Fixed HTML codes in Fidonet documents

This commit is contained in:
Michiel Broek 2002-02-16 21:38:40 +00:00
parent 1fb610f935
commit 0aa608b565
42 changed files with 18330 additions and 18508 deletions

View File

@ -1,79 +1,80 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Transparant Gateways to and from FidoNet.</TITLE> <HEAD>
</HEAD> <TITLE>Transparant Gateways to and from FidoNet.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
Transparent Gateways to and from FidoNet <tm> <PRE>
Technical Considerations Transparent Gateways to and from FidoNet <tm>
FSC-0035 Technical Considerations
FSC-0035
Michael Shiels 22 June 89
Michael Shiels 22 June 89
Copyright 1989, Michael Shiels. All rights reserved. The right to distribute
for non-commercial use is granted to the FidoNet Technical Standards Committee, Copyright 1989, Michael Shiels. All rights reserved. The right to distribute
provided that no fee is charged. This may be posted on FidoNet electronic BBSs for non-commercial use is granted to the FidoNet Technical Standards Committee,
which charge no fee for accessing this document. Any and all other reproduction provided that no fee is charged. This may be posted on FidoNet electronic BBSs
or excerpting requires the explicit written consent of the author. which charge no fee for accessing this document. Any and all other reproduction
or excerpting requires the explicit written consent of the author.
Gateways
-------- Gateways
--------
Gatewaying between Fidonet and other networks seems to be the latest feature
which hopefully brings more benefits to the users of each network. But there Gatewaying between Fidonet and other networks seems to be the latest feature
are some real problems with gatewaying and doing "transparent" replies. which hopefully brings more benefits to the users of each network. But there
This proposal should allow for almost totally transparent gateways but requires are some real problems with gatewaying and doing "transparent" replies.
the co-operation of BBS software writers to support this following protocol. This proposal should allow for almost totally transparent gateways but requires
the co-operation of BBS software writers to support this following protocol.
Incoming Messages
----------------- Incoming Messages
-----------------
When a message is entered into fidonet from another network it will be entering
through one machine (say 1/2). The userid on the other network may not match When a message is entered into fidonet from another network it will be entering
very will with the 2 word 36 character userid on Fidonet. So the following is through one machine (say 1/2). The userid on the other network may not match
done to store away the proper userid of the sender. very will with the 2 word 36 character userid on Fidonet. So the following is
done to store away the proper userid of the sender.
Two (2) lines are added to the message (usually at the top of the text portion
hidden by the infamous ^A KLUDGE). Two (2) lines are added to the message (usually at the top of the text portion
hidden by the infamous ^A KLUDGE).
^AREPLYADDR .....\r
^AREPLYADDR .....\r
which signifies the FULL userid of the person on the other network. The first
36 characters or the full userid if less than 36 characters long, are stored which signifies the FULL userid of the person on the other network. The first
in the FROM field of the message header. When replies are done they use a 36 characters or the full userid if less than 36 characters long, are stored
second line of the following form. in the FROM field of the message header. When replies are done they use a
second line of the following form.
^REPLYTO zone:net/node firstname lastname
^REPLYTO zone:net/node firstname lastname
which is used to signify the "userid" which mail destined to this other network
must be sent to and on which machine that userids resides. Replies are sent which is used to signify the "userid" which mail destined to this other network
to this zone:net/node and userid with the first line of the message being must be sent to and on which machine that userids resides. Replies are sent
changed into 'TO: ....' where .... is the FULL userid from the ^AREPLYADDR to this zone:net/node and userid with the first line of the message being
line. changed into 'TO: ....' where .... is the FULL userid from the ^AREPLYADDR
line.
Should you have constructive correction or criticism, please contact:
Should you have constructive correction or criticism, please contact:
Michael Shiels
FidoNet: 1:250/410 michael.shiels@masnet.fidonet.org Michael Shiels
uucp: ?!tmsoft!masnet!michael.shiels FidoNet: 1:250/410 michael.shiels@masnet.fidonet.org
Internet: michael.shiels@masnet.uucp uucp: ?!tmsoft!masnet!michael.shiels
Internet: michael.shiels@masnet.uucp
----------
FidoNet is a trademark of Tom Jennings and Fido Software, to whom we all owe ----------
much thanks for the origin and spirit of FidoNet. FidoNet is a trademark of Tom Jennings and Fido Software, to whom we all owe
</PRE> much thanks for the origin and spirit of FidoNet.
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,362 +1,363 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>A Type-2 Packet Extension Proposal.</TITLE> <HEAD>
</HEAD> <TITLE>A Type-2 Packet Extension Proposal.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
Document: FSC-0039 <PRE>
Version: 04 Document: FSC-0039
Date: 29-Sep-90 Version: 04
Date: 29-Sep-90
A Type-2 Packet Extension Proposal
Mark A. Howard 1:260/340@FidoNet A Type-2 Packet Extension Proposal
Mark A. Howard 1:260/340@FidoNet
Status of this document:
------------------------ Status of this document:
This FSC suggests a proposed protocol for the FidoNet(r) community, ------------------------
and requests discussion and suggestions for improvements. Distribution This FSC suggests a proposed protocol for the FidoNet(r) community,
of this document is unlimited. and requests discussion and suggestions for improvements. Distribution
of this document is unlimited.
Fido and FidoNet are registered marks of Tom Jennings and Fido Software.
FTS-0001 is a copyrighted work of Randy Bush. Fido and FidoNet are registered marks of Tom Jennings and Fido Software.
FTS-0001 is a copyrighted work of Randy Bush.
Introduction
------------ Introduction
This document serves two major purposes. The first is an attempt to define ------------
and document the Type-2 packet which is widely in use in FidoNet today. This document serves two major purposes. The first is an attempt to define
Although FTS-0001 defines the structure of a Type-2 packet, the natural and document the Type-2 packet which is widely in use in FidoNet today.
evolution of our network, mostly with regards to addressing methodology, Although FTS-0001 defines the structure of a Type-2 packet, the natural
has made it necessary to utilize hitherto unused portions of the header evolution of our network, mostly with regards to addressing methodology,
to insert Zone and Point information. Also, it has become apparent that has made it necessary to utilize hitherto unused portions of the header
some of the existing fields are not large enough to accomplish their to insert Zone and Point information. Also, it has become apparent that
original tasks. some of the existing fields are not large enough to accomplish their
original tasks.
The second is to propose a simple mechanism to allow FidoNet to begin to
utilize advanced mail packing techniques. It is quite apparent that while The second is to propose a simple mechanism to allow FidoNet to begin to
Type-2 has served us faithfully for some time now, the evolution of our utilize advanced mail packing techniques. It is quite apparent that while
network in terms of technical and physical complexity has caused us to Type-2 has served us faithfully for some time now, the evolution of our
consider more efficient and functional ways to pack mail. network in terms of technical and physical complexity has caused us to
consider more efficient and functional ways to pack mail.
It should be made clear that with the exception of the Capability Word,
Capability Word Validation Copy, ProductCode(hi), and Revision(minor), It should be made clear that with the exception of the Capability Word,
which are proposed extensions to the Type-2 packet header, this FSC is Capability Word Validation Copy, ProductCode(hi), and Revision(minor),
an attempt to correctly document existing practices with regards to the which are proposed extensions to the Type-2 packet header, this FSC is
insertion of zone and point info by at least three mail processors in an attempt to correctly document existing practices with regards to the
use today. insertion of zone and point info by at least three mail processors in
use today.
The Type-2 Header (Where's the Zone?)
------------------------------------- The Type-2 Header (Where's the Zone?)
Although FTS-0001 has recently been updated to reflect the use of some of -------------------------------------
the areas in the packed message header for zone data, at least two other Although FTS-0001 has recently been updated to reflect the use of some of
methods for inserting the zone information have been adopted, making it the areas in the packed message header for zone data, at least two other
necessary to provide support for both formats in all of the zone aware mail methods for inserting the zone information have been adopted, making it
processors. The end result is more code, and redundant information in the necessary to provide support for both formats in all of the zone aware mail
packet header. processors. The end result is more code, and redundant information in the
packet header.
This has presented a problem in logistics, as it is difficult to consider
the project of updating mail processors using one type to use the other. This has presented a problem in logistics, as it is difficult to consider
As sufficient indentification is provided, in the form of the product code, the project of updating mail processors using one type to use the other.
to determine the expected location of the zone information, and because As sufficient indentification is provided, in the form of the product code,
code already exists in most of the mail processors to overcome this, this to determine the expected location of the zone information, and because
proposal does not attempt to suggest that one method be used over the code already exists in most of the mail processors to overcome this, this
other, rather the intent is to attempt to document the extensions in use, proposal does not attempt to suggest that one method be used over the
and the products involved. other, rather the intent is to attempt to document the extensions in use,
and the products involved.
See the accompanying chart and cross-reference.
See the accompanying chart and cross-reference.
The Product Code
---------------- The Product Code
Based upon the current rate of requests for product codes from the FTSC, ----------------
it is probable that the Product Code byte will not be large enough to Based upon the current rate of requests for product codes from the FTSC,
accomodate all of the codes required. While it is not reasonable to it is probable that the Product Code byte will not be large enough to
expect that all Type-2 processors will eventually check the hi-order byte accomodate all of the codes required. While it is not reasonable to
proposed here, it is likely that 'current' mail processors will. This expect that all Type-2 processors will eventually check the hi-order byte
can be nothing but benefical, as it will force users to upgrade their proposed here, it is likely that 'current' mail processors will. This
mail processors to a product which will as a minimum, support Type-2 can be nothing but benefical, as it will force users to upgrade their
with Zone and Point extensions, and quite possibly, processors that will mail processors to a product which will as a minimum, support Type-2
utilize more advanced mail packing techniques, making Type-2 extinct once with Zone and Point extensions, and quite possibly, processors that will
and for all. utilize more advanced mail packing techniques, making Type-2 extinct once
and for all.
The Capability Word (How do we GET there from here?)
----------------------------------------------------- The Capability Word (How do we GET there from here?)
Everybody would like to see more efficient and functional ways to pack and -----------------------------------------------------
exchange mail. Several Type-3 message bundle proposals exist, but none Everybody would like to see more efficient and functional ways to pack and
really address a problem which must be solved first. The problem is that exchange mail. Several Type-3 message bundle proposals exist, but none
since FidoNet is a hobbyist network, no demands can be placed on any one really address a problem which must be solved first. The problem is that
sysop to upgrade or change their bundling software. Because of this, it since FidoNet is a hobbyist network, no demands can be placed on any one
is necessary to consider strategies which allow for the existence of Type-2 sysop to upgrade or change their bundling software. Because of this, it
bundlers in the network topology. is necessary to consider strategies which allow for the existence of Type-2
bundlers in the network topology.
Considerable advantages can be realized, however, between systems that
consent to use advanced bundling techniques. One way to do this is to Considerable advantages can be realized, however, between systems that
simply send netmail to all of your connecting systems, saying "Hey, I've consent to use advanced bundling techniques. One way to do this is to
got a Type-3 bundler now, how about you?" This could become quite simply send netmail to all of your connecting systems, saying "Hey, I've
tiresome, and does not represent much of an improvement on the current got a Type-3 bundler now, how about you?" This could become quite
situation. tiresome, and does not represent much of an improvement on the current
situation.
