[comp.org.fidonet] FidoNet Newsletter, Volume 7, # 5

pozar@hoptoad.uucp (Tim Pozar) (02/02/90)

     Volume 7, Number  5                               29 January 1990
     +---------------------------------------------------------------+
     |                                                  _            |
     |                                                 /  \          |
     |                                                /|oo \         |
     |        - FidoNews -                           (_|  /_)        |
     |                                                _`@/_ \    _   |
     |        International                          |     | \   \\  |
     |     FidoNet Association                       | (*) |  \   )) |
     |         Newsletter               ______       |__U__| /  \//  |
     |                                 / FIDO \       _//|| _\   /   |
     |                                (________)     (_/(_|(____/    |
     |                                                     (jm)      |
     +---------------------------------------------------------------+
     Editor in Chief:                                  Vince Perriello
     Editors Emeritii:                                     Dale Lovell
                                                        Thom Henderson
     Chief Procrastinator Emeritus:                       Tom Jennings
     
     FidoNews  is  published  weekly  by  the  System Operators of the
     FidoNet (r) International BBS Network as its official newsletter.
     Its contents represent  a compendium of articles freely submitted
     and openly published by  members  of  the  FidoNet (r) community.
     You  are  encouraged  to  submit   articles  for  publication  in
     FidoNews.  Article submission standards are contained in the file
     ARTSPEC.DOC, available from node 1:1/1.  1:1/1  is  a  Continuous
     Mail system, available for network mail 24 hours a day.
     
     Copyright 1990, Fido Software.  All rights reserved.  Duplication
     and/or distribution permitted  for  noncommercial  purposes only.
     For use in other circumstances, please  contact  Fido Software at
     (415)764-1688.
     
     This is a compilation of individual articles contributed by their
     authors  or  authorized  agents of the authors.  Contribution  of
     these  articles  to this compilation does not diminish the rights
     of the authors.
     
     Fido  and FidoNet are registered trademarks of  Tom  Jennings  of
     Fido Software, 164 Shipley St., San Francisco, CA  94107  and are
     used with permission.
     
     We  don't necessarily agree with the contents  of  every  article
     published  here.  Most of these materials are  unsolicited.    No
     article submitted  by  a  FidoNet SysOp will be rejected if it is
     properly attributed and  legally  acceptable.    We  will publish
     every responsible submission received.


                        Table of Contents
     1. EDITORIAL  ................................................  1
        And Now -- FidoNet after IFNA  ............................  1
     2. ARTICLES  .................................................  2
        Come to FidoCon '90!  .....................................  2
        Internetwork Gateway Policy - Another Perspective  ........  5
     And more!
     FidoNews 7-05                Page 1                   29 Jan 1990


     =================================================================
                                 EDITORIAL
     =================================================================


     I have heard that this past weekend's IFNA meeting came to an end
     with IFNA remaining alive.    As  I hear it, the reason has to do
     with  corporate laws which make  it  necessary  for  the  paid-up
     members of IFNA to vote in  favor of dissolution before the board
     can act.

     This  of  course  doesn't  necessarily have any  bearing  on  the
     operations  of  the  net.   IFNA has been  a  largely  irrelevant
     presence for the past two years or so, and the fact that today it
     continues  to  exist changes nothing.  In fact, if you  carefully
     read  this week's nodelist, or for that matter the first page  of
     FidoNews, you will see that life is indeed going on without IFNA.

     Since IFNA  continues to exist, and since its bylaws require that
     it regard FidoNews  as  its  official  publication, there will no
     doubt be many articles  here,  probably until some time after the
     formal ending of the Association.    Most, I suspect, will relate
     to official business that simply must be transacted.

     Be patient with them.  And  please  don't  get  the  idea  that I
     consider it appropriate to start dancing on  IFNA's  grave.  IFNA
     was a damned fine idea which died of a particularly toxic mixture
     of cynicism and apathy.  When the time finally comes, I'll  mourn
     the passing of  this  idea, if you don't mind.  Please just allow
     me my moment of silence. Thank you.


     -----------------------------------------------------------------
     FidoNews 7-05                Page 2                   29 Jan 1990


     =================================================================
                                 ARTICLES
     =================================================================

     Come to FidoCon '90!

     by Bill VanGlahn, 1/90, FidoCon Committee Chairman

     As you may or may not know, this year's FidoCon is being hosted
     August 1-5 at the Conclave '90 sysops convention by the Secret
     Sysop Society in Net 107 in New Jersey.  As you can probably
     guess by the name, we're out to have some fun!  Well, now that
     we've gotten our act together, here's some of the details, but
     remember, don't tell anyone!  It's a SECRET!  ;-)

     We wanted this year's FidoCon to be more than just a convention.
     Past FidoCon's have been lots of fun for the sysops, but
     probably pretty boring for the rest of the family, so we've gone
     out of our way to make sure that this year you can plan on
     spending a real vacation here in the New York/New Jersey
     metropolitan area.

     Additionally, we've also simplified the registration procedures
     with our all-inclusive "chinese menu" registration form (to be
     published next week or the following).  No longer will you have
     to worry about what meals you're going to attend, make your own
     room reservations, etc.  Just pick the plan you want to have,
     and we'll take care of the rest!

     Well, on with the show:

     Plans A & B include the hotel room, all meals (including
     Friday's banquet), and the conference fee, all in one cost.

     Please note the discounts for early registration:

                                       Before 6/1/90:  Before 4/1/90:
                                       --------------  --------------
     A. Single Occupancy.......$595.00     $545.00        $495.00
     B. Double Occupancy.......$450.00     $400.00        $350.00
     C. Conference w/ meals....$300.00     $250.00        $200.00
     D. Conference w/ Banquet..$205.00     $155.00        $105.00
     E. Conference only........$175.00     $125.00         $75.00
     F. Banquet only...........$130.00      $80.00         $30.00

     (Those registering before 4/1/90 get a $100.00 discount, those
     registering before 6/1/90 get a $50.00 discount on all plans.)

     The conference opens with a pool-side welcoming cocktail party,
     at which beer & wine will be covered by your meal ticket.
     Friday night will be the sysop's banquet, which is also included
     in plans A-D (and F, of course), and there'll be a special
     barbecue lunch on saturday afternoon.

     FidoNews 7-05                Page 3                   29 Jan 1990


     Seminars will be held from 10am till noon, and from 1PM until 4,
     to give all participants plenty of time to recover from those
     all-night 'bull sessions' where the REAL activity takes place!

     We promised you outdoor activies, too, so here they are:

     (Since we're dealing with sysops, we've formatted the 'external
     events' into an event table)

             Start    End
     Thu     08:30   16:30   ;Day trip to the Beach      $24.50
     Thu     14:30   22:30   ;Bus trip to Atlantic City  $22.00
     Thu     17:30   23:00   ;Twilight Manhattan Tour    $37.50
     Thu     18:30   23:00   ;A Night On Broadway        $71.00

     Fri     07:30   17:30   ;Daytime Shopping Tour: NYC $36.50
     Fri     08:30   16:30   ;Day trip to the Beach      $24.50
     Fri     14:30   22:30   ;Bus trip to Atlantic City  $22.00
     Fri     17:30   23:30   ;Twilight Manhattan Tour    $37.50

     Sat     17:00   23:00   ;Twilight Manhattan Tour    $37.50
     Sat     19:30   22:00   ;Grand Costume Ball         $50.00*

     * Costume mandatory, and included in entrance fee

     The TWILIGHT TOUR of New York includes a ride through Times
     Square (you know, that place you see every New Year's Eve), the
     marquees of Broadway, a trip to Macy's, the world's largest
     department store, a walking tour through Greenwich Village, then
     a ride through Soho and Little Italy and then to Chinatown for
     dinner.  The tour then continues on to the financial district of
     Wall Street, and Battery Park, where you'll board a ferry that
     will take you across New York harbor to Ellis Island and a
     breath-taking view of the Manhattan skyline.  The tour then
     finishes off with a trip past the United Nations building,
     Rockefeller Center, the Channell Gardens, and terminates at the
     Empire State building.  All in all, the tour takes about 5 hours
     and is well worth the fee of $37.50.

