
bound by policy4, nor can it be expected to, as it is no longer just
fidonet mail. The gateway assumes no liablity for traffic whether it
be legal or otherwise and will take prompt action once notified of an
repeated offense, but it cannot be expected that all internet gated
echoes will be free of clutter. One a positive note however, your
echomail area will receive the exposure that it desperately needs to
thrive and grow.
-----------------------------------------------------------------
Packet type 2, draft 990328
by Goran Eriksson, 2:201/505,
[email protected]
It seems to be the general opinion among FTSC members that packet type
2+ (and possibly others like packet type 2.2 and the packet type
proposed by FSC-48) should receive FTS status.
To prepare for this I have written a document describing packet type 2
as this is the basis for all of these other packet types.
I do not expect this document to be included verbatim into a new FTS.
Neither for packet type 2, nor for the other packet types.
However, I hope that the FTSC will find my document useful enough to
build the new FTS documents upon it.
Therfore, I will post my latest draft in the following messages and
invite you to comment on it in the NET_DEV echomail conference.
English is a foreign language to me. Purely linguistic remarks are
welcome, but please send them to me by netmail or e-mail.
1. General
A packet file of type 2 has the following general layout
---------------------
| Packet header |
---------------------
| Packed message |
---------------------
: :
---------------------
| Packed message |
---------------------
| Packet terminator |
---------------------
The number of packed messages may be 0 or more.
FIDONEWS 16-13 Page 4 29 Mar 1999
2. Packet header
2.1. General
The packet header of a packet file of type 2 has the following
general layout
Relative byte offset Size in bytes
-----------------------
0 00H | Origin Node | 2
-----------------------
2 02H | Destination Node | 2
-----------------------
4 04H | Year | 2
-----------------------
6 06H | Month | 2
-----------------------
8 08H | Day | 2
-----------------------
10 0AH | Hour | 2
-----------------------
12 0CH | Minute | 2
-----------------------
14 0EH | Second | 2
-----------------------
16 10H | Baud Rate | 2
-----------------------
18 12H | Packet Type | 1
-----------------------
20 14H | Origin Net | 2
-----------------------
22 16H | Destination Net | 2
-----------------------
24 18H | Product Code | 1
-----------------------
25 19H | Serial Number | 1
-----------------------
26 1AH | Password | 8
-----------------------
34 22H | Origin zone | 2
-----------------------
36 24H | Destination zone | 2
-----------------------
38 26H | Reserved | 20
-----------------------
The total size of the packet header is 58 bytes.
2.2. Origin Node
This field contains information about the node number of the system
having created the packet. The field contains a 16-bit binary unsigned
integer in the range 0-65535.
See notes 1 and 2.
FIDONEWS 16-13 Page 5 29 Mar 1999
2.3. Destination Node
This field contains information about the node number of the system
for which the packet was created. The field contains a 16-bit binary
unsigned integer in the range 0-65535.
See notes 1 and 2.
2.4. Year
This field contains information about the year when the packet was
created. The field contains a 16-bit binary unsigned integer in the
range 0-66535.
See notes 2 and 3.
2.5. Month
This field contains information about the month when the packet was
created. The field contains an 8-bit binary unsigned integer in the
range 0-11. The following representation is used:
Month represented as
January 0
February 1
March 2
April 3
May 4
June 5
July 6
August 7
September 8
October 9
November 10
December 11
See note 3.
2.6. Day
This field contains information about the day when the packet was
created. The field contains an 8-bit binary unsigned integer in the
range 1-31.
See note 3.
2.7. Hour
This field contains information about the hour when the packet was
created. The field contains an 8-bit binary unsigned integer in the
range 0-23.
See note 3.
2.8. Minute
This field contains information about the minute when the packet was
created. The field contains an 8-bit binary unsigned integer in the
range 0-59.
See note 3.
FIDONEWS 16-13 Page 6 29 Mar 1999
2.9. Second
This field contains information about the second when the packet was
created. The field contains an 8-bit binary unsigned integer in the
range 0-59.
See note 3.
2.10. Baud Rate
This field is filled with the 16-bit binary unsigned integer 0 by the
system creating the packet. Any system receiving the packet may ignore
the value of this field. For historical reasons this field is called
Baud Rate.
See note 2.
2.11. Packet Type
This field is filled with the 16-bit binary unsigned integer 2 by the
system creating the packet. Any system receiving the packet should
check the contents of this field. If it does not contain the 16-bit
binary unsigned integer 2 it is recommanded that the receiving system
regards it unsafe to unpack this packet according to the format
specification for packet type 2. Any further actions by the receiving
system in this case are left to the implementation.
See note 2.
2.12. Origin Net
This field contains information about the net number of the system
having created the packet. The field contains a 16-bit binary unsigned
integer in the range 1-65535.
See notes 1 and 2.
2.13. Destination Net
This field contains information about the net number of the system for
which the packet was created. The field contains a 16-bit binary
unsigned integer in the range 1-65535.
See notes 1 and 2.
2.14. Product Code
This field contains information about the product code assigned to the
programme creating the packet. The field contains an 8-bit binary
unsigned integer in the range 0-255.
Product codes are assigned to programmes by the FTSC. See FTA-1005.
That document also contains information about what product codes to
use by programmes which have not yet been assigned a product code by
the FTSC.
2.15. Serial Number
This field may contain information about the serial number of the
programme creating the packet. The field contains a 8-bit binary
unsigned integer in the range 0-255. If a programme does not want to
assign any serial number to this field it should fill this field with
the 8-bit binary unsigned integer 0.