What would be desirable is a network that would 'upgrade itself'. Given a
situation where mail processors of various capabilities will exist in a What would be desirable is a network that would 'upgrade itself'. Given a
network topology, the goal is to provide a mechanism whereby two links can situation where mail processors of various capabilities will exist in a
determine and utilize the most efficient bundling method to use, in a network topology, the goal is to provide a mechanism whereby two links can
manner transparent to the sysop. determine and utilize the most efficient bundling method to use, in a
manner transparent to the sysop.
For instance, let's say that the FTSC releases the Type-7 All New Singing
and Dancing bundle format. Well, your current version of SlingToss can For instance, let's say that the FTSC releases the Type-7 All New Singing
only support Types 2, 3, and 5. One of your downlinks gets a new version and Dancing bundle format. Well, your current version of SlingToss can
of MailMangle which can support Types 2, 3, 4, and 7. Well, it is quite only support Types 2, 3, and 5. One of your downlinks gets a new version
obvious that since you and he are exchanging 4 megs of mail each night, of MailMangle which can support Types 2, 3, 4, and 7. Well, it is quite
and it's an overseas call, that it would be in your interest to obtain a obvious that since you and he are exchanging 4 megs of mail each night,
new version of SlingToss which can support Type 7. and it's an overseas call, that it would be in your interest to obtain a
new version of SlingToss which can support Type 7.
Note that this is *optional*. Because both processors can support Type-3,
they will continue to exchange Type-3 mail quite happily, even though Note that this is *optional*. Because both processors can support Type-3,
MailMangle is happily advertising the availability of Type-7. Even your they will continue to exchange Type-3 mail quite happily, even though
downlinks which are still using stone-age Type-2 processors will be fine, MailMangle is happily advertising the availability of Type-7. Even your
as SlingToss will always export Type-2 bundles when no higher capability downlinks which are still using stone-age Type-2 processors will be fine,
can be determined. as SlingToss will always export Type-2 bundles when no higher capability
can be determined.
So, after dashing off the check to the author, your new version of
SlingToss comes in the mail! You rush over to your system, and install it. So, after dashing off the check to the author, your new version of
The next time SlingToss exports mail to the MailMangle system, it says SlingToss comes in the mail! You rush over to your system, and install it.
"Hey! I can now support Type 2, 3, 5, and 7! So, whattya got?" This is The next time SlingToss exports mail to the MailMangle system, it says
no skin off MailMangle's nose, he's had Type-7 for quite a while, and he "Hey! I can now support Type 2, 3, 5, and 7! So, whattya got?" This is
begins to export Type-7 bundles to SlingToss. "It's about time.", he says. no skin off MailMangle's nose, he's had Type-7 for quite a while, and he
begins to export Type-7 bundles to SlingToss. "It's about time.", he says.
Now, this scenario is made possible by implementing a 'Capability Word' in
the present and future packet headers. The Capability Update mechanism Now, this scenario is made possible by implementing a 'Capability Word' in
depends on several assumptions: the present and future packet headers. The Capability Update mechanism
depends on several assumptions:
1) Any Advanced Capability Bundler *MUST* be capable of receiving and
faithfully processing Type-2 bundles. Hopefully, the inbound packets 1) Any Advanced Capability Bundler *MUST* be capable of receiving and
will be in the new format proposed by this document, but then again, faithfully processing Type-2 bundles. Hopefully, the inbound packets
this is not an exact science. What this means is that it is likely will be in the new format proposed by this document, but then again,
that some packets may arrive with the Capability Word (CW) set to 0. this is not an exact science. What this means is that it is likely
In this case, Type-2 is assumed, assuring compatibility. The only that some packets may arrive with the Capability Word (CW) set to 0.
caveat is that it is conceivable that some obscure mail processor In this case, Type-2 is assumed, assuring compatibility. The only
uses the location proposed for the CW for other arcane purposes. This caveat is that it is conceivable that some obscure mail processor
| can detected through the CWValidation Copy, which is byte-swapped and uses the location proposed for the CW for other arcane purposes. This
| compared with the CW at that time. If a mismatch is found, a CW of | can detected through the CWValidation Copy, which is byte-swapped and
| type 0 is assumed, and a Type-2 bundling method is used. | compared with the CW at that time. If a mismatch is found, a CW of
| type 0 is assumed, and a Type-2 bundling method is used.
2) An Advanced Capability Bundler, hereafter referred to as a Type-N
Bundler, must have a method to store and maintain the node-by-node 2) An Advanced Capability Bundler, hereafter referred to as a Type-N
capability information. This can be done many ways, and in fact Bundler, must have a method to store and maintain the node-by-node
several processors already have begun to maintain node information capability information. This can be done many ways, and in fact
outside of that found in AREAS.BBS, mostly to implement pre-arranged several processors already have begun to maintain node information
alternate compression methods. In a text configuration file, you outside of that found in AREAS.BBS, mostly to implement pre-arranged
might see the following: alternate compression methods. In a text configuration file, you
might see the following:
; Address Comp Send LastCW ; Comments
Node 1:260/340 ZIP Auto 7 ; Auto detect & upgrade ; Address Comp Send LastCW ; Comments
Node 1:135/20 LZH 3 2,3,7 ; Always send Type-3 Node 1:260/340 ZIP Auto 7 ; Auto detect & upgrade
Node 1: ARC 2 0 ; Stone-Age processor Node 1:135/20 LZH 3 2,3,7 ; Always send Type-3
Node 1:135/4 --- Auto 7 ; Sent me netmail Node 1: ARC 2 0 ; Stone-Age processor
Node 1: --- 0 0 ; Don't send CW Node 1:135/4 --- Auto 7 ; Sent me netmail
Node 1: --- 0 0 ; Don't send CW
In this example, the fields are:
In this example, the fields are:
Address - downlink address. Note that this is not necessarily
relative to echomail, only, it is possible to append Address - downlink address. Note that this is not necessarily
information to the node database as netmail packets are relative to echomail, only, it is possible to append
receieved from different addresses. information to the node database as netmail packets are
receieved from different addresses.
Comp - desired mail compression method.
Comp - desired mail compression method.
Send - Auto - automatically determined maximum common packing
method to use. Automatically update to LastCW Send - Auto - automatically determined maximum common packing
when packing. method to use. Automatically update to LastCW
when packing.
LastCW - Last CW received from remote system.
LastCW - Last CW received from remote system.
3) A Type-N Bundle will always advertise it's capabilities in the CW
regardless of the type being sent. As shown in the above example, 3) A Type-N Bundle will always advertise it's capabilities in the CW
it allows Type-N processors to automatically track the capability regardless of the type being sent. As shown in the above example,
of your system. Again, in cases where a stone-age processor is it allows Type-N processors to automatically track the capability
being used, this field will be ignored, and in the unusual event of your system. Again, in cases where a stone-age processor is
that it is not ignored, and is somehow harmful to the far system, being used, this field will be ignored, and in the unusual event
the Type-N processor can be configured to send a CW of 0. that it is not ignored, and is somehow harmful to the far system,
the Type-N processor can be configured to send a CW of 0.
The format of the Capability Word is designed to support up to 15 future
bundle types, and is bit-mapped to facilitate the easy determination of The format of the Capability Word is designed to support up to 15 future
the maximum common level supported between two nodes: bundle types, and is bit-mapped to facilitate the easy determination of
the maximum common level supported between two nodes:
msb Capability Word lsb
Node Supports ------------FTSC Type Supported---------------- msb Capability Word lsb
Node Supports ------------FTSC Type Supported----------------
U 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2
U 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2
2, 3, and 7 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 1
2, 3, and 5 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1 2, 3, and 7 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 1
2 (this FSC) 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 2, 3, and 5 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1
Stone Age** 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 (this FSC) 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1
^ Stone Age** 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
+--- Indicates UseNet RFC-822 capability ^
+--- Indicates UseNet RFC-822 capability
** - a mismatch in the CWValidation Copy also
produces a CW=0. ** - a mismatch in the CWValidation Copy also
produces a CW=0.
In this example, the Type-N bundler would first compare the remote CW
| and the byte-swapped remote CWValidation Copy, and check for a mismatch. In this example, the Type-N bundler would first compare the remote CW
Prior to the compare, the MSB of the CW's are masked, as this bit is | and the byte-swapped remote CWValidation Copy, and check for a mismatch.
reserved to indicate whether the mail processor is capable of also Prior to the compare, the MSB of the CW's are masked, as this bit is
accepting UseNet RFC-822 bundles. Following the MSB mask, and bit reserved to indicate whether the mail processor is capable of also
comparison, if they do not match, a remote CW of 0 is assumed. If they accepting UseNet RFC-822 bundles. Following the MSB mask, and bit
match, the Type-N processor would AND the local and remote CW words, comparison, if they do not match, a remote CW of 0 is assumed. If they
obtaining a CW expressing the Types which are in common to both systems. match, the Type-N processor would AND the local and remote CW words,
The most significant Type will be used, by default, but note that this obtaining a CW expressing the Types which are in common to both systems.
assumes that new bundling Types will be increasingly more efficient or The most significant Type will be used, by default, but note that this
in some way more beneficial. assumes that new bundling Types will be increasingly more efficient or
in some way more beneficial.
Because this may not always be the case, there should be a method provided,
as illustrated above, to override the automatic upgrade should this become Because this may not always be the case, there should be a method provided,
the case. as illustrated above, to override the automatic upgrade should this become
the case.
The MSB of the CW is used to indicate whether the mail processor can accept
UseNet RFC-822 bundles or not. It is a separate indicator, and not intended The MSB of the CW is used to indicate whether the mail processor can accept
to be used as a part of the above comparison, however can be used to also UseNet RFC-822 bundles or not. It is a separate indicator, and not intended
advertise RFC-822 capability to other systems. Since RFC-822 is 'set in to be used as a part of the above comparison, however can be used to also
stone', there is no need to assign more than one capability bit. advertise RFC-822 capability to other systems. Since RFC-822 is 'set in
stone', there is no need to assign more than one capability bit.
It might seem somewhat limiting to only consider the possibility of 15
different future bundling methods, but it is my opinion that the careful It might seem somewhat limiting to only consider the possibility of 15
use of a 'Sub-Type' byte in the packet header can allow for the variations different future bundling methods, but it is my opinion that the careful
on a single theme, and that proposals for new formats should be evaluated use of a 'Sub-Type' byte in the packet header can allow for the variations
by the FTSC to determine whether sufficient benefit can be realized in on a single theme, and that proposals for new formats should be evaluated
the implementation of the given format, prior to assigning a new type by the FTSC to determine whether sufficient benefit can be realized in
code. the implementation of the given format, prior to assigning a new type
code.