     The Grand Costume Ball will be held at Medieval Times, a new
     type of dinner theater, where the times of King Arthur are
     brought to life again.  The theater is an actual medieval area,
     where feats of heroics, jousting tournaments, and demonstrations
     of Renaissance life are recreated, all while you enjoy a true
     Medieval feast!  Costumes are mandatory, and included in the
     $50.00 fee.

     The day trips to the beach are held at the famous New Jersey
     Shore, at beautiful SEAside Park.  Lay on the beach all day, or
     enjoy the amusement park on the boardwalk!  Anyone for miniature
     golf?  $24.50 includes bus fare.

     FidoNews 7-05                Page 4                   29 Jan 1990


     Trips to Atlantic City include bus fare to the famous casinos on
     the board walk, as well as casino 'comps' (coupons, rebates,
     free tickets, etc.).  The activities on the beach and boardwalk
     are also available for those not into the fast action and bright
     lights of the casinos.  $22.00

     For those so inclined, registration also includes use of the on
     premises Meadowlands Health Club and all equipment, and free
     admission to Cricket's nightclub and disco.

     For further information, please contact me at 1:1/90.

     Of course, we'll have the usual airline discounts (details
     soon), so we hope to see you all there!

     -----------------------------------------------------------------
     FidoNews 7-05                Page 5                   29 Jan 1990


     Internetwork Gateway Policy
     ------------ ------- ------

     Tim Pearson
     1:286/703


     I submitted this article not in an attempt to  elicit  additional
     caustic  reactions  to  the  "Gateway  Document" but rather in an
     attempt to clarify  and  correct  a  few  misconceptions  and  to
     publicly  answer  some questions I've been asked frequently since
     the document was published.

     I'd like to begin  with  some  answers  to  some  commonly  asked
     questions:

     -  "Is  the  Gateway Document in effect now?  The article said it
     would go into effect in 30 days."

     No,  the document is not in effect.  No,  that is  not  what  the
     article  said  would happen.  The article said the document would
     be submitted to the International  Coordinator  for  approval  in
     thirty days. Everyone will be given ample notice before the
     document goes into effect.  Stay tuned to FidoNews.


     -  "I'm the IC of XYZ-Net.  Am I going to loose my echomail feeds
     when the document is implemented?"

     No evil FidoNet axe will fall upon your echomail feed at midnight
     on the day  the  document  goes  into  effect.  The  Internetwork
     Coordinator  will  help you find the software necessary to comply
     with the requirements.  No reasonable request for  assistance  or
     additional  time  has  or  will  be  refused.  Please contact the
     Internetwork  Coordinator  for   further   information   on   the
     registration  and  certification  process.   Over  a  half  dozen
     networks have already registered.  None of them were turned down.


     - "If my nodes have FidoNet addresses then I can't get a gateway,
     right?  The  document says that if you have a FidoNet address you
     must get your echomail directly from FidoNet."

     Wrong.  The document says that this is the  expected  method.  It
     assumes  that  most  folks  with  other  than  a purely political
     motivation would prefer to take the shortest distance between two
     points.   The  overriding  consideration  is   that   non-FidoNet
     addresses  not  appear in FidoNet echomail while said echomail is
     inside  FidoNet  and  that  all   echomail   gateways   also   be
     bidirectional  netmail gateways.  If you have a case to make with
     respect to this issue,  please make it  (even  if  it  is  purely
     political).  The  key  issue in my mind is that you demonstrate a
     willingness to cooperate with FidoNet in good faith on  technical
     and  administrative  issues.  We certainly pledge to cooperate in
     good faith  with  you.  Don't  believe  everything  you  hear.  I
     suggest you contact the Internetwork Coordinator directly and see
     FidoNews 7-05                Page 6                   29 Jan 1990


     for yourself if all the dire predictions are true.



     - "Where do you get the authority to implement such a document?"

     I direct your attention to Section 7.1 of Policy4 as adopted by
     FidoNet.


     I was going to address some other points next.  However,  I think
     the following echomail reply to what,  in my opinion,  was a very
     sincere  message  from  Jack  Decker  makes  these  points   more
     concisely  than any rewording I could come up with.  I would like
     to thank Mr. Decker for his reasoned approach to this issue.


     Msg # 2907
     From: Tim Pearson
       To: Jack Decker
     Subj: Re: gateway proposal
     ________________________________________________________________

     > I have never conversed with you before so I hold no
     > preconceptions (good or bad) about you.  I assume that you
     > felt there was some sincere need for this Gateway Document.

     Yes I do feel that there is a sincere need for the document. I'll
     try to explain why as we go along here...

     > I hope you saw my article in Fidonews in which I expressed
     > some reservations about this document.

     I do remember reading one you wrote, Jack.  To be totally honest,
     as I sit here now,  I can't remember what points you made  versus
     points  made  by  others who wrote similar articles.  As you say,
     there have been  several.  I'm  sorry  I  can't  recall  it  more
     clearly.

     > ... if there is any consensus at
     > all, it is that folks don't seem to feel that there is any
     > need for this document, and/or that it is actually designed
     > to cause problems for the other networks and to build
     > additional barriers between the other networks and Fidonet.

     I'm afraid I can't subscribe to your conclusion,  Jack,  although
     from looking only at the public record I can  certainly  see  how
     you  arrived  at it.  I would think the same thing had I only had
     FidoNews articles to rely on.  The fact is that I (and others  on
     the  GPDC)  have  received numerous positive comments via netmail
     from folks inside as well  as  folks  outside  FidoNet.  We  have
     received  applications  from  over  a half dozen "Other Networks"
     (none of which have been rejected,  by the way) who seem  willing
     to  accept even the original draft of the document.  Human nature
     makes things work kind of like  the  evening  news.  One  usually
     doesn't  hear  loud  and  long  public  outcry from those who are
     FidoNews 7-05                Page 7                   29 Jan 1990


     satisfied with the way things are going.  They have no  incentive
     to "go public." Similarly,  you don't see evening news broadcasts
     filled with reports on how things are going right  in  the  world
     very often. To be quite honest, I feel that (as we so clearly saw
     in  the  IFNA  referendum) the "I don't give a damn's" are in the
     majority again in this case.


     >
     > My only question would be, who asked for this document and
     > why do we need it? I know you guys put a lot of work into it
     > but if the general consensus of sysops in Fidonet was that
     > we don't need this, would you guys consider dropping the
     > whole idea?  Or are there one or more people who are
     > determined to push this through whether anyone wants
     > it/feels it is needed or not?
     >

     I've already spoken to the "general consensus" issue above  so  I
     won't waste your time with a restatement of that position. I will
     try  to  address  the  "who asked for it?" part of your question.
     This was an ongoing process when I became an  RC  almost  exactly
     one year ago.  David Dodell was IC then as I'm sure you remember.
     David,  Randy Bush and virtually all of the RC's at the time (and
     now as far as I know) seemed to feel that we had a  problem  that
     would  only  get  worse.  We  couldn't  possibly make these other
     networks go away even if we wanted to (and we  didn't  want  to).
     Therefore,  we  felt  and feel that we should try to put a set of
     guidelines in place to try to bring some  order  to  the  chaotic
     "grab  a  zone" practice that was ongoing at the time.  David was
     getting netmails every week asking him as IC to "assign"  so  and
     so  zone  such  and  such.  He was getting messages whose content
     consisted of irate complaints about network "A" having  zone  123
     before  network  "B"  and how he should make network "B" use some
     other zone number.  It was a mess.  I think  I  do  remember  you
     saying  that  we  are all agreed that Zonegates don't make proper
     network gateways.  Well, then and now, many folks feel they do. I
     don't think it is malicious.  I just think they  don't  know  any
     better.

     I tried to bring forward another problem in the lead-in article I
     wrote  when the draft document was published.  That problem being
     that these illicit zone numbers  were  breaking  FidoNet/Internet
     gateways. (Someone took issue with the use of the word "illicit".
     From  FidoNet's  point  of  view,  that is what these non-FidoNet
     addresses are.)