FIDONEWS 16-13 Page 7 29 Mar 1999
2.16. Password
This field contains information about a packet level password. The
field contains an array of 0-8 ASCII characters, each in the range
'0'..'9', 'A'..'Z'. The programme creating the packet should fill all
unused bytes in this field with the 8-bit binary unsigned value 0. Any
programme receiving a packet should ignore any bytes in this field
after the first occurence of an byte with the value 0. The comparison
of passwords in a received packet file is done case insensitively.
Any programme receiving a packet with a password differing from the
password set up between the system having created the packet and the
system receiving it (including the absence of a password when one has
been agreed upon) should consider the information contained in the
packet about the system that has created as unreliable. Any further
actions by the receiving system in this case are left to each
implementation.
See note 5.
2.17. Origin Zone
This field may contain information about the zone number of the system
having created the packet. The field contains a 16-bit binary unsigned
integer in the range 1-65535. If a programme does not wish to enter a
zone number into this field it should fill it with the 16-bit binary
unsigned value 0.
See notes 1, 2 and 4.
2.18. Destination Zone
This field may contain information about the zone number of the system
for which the packet was created. The field contains a 16-bit binary
unsigned integer in the range 1-65535. If a programme does not wish to
enter a zone number into this field it should fill it with the 16-bit
binary unsigned value 0.
See notes 1, 2 and 4.
2.19. Reserved
This field is filled by the programme creating the packet with an
array of bytes with the 8-bit binary unsigned value 0. Any programme
receiving a packet should ignore the contents of this field.
3. Packed message format
3.1. General
The packed message in a packet file of type 2 has the following
general layout
Relative byte offset
-----------------------
0 00H | Packet Type |
-----------------------
2 02H | Origin Node |
-----------------------
4 04H | Destination Node |
FIDONEWS 16-13 Page 8 29 Mar 1999
-----------------------
6 06H | Origin Net |
-----------------------
8 08H | Destination Net |
-----------------------
10 0AH | Attribute |
-----------------------
12 0CH | Cost |
-----------------------
14 0EH | Date and Time |
-----------------------
34 22H | To-name |
-----------------------
| From-name |
-----------------------
| Subject |
-----------------------
| Message body |
-----------------------
The total size of the packed message is variable.
3.2. Packet Type
This field is filled with the 16-bit binary unsigned integer 2 by the
system creating the packet. Any system receiving the packet should
check the contents of this field. If it does not contain the 16-bit
binary unsigned integer 2 it is recommanded that the receiving system
regards it unsafe to unpack this packet according to the format
specification for packet type 2. Any further actions by the receiving
system in this case are left to the implementation.
See note 2.
3.3. Origin Node
This field contains information about the node number of the system
having created the message. The field contains a 16-bit binary
unsigned integer in the range 0-65535.
See notes 1 and 2.
3.4. Destination Node
This field contains information about the node number of the system
for which the message was created. The field contains a 16-bit binary
unsigned integer in the range 0-65535.
See notes 1 and 2.
3.5. Origin Net
This field contains information about the net number of the system
having created the message. The field contains a 16-bit binary
unsigned integer in the range 1-65535.
See notes 1 and 2.
3.6. Destination Net
This field contains information about the net number of the system for
FIDONEWS 16-13 Page 9 29 Mar 1999
which the message was created. The field contains a 16-bit binary
unsigned integer in the range 1-65535.
See notes 1 and 2.
3.7. Attribute
This field contains information about the attributes assigned to the
message in question. This field is treated as a 16-bit bit mapped flag
field with the following assignments:
Bit Meaning
--- -------
0 Private
1 Crash
4 File Attached
10 Reserved
11 File Request
12 Return Receipt Request
13 Is Return Receipt
14 Audit Request
15 File Update Request
See note 2.
3.7.1. Private
When this attribute is set the message is considered private and
intended for the addressee only. See a separate document for the use
of the Private attribute in echomail messages.
3.7.2. Crash
When this attribute is set the message is considered high-priority. A
system that encounters a message with the Crash attribute set normally
makes an effort to speed the delivery of the message in question if it
is not intended for the own system. However, the actions actually to
be taken upon receipt of a message with the Crash attribute set is
left to each implementation.
3.7.3. File Attached
When this attribute is set it is supposed that one or more files are
attached to the message. The files are transferred separately from the
packet file in which the message with the File Attached attribute is
contained. See also 3.12.1.
A message with the File Attached attribute set may contain a message
body.
Normally a message with the File Attached attribute set must be sent
directly to the destination system since ftn systems usually are not
set up for the routing of non-mail files.
3.7.4. Reserved
This attribute bit is reserved for future use. It should not be
checked by a programme receiving a type 2 packet.
3.7.5. File Request
When this attribute is set it is supposed that one or more files are
FIDONEWS 16-13 Page 10 29 Mar 1999
requested from the desination system of to the message. See also
3.12.1.
A message with the File Request attribute set may contain a message
body.
Normally a message with the File Request attribute set must be sent
directly to the destination system since ftn systems usually are not
set up for the routing of non-mail files.
3.7.6. Return Receipt Request
When this attribute is set it is assumed that the sender of the
message requests a return receipt. A Return Receipt in this connection
means a receipt from the final destination system that the message has
arrived there. It is left to each implementation what steps to take
when a message with the Return Receipt Request attribute bit is
received.
3.7.7. Is Return Receipt
When this attribute is set it is assumed that the message in question
is a return receipt. It is left to each implementation what steps to
take when a message with the Is Return Receipt attribute bit is
received.
3.7.8. Is Audit Request
When this attribute is set it is assumed that the sender of the
message requests audit receipts. An Atuidt Receipt in this connection
means a receipt from each of the systems transporting the message in
question on its way to the final destination that the message has
passed there. It is left to each implementation what steps to take
when a message with the Is Audit Request attribute bit is received.