Mailers
------- Mailers
It is quite clear to me that should this concept take hold, that the -------
logical place to store node capability data is in the local nodelist It is quite clear to me that should this concept take hold, that the
database, or an index-associated data file. As above, it is necessary logical place to store node capability data is in the local nodelist
to generate Type-2 packets for whatever purpose, unless it is known database, or an index-associated data file. As above, it is necessary
by prior association, that the far mailer can accept other types of to generate Type-2 packets for whatever purpose, unless it is known
packets. It is also quite reasonable to assume that a nodelist flag by prior association, that the far mailer can accept other types of
could be assigned to advertise the CW for a given node, which the packets. It is also quite reasonable to assume that a nodelist flag
native mailer nodelist compiler could then immediately determine the could be assigned to advertise the CW for a given node, which the
preferred bundling method for any given node in FidoNet. native mailer nodelist compiler could then immediately determine the
preferred bundling method for any given node in FidoNet.
Another possibility would be to pass a capability advertisement in the
extensible portion of a handshake protocol, which may or may not already Another possibility would be to pass a capability advertisement in the
exist in FidoNet. extensible portion of a handshake protocol, which may or may not already
exist in FidoNet.
The approach suggested previously in this document suggests the use of
a text configuration file, but it is quite obvious that many benefits The approach suggested previously in this document suggests the use of
can be realized through the use of the nodelist, including the use of a text configuration file, but it is quite obvious that many benefits
additional flags to indicate the preferred compression method, etc. can be realized through the use of the nodelist, including the use of
additional flags to indicate the preferred compression method, etc.
Summary
------- Summary
This document has been created in an attempt to define a method to allow -------
the future expansion and enhancement of FidoNet technology mail processors This document has been created in an attempt to define a method to allow
and mailers, and in a way that is the least disruptive to existing mail the future expansion and enhancement of FidoNet technology mail processors
operations. The intent is to provide for an environment that is as open, and mailers, and in a way that is the least disruptive to existing mail
and extensible as possible. operations. The intent is to provide for an environment that is as open,
and extensible as possible.
The mechanism described should allow many different types of processors
(FTSC-registered) to exist in the network at once, and to provide an The mechanism described should allow many different types of processors
environment which is designed to operate at it's maximum efficiency (FTSC-registered) to exist in the network at once, and to provide an
wherever possible or practical. environment which is designed to operate at it's maximum efficiency
wherever possible or practical.
Revision 2 of this document was produced to implement suggestions made
primarily by Jan Vroonhof, who suggested the use of the CW Validation Revision 2 of this document was produced to implement suggestions made
Copy. Jan presented this idea in his FSC-0048, along with other concepts primarily by Jan Vroonhof, who suggested the use of the CW Validation
relating to the correct indentification and handling of zone and point Copy. Jan presented this idea in his FSC-0048, along with other concepts
addressing. This document sanctions the improvements to the CW as relating to the correct indentification and handling of zone and point
recommended, but does not address or support the other extensions addressing. This document sanctions the improvements to the CW as
recommended in FSC-0048. recommended, but does not address or support the other extensions
recommended in FSC-0048.
Thanks
------ Thanks
To Ward Christensen, creator of XModem and BYE. ------
To Ward Christensen, creator of XModem and BYE.
Tom Jennings, who started this whole mess.
Tom Jennings, who started this whole mess.
Joaquim Homrighausen, for lots of good ideas, and motivation. Here's
another Lamborghini to work on. Joaquim Homrighausen, for lots of good ideas, and motivation. Here's
another Lamborghini to work on.
Wynn Wagner, Oliver McDonald, Roeland Meyer, Andrew Farmer, Claude
Warren, Jan Vroonhof, Bob Hartman, and Vince Perriello, who all Wynn Wagner, Oliver McDonald, Roeland Meyer, Andrew Farmer, Claude
contributed in some way to the creation of this document, mostly Warren, Jan Vroonhof, Bob Hartman, and Vince Perriello, who all
through their messages in NET_DEV. contributed in some way to the creation of this document, mostly
through their messages in NET_DEV.
Type-2 Packet Format (proposed, but currently in use)
----------------------------------------------------- Type-2 Packet Format (proposed, but currently in use)
Field Ofs Siz Type Description Expected value(s) -----------------------------------------------------
------- --- --- ---- -------------------------- ----------------- Field Ofs Siz Type Description Expected value(s)
OrgNode 0x0 2 Word Origination node address 0-65535 ------- --- --- ---- -------------------------- -----------------
DstNode 2 2 Word Destination node address 1-65535 OrgNode 0x0 2 Word Origination node address 0-65535
Year 4 2 Int Year packet generated 19??-2??? DstNode 2 2 Word Destination node address 1-65535
Month 6 2 Int Month " " 0-11 (0=Jan) Year 4 2 Int Year packet generated 19??-2???
Day 8 2 Int Day " " 1-31 Month 6 2 Int Month " " 0-11 (0=Jan)
Hour A 2 Int Hour " " 0-23 Day 8 2 Int Day " " 1-31
Min C 2 Int Minute " " 0-59 Hour A 2 Int Hour " " 0-23
Sec E 2 Int Second " " 0-59 Min C 2 Int Minute " " 0-59
Baud 10 2 Int Baud Rate (not in use) ???? Sec E 2 Int Second " " 0-59
PktVer 12 2 Int Packet Version Always 2 Baud 10 2 Int Baud Rate (not in use) ????
OrgNet 14 2 Word Origination net address 1-65535 PktVer 12 2 Int Packet Version Always 2
DstNet 16 2 Word Destination net address 1-65535 OrgNet 14 2 Word Origination net address 1-65535
PrdCodL 18 1 Byte FTSC Product Code (lo) 1-255 DstNet 16 2 Word Destination net address 1-65535
* PVMajor 19 1 Byte FTSC Product Rev (major) 1-255 PrdCodL 18 1 Byte FTSC Product Code (lo) 1-255
Password 1A 8 Char Packet password A-Z,0-9 * PVMajor 19 1 Byte FTSC Product Rev (major) 1-255
* QOrgZone 22 2 Int Orig Zone (ZMailQ,QMail) 1-65535 Password 1A 8 Char Packet password A-Z,0-9
* QDstZone 24 2 Int Dest Zone (ZMailQ,QMail) 1-65535 * QOrgZone 22 2 Int Orig Zone (ZMailQ,QMail) 1-65535
Filler 26 2 Byte Spare Change ? * QDstZone 24 2 Int Dest Zone (ZMailQ,QMail) 1-65535
| * CapValid 28 2 Word CW Byte-Swapped Valid Copy BitField Filler 26 2 Byte Spare Change ?
* PrdCodH 2A 1 Byte FTSC Product Code (hi) 1-255 | * CapValid 28 2 Word CW Byte-Swapped Valid Copy BitField
* PVMinor 2B 1 Byte FTSC Product Rev (minor) 1-255 * PrdCodH 2A 1 Byte FTSC Product Code (hi) 1-255
* CapWord 2C 2 Word Capability Word BitField * PVMinor 2B 1 Byte FTSC Product Rev (minor) 1-255
* OrigZone 2E 2 Int Origination Zone 1-65535 * CapWord 2C 2 Word Capability Word BitField
* DestZone 30 2 Int Destination Zone 1-65535 * OrigZone 2E 2 Int Origination Zone 1-65535
* OrigPoint 32 2 Int Origination Point 1-65535 * DestZone 30 2 Int Destination Zone 1-65535
* DestPoint 34 2 Int Destination Point 1-65535 * OrigPoint 32 2 Int Origination Point 1-65535
* ProdData 36 4 Long Product-specific data Whatever * DestPoint 34 2 Int Destination Point 1-65535
PktTerm 3A 2 Word Packet terminator 0000 * ProdData 36 4 Long Product-specific data Whatever
PktTerm 3A 2 Word Packet terminator 0000
* - extensions to FTS-0001
* - extensions to FTS-0001
Ofs, Siz are in hex, other values are decimal.
Ofs, Siz are in hex, other values are decimal.
Zone/Point Aware Mail Processors (probably a partial list)
---------------------------------------------------------- Zone/Point Aware Mail Processors (probably a partial list)
Prod ----------------------------------------------------------
Code Name - Uses QOrg/QDstZone Orig/DestZone Orig/DestPoint Prod
---- ----------- ------------- ------------- -------------- Code Name - Uses QOrg/QDstZone Orig/DestZone Orig/DestPoint
0x0C FrontDoor Reads/Updates Yes Yes ---- ----------- ------------- ------------- --------------
0x1A DBridge ????? Yes Yes 0x0C FrontDoor Reads/Updates Yes Yes
0x45 XRS Reads/Updates Yes Yes 0x1A DBridge ????? Yes Yes
0x29 QMail Yes ????? Not point-aware 0x45 XRS Reads/Updates Yes Yes
0x35 ZMailQ Yes ????? Not point-aware 0x29 QMail Yes ????? Not point-aware
0x3F TosScan Reads/Updates Yes Yes 0x35 ZMailQ Yes ????? Not point-aware
0x3F TosScan Reads/Updates Yes Yes
</PRE>
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,227 +1,228 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>A Product Identiefier for FidoNet Message Handlers.</TITLE> <HEAD>
</HEAD> <TITLE>A Product Identiefier for FidoNet Message Handlers.</TITLE>
<!-- Background white, links blue (unvisited), navy (visited), red (active) --> </HEAD>
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
Document: FSC-0046 <PRE>
Version: 005 Document: FSC-0046
Date: 30-Aug-94 Version: 005
Date: 30-Aug-94
A Product Idenfifier for FidoNet Message Handlers
A Product Idenfifier for FidoNet Message Handlers
Joaquim Homrighausen
2:270/17@fidonet or joho@abs.lu Joaquim Homrighausen
2:270/17@fidonet or joho@abs.lu
August 30, 1994
August 30, 1994
Copyright 1994 Joaquim Homrighausen; All rights reserved.
Copyright 1994 Joaquim Homrighausen; All rights reserved.
Status of this document:
Status of this document:
This FSC suggests a proposed protocol for the FidoNet(r) community,
and requests discussion and suggestions for improvements. This FSC suggests a proposed protocol for the FidoNet(r) community,
Distribution of this document is unlimited. and requests discussion and suggestions for improvements.
Distribution of this document is unlimited.
Fido and FidoNet are registered marks of Tom Jennings and Fido
Software. Fido and FidoNet are registered marks of Tom Jennings and Fido
Software.
Purpose
Purpose
This document should serve as a guide for the product identfier, PID
hereafter, format for FidoNet message handlers. The purpose behind PIDs This document should serve as a guide for the product identfier, PID
is related to my attempt to remove the requirement of Origin lines in hereafter, format for FidoNet message handlers. The purpose behind PIDs
conference mail messages. is related to my attempt to remove the requirement of Origin lines in
conference mail messages.
While I fully understand that this won't happen in all conferences, I
would like to provide the facility to those who can use it (i.e. for While I fully understand that this won't happen in all conferences, I
conferences where all the participants are using software that supports would like to provide the facility to those who can use it (i.e. for
messages without origin lines). conferences where all the participants are using software that supports
messages without origin lines).
Another use for PIDs is to minimize the excessive amount of information
some programs put on the tear lines which increases overall Another use for PIDs is to minimize the excessive amount of information
transportation cost and time of conference mail. some programs put on the tear lines which increases overall
transportation cost and time of conference mail.