     Someone somewhere made the suggestion  that  this  could  all  be
     fixed  if  only  FidoNet  would compile all the FTN Other Network
     nodelists along with its own.  We have enough trouble keeping our
     own  nodelist current.  The technical and logistic nightmare this
     would create should  be  obvious.  Not  to  mention  the  "minor"
     problem  that  several  FTN  other  nets  are using the same zone
     number.

     FidoNews 7-05                Page 8                   29 Jan 1990


     The only workable solution we could come up with  was  simply  to
     require that only FidoNet addresses appear in FidoNet mail.  That
     means  that  some  other networks are going to have to change the
     way their gateways  work.  We  are  in  the  process  of  helping
     several  other  networks  to  obtain  and  implement the software
     necessary to run a proper gateway right now.


     > I guess I just don't see the need to put up additional walls
     > between the networks.  I think most of us are in this hobby
     > to communicate with each other, not to figure out ways to
     > make communications difficult.  This document honestly seems
     > to be moving us in the wrong direction, unless I'm really
     > missing the reason it's needed...

     I'm not going to get into a counterproductive discussion  of  why
     these  "walls"  exist and who raised them.  The fact is that they
     exist because other networks exist.  These  other  networks  have
     their  own  way of doing things,  their own nodelists,  their own
     addressing schemes,  and their own reasons for existance.  All of
     that  is  fine.  We  are  attempting  to  cut  some  standardized
     bidirectional "doors" in these walls.

     We are not trying to make communication more difficult.  The fact
     is,  Jack,   that  communication  is  virtually  impossible  (via
     netmail)  to  many  of  the current other networks that are using
     FidoNet echos.  How can we  possibly  enforce  moderator's  rules
     about  topical  limitations  when the option to "take it netmail"
     doesn't exist in many cases?  I would like to  see  one  standard
     method  agreed upon for internetwork routing.  I don't care if it
     is the RBBS-Net method or the ^ADOMAIN method or  something  else
     entirely as long as it works -- both directions.

     One  last point and then I'll let you rest your eyes.  I've heard
     many people say how biased and unfair the document  is.  Consider
     the  analogy  to  a  trade agreement between the U.S.  and,  say,
     Japan.  The folks in  the  U.S.  think  the  Japanese  are  being
     unfair.  The  Japanese  think  the  folks  in the U.S.  are being
     unfair.  It is all a matter  of  perspective.  Folks  in  FidoNet
     look  at  it  from  the  FidoNet  perspective.  Others look at it
     differently.  My job as a FidoNetter is to look out for the  best
     interest  of  my  network.  I'm  trying to do that.  If I did any
     less,  I would be derelict in my obligation to my network.  Folks
     have  every  right  to  establish  as many other networks as they
     like.  If we're honest,  Jack,  we'll admit that without  FidoNet
     echomail,  most of them would wither on the vine.  Is it too much
     to ask that they partake of  their  lifeblood  in  a  manner  not
     harmful to their host?  I hope you would agree that the answer to
     that question is no.

     Take care (sorry for my verbosity),
     FidoNews 7-05                Page 9                   29 Jan 1990


                 Tim

     -----------------------------------------------------------------
     FidoNews 7-05                Page 10                  29 Jan 1990


     Re-formatted for FidoNews from original SYSOP echo message.
     Date: 23 Jan 90  10:37:37
     From: Walter Tietjen (1:151/114)
     To:   Tim Pearson
     Subj: Re: gateway proposal

      TP> Someone somewhere made the suggestion that this
      TP> could all be fixed if only FidoNet would compile
      TP> all the FTN Other Network nodelists along with
      TP> its own. We have enough trouble keeping our own
      TP> nodelist current.  The technical and logistic
      TP> nightmare this would create should be obvious.
      TP> Not to mention the "minor" problem that several
      TP> FTN other nets are using the same zone number.

     _NO_NEED_  for  FidoNet to compile an OtherNet's nodelist. The ZC
     of AnyOtherNet could compile his own nodelist using the  keywords
     SINDEX and either FIDOTXT or FIDOPRN in his XLATLIST.CTL file (or
     equivalent  if  using  a  different  nodelist compiler). Take the
     sorted index at the end of  his  NODELIST.TXT/NODELIST.PRN  file.
     Example   for   AlterNet   -   Dos-command   `COPY   NODELIST.PRN
     ANETLIST.PRN'. AnyOtherNet ZC then fires up a text editor. `EDLIN
     ANETLIST.PRN'. Delete the tedious node-by-node list at the top, &
     keep the net by net sorted index.  Now  netmail  file-attach  the
     `sorted-index-only'  to a volunteer at a `central-clearing-house'
     serving _ALL_ networks (FidoNet included).

     At  the  `central-clearing-house',  the  volunteer  compares  the
     `SINDEX-only'   NODELIST.PRN   from  FidoNet,  ANETLIST.PRN  from
     AlterNet, NETLIST.PRN from NETWORK/FamilyNet,  RBBSLIST.PRN  from
     RBBS-Net, EGGLIST.PRN from EggNet, etc.

     Said   volunteer   looks   for  `net'  number  (of  <Net>/<Node>)
     collisions where 2 or more political networks use the same  `net'
     number.  _IMPERATIVE_  that  only  one network use a `net' number
     within any FidoNet Geo-Zone - (Easier on mailer software if `net'
     numbers were only used once world-wide, but not essential.)

      TP> The only workable solution we could come up with
      TP> was simply to require that only FidoNet addresses
      TP> appear in FidoNet mail.

     See Above.

     Primary  reason  for  leaving  `foreign  net'  (ie   non-FidoNet)
     addresses  in  echomail  "seen-by"  lines  is "dupe" control. ANY
     `circular   feed'   causes   dupes.   If   a    seen-by-stripping
     internet-echogate  is  included in an accidental `circular feed',
     the dupes are spread much farther than a  `circular  feed'  which
     does not include an echogate in the path.

     FidoNews 7-05                Page 11                  29 Jan 1990


     JD = Jack Decker

      JD> I guess I just don't see the need to put up additional walls
      JD> between the networks.  I think most of us are in this hobby
      JD> to communicate with each other, not to figure out ways to
      JD> make communications difficult.  This document honestly seems
      JD> to be moving us in the wrong direction, unless I'm really
      JD> missing the reason it's needed...

      TP> We are not trying to make communication more
      TP> difficult.  The fact is, Jack, that communication
      TP> is virtually impossible (via netmail) to many of
      TP> the current other networks that are using FidoNet
      TP> echos.  How can we possibly enforce moderator's
      TP> rules about topical limitations when the option
      TP> to "take it netmail" doesn't exist in many cases?

     A  periodic  (maybe  monthly?)  list of those FidoNet/AnyOtherNet
     multi-ID systems which have `AnyOtherNet' nodelists FReqable  and
     which `AnyOtherNet' nodelists  are  available  there.  Freq.  the
     desired nodelist from a multi-ID system, then send direct netmail
     to the desired AnyOtherNet single-ID system.

     Example: Dual-ID FidoNet 1:151/114 - AlterNet 7:48/2022 has  both
     the  AlterNet and NetWork/FamilyNet nodelists available for FReq.
     even though it is not in Network/FamilyNet. Extract from the list
     you would get if you FReq'ed `FILES' from 1:151/114 on  Jan  23.,
     1990 :

     ANETDIFF.A19        2635 AlterNet nodediff - ANETDIFF
     ANETLIST.019       49242 AlterNet nodelist - ANETLIST
     FIX1990.LZH         2400 OPUS event bug fix for 1990
     NETDIFF.A19         1985 The Family nodediff - FMLYDIFF
     NETLIST.019        41600 The Family nodelist - FMLYLIST
     NODEDIFF.A19       37782 FidoNet nodediff - NODEDIFF
     NODELIST.A19      274718 FidoNet nodelist (PKPAK squashed)
                              - NODELIST

      TP>  I would like to see one standard method agreed
      TP> upon for internetwork routing.  I don't care if
      TP> it is the RBBS-Net method or the ^ADOMAIN method
      TP> or something else entirely as long as it works -- both
      TP> directions.

     See paragraphs directly above my edited FILES list.