3.7.9. File Update Request
When this attribute is set it is supposed that a file update is
requested from the desination system of to the message. See also
3.12.1.
A message with the File Update Request attribute set may contain a
message body.
Normally a message with the File Update Request attribute set must be
sent directly to the destination system since ftn systems usually are
not set up for the routing of non-mail files.
3.7.10. Attribute bits 2-3, 5-9
Any programme creating a packet may set bits 2-3 and 5-9 in the
message attribute field to 0. They should not be checked by a
programme receiving a type 2 packet.
These attribute bits are normally only used for information
interchange between different programmes on the system where the
message in question is created.
3.8. Cost
This field is filled with the 16-bit binary unsigned integer 0 by the
system creating the packet. Any system receiving the packet may ignore
FIDONEWS 16-13 Page 11 29 Mar 1999
the value of this field. For historical reasons this field is called
Cost.
See note 2.
3.9. Date and Time
This field is filled with a <NUL>-terminated ASCII character string
representing the date and the time when the message in question was
created.
The string has the following format
DD " " Month " " YY " " " " HH ":" MM ":" SS <NUL>
where
DD = "01" | "02" | "03" | ... | "31"
Month = "Jan" | "Feb" | "Mar" | "Apr" | "May" | "Jun" |
"Jul" | "Aug" | "Sep" | "Oct" | "Nov" | "Dec"
YY = "01" | "02" | .. | "85" | "86" | ... | "99" | "00"
HH = "00" | .. | "23"
MM = "00" | .. | "59"
SS = "00" | .. | "59"
The representation of the year contains the two last digits of the
year in question. E.g. the year 1999 is represented as "99" and the
year 2000 as "00".
Considering the time when packet type 2 was first put into use, values
"80".."99" is assumed to represent 1980..1999 and values "00".."79" is
assumed to represent 2000..2079.
The length of the string is 20 characters including the <NUL>
termination.
See note 3.
3.10. To-name
This variable length field is filled with the <NUL>-terminated
character string representing the name of the addressee of the message
in question. In the case the programme creating the packet does not
want to put any actual name there, the field should be filled with a
single <NUL> character. The maximum length of the string is 36
characters including the <NUL> termination. E.g. the name Jim Brown is
represented as "Jim Brown"<NUL>.
The character set used in this field is the same as given in the
message body (see a separate document). If no character set is given
there, the ASCII character set is used.
Character codes 1..31 may not be used within this field.
3.11. From-name
This variable length field is filled with the <NUL>-terminated
character string representing the name of the sender of the message in
question. In the case the programme creating the packet does not want
FIDONEWS 16-13 Page 12 29 Mar 1999
to put any actual name there, the field should be filled with a single
<NUL> character. The maximum length of the string is 36 characters
including the <NUL> termination. E.g. the name Jim Brown is
represented as "Jim Brown"<NUL>.
The character set used in this field is the same as given in the
message body (see a separate document). If no character set is given
there, the ASCII character set is used.
Character codes 1..31 may not be used within this field.
3.12. Subject
This variable length field is filled with the <NUL>-terminated
character string representing the subject of the message in question.
In the case the programme creating the packet does not want to put any
actual subject there, the field should be filled with a single <NUL>
character. The maximum length of the string is 72 characters including
the <NUL> termination. E.g. the subject "FTS-0001" is represented as
"FTS-0001"<NUL>.
The character set used in this field is the same as given in the
message body (see a separate document). If no character set is given
there, the ASCII character set is used.
Character codes 1..31 may not be used within this field.
3.12.1. File specifications
When the attribute field has bit 4, 11 and/or 15 set, the message
subject field normally is replaced by a list of file specifications
containing the file names the system where the message was created
(directory, path and time information etc are discarded).
These file specifications are transmitted to the receiving system
according to separate documents.
It should be noted that if the message is accompanied by an attached
file which is to be routed via other systems before reaching the
ultimate destination system, it may be essential for the intermediate
systems that the message is indeed transmitted even if it is empty. By
doing so, the intermediate systems will have a way of finding out the
intended destination of the attached file.
It should also be noted that especially in the case of routed file
attaches it is essential that file names are chosen so that they can
be directly and easily handled under the same names by the respective
host operating systems at the intermediate systems.
3.13. Message body
This variable length field is filled with the <NUL>-terminated
character string representing the message text of the message in
question. In the case the programme creating the packet does not want
to put any actual text there, the field should be filled with a single
<NUL> character. The maximum length of the string is unlimited. E.g.
the text "FTS-0001" is represented as "FTS-0001"<NUL>.
See note 7.
FIDONEWS 16-13 Page 13 29 Mar 1999
The character set used in this field is the same as given in the
message body (see a separate document). If no character set is given
there, the ASCII character set is used.
Character codes 2..9,11..12,14..31 may not be used within this field.
Character code 141 may be used within this field irrespective of the
character set used.
Character code 1 may be used only for the purpose given below.
Special considerations about certain character codes apply:
3.14. Character code 1, <SOH>
To include extra addressing and control information, the message body
may contain so called kludges.
Each kludge is contained within a separate paragraph of text as
defined in 3.16. A paragraph containing a kludge may not contain any
other message text.
Each paragraph containing a kludge starts with <SOH> character. The
<SOH> character must not appear in any other position of a paragraph.
The general format of a paragraph containing a kludge is
<SOH><Kludge tag>": "<string><CR>
where <string> is some sort of value related to the kludge in
question.
If no such value is required for a certain kludge, the general format
of a paragraph containing such a kludge is
<SOH><Kludge tag>":"<CR>
Developers may introduce new kludges on an experimental basis as they
see fit. Kludge tags which are documented in FTS documents must
however not be used in any other way than according to those FTS
documents. Kludge tags which are documented in FSP or FSC documents
should not be used in any other way than according to those documents.