PID
PID
A PID replaces the program identifier often seen on the tear line of
conference mail messages and is hidden behind a ^A (ASCII SOH, 01h). A PID replaces the program identifier often seen on the tear line of
This also allows for better tracking of software causing problems in conference mail messages and is hidden behind a ^A (ASCII SOH, 01h).
conferences. This also allows for better tracking of software causing problems in
conferences.
: Only one PID per message is allowed and should only be added by the
: program that creates the message. I.e. programs passing the message on : Only one PID per message is allowed and should only be added by the
: to someone else may not add additional PIDs. If a PID is added, no : program that creates the message. I.e. programs passing the message on
: program information may be present after the tear line. : to someone else may not add additional PIDs. If a PID is added, no
: program information may be present after the tear line.
A PID also offers the ability to add serial numbers to identify a
specific copy of a program as being the source of a message with little A PID also offers the ability to add serial numbers to identify a
or no effort. specific copy of a program as being the source of a message with little
or no effort.
Format
Format
^APID: <pID> <version>[ <serial#>]<CR>
^APID: <pID> <version>[ <serial#>]<CR>
Sample
Sample
^APID: FM 2.11.b<CR>
^APID: FM 2.11.b<CR>
Would identify FrontDoor's editor, beta version 2.11 and replace:
Would identify FrontDoor's editor, beta version 2.11 and replace:
--- FM 2.11 (beta)
--- FM 2.11 (beta)
Fields
Fields
pID The ID of the product responsible for creating the message.
This should be kept as short as possible. The maximum pID The ID of the product responsible for creating the message.
length for this field is 10 characters. This should be kept as short as possible. The maximum
length for this field is 10 characters.
version The version of the product including any alpha, beta, or
gamma status. Only the relevant part of the version should version The version of the product including any alpha, beta, or
be included. I.e. 1.00 should be expressed as 1, 1.10 as gamma status. Only the relevant part of the version should
1.1 and 1.01 as 1.01. Alpha, beta, or gamma status should be included. I.e. 1.00 should be expressed as 1, 1.10 as
be expressed by appending a / or . followed by a, b, or g 1.1 and 1.01 as 1.01. Alpha, beta, or gamma status should
and optionally a revision indicator, such as a1, b2, etc. be expressed by appending a / or . followed by a, b, or g
The maximum length for this field is 10 characters. and optionally a revision indicator, such as a1, b2, etc.
The maximum length for this field is 10 characters.
serial# The serial number of the product, omitted if irrelevant
or zero. The maximum length for this field is ten (10) serial# The serial number of the product, omitted if irrelevant
characters. or zero. The maximum length for this field is ten (10)
characters.
TID
TID
TIDs or "Tosser IDs" started to appear shortly after the first
revision of this document was released. They are added by Conference TIDs or "Tosser IDs" started to appear shortly after the first
Mail ("EchoMail") processors when a message is exported from the revision of this document was released. They are added by Conference
local message base and injected into the network distribution scope Mail ("EchoMail") processors when a message is exported from the
for a conference. local message base and injected into the network distribution scope
for a conference.
When a Conference Mail processor adds a TID to a message, it may not
add a PID. An existing TID should, however, be replaced. TIDs follow When a Conference Mail processor adds a TID to a message, it may not
the same format used for PIDs, as explained above. add a PID. An existing TID should, however, be replaced. TIDs follow
the same format used for PIDs, as explained above.
List of products
List of products
The accompanying file, PIDLIST.TXT, is a list of products known to
support the PID proposal. Software authors are encouraged to inform The accompanying file, PIDLIST.TXT, is a list of products known to
the author of this document of changes and additions to this list. support the PID proposal. Software authors are encouraged to inform
the author of this document of changes and additions to this list.
--- end of file "fsc-0046.005" ---
</PRE> --- end of file "fsc-0046.005" ---
<HR> </PRE>
<PRE> <HR>
Document: PIDLIST.TXT (FSC-0046) <PRE>
Date: 30-Aug-94 Document: PIDLIST.TXT (FSC-0046)
Date: 30-Aug-94
A list of used product idenfifiers
A list of used product idenfifiers
Joaquim Homrighausen
2:270/17@fidonet or joho@abs.lu Joaquim Homrighausen
2:270/17@fidonet or joho@abs.lu
Product identifiers
Product identifiers
Product Version ID Author
----------------------------------------------------------------------------- Product Version ID Author
!!MessageBase 1.6+ !!MB Holger Lembke 2:240/500.20 -----------------------------------------------------------------------------
Alert 2.1+ Alert Richard Kail 2:310/25.2 !!MessageBase 1.6+ !!MB Holger Lembke 2:240/500.20
ANet 921213+ ANet Thomas Ekstroem 2:201/411 Alert 2.1+ Alert Richard Kail 2:310/25.2
ArcMail RISC OS 1.04+ AM Philip Blundell 2:440/34.4 ANet 921213+ ANet Thomas Ekstroem 2:201/411
Artmail Mailer System 1.00+ ART Klaus Landefeld 2:247/402 ArcMail RISC OS 1.04+ AM Philip Blundell 2:440/34.4
Auto Message Taker 1.00+ AMT Patrik Torstensson n/a Artmail Mailer System 1.00+ ART Klaus Landefeld 2:247/402
AVALON 3.10+ AVALON Stephan Slabihoud 2:2401/103.6 Auto Message Taker 1.00+ AMT Patrik Torstensson n/a
CrossPoint 2.10+ XP Peter Mandrella 2:243/97.80 AVALON 3.10+ AVALON Stephan Slabihoud 2:2401/103.6
EchoSprint 1.02+ ES Ben Elliston 3:620/262 CrossPoint 2.10+ XP Peter Mandrella 2:243/97.80
Enhanced Mail MAnager .01+ EMMA Johan Zwiekhorst 2:292/118 EchoSprint 1.02+ ES Ben Elliston 3:620/262
Enhanced Message EDitor .02+ EMED Johan Zwiekhorst 2:292/118 Enhanced Mail MAnager .01+ EMMA Johan Zwiekhorst 2:292/118
EZMail .67+ EZMail Torben Paving 2:234/41 Enhanced Message EDitor .02+ EMED Johan Zwiekhorst 2:292/118
F_POINT 1.1+ F_POINT Florian Rupp 2:248/107.2 EZMail .67+ EZMail Torben Paving 2:234/41
FastEcho 1.21a+ FastEcho Tobias Burchhardt 2:245/39 F_POINT 1.1+ F_POINT Florian Rupp 2:248/107.2
FileScan 1.5+ FileScan Matthias Duesterhoeft 2:241/4513 FastEcho 1.21a+ FastEcho Tobias Burchhardt 2:245/39
Freqit (Windows) 1.0+ FIW Marvin Hart 1:106/462 FileScan 1.5+ FileScan Matthias Duesterhoeft 2:241/4513
Freqit (MS-DOS) 1.0+ FID Marvin Hart 1:106/462 Freqit (Windows) 1.0+ FIW Marvin Hart 1:106/462
FrontDoor APX 1.00+ FDAPX Joaquim Homrighausen 2:270/17 Freqit (MS-DOS) 1.0+ FID Marvin Hart 1:106/462
FrontDoor (Editor) 2.00+ FM Joaquim Homrighausen 2:270/17 FrontDoor APX 1.00+ FDAPX Joaquim Homrighausen 2:270/17
FrontDoor (Mailer) 2.00+ FD Joaquim Homrighausen 2:270/17 FrontDoor (Editor) 2.00+ FM Joaquim Homrighausen 2:270/17
FrontEnd FX 1.00+ FEFX Eric Theriault 1:132/220 FrontDoor (Mailer) 2.00+ FD Joaquim Homrighausen 2:270/17
GEcho 1.00+ GE Gerard van der Land 2:2802/110 FrontEnd FX 1.00+ FEFX Eric Theriault 1:132/220
GeeMail 2.00+ GeeMail Lech Szychowski 2:480/4.7 GEcho 1.00+ GE Gerard van der Land 2:2802/110
HbToSca 1.00+ HTS Jani Laatikainen 2:220/150 GeeMail 2.00+ GeeMail Lech Szychowski 2:480/4.7
HyperBBS 2.00+ HyperBBS Jani Laatikainen 2:220/150 HbToSca 1.00+ HTS Jani Laatikainen 2:220/150
JetMail 1.00+ JetMail Daniel Roesen 2:243/93.8 HyperBBS 2.00+ HyperBBS Jani Laatikainen 2:220/150
LazyBBS .5+ LazyBBS Franck Arnaud 2:320/100 JetMail 1.00+ JetMail Daniel Roesen 2:243/93.8
Mail FX 1.00+ MFX Eric Theriault 1:132/220 LazyBBS .5+ LazyBBS Franck Arnaud 2:320/100
MsgTrack 3.20+ MT Andrew Farmer 1:243/1 Mail FX 1.00+ MFX Eric Theriault 1:132/220
NewsFlash 1.01+ NwF Chris Lueders 2:2402/330 MsgTrack 3.20+ MT Andrew Farmer 1:243/1
NodeDiff Processor 3.00+ NDP Serge Vikulov 2:5080/5 NewsFlash 1.01+ NwF Chris Lueders 2:2402/330
Notify 2.1 Notify Frank Schuhardt 2:247/160 NodeDiff Processor 3.00+ NDP Serge Vikulov 2:5080/5
OFFFax 3.03 OFFFax Frank Schuhardt 2:247/160 Notify 2.1 Notify Frank Schuhardt 2:247/160
Pobble 0.15+ Pobble Josh Parsons 3:771/340 OFFFax 3.03 OFFFax Frank Schuhardt 2:247/160
QBBed 2.64+ qbbed Werner Berghofer 2:310/90.100 Pobble 0.15+ Pobble Josh Parsons 3:771/340
RemoteAccess 1.10+ RA Andrew Milner 2:270/18 QBBed 2.64+ qbbed Werner Berghofer 2:310/90.100
RASS 1.00+ RASS Yossi Gottlieb 2:403/139.75 RemoteAccess 1.10+ RA Andrew Milner 2:270/18
SendFile 1.00+ SendFile Mike Shoyher 2:5020/17.3 RASS 1.00+ RASS Yossi Gottlieb 2:403/139.75
Synchronet 1.00+ SYNC Rob Swindell 1:103/705 SendFile 1.00+ SendFile Mike Shoyher 2:5020/17.3
TB-Edit 1.10+ TB-Edit Arjen Lentz 2:283/512 Synchronet 1.00+ SYNC Rob Swindell 1:103/705
TB-Mailer 1.97+ TB-Mailer Arjen Lentz 2:283/512 TB-Edit 1.10+ TB-Edit Arjen Lentz 2:283/512
TB-Point .10+ TB-Point Arjen Lentz 2:283/512 TB-Mailer 1.97+ TB-Mailer Arjen Lentz 2:283/512
TechBBS 1.00 TECHBBS Marcel Tegelaar 2:281/409 TB-Point .10+ TB-Point Arjen Lentz 2:283/512
TechMail 1.00 TECHMAIL Raymond van der Holst 2:281/409.2 TechBBS 1.00 TECHBBS Marcel Tegelaar 2:281/409
TosScan 1.10+ TosScan Joaquim Homrighausen 2:270/17 TechMail 1.00 TECHMAIL Raymond van der Holst 2:281/409.2
TPCS .89b TPCS Krister Hansson-Renaud 2:201/201.7 TosScan 1.10+ TosScan Joaquim Homrighausen 2:270/17
Mikael Kjellstrom 2:201/201.10 TPCS .89b TPCS Krister Hansson-Renaud 2:201/201.7
XRobot 3.00+ XRobot Joaquim Homrighausen 2:270/17 Mikael Kjellstrom 2:201/201.10
Xrs Alternative Packer 1.04+ XAP Jeroen Smulders 2:512/1.8 XRobot 3.00+ XRobot Joaquim Homrighausen 2:270/17
ZeroToss 1.00 ZeroToss Jeff Masud 1:103/115 Xrs Alternative Packer 1.04+ XAP Jeroen Smulders 2:512/1.8
----------------------------------------------------------------------------- ZeroToss 1.00 ZeroToss Jeff Masud 1:103/115
-----------------------------------------------------------------------------
Product identifier registration
Product identifier registration
Simply fill in the required information and send this form to the author of
this document via private netmail. Simply fill in the required information and send this form to the author of
this document via private netmail.