     -Walter

     --- ConfMail V4.00
      * Origin: TI-RALEIGH 919-833-3412 NCRTP 9986 (1:151/114)

     FidoNews 7-05                Page 12                  29 Jan 1990


     Adding to original SYSOP echo message:

     In  addition  to  the 2-step method of first FReq'ing the desired
     AnyOtherNet nodelist then sending direct netmail, _REAL_  working
     zonegates could be set up between the various networks.

     Back in the days when NETWORK and RBBS-Net were formed,  everyone
     _THOUGHT_  "Zones"  _HAD_  to  be  single-digit numbers causing a
     false appearance of a shortage of usable zones. Actually only the
     TABBY package (versions 2.1 and  earlier)  has  the  single-digit
     zone  problem.   QuickBBS  will  handle  zone  numbers 1-255, and
     BinkleyTerm will handle zones 1-4095 (.001 - .FFF  extensions  on
     the separate holding-area for each zone setup).

     RBBS-Net  could  switch  to  a  multi-digit  zone  number thereby
     eliminating the  "2  zone  8s"  conflict.  Same  basic  principle
     applies to any/all other "shared zone" conflicts.

     -----------------------------------------------------------------
     FidoNews 7-05                Page 13                  29 Jan 1990


     Jack Decker
     1:154/9, 11:154/8

                A MODERATED ECHOMAIL CONFERENCE PROCESSOR
                                  -or-
                           MY TWO BITS' WORTH


     [continued from last week]

     AN OPTIONAL ADD-ON TO THE BASIC PROPOSAL

     Last week I presented the basic proposal for a moderated
     echomail conference processor.  I'd also like to throw out a
     proposal for an option that would partially emulate one other
     advantage of GroupMail, namely, that every system that receives
     a conference gets the same message bundle.  Please note that
     the following discussion applies to message packets that are
     being sent downbound from the conference moderator's system,
     NOT to messages that are upbound to the moderator, and that the
     following is really a separate proposal from the above.  The
     following discussion will be meaningless if moderated
     conference mail is not implemented, but what follows should be
     considered an optional add-on to the basic moderated conference
     mail proposal described above.  This add-on will greatly
     facilitate the handling of pass-thru conferences when
     implemented as part of any moderated conference mail processor.

     First, an explanation of the GroupMail feature we're trying to
     improve upon:  Under GroupMail, when a system receives a
     message bundle for a particular conference, it does NOT unpack
     and re-toss the bundle before passing it along to any downlinks
     that receive the conference from that system.  Instead, the
     bundle is passed along unchanged, just as received.  So, if the
     unpacking software "grunges" a message (as often happens when a
     disk full or similar unexpected condition occurs), it only
     affects the display of the message on that particular system,
     and does not affect the condition of the message bundle
     received at any downstream system.

     GroupMail does this by building a separate message bundle (and,
     ultimately, a separate .ARC file) for each and every available
     conference.  The advantage of doing this can be explained if
     you consider the case where (for example) you feed a large echo
     to several different systems.  With echomail you have to toss
     the messages separately for each system.  Thus, if you receive
     a 200K packet of FOR-SALE and feed it to five systems, you'll
     need one meg of free space (5 systems * 200K) just to toss
     those messages to the five individual systems, plus some
     additional room to allow the archiver to try and compress those
     packets.  With GroupMail, you'd receive the one 200K packet (in
     ARCed format) and store it in a holding area, and that one
     packet would be sent to all five systems.

     FidoNews 7-05                Page 14                  29 Jan 1990


     The disadvantage of this scheme is that if all conferences are
     stored in individual archives, then a system receiving seventy
     different GroupMail conferences could conceivably receive
     seventy different archives (one for each conference) every
     night.  As fast as most mailers are, there is still a certain
     amount of turnaround time required each time a different file
     is sent, so transmitting a number of small archives instead of
     one large one increases the connection time required to receive
     one's nightly echo feeds. Also, each conference archive must be
     individually named in such a manner as to prevent name
     collisions, while not using a filename that may have some
     meaning to a mailer program (e.g. a filename that might appear
     to be an attach file or a request file or a mail packet).

     There's also the question of how long to retain each individual
     message archive.  As mentioned above, with echomail you will
     temporarily create one copy of the messages in any given
     conference for EACH system receiving the conference (so, if you
     are feeding an echo to five different systems, you will
     temporarily have five different copies of the messages in that
     echo on your system).  BUT, as these message packets are sent
     to the recipient systems, they are automatically deleted from
     your system.  With GroupMail, you only keep one copy of any
     given set of echo messages, but you have to keep it around
     until all the systems you've fed the echo to have had a chance
     to retrieve it from you system.  Given that systems sometimes
     have technical problems that may keep them from connecting on a
     given night, and sysops sometime go away for weekends (at which
     point Murphy invariably takes over and crashes their systems),
     the normal retention time for GroupMail echoes has to be set at
     3 to 5 days in order to make sure that no messages are "missed"
     by any downstream system.  So the advantage of only having to
     store one copy of the messages in a given conference for all
     the nodes you feed it to is largely negated by the requirement
     to keep 3-5 days's worth of messages around in order to make
     sure that none of the systems you feed miss any messages.

     Finally, when the same message archive is sent to all systems
     you feed, it must be stored in an archive format that can be
     uncompressed at all systems being fed.  Unfortunately, none of
     the best archivers are portable across all computing
     environments found in Fidonet.  So the "least common
     denominator" approach is used (.ARC format archives in the case
     of GroupMail) which insures that virtually all systems
     receiving GroupMail packets can unARC them without difficulty,
     but at a cost of longer transmission times and greater disk
     space storage requirements than would be necessary if a newer
     archiver could be used.

     For these and other reasons, I do not feel that storing each
     day's worth of messages from a conference in an individual
     ARCHIVE file is a good idea.  However, storing each conference
     in a separate BUNDLE (that is, a separate .PKT file) which is
     then packed to each recipient might be an effective way to
     transmit moderated conference mail.

     FidoNews 7-05                Page 15                  29 Jan 1990


     Let's consider how an advanced conference mail processor might
     handle moderated conferences:

     1) An incoming mail ARCHIVE (a .mo?, .tu?, ... .su?) file
     arrives from another system.

     2) The conference mail processor finds this packet, determines
     which archive format was used to create it (ARC, ZIP, LHARC,
     ZOO, etc.) and calls the proper de-archiver to decompress the
     file and recover the individual .PKT files.

     3) The header of the .PKT files are examined and if they are a
     standard .PKT file (as currently used) they are processed in
     the normal manner (messages are tossed/scanned to/from the
     appropriate netmail or echomail areas).  However, if the header
     indicates that the incoming .PKT file is a moderated echo
     conference, it is temporarily moved to a separate directory
     (actually, placing these files in a separate directory may not
     be necessary, but it's easier to mentally visualize the process
     if we separate these files).  Please note that each of these
     new type .PKT files will contain messages from only one
     moderated conference per .PKT file (for example, if we received
     feeds of FOR-SALE, TECH, and COMM, we'd get three moderated
     conference style .PKT files, one for each of the three
     conferences).  Also please note that both types of .PKT files
     may be intermixed in the same mail archive (this solves the
     problem of having to transmit multiple files).

     4) As the new style .PKT files are moved to the holding area, a
     temporary index is constructed showing which conference area
     tag relates to each of the .PKT files (for example, showing
     that packet 12345678.PKT contains messages for the FOR-SALE
     echo).  Each area tag in the index is then examined and the
     associated .PKT file may be handled in any of the following
     ways:

     If the .PKT file is NOT associated with a passthru area, then
     the messages in that .PKT file are tossed to the appropriate
     message areas on your system.

     If the .PKT file is associated with an area that is fed to
     other (downstream) systems, then the .PKT file is archived into
     an outgoing mail ARCHIVE (a .mo?, .tu?, ... .su?) file destined
     for each of those systems, WITHOUT change.  The .PKT file that
     is received is the .PKT file that goes out.  Note that in this
     case the PATH line in the messages cannot be changed.  However,
     the integrity of the .PKT file is maintained (assuming that no
     errors were encountered in the process of unarchiving the .PKT
     file in the first place... obviously, such errors should be
     trapped).