Consequently each programme receiving a type 2 packet file should
retain any unknown kludge verbatim and at an unchanged a position
within the message body as possible. This is particularly essential
for messages which are to be routed to another system.
The ASCII character set is used in paragraphs containing kludges.
This document describes three kludges: FMPT, TOPT and INTL.
3.14.1. FMPT
The FMPT kludge is used to give information about the point number of
the sender of a message if that point number is not 0. If the point
number of the sender of a message is 0 that message should not contain
any FMPT kludge.
FIDONEWS 16-13 Page 14 29 Mar 1999
The format of a paragraph containing a FMPT kludge is
<SOH>"FMPT <point number>"<CR>
where <point number> is the ASCII representation of the point number
of the sender. The point number is an unsigned integer in the range
1-65535. See note 1.
E.g. a message from point number 1 of a certain node contains the
following FMPT kludge
<SOH>"FMPT 1"<CR>
Note that the format of a paragraph containing a FMPT kludge deviates
from the general format given above in that it does not contain any
colon after the kludge tag.
3.14.2. TOPT
The TOPT kludge is used to give information about the point number of
the addressee of a message if that point number is not 0. If the point
number of the addressee of a message is 0 that message should not
contain any TOPT kludge.
The format of a paragraph containing a TOPT kludge is
<SOH>"TOPT "<point number><CR>
where <point number> is the ASCII representation of the point number
of the sender. The point number is an unsigned integer in the range
0-65535. See note 1.
E.g. a message to point number 1 of a certain node contains the
following TOPT kludge
<SOH>"TOPT 1"<CR>
Note that the format of a paragraph containing a FMPT kludge deviates
from the general format given above in that it does not contain any
colon after the kludge tag.
3.14.3. INTL
The INTL kludge is used to give information about the zone numbers of
the sender and the addressee of a message.
The format of a paragraph containing a INTL kludge is
<SOH>"INTL "<destination address>" "<origin address><CR>
where <destination address> is the ASCII representation of the
destination address and <origin address> is the ASCII representation
of the origin address of the message in question. These addresses is
given on the form <zone>:<net>/<node> where <zone> is the ASCII
representation of the zone number, <net> is the ASCII representation
of the net number and <node> is the ASCII representation of the
node number. Any point number information is given in FMPT and TOPT
kludges.
FIDONEWS 16-13 Page 15 29 Mar 1999
E.g. a message from address 1:123/4.5 to 2:345/6.7 node contains the
following INTL kludge
<SOH>"INTL 2:345/6 1:123/4"<CR>
Note that the format of a paragraph containing a INTL kludge deviates
from the general format given above in that it does not contain any
colon after the kludge tag.
INTL kludges are also often used even when both the originating and
the destination systems are in the same zone. This gives both the
originating system and the destination system as well as any
intermediate routing systems unambiguous zone information even in a
situation where one system may be active in a number of different
zones.
However, it is known that some programmes may route messages
incorrectly if the INTL kludge is present in messages where both the
originating and the destination systems are in the same zone.
3.15. Character code 10, <LF>
Programmes creating packet files may put <LF> characters into the
message body. These characters should be disregarded by any programmes
displaying the message to a user. Instead text should be formatted
according to local conditions such as user preferences and/or
physical/logical constraints of display equipment.
Use of <LF> characters in the message body is discouraged. However
<LF> characters should not be removed from the message body of
in-transit messages.
3.16. Character code 13, <CR>
The <CR> character is used for the purpose of terminating paragraphs
of text. Any programme displaying the message to a user should format
the text accordingly.
3.17. Character code 141, soft-<CR>
Programmes creating packet files may put soft-<CR> characters into the
message body. These soft-<CR> characters are usually used to prescribe
local formatting on the system where the message in question was
created. These characters should be disregarded by any programmes
displaying the message to a user.
Use of soft-<CR> characters in the message body is discouraged.
However soft-<CR> characters should not be removed from the message
body of in-transit messages.
In certain character sets, character code 141 may be used for a vital
part of the character set. If it can be assumed that the message is
written in such a character set, character code 141 may be used and
displayed.
4. Packet file names
The name of a packet file when transmitted to another system is of the
form
FIDONEWS 16-13 Page 16 29 Mar 1999
HHHHHHHH.PKT
where HHHHHHHH is a string of 8 hexadecimal digits in the ASCII
character set and .PKT is the literal ".PKT" also in the ASCII
character set.
The value for HHHHHHHH is chosen so as to minimize the risk of any
system receiving several packet files with the same name before all
the previously received files of that name have been processed.
5. Arcmail
To minimize the storage requirements for packet files and the time and
cost for their transmission from system to system, zero or more packet
files may be aggregated into compressed archives (Arcmail bundles)
using lossless compression programmes. This scheme is normally called
Arcmail after the programme once produced by System Enhancement
Associates.
Such compression programmes are not specified by this standard but are
generally available for a number of platforms.
However, the availability of suitable decompression programmes on a
certain system cannot be guaranteed. Therefore Arcmail should only be
used after prior agreement between the operators of the two systems
involved.
When Arcmail bundles are to be used their file names when transmitted
to another system is of the form
HHHHHHHH.DDN
where HHHHHHHH is a string of 8 hexadecimal digits in the ASCII
character set and .DD is one of the following literals
".MO", ".TU", ".WE", ".TH", ".FR", ".SA", ".SU"
in the ASCII character set and N is a the ASCII representation of
decimal digit 0-9.
See note 6.
7. Address interpretation
Packet type 2 has been in use during a long period of time during
which the number and the complexity of ftn networks have increased
greatly.
The addressing requirements during this period have increased. Some of
these additional requirements have been met in packet type 2 by adding
kludges as defined above.