Product: _________________________________________
Product: _________________________________________
Version: __________
Version: __________
PID info: _________________________________________
PID info: _________________________________________
Author: _________________________________________
Author: _________________________________________
Address: ___________________________ (eMail address)
Address: ___________________________ (eMail address)
--- end of file "pidlist.txt" ---
</PRE> --- end of file "pidlist.txt" ---
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,417 +1,418 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>A Proposed Type-2 Packet Extension.</TITLE> <HEAD>
</HEAD> <TITLE>A Proposed Type-2 Packet Extension.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
Document: FSC-0048 <PRE>
Version: 002 Document: FSC-0048
Date: 21-Oct-90 Version: 002
Date: 21-Oct-90
A Proposed Type-2 Packet Extension
Jan Vroonhof A Proposed Type-2 Packet Extension
2:281/1.12@fidonet Jan Vroonhof
Oct 21, 1990 2:281/1.12@fidonet
Oct 21, 1990
Status of this document
======================= Status of this document
=======================
This FSC suggests a proposed protocol for the FidoNet(r)
community, and requests discussion and suggestions for This FSC suggests a proposed protocol for the FidoNet(r)
improvements. Distribution of this document is unlimited. community, and requests discussion and suggestions for
improvements. Distribution of this document is unlimited.
Fido and FidoNet are registered marks of Tom Jennings and Fido
Software. Fido and FidoNet are registered marks of Tom Jennings and Fido
Software.
Purpose
======= Purpose
=======
The final goal of this document is to become a widely used
standardised extension to FTS-0001, like FTS-0006, 0007 and The final goal of this document is to become a widely used
0008 are, and provide an elegant way to switch to a new standardised extension to FTS-0001, like FTS-0006, 0007 and
bundling method without requiring major effort or breaking 0008 are, and provide an elegant way to switch to a new
anything. bundling method without requiring major effort or breaking
anything.
Prologue
======== Prologue
========
The main thing that needs stressing is that the additions
covered by this document are FULLY (I repeat FULLY) BACKWARDS The main thing that needs stressing is that the additions
COMPATIBLE with FTS-0001 (and other existing standards and covered by this document are FULLY (I repeat FULLY) BACKWARDS
practices in FidoNet and WhatEverOtherNets that I know of). COMPATIBLE with FTS-0001 (and other existing standards and
When I say "backwards compatible" I mean that problems it would practices in FidoNet and WhatEverOtherNets that I know of).
create already exist in the current FTS-0001 system (e.g. When I say "backwards compatible" I mean that problems it would
zone conflicts when dealing with a non compliant system). In create already exist in the current FTS-0001 system (e.g.
short it only corrects some flaws in FTS-0001 WITHOUT zone conflicts when dealing with a non compliant system). In
generating new ones. short it only corrects some flaws in FTS-0001 WITHOUT
generating new ones.
In this document I have tried to stay as much as possible on
the paths of existing practices. Therefore I think In this document I have tried to stay as much as possible on
implementation of the additions it proposes will not be too the paths of existing practices. Therefore I think
hard. implementation of the additions it proposes will not be too
hard.
! Prologue to revision 2
! ====================== ! Prologue to revision 2
! ======================
! Revision 2 of this document reserves a bit in the
! CapabilityWord for one bundle type already in use outside of ! Revision 2 of this document reserves a bit in the
! FidoNet, RFC-822. A small change was made to the "receiving" ! CapabilityWord for one bundle type already in use outside of
! flowchart in order to ensure compatibility with FSC-0039.004. ! FidoNet, RFC-822. A small change was made to the "receiving"
! In the process a lot of errors and omissions in the spelling, ! flowchart in order to ensure compatibility with FSC-0039.004.
! credits etc. were corrected. ! In the process a lot of errors and omissions in the spelling,
! credits etc. were corrected.
===============
===============
! All references in the following to FSC-0039 are to Revision 1
! of that document. ! All references in the following to FSC-0039 are to Revision 1
! of that document.
My thoughts on FSC-0039 and FTS-0001 rev 12
=========================================== My thoughts on FSC-0039 and FTS-0001 rev 12
===========================================
First, revision 12 of FTS-0001 introduced the term "(some
impls)" to indicate that some implementations used their own First, revision 12 of FTS-0001 introduced the term "(some
! extensions to FTS-0001 (Note that in later revisions this was impls)" to indicate that some implementations used their own
! changed to "optional"). The problem is that this info cannot be ! extensions to FTS-0001 (Note that in later revisions this was
relied upon, because there is no way to actually validate the ! changed to "optional"). The problem is that this info cannot be
data. One can only check whether the values of these fields are relied upon, because there is no way to actually validate the
in the range of valid values and hope for the best. data. One can only check whether the values of these fields are
in the range of valid values and hope for the best.
Second, FSC-0039 introduced the idea of having a bitfield
(called the Capability Word) indicating whether extension data Second, FSC-0039 introduced the idea of having a bitfield
was valid. Through the Capability Word, it also made it (called the Capability Word) indicating whether extension data
possible to indicate the ability to support other, non type 2, was valid. Through the Capability Word, it also made it
packets, thus allowing for flexible migration towards type 3. possible to indicate the ability to support other, non type 2,
It also documented the addressing extensions used by various packets, thus allowing for flexible migration towards type 3.
programs. It also documented the addressing extensions used by various
programs.
However, FSC-0039 has two flaws:
However, FSC-0039 has two flaws:
1. One cannot be sure the bitfield is zero because other
implementations might use this field for their own purposes. 1. One cannot be sure the bitfield is zero because other
Therefore this document includes a second validation copy implementations might use this field for their own purposes.
for the Capability Word (CW hereafter). This copy allows the Therefore this document includes a second validation copy
FSC-xxxx compliant software to validate the CW by comparing for the Capability Word (CW hereafter). This copy allows the
the two. The chance of some junk portraying itself as a CW FSC-xxxx compliant software to validate the CW by comparing
is significantly reduced by this. the two. The chance of some junk portraying itself as a CW
is significantly reduced by this.
! Please note that the validation copy is byte swapped
! compared to the normal capability word. While this started ! Please note that the validation copy is byte swapped
! out as a typo, I decided to leave it in as it introduces ! compared to the normal capability word. While this started
! some extra safety, without requiring much extra code effort. ! out as a typo, I decided to leave it in as it introduces
! In later revisions of FSC-0039, Mark adopted this idea of a ! some extra safety, without requiring much extra code effort.
! validation copy too and eliminated the problem. ! In later revisions of FSC-0039, Mark adopted this idea of a
! validation copy too and eliminated the problem.
2. Although FSC-0039 provides a way to make packet headers 4D
it is not backwards compatible. It cannot be used in FTS- 2. Although FSC-0039 provides a way to make packet headers 4D
0001 sessions to unknown systems, making FidoNet still not it is not backwards compatible. It cannot be used in FTS-
totally 4D capable. Although it implements fields for zone 0001 sessions to unknown systems, making FidoNet still not
and point number, an FTS-0001 compliant application is not totally 4D capable. Although it implements fields for zone
required to look at these fields. When a point mails using and point number, an FTS-0001 compliant application is not
these fields to implement its 4D address, a system only required to look at these fields. When a point mails using
looking at the net/node info, as is required by FTS-0001, these fields to implement its 4D address, a system only
still sees it as a boss node, causing the obvious problems. looking at the net/node info, as is required by FTS-0001,
still sees it as a boss node, causing the obvious problems.
This document provides a way for transparent point handling,
using a technique already exploited by many mailers This document provides a way for transparent point handling,
internally. It will allow this document to be implemented using a technique already exploited by many mailers
and used by mailers not supporting it. At the same time the internally. It will allow this document to be implemented
danger that a point is seen as the boss node is eliminated. and used by mailers not supporting it. At the same time the
danger that a point is seen as the boss node is eliminated.
It does NOT provide full inter-zone backwards compatibility,
but that is not needed as badly, as problems are not yet too It does NOT provide full inter-zone backwards compatibility,
great. Any measures to ensure backwards compatibility in but that is not needed as badly, as problems are not yet too
this area might harm communication with non-supporting great. Any measures to ensure backwards compatibility in
programs, when the old system could handle the situation. this area might harm communication with non-supporting
programs, when the old system could handle the situation.
Packet Header
============= Packet Header
=============
The "|" character is used to indicate extensions documented in
FTS-0001 revision 12, the ":" character indicates those The "|" character is used to indicate extensions documented in
documented here and in FSC-0039. FTS-0001 revision 12, the ":" character indicates those
documented here and in FSC-0039.
Offset
dec hex Offset
.-----------------------------------------------------. dec hex
0 0 | origNode (low order) | origNode (high order) | .-----------------------------------------------------.