     FidoNews 7-05                Page 16                  29 Jan 1990


     It should be noted here that if a moderated conference is
     converted to regular echomail, then it MUST be unpacked and a
     SEEN-BY line must be added to each message, and the system's
     net/node number must be added to the PATH line of each message.
     The messages in that conference may then be re-packed as
     echomail to the conference in question.  To do otherwise would
     defeat the duplicate message security built into this scheme
     (this would in most cases make the use of the -p and -e
     switches together on the same AREAS.BBS line invalid, however,
     I suppose a truly ambitious programmer could figure out a way
     to adjust the PATH lines in the .PKT files of passthru
     conferences without first unpacking and tossing the individual
     messages).

     5) Once the individual .PKT files have been tossed to your
     system and/or archived to other downstream systems that receive
     them from you, they are deleted immediately (generally in the
     same scan/toss cycle), and don't hang around taking up space on
     your system (some software might allow you to optionally
     override this if for some reason you wanted to keep the .PKT
     files around for a day or two).

     One might reasonably ask how a conference mail processor is
     supposed to know that a .PKT file contains a moderated echo
     conference, and how to determine the area tag.  Please consider
     the header of a typical .PKT file:

          PktHType = Record
           OrigNode      : integer;
           DestNode      : integer;
           Year          : integer;
           Month         : integer;
           Day           : integer;
           Hour          : integer;
           Minute        : integer;
           Second        : integer;
           DestBaud      : integer;
           PktVers       : integer;
           OrigNet       : integer;
           Destnet       : integer;
           Product       : char;
           filler        : char;
           PwdKludge     : Array[1..8] of char;
           filler        : Array[1..24] of char;
          end;

     Since the baud rate of the destination system is a totally
     useless piece of information in an echomail header packet (and
     since virtually all systems get this information from someplace
     other than the packet header anyway), I propose that we utilize
     one byte of this integer as a "signature byte" which will
     indicate to a conference mail processor that this is a
     moderated echomail packet.  No true modem baud rate currently
     in use is an odd value (I think we can safely ignore the
     oddities such as 1200/75 splits used by commercial videotex
     services in some countries), therefore, bit 0 of the least
     FidoNews 7-05                Page 17                  29 Jan 1990


     significant bit of the least significant byte will never be set
     if this field really contains a modem value.  I therefore
     propose the field be redefined as follows for moderated
     conference mail:

     Instead of:         DestBaud      : integer;

     We'd use:           EchoPktFlag   : Char;
                         SerialNo      : Char;

     Where the echo packet type would be defined as follows:

          Bit  0        1 if moderated conference mail, 0 otherwise
          Bits 7-6      Reserved for future use

     Again, the implication is that if bit 0 is not set, the packet
     is a normal mail packet containing regular netmail or regular
     echomail (or both).  If bit 1 IS set, the packet contains ONLY
     moderated conference mail which meets the following criteria:

     1)  The packet is exactly as it was when it left the
     moderator's system (the .PKT file is totally unmodified except
     for being unpacked and repacked) and,

     2)  The packet contains moderated echomail that is downbound
     from the moderator ONLY and,

     3)  ALL messages in the area are for the SAME conference and
     have the exact same AREA tag (the conference mail processor
     will normally only read the first AREA tag of the first
     message).

     If the moderated conference .PKT file is changed in ANY way,
     then the system making the change must reset bit 0 of the
     EchoPktFlag (in effect changing the packet to a normal echomail
     PACKET, although the messages contained therein would still be
     flagged as part of a moderated conference) AND the system must
     add its address to the PATH line of each message in the packet.

     You will note that I have suggested a redefinition of the
     second byte of the Destination Baud integer as a Serial Number
     byte.  This would simply be a byte value that is incremented at
     the moderators' system each time a new message packet is issued
     (with rollover from 255 to 0).  In this manner the recipient of
     a conference area could, if he so desired, keep track of this
     value and thereby be alerted to any interruptions or missing
     packets in the echo feed.

     Actually, if I could be sure that the 24 bytes of filler in the
     .PKT file header were not being used by anyone, I would suggest
     that this information could go in there, rather than usurping
     the DestBaud integer.  Were that to happen, I'd prefer to see a
     two-byte value for the serial number, and also a 32-bit CRC
     value calculated on the portion of the .PKT file following the
     header (e.g., starting with the first byte of the first message
     header) to insure the integrity of the .PKT file.
     FidoNews 7-05                Page 18                  29 Jan 1990


     It should be obvious, as you read the above, that a new style
     moderated conference .PKT file would be completely compatible
     with virtually all currently existing mail processors.  These
     processors would simply treat such packets as they would any
     other bundle of incoming echomail.  In fact, the ONLY reason
     that such packets would need to be unpacked before sending to a
     system that is only capable of handling regular echomail is so
     that the required SEEN-BY line can be added, and the PATH line
     updated, in order to protect against duplicate message
     generation.

     It should be noted that when the -m switch is used in the
     AREAS.BBS file, a conference mail processor that supports this
     optional add-on to the basic moderated conference mail scheme
     should toss mail to the appropriate conference area as it is
     received, but NOT scan (export) it unless a specific switch is
     used on the command line when the mail processor is invoked.
     Normally you'd have a once-daily event that would invoke the
     processor with that switch, in order to scan and export
     messages from any areas that you moderate, followed IMMEDIATELY
     by a call to whatever you use to renumber and clean up that
     message area.  It would not normally be a good idea to
     automatically delete messages from the conferences you moderate
     at any time other than immediately after the daily message
     export from that area (this would prevent messages arriving
     after the export event but before the cleanup event from being
     deleted before they can go out).  And, of course, the moderated
     conference mail processor would have to build the .PKT files
     for each conference according to the specifications mentioned
     above.

     One potential problem exists at this point, and that is the
     possibility of creating duplicate .PKT file names.  Consider
     that many conference moderators might decide to run their
     once-daily export events at about the same time (just after
     midnight, for example) and therefore a .PKT file naming scheme
     based solely on time just might produce packets for different
     conference areas with the same filenames.  It would therefore
     seem wise to at least try and avoid the potential for duplicate
     filenames by using a .PKT file naming scheme that is not based
     solely on the time of day.

     The root portion of a .PKT filename may contain any valid
     hexadecimal character (0-9 or A-F).  Therefore, one possible
     scheme might be to use a four character checksum of the
     conference name plus some time dependent information.  For
     example, the following scheme might create adequately unique
     filenames:

          Mail packet filename format: cccctttt.PKT

     FidoNews 7-05                Page 19                  29 Jan 1990


     .....where cccc is a 32 bit checksum of the conference area
     tag, and tttt is the number of seconds past the start of the
     month (at the time the .PKT file is created) expressed in
     hexadecimal format.

     No .PKT file naming scheme can GUARANTEE unique filenames for
     conferences created on different systems, so it would be best
     if the moderated conference mail packer could check existing
     mail archives for duplicate filenames before adding a new .PKT
     file (I realize this may be difficult to do, however, given the
     number of different archiving programs in common use today).
     If such a check were made, renaming of .PKT files to avoid name
     collisions WOULD be permissible.  Yet another possibility would
     be to use a base 36 character set (0-9 or A-Z), or perhaps
     better yet, a base 20 character set (the letters G-Z ONLY, to
     positively avoid conflicts with .PKT filenames created by
     existing mail packers) for the root part of moderated
     conference mail .PKT filenames, and base these on some sort of
     random numbering scheme.  To some extent, the preferred method
     of avoiding .PKT file name collisions should be left to the
     software authors, but the (admittedly small) potential for
     difficulty should not be ignored.

     POLITICAL CONSIDERATIONS

     The above about covers the technical end of this proposal.
     Alas, there are the political considerations to contend with.
     I propose the following as sort of a Policy Statement in regard
     to moderated echomail:

     1) Anyone who converts moderated echomail to regular echomail
     may do so without prior permission to feed leaf nodes (nodes
     that do not further distribute the conference further) ONLY.
     If a node receiving a converted echomail feed wishes to pass
     that feed along to other nodes, the conference moderator's
     permission is required.  In any event, the node that converts
     moderated echomail to regular echomail is responsible for
     knowing which systems are receiving the conference via his
     system (either directly or indirectly) and for making sure that
     "dupe loops" are not created.