The following guidelines can be given for the interpretation of the
ftn addresses of type 2 packet files:
1. The origin and destination zone numbers are given explicitly in the
FIDONEWS 16-13 Page 17 29 Mar 1999
packet header if they are different from 0 and the packet is created
by a programme that is known to put that information there. One such
programme is QMail.
2. The origin net and node numbers are given explicitly in the packet
header.
3. The destination net and node numbers are given explicitly in
the packet header.
4. The origin and destination point numbers cannot be found in a type
2 packet. (For the case of Fakenets see section 8.)
The following guidelines can be given for the interpretation of the
ftn addresses of messages in type 2 packet files:
1. The origin and destination zone numbers are given explicitly in an
INTL kludge in the message body if there is such a kludge. (For the
case of Zone Gating see section 8.)
2. If there is no INTL kludge in the message body or there is an INTL
kludge that is not conformant with this specification the missing zone
numbers may be assumed to be equal to the originating zone number in
the packet header if that information is available. (For the case of
Zone Gating see section 8.)
3. If any zone number cannot be determined in steps 1 and 2 it may be
assumed to be equal to the zone number of the main address of the own
system. (For the case of Zone Gating see section 8.)
4. The origin net and node numbers are given explicitly in the
message header.
5. The destination net and node numbers are given explicitly in the
message header. (For the case of Zone Gating see section 8.)
6. The originating point number is given in the FMPT kludge in the
message body if there is such a kludge.
7. If there is no FMPT kludge in the message body or there is a FMPT
kludge that is not conformant with this specification the originating
point number may be assumed to be 0.
8. The destination point number is given in the TOPT kludge in the
message body if there is such a kludge. (For the case of Zone Gating
see section 8.)
9. If there is no TOPT kludge in the message body or there is a TOPT
kludge that is not conformant with this specification the destination
point number may be assumed to be 0. (For the case of Zone Gating see
section 8.)
8. Fakenets
Some existing programmes have limited support for point addressing.
In order to still allow for points when such programmes are in use,
sometimes a system called Fakenets or Fakenet Addressing is used.
The operator of a ftn node using Fakenets defines a special net
number, not included in the general nodelist, for the points under
that node.
That ftn node itself assumes the role of host for that net, i.e.
assumes the address <fakenet>/0. The point systems are then assigned
node numbers within that Fakenet. These node numbers are usually equal
to the point numbers which they have been assigned. There may or there
may not be a zone number assigned to the Fakenet. If a zone number is
FIDONEWS 16-13 Page 18 29 Mar 1999
assigned it usually is the zone number in which the ftn node itself is
active.
A ftn node operating a Fakenet should use programmes which do the
readdressing of messages so that systems outside of the Fakenet need
not be aware of the address allocations within the Fakenet.
E.g. assume that node 1:234/5 operates a fakenet with net number
23450. Programmes at 1:234/5 are then expected to readdress any
message to 1:234/5.1 to whatever node number that point system has
within the fakenet (usually 1:23450/1). Likewise, programmes at
1:234/5 are expected to readdress any messages from 1:23450/1 to a
destination outside the fakenet so that they appear to originate from
1:234/5.1 (providing that is the 4-dimensional point address which
Fakenet node 1:23450/1 has).
9. Zone Gating
When two zones cover different geographical areas such as two
different continents the technical difficulties and costs of
establishing direct communications between two systems, one in each of
these zones, may be considered a problem.
For that purpose there may by administrative decisions be appointed
one or more zone gates for message traffic from one zone to the other.
The zone gates are systems whose operators have taken on the task of
collecting and transmitting message traffic from the own zone to the
foreign zone.
To allow for such zone gating the following addressing guidelines
apply.
The origin address and the final destination address is given with the
help of INTL, FMPT och TOPT kludges in the message body.
The message header contains the node and net numbers of the
originating system and the node and network numbers of the zone gate.
Notes
Note 1
It may be noted that certain existing programmes may represent point,
node, net and zone numbers as signed integers on the user interface
level. E.g. node number 65535 may be represented as -1.
Note 2
Big-endian byte order (also known as Intel byte order) is used for 16-
bit binary integers.
Each field containing a 16-bit binary integer is composed of two bytes
O0 and O1:
+----+----+
! O0 ! O1 !
-----+----+
FIDONEWS 16-13 Page 19 29 Mar 1999
where O0 contains bits 0-7 and O1 bit 8-15 of the 16-bit binary
integer.
Bit 0 is the least significant bit and bit 15 is the most significant
bit of the 16-bit binary integer.
Note 3
It may be noted that this document does not contain any information
about how to decide the time zone used in the fields for date and time
in a packet. It is however expected that most programmes use the local
system time in these fields.
Note 4
It may be noted that certain existing programmes put additional
restrictions on the range of valid zone numbers. E.g. the zone numbers
may be restricted to 1-255 or 1-4095.
Note 5
There are a number or programmes in current use which allow also
non-ASCII characters to be entered into the packet level password.
E.g. character codes 128-255. There is no way within the framework of
this common ftn practice to tell what character set is used in this
case. Therefore it is also not possible for a programme to implement a
general case translation algorithm for such characters.
Note 6
Certain existing programmes are known to produce Arcmail bundles with
file names when transmitted where N may be an ASCII character in the
range '0'..'9', 'A'..'F'.
Certain other existing programmes are known to produce Arcmail bundles
with file names when transmitted where N may be an ASCII character in
the range '0'..'9', 'A'..'Z'.
The capability of processing Arcmail bundles with such extended file
names is not required by this specification and they should therefore
only be used after prior agreement between the operators of the two
systems involved.
Note 7
This specification specifies the size of the message body as
unlimited.