+--------------------------+--------------------------+ 0 0 | origNode (low order) | origNode (high order) |
2 2 | destNode (low order) | destNode (high order) | +--------------------------+--------------------------+
+--------------------------+--------------------------+ 2 2 | destNode (low order) | destNode (high order) |
4 4 | year (low order) | year (high order) | +--------------------------+--------------------------+
+--------------------------+--------------------------+ 4 4 | year (low order) | year (high order) |
6 6 | month (low order) | month (high order) | +--------------------------+--------------------------+
+--------------------------+--------------------------+ 6 6 | month (low order) | month (high order) |
8 8 | day (low order) | day (high order) | +--------------------------+--------------------------+
+--------------------------+--------------------------+ 8 8 | day (low order) | day (high order) |
10 A | hour (low order) | hour (high order) | +--------------------------+--------------------------+
+--------------------------+--------------------------+ 10 A | hour (low order) | hour (high order) |
12 C | minute (low order) | minute (high order) | +--------------------------+--------------------------+
+--------------------------+--------------------------+ 12 C | minute (low order) | minute (high order) |
14 E | second (low order) | second (high order) | +--------------------------+--------------------------+
+--------------------------+--------------------------+ 14 E | second (low order) | second (high order) |
16 10 | baud (low order) | baud (high order) | +--------------------------+--------------------------+
+--------------------------+--------------------------+ 16 10 | baud (low order) | baud (high order) |
18 12 | 0 | 2 | 0 | 0 | +--------------------------+--------------------------+
+--------------------------+--------------------------+ 18 12 | 0 | 2 | 0 | 0 |
20 14 | origNet (low order) | origNet (high order) | +--------------------------+--------------------------+
: | Set to -1 if from point | 20 14 | origNet (low order) | origNet (high order) |
+--------------------------+--------------------------+ : | Set to -1 if from point |
22 16 | destNet (low order) | destNet (high order) | +--------------------------+--------------------------+
+--------------------------+--------------------------+ 22 16 | destNet (low order) | destNet (high order) |
| 24 18 | ProductCode (low order) | Revision (major) | +--------------------------+--------------------------+
| +--------------------------+--------------------------+ | 24 18 | ProductCode (low order) | Revision (major) |
| 26 1A | password | | +--------------------------+--------------------------+
| | 8 bytes, null padded | | 26 1A | password |
| +--------------------------+--------------------------+ | | 8 bytes, null padded |
|: 34 22 | origZone (low order) | origZone (high order) | } | +--------------------------+--------------------------+
| +--------------------------+--------------------------+ } As in |: 34 22 | origZone (low order) | origZone (high order) | }
|: 36 24 | destZone (low order) | destZone (high order) | } QMail | +--------------------------+--------------------------+ } As in
: +--------------------------+--------------------------+ |: 36 24 | destZone (low order) | destZone (high order) | } QMail
: 38 26 | AuxNet (low order) | AuxNet (high order) | : +--------------------------+--------------------------+
: +--------------------------+--------------------------+ : 38 26 | AuxNet (low order) | AuxNet (high order) |
: 40 28 | CWvalidationCopy (high) | CWvalidationCopy (low) | : +--------------------------+--------------------------+
: +--------------------------+--------------------------+ : 40 28 | CWvalidationCopy (high) | CWvalidationCopy (low) |
: 42 2A | ProductCode (high order) | Revision (minor) | : +--------------------------+--------------------------+
: +--------------------------+--------------------------+ : 42 2A | ProductCode (high order) | Revision (minor) |
: 44 2C | CapabilWord (low order) | CapabilWord (high order) | : +--------------------------+--------------------------+
: +--------------------------+--------------------------+ : 44 2C | CapabilWord (low order) | CapabilWord (high order) |
: 46 2E | origZone (low order) | origZone (high order) | } : +--------------------------+--------------------------+
: +--------------------------+--------------------------+ } As in : 46 2E | origZone (low order) | origZone (high order) | }
: 48 30 | destZone (low order) | destZone (high order) | } FD etc : +--------------------------+--------------------------+ } As in
: +--------------------------+--------------------------+ : 48 30 | destZone (low order) | destZone (high order) | } FD etc
: 50 32 | origPoint (low order) | origPoint (high order) | } : +--------------------------+--------------------------+
: +--------------------------+--------------------------+ } As in : 50 32 | origPoint (low order) | origPoint (high order) | }
: 52 34 | destPoint (low order) | destPoint (high order) | } FD etc : +--------------------------+--------------------------+ } As in
: +--------------------------+--------------------------+ : 52 34 | destPoint (low order) | destPoint (high order) | } FD etc
: 54 46 | Product Specific Data | : +--------------------------+--------------------------+
: + + : 54 46 | Product Specific Data |
: | 4 Bytes | : + +
+--------------------------+--------------------------+ : | 4 Bytes |
58 3A | zero or more | +--------------------------+--------------------------+
~ packed ~ 58 3A | zero or more |
| messages | ~ packed ~
+--------------------------+--------------------------+ | messages |
| 0 | 0 | 0 | 0 | +--------------------------+--------------------------+
'-----------------------------------------------------' | 0 | 0 | 0 | 0 |
'-----------------------------------------------------'
Packet = PacketHeader { PakdMessage } 00H 00H
Packet = PacketHeader { PakdMessage } 00H 00H
PacketHeader = origNode (* of packet, not of messages in packet *)
destNode (* of packet, not of messages in packet *) PacketHeader = origNode (* of packet, not of messages in packet *)
year (* of packet creation, e.g. 1986 *) destNode (* of packet, not of messages in packet *)
month (* of packet creation, 0-11 for Jan-Dec *) year (* of packet creation, e.g. 1986 *)
day (* of packet creation, 1-31 *) month (* of packet creation, 0-11 for Jan-Dec *)
hour (* of packet creation, 0-23 *) day (* of packet creation, 1-31 *)
minute (* of packet creation, 0-59 *) hour (* of packet creation, 0-23 *)
second (* of packet creation, 0-59 *) minute (* of packet creation, 0-59 *)
baud (* max baud rate of orig and dest *) second (* of packet creation, 0-59 *)
PacketType (* old type-1 packets now obsolete *) baud (* max baud rate of orig and dest *)
origNet (* of packet, not of messages in packet PacketType (* old type-1 packets now obsolete *)
set to -1 if orig=point *) origNet (* of packet, not of messages in packet
destNet (* of packet, not of messages in packet *) set to -1 if orig=point *)
+ productCode Lo (* 0 for Fido, write to FTSC for others *) destNet (* of packet, not of messages in packet *)
|+ serialNo Maj (* binary serial number (otherwise null) *) + productCode Lo (* 0 for Fido, write to FTSC for others *)
| password (* session pasword (otherwise null) *) |+ serialNo Maj (* binary serial number (otherwise null) *)
| origZone (* zone of pkt sender (otherwise null) *) | password (* session pasword (otherwise null) *)
| destZone (* zone of pkt receiver (otherwise null) *) | origZone (* zone of pkt sender (otherwise null) *)
| auxNet (* contains Orignet if Origin is a point *) | destZone (* zone of pkt receiver (otherwise null) *)
+! Bytesw. CWvalidationCopy (* Must be equal to CW to be valid *) | auxNet (* contains Orignet if Origin is a point *)
+ ProductCode Hi +! Bytesw. CWvalidationCopy (* Must be equal to CW to be valid *)
+ revision Minor + ProductCode Hi
+ origZone (* zone of pkt sender (otherwise null) *) + revision Minor
+ destZone (* zone of pkt receiver (otherwise null) *) + origZone (* zone of pkt sender (otherwise null) *)
+ ProdData (* Product specific filler *) + destZone (* zone of pkt receiver (otherwise null) *)
+ ProdData (* Product specific filler *)
When the two copies of the CW match they can be asumed to be
valid and used. When the two copies of the CW match they can be asumed to be
valid and used.
Stone-Aged: Old FTS-0001
Type-2+ : Old FTS-0001 plus changes indicated by "|" and ":" Stone-Aged: Old FTS-0001
are valid Type-2+ : Old FTS-0001 plus changes indicated by "|" and ":"
are valid
A Type-N Bundle will always advertise its capabilities in the
CW regardless of the type being sent. As shown in the example A Type-N Bundle will always advertise its capabilities in the
below, the CW allows Type-N processors to automatically track CW regardless of the type being sent. As shown in the example
the capability of your system. Again, in cases where a stone- below, the CW allows Type-N processors to automatically track
age processor is being used, this field will be ignored, and in the capability of your system. Again, in cases where a stone-
the unusual event that it is not ignored, and is somehow age processor is being used, this field will be ignored, and in
harmful to the far system, the Type-N processor can be the unusual event that it is not ignored, and is somehow
configured to send a CW of 0. harmful to the far system, the Type-N processor can be
configured to send a CW of 0.
The format of the Capability Word is designed to support up to
15 future bundle types, and is bit-mapped to facilitate the The format of the Capability Word is designed to support up to
easy determination of the maximum common level supported 15 future bundle types, and is bit-mapped to facilitate the
between two nodes: easy determination of the maximum common level supported
between two nodes:
msb Capability Word lsb
Node Supports ------------FTSC Type Supported **)------------ msb Capability Word lsb
Node Supports ------------FTSC Type Supported **)------------
U 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2+
U 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2+
2+,3, and 7 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 1
2+,3, and 5 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1 2+,3, and 7 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 1
2+ (this Doc) 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 2+,3, and 5 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1
Stone Age 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2+ (this Doc) 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1
Stone Age 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
! ^-- "U" Indicates nodes able to process RFC-822
! bundles. ! ^-- "U" Indicates nodes able to process RFC-822
** - In the example bit definitions only type 2, ! bundles.
and the Stone-Age type, are defined now. ** - In the example bit definitions only type 2,
The rest are to be concidered "reserved by and the Stone-Age type, are defined now.
FTSC". The rest are to be concidered "reserved by
FTSC".
The receiving Type-N bundler would AND the two words, obtaining
a word expressing the Types which are common to both the The receiving Type-N bundler would AND the two words, obtaining
receiving and the sending system. The most significant Type a word expressing the Types which are common to both the
will be used for future sessions, by default. Please note that receiving and the sending system. The most significant Type
this assumes that new bundling Types will be increasingly more will be used for future sessions, by default. Please note that
efficient or in some way more beneficial. Because this may not this assumes that new bundling Types will be increasingly more
always be the case, there should be a method provided to efficient or in some way more beneficial. Because this may not
override the automatic upgrade, as illustrated above, should always be the case, there should be a method provided to
this ever happen. override the automatic upgrade, as illustrated above, should
this ever happen.
! N.B. The one bit left over (Msb) is now used as indicator for
! RFC-822 type bundles. For info on RFC-822 please check out ! N.B. The one bit left over (Msb) is now used as indicator for
! the relevant documents themselves. ! RFC-822 type bundles. For info on RFC-822 please check out
! the relevant documents themselves.
! For a more explanatory text on using the CW to its full
! potential, refer to the FSC-0039 text by Mark Howard. ! For a more explanatory text on using the CW to its full
! Mark also gives some more rationale for the origional idea ! potential, refer to the FSC-0039 text by Mark Howard.
! of the CW. ! Mark also gives some more rationale for the origional idea
! of the CW.