     2) It should be considered a serious violation of policy to
     feed moderated echomail conferences to a node capable of
     processing only regular echomail without inserting the required
     SEEN-BY and PATH lines (put another way, within an AREAS.BBS
     file the -d switch must NOT be used to feed a node that is not
     running a "moderated conference mail aware" echomail processor.
     The -e switch MUST be used instead).

     3) As long as moderated echomail is distributed as moderated
     echomail, (not converted to regular echomail), the propagation
     of duplicate messages is nearly impossible.  Therefore, there
     is no reason that the distribution of moderated echomail
     conferences needs to be restricted by anything other than
     least-cost routing considerations (that is, geographic
     restrictions are not really appropriate for conferences in
     FidoNews 7-05                Page 20                  29 Jan 1990


     which duplicate messages cannot easily be propagated).

     4) IF the new packet type as described above (with the header
     bit indicating that the packet is moderated echomail) is used,
     then it shall NOT be a requirement that the uplink and downlink
     paths between any particular system and the moderator's system
     be the same; however, if a conference is made available on a
     BBS, then an uplink path for replies MUST be provided.  The
     intent of this provision is to allow specific conferences, or
     groups of conferences, to be distributed via one-way channels
     (e.g. radio or satellite feeds) to reduce the costs for those
     wishing to receive the conference.  However, if an uplink path
     back to the moderator's system were not provided, users of a
     BBS might wrongly assume that they could leave messages that
     would be seen by all participants of the conference.  Thus, the
     requirement that an uplink path for replies must be made
     available.  The moderator of a conference may waive this
     requirement (although doing so is not recommended except in the
     case of "read-only" conferences).

     5) Complaints that moderated echomail equals censorship are
     really not valid.  Consider that Fidonet echomail is one of the
     few mediums in which folks seem to think they should be able to
     say anything they doggone well please.  Most sysops would not
     allow users to post just anything that they might want to say
     in any conference they feel like saying it in, yet some of
     these same sysops will be the first to complain about anyone
     who tries to implement some effective moderation in echomail.

     This proposal addresses that concern by insuring that echomail
     processors will be able to handle BOTH types of echomail (both
     moderated and unmoderated) as easily as regular echomail is now
     run.  So it would not be an either/or choice for sysops and
     echomail hub operators whether to run moderated or unmoderated
     echomail.  Right now we have echomail hubs that offer only
     echomail conferences and GroupMail hubs that offer only
     GroupMail conferences, but with software designed to be
     compliant with this proposal, all hubs would be able to handle
     both types of conferences.  Thus, it would be strictly up to
     the moderator of a conference as to whether that conference
     should be moderated or unmoderated.  In the case of conferences
     that have been on the backbone for a long time, many would
     undoubtedly remain as regular (unmoderated) echomail
     conferences.  But for new conferences, shouldn't it be the
     moderator's option as to how closely he wishes to moderate a
     conference?  After all, no one will force anybody to join a
     conference that they feel is too tightly moderated.

     CLOSING COMMENTS

     I think that about covers everything.  If you feel this
     proposal is missing something, please drop me a note at 154/8
     or if that won't work for you, you can send it to 1:154/9.  You
     can also leave comments in the NET_DEV echo but keep in mind
     that echomail currently isn't always as reliable as netmail,
     and occasionally my feed of NET_DEV does seem to be interrupted
     FidoNews 7-05                Page 21                  29 Jan 1990


     for various reasons (technical, not political!).  One question
     that I have left open (mostly because I don't really want this
     proposal to get mired in political concerns) is whether some
     mechanism should be included for routing private netmail
     replies to echomail back up to the sender of the original
     message via the same path that the original message came down?
     I wouldn't mind seeing such a mechanism included, but it would
     require some changes to the above proposal and worse, it might
     make the whole proposal politically unacceptable in Fidonet
     (besides that, I think there are better ways to devise a
     netmail routing scheme for Fidonet, should we ever have the
     collective will to do so.  See my article in Fidonews 7-01 if
     you'd like my thoughts on a netmail routing scheme).

     I will probably send this proposal up to the Fidonet Technical
     Standards Committee in a week or two, but I reserve the right
     to make revisions first, based on any comments I may receive
     from readers of these articles.  Your constructive comments are
     welcome.

     -----------------------------------------------------------------
     FidoNews 7-05                Page 22                  29 Jan 1990


     A Reply to Mr. Riddle
     Phil Root
     NC 285
     285/0, 285/17


             Having  been forwarded a copy of Mr.  Riddle's article on
     the Proposed Gateway Policy Document, I'd like to mention a short
     rebuttal.   I  feel that  some of the 'facts' that he puts  forth
     could use some clarification,  and perhaps,  I can point out some
     errors in his logic.

     Point 1:   Mr. Riddle says that the major issue facing Fidonet is
     that of direction.   I feel that he is wrong.  He states the real
     issues  are  how  the  current  coordinators  acceded  to   their
     positions,  how  they remain there,  the management and  personal
     attitudes  they represent....   I think that this indicates  that
     the proposed Gateway Policy Document has absolutely nothing to do
     with his dissatisfaction.  It wouldn't matter at all if it was an
     absolutely  PERFECT  document,  (which  it isn't,  but  that's  a
     different matter),  the point that he makes is that since it  was
     proposed  by  the *c structure,  and individual sysops  were  not
     "consulted",  etc.  that it is somehow flawed.  I find this logic
     to be somewhat contorted.

     Point 2:   Mr. Riddle is mistaken in his assumption that POLICY 4
     mandated  membership  in the local net.   It doesn't.   It  does,
     however,  grant to the International,  Zone, Regional and Network
     coordinators the ability to manage the nodelist for the  greatest
     effeciency.   In  this  case,  the Regional coordinator saw  that
     there was an existing net in the Omaha calling area.  There  were
     also  6  independent nodes in that area.   Attempts  to  convince
     those  nodes  to come into the net voluntarily  had  failed,  and
     under  mandate from the Zone coordinator,  the RC instructed that
     those  members were to be included in the Network  nodelist.   In
     the same paragraph, there was another indication and reference to
     an  internal network dispute that needs no further  clarification
     here.

     Point 3:   In paragrph 3 of Mr. Riddle's comments, he states that
     the *C's proposed internet gateway policy document was created in
     an atmosphere of "narrow-minded and short-sighted,  arguably ego-
     tripping conduct".   Such comments are really  counterproductive.
     A  lot  of  work  and  thought went into  the  creation  of  this
     document.

     Point  4:   There as never been any real proof that the vote  was
     flawed,  and  no one complained as long as the vote was going  to
     their liking.   Further, Mr. Riddle offers no proof that the vote
     was flawed.  If the Board of Directors of a SEPARATE organization
     decides to put a resolution to the sysops, and a majority of them
     decide  to ignore it,  then I find nothing flawed in  it,  except
     that it did not turn out to Mr. Riddle's advantage.

     FidoNews 7-05                Page 23                  29 Jan 1990


     Point 5:  I'm not going to comment on the debate excerpts the Mr.
     Riddle chooses to publish.   I think that they show even  further
     that  his  comments  actually  have very little to  do  with  the
     viability  or  non-viability of the  Internet  Gateway  Document.
     What  we have here is another 'Fidonet sysop' complaining   about
     the age old complaint,  "that we have no say".   This is hogwash.
     There  is  a  complaint and appeal process clearly  written  into
     POLICY 4.   If a *C at almost any level refuses to listen,  there
     is  ALWAYS the opportunity to go to the next higher  level.   Mr.
     Riddle  has  the  opportunity of seeking  membership  in  another
     network if he chooses.  I should note that he is not even a  full
     Fidonet  node,  but  a  point  off of  285/666.   Not  that  this
     diminishes  his  right to comment,  and yes,  I DID  invite  this
     comment.    However,  I  must  confess,  I  had  hoped  for  some
     constructive criticism of the Gateway document, not a diatrabe on
     the *c structure, and its supposed evils.

     People  were  clamoring for democracy.  They 'DEMANDED' that  the
     sysops be given a choice on matter.   Yet,  when the sysops  were
     given  a choice,  we saw the result.   Most of the sysops did not
     even bother to cast their ballots.  We've seen that democracy CAN
     work.  However, it won't work in Fidonet without participation by
     the  sysops,  any better than it works anywhere else without  the
     participation of the electorate.