For obvious reasons, each system has some maximum size for a message
body and for a packet file. Furthermore the file transfer protocols
specified for ftn sessions separately may also impose maximum sizes on
files to be transferred from one ftn system to another.
Finally some existing programmes/platforms may have their own limits
as to the maximum size of a message and to the maximum size of a
packet file. E.g. some computer architectures use segmented memory and
then the developer of a certain existing programme may have chosen to
see to it that each data structure fits within one such segment, e.g.
64 kilobytes. Other existing programmes may have internal limits to
the size of the message body, e.g. 10 or 32 kilobytes.
FIDONEWS 16-13 Page 20 29 Mar 1999
Procedures for splitting and recombining large messages are specified
in other FTSC documents.
-----------------------------------------------------------------
FIDONEWS 16-13 Page 21 29 Mar 1999
=================================================================
COLUMNS
=================================================================
What's Not Happening: Tag-Teams
.-- -- -- -- -- -- WHAT'S NOT HAPPENING -- -- -- -- -- --.
| There isn't always something happening on Fidonet, but |
| there's always something which isn't happening. This |
| column is dedicated to the lost causes which make Fido |
| what it isn't today. Published semi-occasionally... |
`-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --'
Tag-Teams
Douglas Myers, 1:270/720
[email protected]
Occupying center ring in Fido's Circus of Lost Causes is Bob
Morasvik's elaborate game of Tag. The objective is to find a game
which is already being played, and then take over the game by
declaring himself "it." The rank and file of Fidonet have countered
this initiative by largely ignoring it. This demonstration of
applied apathy seems to be prevailing despite loud "it-fits"
cross-posted to multiple echoes by J. Kershaw, Defensive Coordinator
for the Morasvik team.
The game of Tag derives its name from the practice, mostly in Zone
1, of listing an echotag with the Elist Robot operated by Thom
Lacosta as a prelude to distributing echomail throughout the zone.
This elist is used by distribution systems (and anyone else
interested) to identify the moderator of an echo and to help reduce
the instance of duplicate echotags.
Tag, the game, takes advantage of the fact that not all echotags are
listed. Many echo areas are distributed by private arrangement with
the nodes involved and don't need to be listed, and many more are
listed, but not necessarily with Thom LaCosta's system. Thom's
elist service is usually targeted by Tag players, though, because
the North American Backbone uses this service.
The game of Tag is played by searching for existing echoes which are
either unlisted or listed elsewhere, and then listing the echotag
with Thom's service, but naming oneself as moderator. The most
common source of unlisted existing echoes is echoes which were
previously listed, but where the moderator has failed to keep the
listing current. Many moderators have found their echoes
effectively "taken over" in this manner.
In the past, Bob Morasvik has proven himself an adept player at this
form of echo hijacking by such maneuvers as listing all of the
Region 13 conferences, leaving the Region 13 coordinators the
alternatives of either establishing new conferences or recognizing
him as moderator of the existing conferences.
In his latest attempt to retain top seed in the world of Tag
FIDONEWS 16-13 Page 22 29 Mar 1999
players, Bob elisted ZCC-Public, an echo originating in Zone 2 but
never elisted in Zone 1. After successfully listing the echo with
Thom's robot, Bob attempted to control Zone 1 distribution of the
echo on the basis that he was the elisted moderator. He's
officially cut the echo from Z1B distribution, but John Souvestre
(principle Z1B hub) simply distributes the Zone 2 echo. Bob's
request to have his version of ZCC-Public carried on NAB
distribution was denied on the basis that the tag is already in use
by many of the hubs comprising the NAB. The net result is that Bob
has been largely ignored.
I'm not sure how this affects his standing as a Tag player, but Bob
Morasvik is no longer "It," and heads the list of What's Not
Happening on Fido.
-----------------------------------------------------------------
FIDONEWS 16-13 Page 23 29 Mar 1999
=================================================================
NOTICES
=================================================================
Future History
12 May 1999
12th Anniversary of Fido Operations in Zone 4;
10th Anniversary of the creation of FidoNet Zone 4.
14 - 16 May 1999
V. BBachCon in Bleichenbach, Germany.
For further information see: www.bbachcon.de
24 Jul 1999
XIII Pan American Games [through 8 Aug 99].
9 Jun 1999
Tenth Anniversary of the adoption of FidoNet Policy 4.07.
10 Sep 1999
10th anniversary of Zone 5 operations.
26 Oct 1999
Thirty years from release Abbey Road album by the Beatles.
31 Dec 1999
Hogmanay, Scotland. The New Year that can't be missed.
1 Jan 2000
The 20th Century, C.E., is still taking place thru 31 Dec.
1 Jun 2000
EXPO 2000 World Exposition in Hannover (Germany) opens.
15 Sep 2000
Sydney (Australia) Summer Olympiad opens.
21 Sep 2000
10 years of FidoNet in +7 (xUSSR)
1 Jan 2001
This is the actual start of the new millennium, C.E.
-- If YOU have something which you would like to see in this
Future History, please send a note to the FidoNews Editor.
-----------------------------------------------------------------
FIDONEWS 16-13 Page 24 29 Mar 1999
=================================================================
FIDONET BY INTERNET
=================================================================
This is a list of all FidoNet-related sites reported to the
FidoNews Editor as of this issue; see the notice at the end.