Generating Type-2+ bundles
========================== Generating Type-2+ bundles
==========================
Do we have a CW Does CW indicate
stored for dest? YES ----> higher packets YES ---> Generate higher Do we have a CW Does CW indicate
NO we support? packet stored for dest? YES ----&gt; higher packets YES ---&gt; Generate higher
| NO NO we support? packet
\|/ | | NO
+-----<----------------------+ \|/ |
| +-----&lt;----------------------+
Fill header with all info |
| Fill header with all info
\|/ |
| \|/
Are we sending from a point? (origPoint != 0) YES --+ |
| | Are we sending from a point? (origPoint != 0) YES --+
NO | | |
| \|/ NO |
| set AuxNet = OrigNet | \|/
\|/ set OrigNet = -1 | set AuxNet = OrigNet
| | \|/ set OrigNet = -1
+-----<----------------------------------------+ | |
| +-----&lt;----------------------------------------+
Add Messages |
| Add Messages
Terminate packet |
| Terminate packet
Send packet |
Send packet
Receiving Type-2+ bundles
========================= Receiving Type-2+ bundles
=========================
Receive Packet
| Receive Packet
Packettype = 2 NO -------------> Process Type-Other |
YES Packettype = 2 NO -------------&gt; Process Type-Other
| YES
| |
CWcopies match NO --------+------> Treat as normal Stone-Age packet |
YES | | CWcopies match NO --------+------&gt; Treat as normal Stone-Age packet
| | | YES | |
Store CW /|\ | | | |
| | /|\ Store CW /|\ |
CW is 0 YES --------------+ | | | /|\
NO | CW is 0 YES --------------+ |
| | NO |
| | | |
CW indicates support for 2+ NO --+ | |
YES CW indicates support for 2+ NO --+
| YES
| |
! OrigPoint is not 0 and OrigNet = -1 YES -------+ |
NO | ! OrigPoint is not 0 and OrigNet = -1 YES -------+
| \|/ NO |
! \|/ Set OrigNet is AuxNet | \|/
| | ! \|/ Set OrigNet is AuxNet
+------<-----------------------------------+ | |
| +------&lt;-----------------------------------+
Process using added info |
Process using added info
Credits
======= Credits
=======
To Mark Howard, for introducing the idea of a CW in his FSC-
0039 document and quite rightly pointing out one big omision To Mark Howard, for introducing the idea of a CW in his FSC-
in revision 1 of this document. 0039 document and quite rightly pointing out one big omision
in revision 1 of this document.
To Rick Moore, for doing a good job in processing all these
revisions by Mark and myself, and for his work for the FTSC in To Rick Moore, for doing a good job in processing all these
general. revisions by Mark and myself, and for his work for the FTSC in
general.
To Joaquim Homrighausen, for his contributions to FidoNet
software in general, and especially for his time devoted to To Joaquim Homrighausen, for his contributions to FidoNet
reading, discussing and implementing the ideas Mark and I software in general, and especially for his time devoted to
introduced. reading, discussing and implementing the ideas Mark and I
introduced.
To Andre van de Wijdeven, for producing and letting me beta
test his TS-MM software, which in my opinion is the best point To Andre van de Wijdeven, for producing and letting me beta
software around. (I'm not saying available, because it isn't test his TS-MM software, which in my opinion is the best point
:-() software around. (I'm not saying available, because it isn't
:-()
To john lots, for shipping this stuff to the US.
To john lots, for shipping this stuff to the US.
To Jon Webb, for doing a much needed grammar and spelling
check. To Jon Webb, for doing a much needed grammar and spelling
check.
To Bob Hartman, Vince Periello, Tom Jennings, Eelco de Graaff,
aXel Horst, Arjen van Loon, jim nutt, Odinn Sorensen, David To Bob Hartman, Vince Periello, Tom Jennings, Eelco de Graaff,
Nugent, Peter Janssens and many others, for making FidoNet aXel Horst, Arjen van Loon, jim nutt, Odinn Sorensen, David
what it is now, for me and for everybody. Nugent, Peter Janssens and many others, for making FidoNet
what it is now, for me and for everybody.
Epilog
====== Epilog
======
So this it, now it's up to you to decide whether or not to
implement it. A small change was made in the receivers So this it, now it's up to you to decide whether or not to
flowchart and a small incompatibility with the later revisions implement it. A small change was made in the receivers
of FSC-0039 was removed. That will ensure that FSC-0048 and flowchart and a small incompatibility with the later revisions
FSC-0039 mailers can happily talk to each other.... of FSC-0039 was removed. That will ensure that FSC-0048 and
FSC-0039 mailers can happily talk to each other....
The best way to implement this would be to always support FSC-
0048 on inbound trafic and generate FSC-0048 on outbound by The best way to implement this would be to always support FSC-
default. A switch on a per-node basis will force your software 0048 on inbound trafic and generate FSC-0048 on outbound by
to be FSC-0039 or even FSC-0001 only, and you will cover all default. A switch on a per-node basis will force your software
bases. to be FSC-0039 or even FSC-0001 only, and you will cover all
bases.
This can be done easily, as FSC-0048 is a superset of FSC-0039
(The -1 thing on points being the difference) which in turn is This can be done easily, as FSC-0048 is a superset of FSC-0039
a superset of FTS-0001 (CW). I'd be glad to get some feedback. (The -1 thing on points being the difference) which in turn is
You can put it in NET_DEV or netmail me. a superset of FTS-0001 (CW). I'd be glad to get some feedback.
You can put it in NET_DEV or netmail me.
Jan Vroonhof (2:281/1.12@fidonet)
Jan Vroonhof (2:281/1.12@fidonet)
</PRE>
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,103 +1,104 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>A Proposal for Passing Domain Information During an FST-0006 Session.</TITLE> <HEAD>
</HEAD> <TITLE>A Proposal for Passing Domain Information During an FST-0006 Session.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
Document: FSC-0049 <PRE>
Version: 001 Document: FSC-0049
Date: 03-Jul-90 Version: 001
Date: 03-Jul-90
A Proposal for
Passing Domain Information A Proposal for
During an FTS-0006 Session Passing Domain Information
During an FTS-0006 Session
by
Bob Hartman by
1:104/501@fidonet.org Bob Hartman
July 3, 1990 1:104/501@fidonet.org
July 3, 1990
Status of this document:
Status of this document:
This FSC suggests a proposed protocol for the FidoNet(r) community,
and requests discussion and suggestions for improvements. This FSC suggests a proposed protocol for the FidoNet(r) community,
Distribution of this document is unlimited. and requests discussion and suggestions for improvements.
Distribution of this document is unlimited.
Fido and FidoNet are registered marks of Tom Jennings and Fido
Software. Fido and FidoNet are registered marks of Tom Jennings and Fido
Software.
FSC-0045 proposes a method for sending five dimensional FidoNet addresses
(ie, zone:net/node.point@domain) via the type 2 packet header. This FSC-0045 proposes a method for sending five dimensional FidoNet addresses
document describes a proposed method for sending the same five dimensional (ie, zone:net/node.point@domain) via the type 2 packet header. This
address in the Hello packet of an FTS-0006 session, with the additional document describes a proposed method for sending the same five dimensional
advantage of being able to utilize the full Internet recognized domain name address in the Hello packet of an FTS-0006 session, with the additional
for various Fidonet technology networks. This proposal, combined with advantage of being able to utilize the full Internet recognized domain name
FSC-0045 will help to solve one of FidoNet's most pressing problems: How to for various Fidonet technology networks. This proposal, combined with
recognize alternative networks without the need of some centralized FSC-0045 will help to solve one of FidoNet's most pressing problems: How to
management looking at all of them and what they are doing with Zone numbers, recognize alternative networks without the need of some centralized
etc. Like FSC-0045, this proposal remains backwards compatible with what it management looking at all of them and what they are doing with Zone numbers,
is replacing. etc. Like FSC-0045, this proposal remains backwards compatible with what it
is replacing.
Currently FTS-0006 has provisions for zone, net, node, and point information
to be passed in the Hello packet. To extend this to allow the domain name Currently FTS-0006 has provisions for zone, net, node, and point information
to be passed, an extra capability bit is used. This bit corresponds to the to be passed in the Hello packet. To extend this to allow the domain name
0x4000 bit, and will be called the DO_DOMAIN bit. If this bit is set, it to be passed, an extra capability bit is used. This bit corresponds to the
means that the sender is domain aware, and has enclosed his domain in the 0x4000 bit, and will be called the DO_DOMAIN bit. If this bit is set, it
Hello packet. The domain is stored in the system name field, after the null means that the sender is domain aware, and has enclosed his domain in the
that terminates the real system name. The system name field is a maximum of Hello packet. The domain is stored in the system name field, after the null
60 characters, so the sender must make the real system name, a null, the that terminates the real system name. The system name field is a maximum of
domain name, and another null byte fit within the 60 bytes. The domain will 60 characters, so the sender must make the real system name, a null, the
start at the byte immediately after the first null byte. The domain is domain name, and another null byte fit within the 60 bytes. The domain will
arbitrary length and should correspond to the Internet assigned domain name. start at the byte immediately after the first null byte. The domain is
This is NOT the same as the FSC-0045 domain, and therefore there needs to be arbitrary length and should correspond to the Internet assigned domain name.
a mapping between real Internet domains, and the FSC-0045 style domain name, This is NOT the same as the FSC-0045 domain, and therefore there needs to be
if FSC-0045 is accepted by the FTSC as a standard for use by all mailers. a mapping between real Internet domains, and the FSC-0045 style domain name,
This mapping is normally straightforward (for example, Internet fidonet.org if FSC-0045 is accepted by the FTSC as a standard for use by all mailers.
would correspond to FSC-0045 domain FidoNet). Since most alternative nets This mapping is normally straightforward (for example, Internet fidonet.org
do not have a registered Internet domain, the naming convention should be would correspond to FSC-0045 domain FidoNet). Since most alternative nets
"known by" domain (ie, FSC-0045 domain name) followed by .ftn (for FidoNet do not have a registered Internet domain, the naming convention should be
Technology Network). So, the FSC-0045 domain "Alternet" would be converted "known by" domain (ie, FSC-0045 domain name) followed by .ftn (for FidoNet
to alternet.ftn under this proposal. This allows domains which are not Technology Network). So, the FSC-0045 domain "Alternet" would be converted
normally FidoNet aware to use FTS-0006 to talk to FidoNet technology mail to alternet.ftn under this proposal. This allows domains which are not
programs. For example, a mailer located at Camex in Manchester, NH might normally FidoNet aware to use FTS-0006 to talk to FidoNet technology mail
send it's mail as 'man.camex.com' during an FTS-0006 session. When parsing programs. For example, a mailer located at Camex in Manchester, NH might
the domain name, the parsing should try to match the domain from right to send it's mail as 'man.camex.com' during an FTS-0006 session. When parsing
left (Internet naming is hierarchical from right to left), so that if a the domain name, the parsing should try to match the domain from right to
mailer knew about man.camex.com, that could also match something of the form left (Internet naming is hierarchical from right to left), so that if a
super.machine.silly.name.man.camex.com. The domain name should be case mailer knew about man.camex.com, that could also match something of the form
INSENSITIVE, and the FSC-0045 abbreviation of it should be unique within the super.machine.silly.name.man.camex.com. The domain name should be case
first 8 characters, and also should not include any periods ('.') or at-signs INSENSITIVE, and the FSC-0045 abbreviation of it should be unique within the
('@') since those characters are significant in the Internet domain naming first 8 characters, and also should not include any periods ('.') or at-signs
scheme. ('@') since those characters are significant in the Internet domain naming
scheme.
In order for this proposal to be adopted, the FTSC would have to assign the
DO_DOMAIN bit, and have it documented in FTS-0006. This method is fully In order for this proposal to be adopted, the FTSC would have to assign the
backwards compatible, since a domain aware mailer could send the domain DO_DOMAIN bit, and have it documented in FTS-0006. This method is fully
information, and if the other end was not domain aware, it would ignore it. backwards compatible, since a domain aware mailer could send the domain
If the other end was domain aware, it would be able to extract the domain information, and if the other end was not domain aware, it would ignore it.
information easily and would then have a full five dimensional address If the other end was domain aware, it would be able to extract the domain
available for the sender. This proposal remains fully backward compatible information easily and would then have a full five dimensional address
with the current uses of all FTS-0006 fields, and should not affect operation available for the sender. This proposal remains fully backward compatible
of any mailer that has used reserved bytes in the Hello packet. with the current uses of all FTS-0006 fields, and should not affect operation
</PRE> of any mailer that has used reserved bytes in the Hello packet.