     -----------------------------------------------------------------
     FidoNews 7-05                Page 24                  29 Jan 1990


     Regional Netmail Routing
     -------- ------- -------

     (Published For the Zone 1 Coordinator and RCs by 1:286/703.)

     The Zone 1 Coordinator and the Zone 1 Regional Coordinators would
     like to announce the creation of what we hope will be  a  helpful
     service  to the sysops in FidoNet Zone 1.  The service is not new
     to FidoNet but is new to Zone 1.

     In a significant number of cases, it really shouldn't matter if a
     netmail message is delivered in 5 minutes  or  5  days.  The  Z1C
     connects  with  each Zone 1 RC and with the Zone 2/3/4/5 zonegate
     nightly.  The Zone 1 RC's connect with  each  of  their  NC's  at
     least  twice  each  week  on FidoNews and Nodediff nights.  These
     already established connections could easily be utilized to offer
     routing services  for  low  priority  netmail  addressed  to  any
     FidoNet destination. That is precisely what we've done.  Although
     this  is  currently  labeled a "pilot project",  we can currently
     forsee no reason why it could not be implemented permanently.

     FidoNet sysops in Zone 1 may feel free to route any low  priority
     netmail to any FidoNet Z1RC or to the Z1C.  You should understand
     that "low priority" means that you don't care if it takes up to 5
     or  6 days for the message to arrive at its ultimate destination.
     The transfer from RC to ZC to RC  (or  to  zonegate)  would  take
     place fairly rapidly.  However,  the speed with which the message
     is delivered to the NC will vary from region to region based upon
     how often RC connects with the  NC  (i.e.  Friday  &  Monday  for
     Nodediff's  and  FidoNews or until the NC and RC connect for some
     other purpose).  NC's are invited to participate in this plan and
     provide outbound low priority netmail routing (via the RC).  NC's
     please understand we said "invite" not  "insist".  That  decision
     us up to you and your network sysops.

     Zone 1,  feel free to use or ignore this offer as you please.  We
     hope that this plan will,  as but one example,  provide  echomail
     users  with  an  incentive to take message threads that stray off
     topic "to netmail". Yes, we could be deluged with so much traffic
     that our  collective  pocketbooks  could  not  bear  the  strain.
     However, we prefer to trust the sysops of FidoNet and their users
     to use this service judiciously and responsibly.

     The regional routing plan is, to be sure, not mandated by Policy.
     It  was  simply  something that seemed to make sense and has been
     voluntarily implemented.  We hope  that  this  proposal  will  be
     received  in  the  spirit  in  which it is offered.  That being a
     sincere effort to provide a service we  feel  we  can  afford  to
     those  we  serve.  If  it doesn't work out we are surely no worse
     off than we are today.  If it does, perhaps we can say we brought
     netmail "out of the closet" and made it widely available  to  the
     sysops and (more significantly to the) users in Zone 1.

     FidoNews 7-05                Page 25                  29 Jan 1990


     Questions  and comments may be directed to the Zone 1 Coordinator
     or to any of the Zone 1 Regional Coordinators.

     -----------------------------------------------------------------
     FidoNews 7-05                Page 26                  29 Jan 1990


     By Bill Weinel
     1:151/121.0 @ FidoNet


                    SCSI SYSTEM ONE: A SYSOP'S SCSI SYSTEM


     SCSI System One: The History
     ----------------------------

             One  of the most frustrating problems I have found  since
     switching  my BBS system over to a PC based computer is the  PC's
     inherent  inability to deal with large HD storage spaces.  (While
     this problem has been remedied to some degree with the advent  of
     DOS 4.x, the hardware problem of multiple hard drive storage on a
     single PC still exists.) This article is the story of some  folks
     who decided that "enough was enough" and did something about it.

             About a year back, I became an SDS node and found  myself
     facing  the  situation of needing more hard drive storage  on  my
     system.  Not being the kind of person who could afford to go  out
     an plunk down $6000 for a brand new  super-duper-800-megabyte-12-
     millisecond-Super-Seeker  hard drive, I decided that it was  time
     to  start  looking for some other reasonable way to break  the  2
     hard drive barrier on the PC. I quickly found that I wasn't alone
     in my quest. A handful of other local sysops had been faced  with
     this same problem too. Enter Jeff Lengel.

             Jeff  is a local computer consultant, hardware  engineer,
     software hacker, and long time friend. We started discussing  the
     problem  last  January and decided that there was  just  no  good
     system available to fill the need for multiple hard drive storage
     at  the time. We had pretty much decided that SCSI was the  route
     to go, but at that time commercial SCSI systems for PCs were few,
     and  those  that were affordable for sysops on  our  budget  were
     basically  non-existant.  Jeff said that he had  seen  some  good
     prices on SCSI hardware available through some mail order vendors
     and that it should be possible to put together a software package
     to  make  it all fly. None of us knew it at the  time,  but  SCSI
     System One was born right there.

             Needless to say, Jeff found that writing the SCSI  driver
     code  was  a  bit more than a trivial task.  He  started  out  in
     assembler, but the code eventually out grew his ability to manage
     it.   So he converted all utilities over to C, leaving the driver
     in assembler  for speed.   As time  went by,  Jeff got  the basic
     driver  code  finished.   This  allowed  him to start testing the
     SCSI controller hardware.

            By June, he had  a working SCSI  driver which  would allow
     the PC to talk to  the SCSI devices  through a host adaptor card.
     Once the driver was working correctly, he started to refine it to
     work with various multi-tasking  and BBS packages.  He also added
     the ability to use bridge controllers  to the system. This opened
     up the door  for getting all those old retired  ST506 type drives
     out of the closet and back online again.
     FidoNews 7-05                Page 27                  29 Jan 1990


             This  is the point where my job started... Jeff needed  a
     few  beta testers (guinea pigs?) to iron out the remaining  flaws
     in the driver. And of course there was that burning question that
     still  needed to be answered: "Would the SCSI driver  really  run
     reliably with all that mailer/BBS software loaded on top of  it?"
     I   volunteered  to  test  it under DOS  3.3  while  Mike  Stroud
     (1:151/102.0) volunteered to test it  under DOS 4.x. Between  the
     two of us, we managed to thrash it pretty well.  This helped Jeff
     work out the few remaining kinks in the driver.

             "So  where are we today?", you ask. Well, today  we  have
     five  systems  in  net 151 now running a Scsi  System  One  on  a
     day-to-day  basis. Jeff has continued to improve the SCSI drivers
     transfer  rate and support for as many bridge adapters as he  can
     possibly find. At the same time, he has managed to develop a  150
     megabyte  automatic  streaming  SCSI  tape  backup  system.  This
     addition to the his base system is a real sysops dream! It can be
     left  to run unattended in the wee hours of the  morning  through
     use  of  an  errorlevel  exit  and  will  automatically   preform
     incremental backups of your system while you sleep. It can backup
     a 100 megabyte drive in file-by-file mode in about 16 minutes and
     can be tailored, through use of a CFG file, to backup  individual
     files, subdirectories, or complete drives. Jeff's also working on
     adding  disk  mirroring  and  a LAN link  package  for  a  future
     release.

             It's  really hard to believe that just about a  year  ago
     this  was all a pipe dream floating around in the heads of a  few
     local  folks. Today, thanks to a little hard work  and  extremely
     patient  wives,  it's a reality. That just goes to  show  that  a
     little collaboration between sysops can go a long way!


     SCSI System One: The Specs
     --------------------------

         -Meets ANSI X3T9.2 specifications
         -Asynchronous interface up to 1.5 megabytes per second
         -Supports full parity generation and checking
         -Supports full SCSI arbitration and checking options
         -Supports linked commands
         -Supports bridge controllers
         -Supports logical units
         -Direct SCSI bus drivers
         -Host interface: PC, XT, AT, 80386, true compatible (*)
                 . SCSI address 330h-337h
                 . DMA channel 3
         -Supports DMA or PIO transfer
         -Supports up to 7 physical drives (14 on bridge controllers)
         -Supports up to 24 logical drives (total)
         -Supports up to 536 megabytes per logical drive 3n3
     FidoNews 7-05                Page 28                  29 Jan 1990


         -Supports complete compatibility between XT and AT bus types
         -Compatible with Norton Advanced utilities Ver. 4.5 and
                    Fasttrax disk optimizer

     (*) max bus speed 8 Mhz.