FidoNet:
Homepage
http://www.fidonet.org
FidoNews
http://www.fidonews.org [HTML]
http://209.77.228.66/fidonews.html [ASCII]
WWW sources
http://travel.to/fidonet/
FTSC page
http://www.ftsc.org/
Echomail [pending]
General
http://owls.com/~jerrys/fidonet.html
http://www.nrgsys.com/orb/foti
List servers:
http://www.onelist.com/subscribe.cgi/fidonet-discussion
============
Zone 1:
http://www.z1.fidonet.org
Region 10:
http://www.psnw.com/~net205/region10.html
Region 11:
http://oeonline.com/~garyg/region11/
Region 13:
http://www.net264.org/r13.htm
Net 264:
http://www.net264.org/
Region 14:
Net 282:
http://www.rxn.com/~net282/
Region 17:
http://www.nwstar.com/~region17/
Region 18:
http://techshop.pdn.net/fido/
Region 19:
http://members.home.net/hbh3/r19
Zone 1 Elist
http://www.baltimoremd.com/elist/
Not sure where the following should be placed:
http://www.angelfire.com/biz/snwvlly/fido.html
============
Zone 2:
http://www.z2.fidonet.org
ZEC2:
Zone 2 Elist:
http://www.fbone.ch/echolist/
Region 20:
http://www.fidonet.pp.se (in Swedish)
FIDONEWS 16-13 Page 25 29 Mar 1999
Region 23:
http://www.fido.dk (in Danish)
Region 24:
http://www.swb.de/personal/flop/gatebau.html (German)
Fido-IP:
http://home.nrh.de/~lbehet/fido (English/German)
Region 25:
http://www.bsnet.co.uk/net2502/net/
Region 26:
http://www.nemesis.ie
REC 26:
http://www.nrgsys.com/orb
Region 27:
http://telematique.org/ft/r27.htm
Region 29:
http://www.rtfm.be/fidonet/ (French)
Region 30:
http://www.fidonet.ch (German)
Region 33:
http://www.fidoitalia.net (Italian)
Region 34:
http://www.pobox.com/cnb/r34.htm (Spanish)
REC34:
http://pobox.com/~chr
Region 36:
http://www.geocities.com/SiliconValley/7207/
Region 38:
http://public.st.carnet.hr/~blagi/bbs/adriam.html
Region 41:
http://www.fidonet.gr (Greek/English)
Region 42:
http://www.fido.cz
Region 48:
http://www.fidonet.org.pl
Region 50:
http://www.fido7.com/ (Russian)
Net 5010:
http://fido.tu-chel.ac.ru/ (Russian)
Net 5015:
http://www.fido.nnov.ru/ (Russian)
Net 5030:
http://kenga.ru/fido/ (Russian & English)
Net 5073:
http://people.weekend.ru/soa/ (Russian)
============
Zone 3:
http://www.z3.fidonet.org
============
Zone 4:
Region 90:
http://visitweb.com/fidonet
Net 903:
http://www.playagrande.com/refugio
Net 904:
http://members.tripod.com/~net904 (Spanish)
============
Zone 5:
http://www.eastcape.co.za/fidonet/index.htm
============
Zone 6:
http://www.z6.fidonet.org
FIDONEWS 16-13 Page 26 29 Mar 1999
Region 65:
http://www.cfido.com/fidonet/cfidochina.html (Chinese)
============
Pages listed above are as submitted to the FidoNews Editor,
and generally reflect Zone and Regional Web Page sites. If
no Regional site is submitted, the first Network page from
that Region is used in its place. Generally, Regional pages
should list access points to all Networks within the Region.
TCP/IP accessible node access information should be submitted
to the FidoNews Editor for inclusion in their Region or Zone.
-----------oOo-------------
Fidonet Via Internet Hubs
Node# | Operator | Facilities (*) | Speed | Basic Rate
-----------+-------------------+----------------+-------+------------
1:12/12 | Ken Wilson | FTP | T1 | $24mo.
1:13/25 | Jim Balcom | FTP | 56k | $20mo.
1:106/1 | Matt Bedynek | FTP,VMoT,UUE | 64k | $5/$15mo.
1:106/6018 | Lawrence Garvin | FTP,VMoT | 64k | $5/mo.
1:107/451 | Andy Knifel | FTP, VMoT, UUE | 33.6 | n/c
1:140/12 | Bob Seaborn | FTP | T1 | $5/$20
1:270/101 | George Peace | FTP | T1 | $30mo.
1:271/140 | Tom Barstow | UUE | T1 | n/c
1:275/1 | Joshua Ecklund | UUE | 28.8 | $10/yr.
1:280/169 | Brian Greenstreet | FTP | 33.6 | $2mo.
1:2401/305 | Peter Rocca | FTP,UUE | T1 | unkn
1:2424/10 | Alec Grynspan | FTP,UUE | T1 | n/c
1:2604/104 | Jim Mclaughlin | FTP,VMoT,UUE | 33.6 | $1mo.
1:2624/306 | D. Calafrancesco | VMoT | 33.6 | $15yr.
1:345/0 | Todd Cochrane | FTP | T1 | n/c
1:346/250 | Aran Spence | FTP,UUE | T1 | $10mo.
1:396/45 | Marc Lewis | UUE | 33.6 | $26/yr.
1:3651/9 | Jerry Gause | FTP,VMoT | 33.6 | $3/$6
1:396/1 | John Souvestre | FTP,VMoT | T1 | $15mo.
2:335/535 | Mario Mure | VMoT,UUE | 64k | n/c
2:254/175 | Alex Kemp | UUE | 56k | n/c
2:284/800 | Jeroen VanDeLeur | FTP,UUE | 64k | n/c
2:335/610 | Gino Lucrezi | UUE | 33.6 | n/c
2:469/84 | Max Masyutin | VMoT | 256k | n/c
2:2411/413 | Dennis Dittrich | UUE | 64k | n/c
2:2474/275 | Christian Emig | UUE | 64k | unkn
3:633/260 | Malcolm Miles | FTP | 33.6 | n/c
4:905/100 | Fabian Gervan | VMoT, UUE | ??? | n/c
5:7104/2 | Henk Wolsink | FTP | 28.8 | n/c
--
* FTP = Internet File Transfer Protocol
* VMoT = Virtual Mailer over Telnet (various)
* UUE = uuencode<->email type transfers
[I'm only cataloging transfer methods, eg, ftp, email, telnet.