     The system consists of one host adaptor card (half  sized  card),
     partitioning/low-level   formatting  software  and  SCSI   device
     driver.  A  three  foot  SCSI  interface cable  is  included.  It
     requires at least DOS 3.2 or higher.

          Jeff  has agreed that in an effort to aid the growth of  the
     'BBS  Network'  he will offer the SCSI System  One  host  adapted
     system  to net sysops at a special rate. For more details on  the
     sysop offer, contact Jeff Lengel at the address below.

     SCSI System One
     1013 Ivy Lane
     Cary NC 27511 USA
     919-469-9750

     Full information may be file requested by requesting SCSIONE from
     1:151/121.0 anytime other than ZMH.

     -----------------------------------------------------------------
     FidoNews 7-05                Page 29                  29 Jan 1990


     =================================================================
                              LATEST VERSIONS
     =================================================================

                          Latest Software Versions

                               MS-DOS Systems
                               --------------

                           Bulletin Board Software
     Name        Version    Name        Version    Name       Version

     Fido            12q+   Phoenix         1.3    TBBS           2.1
     Lynx           1.30    QuickBBS       2.61*   TComm/TCommNet 3.4
     Kitten         2.16    RBBS          17.2B    TPBoard        6.0
     Opus          1.03b+   RBBSmail       17.2    Wildcat!      2.10*
                            TAG           2.5d1*


     Network                Node List              Other
     Mailers     Version    Utilities   Version    Utilities  Version

     BinkleyTerm    2.30    EditNL         4.00    ARC           6.02
     D'Bridge       1.30*   MakeNL         2.20    ARCA06        2.20*
     Dutchie       2.90C    ParseList      1.30    ARCmail        2.0
     FrontDoor     1.99b*   Prune          1.40    ConfMail      4.00
     PRENM          1.47    SysNL          3.01*   EMM           2.02
     SEAdog        4.51b    XlatList       2.90    Gmail         2.01
                            XlaxDiff       2.32    GROUP         2.16
                            XlaxNode       2.32    GUS           1.30*
                                                   LHARC         1.13
                                                   MSG            4.0
                                                   MSGED         1.99
                                                   PK[UN]ZIP     1.02*
                                                   QM             1.0
                                                   QSORT         4.03
                                                   StarLink      1.01
                                                   TCOMMail       2.2
                                                   TMail         1.12
                                                   TPBNetEd       3.2
                                                   TosScan       1.00*
                                                   UFGATE        1.03
                                                   XRS           3.10
                                                   ZmailQ        1.10*

                                 Macintosh
                                 ---------

     Bulletin Board Software   Network Mailers     Other Utilities

     Name            Version   Name      Version   Name       Version

     FidoNews 7-05                Page 30                  29 Jan 1990


     Red Ryder Host   v2.1b4   Tabby         2.1   MacArc        0.04
     Mansion            7.15   Copernicus   1.0d*  ArcMac         1.3
     WWIV (Mac)          3.0                       StuffIt       1.51
                                                   TImport      1.331
                                                   TExport       1.32
                                                   Timestamp      1.6
                                                   Tset           1.3
                                                   Import        2.52
                                                   Export        2.54
                                                   Sundial        2.1
                                                   UNZIP         1.01*

                                   Amiga
                                   -----

     Bulletin Board Software   Network Mailers     Other Utilities

     Name            Version   Name      Version   Name       Version

     Paragon            2.00+* BinkleyTerm  1.00   AmigArc       0.23
                               TrapDoor     1.11   booz          1.01
                               WelMat       0.35*  ConfMail      1.10
                                                   ChameleonEdit 0.10
                                                   Lharc         1.00*
                                                   ParseLst      1.30
                                                   PkAX          1.00
                                                   PK[UN]ZIP     1.01*
                                                   RMB           1.30
                                                   UNzip         0.86
                                                   Zoo           2.00


                                    Atari ST
                                    --------

     Bulletin Board Software   Network Mailer      Other Utilities

     Name            Version   Name      Version   Name       Version

     FIDOdoor/ST        1.5c*  BinkleyTerm 1.03g3  ConfMail      1.00
     Pandora BBS       2.41c   The BOX     1.20    ParseList     1.30
     QuickBBS/ST        0.40                       ARC           6.02*
     GS Point           0.61                       LHARC         0.51
                                                   PKUNZIP       1.10
                                                   MSGED        1.96S
                                                   SRENUM         6.2
                                                   Trenum        0.10
                                                   OMMM          1.40


     + Netmail capable (does not require additional mailer software)
     * Recently changed

     FidoNews 7-05                Page 31                  29 Jan 1990


     Utility authors:  Please help  keep  this  list  up  to  date  by
     reporting  new  versions  to 1:1/1.  It is not our intent to list
     all utilities here, only those which verge on necessity.

     -----------------------------------------------------------------
     FidoNews 7-05                Page 32                  29 Jan 1990


     =================================================================
                                  NOTICES
     =================================================================

     Glen Johnson, 1:269/101

                     Announcing the DRUM_CORPS echo
                     ------------------------------

     DRUM_CORPS is an echo for chewing the  rag  about  competitive
     drum & bugle corps, marching bands, and Winter  color  guards.
     It's on the backbone via the Eastern Star and is moderated  by
     yours truly. If you've ever played in a  drum  corps,  college
     band, high school marching band, or marched in a Winter  color
     guard, this is the place for you!

     I've had a great deal of experience in  drum  corps  over  the
     years, having taught them, played with  them,  run  them,  and
     been a spectator too. And we're looking for other with similar
     experience and interests.

     During the competition season, we'll have scores  &  schedules
     and general  BS  from  other  drum  corps  freaks  around  the
     country. So ask your NEC to pick up DRUM_CORPS and join us!

     Glen Johnson
     1:269/101

     -----------------------------------------------------------------

                          The Interrupt Stack


      9 Feb 1990
        Jack Porter's Birthday. Send greetings to him at 1:205/69.

      5 Jun 1990
        David Dodell's 33rd Birthday

      1 Aug 1990
        Start of FidoCon '90. Contact Bill Vanglahn at 1:1/90 for
        details.

      5 Oct 1990
        21st Anniversary of "Monty Python's Flying Circus"


     If you have something which you would like to see on this
     calendar, please send a message to FidoNet node 1:1/1.

     -----------------------------------------------------------------

---
Remember Campers!!!

To send mail from an Internet site or smart UUCP Site TO a user 
            	  that calls a Fido-Net system.

  You need to know the name of the person and node number of the 
  Fido-Net system that the person uses.
     
  The address of a FidoNode looks like this: 1:105/302.0. Usually
  the 1: and .0 are left off, but they are there by default. (In
  Europe it is 2: and in the Pacific Basin it is 3:.) That
  address can be translated as "Zone 1, Net 105, FidoNode 302,
  Point 0." or p0.f302.n105.z1. Add the FidoNet domain of
  .fidonet.org to the end of that, chop off the p0 (it is again,
  a default) and you have f302.n105.z1.fidonet.org - the "Fully
  Qualified Domain Name" of a FidoNode. Another example is
  1:105/4.3 which would be written as p3.f4.n105.z1.fidonet.org
  (since there is a point number other than 0, we have to specify
  it). Note also that we are only using zone 1.  This will also
  work for zones 2 and 3, just use z2 or z3 as appropriate.

  FidoNet uses full names of the callers.  Multi-part name folks
  (eg. First Last, ie. "Dale Weber") will have a period '.'
  seperating their names.  So, lets say you wanted to send mail 
  to Dale Weber at 1:105/55.0, you would address your letter to:
        Dale.Weber@f55.n105.z1.fidonet.org.



-- 
Tim Pozar    Try also...
Internet: pozar@toad.com   
    Fido:  1:125/555
  PaBell:  (415) 788-3904
  USNail:  KKSF / 77 Maiden Lane /  San Francisco CA 94108