Specific programs using these protocols are no longer being listed.
Contact the system operators for details of which programs they have
available.]
FIDONEWS 16-13 Page 27 29 Mar 1999
Compiled by C. Ingersoll, 1:2623/71, (609)814-1978,
[email protected]
Posted on the 1st of every month in FN_SYSOP, R13SYSOP and Fidonews.
-----------------------------------------------------------------
FIDONEWS 16-13 Page 28 29 Mar 1999
=================================================================
FIDONEWS INFORMATION
=================================================================
------- FIDONEWS MASTHEAD AND CONTACT INFORMATION -------
Editor: Henk Wolsink
Editors Emeriti: Tom Jennings, Thom Henderson, Dale Lovell,
Vince Perriello, Tim Pozar, Sylvia Maxwell,
Donald Tees, Christopher Baker, Zorch Frezberg
"FidoNews Editor"
FidoNet 5:5/23
BBS +27-41-581-5913, 2400/9600/V34
more addresses:
Henk Wolsink -- 5:7104/2,
[email protected]
(Postal Service mailing address)
FidoNews Editor
P.O. Box 12325
Port Elizabeth,
6006
South Africa
------------------------------------------------------
FidoNews is published weekly by and for the members of the FIDONET
INTERNATIONAL AMATEUR ELECTRONIC MAIL system. It is a compilation
of individual articles contributed by their authors or their
authorized agents. The contribution of articles to this compilation
does not diminish the rights of the authors. OPINIONS EXPRESSED in
these articles ARE THOSE OF THE AUTHORS and not necessarily those of
FidoNews and/or the Editor.
Authors retain copyright on individual works; otherwise FidoNews is
Copyright (C) 1999 Henk Wolsink. All rights reserved. Duplication
and/or distribution permitted for noncommercial purposes only. For
use in other circumstances, please contact the original authors, or
the Editor.
=*=*=*=*=*=*=*=*=
OBTAINING COPIES: The most recent issue of FidoNews in electronic
form may be obtained from the FidoNews Editor via manual download or
file-request, or from various sites in FidoNet and the Internet.
PRINTED COPIES may be obtained by sending SASE to the above postal
address. File-request FIDONEWS for the current Issue. File-request
FNEWS for the current month in one archive. Or file-request specific
back Issue filenames in distribution format [FNEWSGnn.ZIP] for a
particular Issue. Monthly Volumes are available as FNWSmmmy.ZIP
where mmm = three letter month [JAN - DEC] and y = last digit of the
current year [9], i.e., FNWSJAN9.ZIP for all the Issues from Jan 99.
FIDONEWS 16-13 Page 29 29 Mar 1999
Annual volumes are available as FNEWSn.ZIP where n = the Volume number
1 - 16 for 1984 - 1999, respectively. Annual Volume archives range in
size from 48K to 1.4M.
INTERNET USERS: FidoNews is available via:
http://www.fidonews.org
**
http://www.fidonet.org/fidonews.htm
**
ftp://ftp.fidonet.org/pub/fidonet/fidonews/
ftp://ftp.irvbbs.com/fidonews/
ftp://ftp.nwstar.com/Fidonet/Fidonews
And in non-English formats via:
**
http://www.hvc.ee/pats/fidonews (Estonian)
http://www.fidonet.pp.se/sfnews (Swedish)
** LINK HAS NOT BEEN UPDATED
*=*=*
You may obtain an email subscription to FidoNews by sending email to:
[email protected]
with a Subject line of: subscribe fnews-edist
and no message in the message body. To remove your name from the
email distribution use a Subject line of: unsubscribe fnews-edist
with no message to the same address above.
*
You may retrieve current and previous Issues of FidoNews via FTPMail
by sending email to:
[email protected]
with a Subject line of: help
and FTPMail will immediately send a reply containing details and
instructions. When you actually make a file request, FTPMail will
respond in three stages. You find a link for this process on
www.fidonews.org.
*=*=*
You can read the current FidoNews Issue in HTML format at:
http://www.fidonews.org
and
http://www.fidonet.dynip.com/public/fidonews/default.htm
and in the FIDONEWS echo.
FIDONEWS 16-13 Page 30 29 Mar 1999
STAR SOURCE for ALL Past Issues via FTP and file-request -
Available for FReq from 1:396/1 or by anonymous FTP from:
ftp://ftp.sstar.com/fidonet/fnews/
Each yearly archive also contains a listing of the Table-of-Contents
for that year's issues. The total set is currently about 13 Megs.
=*=*=*=
The current week's FidoNews are now also available almost immediately
after publication on the FidoNews Editor homepage on the World Wide
Web at:
http://209.77.228.66/fidonews.html
There are also links there to jim barchuk's HTML FidoNews source and
to John Souvestre's FTP site for the archives. There is also an
email link for sending in an article as message text. Drop on over.
=*=*=*=*=*=*=*=*=
SUBMISSIONS: You are encouraged to submit articles for publication in
FidoNews. Article submission requirements are contained in the file
ARTSPEC.DOC, available from the FidoNews Editor, or file-requestable
from 5:5/23 [5:7104/2] as file "ARTSPEC.DOC". ALL Zone Coordinators
should have copies of ARTSPEC.DOC. Please read it.
"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
trademarks of Tom Jennings, P.O. Box 410923, San Francisco, CA 94141,
and are used with permission.
"Disagreement is actually necessary,
or we'd all have to get in fights
or something to amuse ourselves
and create the requisite chaos."
-Tom Jennings
-----------------------------------------------------------------