</PRE>
<A HREF="./"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="./"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,98 +1,99 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>A Character Set Identifier For FidoNet Message Editors.</TITLE> <HEAD>
</HEAD> <TITLE>A Character Set Identifier For FidoNet Message Editors.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
Document: FSC-0050 <PRE>
Version: 001 Document: FSC-0050
Date: 14-Jul-90 Version: 001
Date: 14-Jul-90
A Character Set Identifier For FidoNet Message Editors
A Character Set Identifier For FidoNet Message Editors
Draft I
Draft I
Thomas Sundblom
2:201/114@fidonet Thomas Sundblom
2:201/114@fidonet
Status of this document:
Status of this document:
This FSC suggests a proposed protocol for the FidoNet(r) community,
and requests discussion and suggestions for improvements. This FSC suggests a proposed protocol for the FidoNet(r) community,
Distribution of this document is unlimited. and requests discussion and suggestions for improvements.
Distribution of this document is unlimited.
Fido and FidoNet are registered marks of Tom Jennings and Fido
Software. Fido and FidoNet are registered marks of Tom Jennings and Fido
Software.
Purpose
Purpose
This document should serve as a guide for the character set
identifier, CHARSET hereafter, format for FidoNet message Editors. This document should serve as a guide for the character set
The purpose behind CHARSET is related to my attempt to make it identifier, CHARSET hereafter, format for FidoNet message Editors.
easier for each reader of a FidoNet message to identify the The purpose behind CHARSET is related to my attempt to make it
characters used in the messages. easier for each reader of a FidoNet message to identify the
characters used in the messages.
Since FidoNet messages aren't restricted to use any special character
sets in the messages, there will be differences between computer Since FidoNet messages aren't restricted to use any special character
kinds and special country dependent characters. To avoid confusion sets in the messages, there will be differences between computer
in such cases, I'm hereby introducing the CHARSET kludge. kinds and special country dependent characters. To avoid confusion
in such cases, I'm hereby introducing the CHARSET kludge.
There is no need that each FidoNet Message reader should be able
to understand every possible character set. If the reader can't There is no need that each FidoNet Message reader should be able
handle the special character set found in a message, then it should to understand every possible character set. If the reader can't
use a default character set (as most readers do today). handle the special character set found in a message, then it should
use a default character set (as most readers do today).
Format
Format
^aCHARSET: <Character set identifier>
^aCHARSET: &lt;Character set identifier&gt;
Sample
Sample
^aCHARSET: ISO-11
^aCHARSET: ISO-11
Would identify that the message is written using the ISO-11
character set, which relates to the character set mainly used Would identify that the message is written using the ISO-11
in Sweden. character set, which relates to the character set mainly used
in Sweden.
Supported character sets
Supported character sets
No special character set is specified, but it is recomended to
use the ISO numbering of the different character sets. Where no No special character set is specified, but it is recomended to
ISO number is available, an easy to understand code should by used. use the ISO numbering of the different character sets. Where no
ISO number is available, an easy to understand code should by used.
Character set identifier examples
Character set identifier examples
ISO-6 Relates to plain ASCII 7 bit character set.
ISO-11 Swedish character set, 7 bit. ISO-6 Relates to plain ASCII 7 bit character set.
ISO-21 Germany character set, 7 bit. ISO-11 Swedish character set, 7 bit.
ISO-69 French character set, 7 bit. ISO-21 Germany character set, 7 bit.
ISO-69 French character set, 7 bit.
Other character set identifiers could be
PC-8 IBM PC complete character set. Other character set identifiers could be
ATARI ATARI ST complete character set PC-8 IBM PC complete character set.
AMIGA AMIGA complete character set ATARI ATARI ST complete character set
</PRE> AMIGA AMIGA complete character set
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,187 +1,188 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Specifications for the ^aFLAGS field.</TITLE> <HEAD>
</HEAD> <TITLE>Specifications for the ^aFLAGS field.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
Document: FSC-0053 <PRE>
Version: 002 Document: FSC-0053
Date: 08-Dec-92 Version: 002
Date: 08-Dec-92
Specifications for the ^aFLAGS field
Specifications for the ^aFLAGS field
Joaquim H. Homrighausen
2:270/17@fidonet or joho@ae.lu Joaquim H. Homrighausen
2:270/17@fidonet or joho@ae.lu
December 8, 1992
December 8, 1992
Status of this document:
Status of this document:
This FSC suggests a proposed protocol for the FidoNet(r) community,
and requests discussion and suggestions for improvements. This FSC suggests a proposed protocol for the FidoNet(r) community,
Distribution of this document is unlimited. and requests discussion and suggestions for improvements.
Distribution of this document is unlimited.
Fido and FidoNet are registered marks of Tom Jennings and Fido
Software. Fido and FidoNet are registered marks of Tom Jennings and Fido
Software.
Purpose
Purpose
To explain and document the existing usage of the ^aFLAGS field used
by many software packages, including FrontDoor, TosScan, and To explain and document the existing usage of the ^aFLAGS field used
D'Bridge. And to inform software authors of its proper usage. by many software packages, including FrontDoor, TosScan, and
D'Bridge. And to inform software authors of its proper usage.
Prologue
Prologue
One of the problems with the FTS-1 (stored) message format is its
limitations in regards to message attributes. Several bits are used One of the problems with the FTS-1 (stored) message format is its
(reserved) by SEAdog, another by several packers and editors - even limitations in regards to message attributes. Several bits are used
though most mailer authors don't support them, they remain. One (reserved) by SEAdog, another by several packers and editors - even
reason would be backward compatibility with older software. though most mailer authors don't support them, they remain. One
reason would be backward compatibility with older software.
Unfortunately, this presents a problem for software authors that
would like to pass extended message attributes for use and handling Unfortunately, this presents a problem for software authors that
by other software. would like to pass extended message attributes for use and handling
by other software.
Some software packages have been using an alternate method called
"FLAGS" which is 7-bit ASCII placed behind <SOH>FLAGS somewhere near Some software packages have been using an alternate method called
the beginning of a message. The various flags will now be described. "FLAGS" which is 7-bit ASCII placed behind <SOH>FLAGS somewhere near
the beginning of a message. The various flags will now be described.
Flags
Flags
The FLAGS string should be placed somewhere near the beginning of
the message text, and is preceeded by a <SOH> (^a) character. There The FLAGS string should be placed somewhere near the beginning of
is no need to support all or any of the below mentioned flags. the message text, and is preceeded by a &lt;SOH&gt; (^a) character. There
is no need to support all or any of the below mentioned flags.
If flags are stripped when a message passes through a system, all
relevant and correct FTS-1 status bits should be updated to indicate If flags are stripped when a message passes through a system, all
the original contents of the FLAGS field. relevant and correct FTS-1 status bits should be updated to indicate
the original contents of the FLAGS field.
Flag Brief Long description
-------------------------------------------------------------------- Flag Brief Long description
PVT Private Indicates that the message may only be read --------------------------------------------------------------------
by its addressee and author. PVT Private Indicates that the message may only be read
by its addressee and author.
HLD Hold Message should be held for pickup by its
destination system. HLD Hold Message should be held for pickup by its
destination system.
CRA Crash High-priority mail.
CRA Crash High-priority mail.
K/S Kill/Sent Remove message after it has been success-
fully sent. K/S Kill/Sent Remove message after it has been success-
fully sent.
SNT Sent Message has been successfully sent (used
for message without Kill/Sent status). SNT Sent Message has been successfully sent (used
for message without Kill/Sent status).
RCV Received Message has been read by its addressee.
RCV Received Message has been read by its addressee.
A/S Archive/Sent Place message in "sent mail" archival
system after it has been successfully sent. A/S Archive/Sent Place message in "sent mail" archival
system after it has been successfully sent.
DIR Direct Message must be sent directly to its
destination and may not be routed. DIR Direct Message must be sent directly to its
destination and may not be routed.
ZON Zonegate Send message through zonegate (if
possible). ZON Zonegate Send message through zonegate (if
possible).
HUB Hub/Host-route Host- or Hub-route message (as
appropriate). HUB Hub/Host-route Host- or Hub-route message (as
appropriate).
FIL File attach Message has one or more files attached to
it. FIL File attach Message has one or more files attached to
it.
FRQ File request Message has one or more file requests in
subject field. FRQ File request Message has one or more file requests in
subject field.
IMM Immediate NOW!-priority mail. Send at first
opportunity, override any transmission IMM Immediate NOW!-priority mail. Send at first
restrictions enforced by events, costs, or opportunity, override any transmission
qualification. restrictions enforced by events, costs, or
qualification.
XMA Xmail Message has alternate form of compressed
mail attached. XMA Xmail Message has alternate form of compressed
mail attached.
KFS Kill file Remove attached file(s) after they have
been successfully sent. Only valid for file KFS Kill file Remove attached file(s) after they have
attach message. been successfully sent. Only valid for file
attach message.
TFS Truncate file Truncate attached file(s) to zero length
after they have been successfully sent. TFS Truncate file Truncate attached file(s) to zero length
Only valid for file attach message. after they have been successfully sent.
Primarily used by Conference Mail Only valid for file attach message.
processors. Primarily used by Conference Mail
processors.
LOK Lock Prevent message from being processed.
This includes sending, deleting, LOK Lock Prevent message from being processed.
purging, and editing. This includes sending, deleting,
purging, and editing.
RRQ Receipt REQ When the mailer/packer at the message's
final destination unpacks the message, it's RRQ Receipt REQ When the mailer/packer at the message's
asked to generate a receipt to the author final destination unpacks the message, it's
of the message that indicates that the asked to generate a receipt to the author
message arrived at its final destination. of the message that indicates that the
message arrived at its final destination.
CFM Confirm REQ When message is read by its addressee, a
Confirmation Receipt should be generated to CFM Confirm REQ When message is read by its addressee, a
the author of the message. Confirmation Receipt should be generated to
the author of the message.
HIR HiRes FAX: Hi-Resolution image.
HIR HiRes FAX: Hi-Resolution image.
COV CoverLetter FAX: Cover sheet.
COV CoverLetter FAX: Cover sheet.
SIG Signature FAX: Signature.
SIG Signature FAX: Signature.
LET LetterHead FAX: LetterHead.
LET LetterHead FAX: LetterHead.
| FAX Fax image The filename specified in the message's
| subject field contains a fax document that | FAX Fax image The filename specified in the message's
| should be viewed using software capable of | subject field contains a fax document that
| doing so. | should be viewed using software capable of
| doing so.
| FPU Force pickup Treated as a message with an IMM flag. This
| instructs the mailer to keep calling the | FPU Force pickup Treated as a message with an IMM flag. This
| destination system, if the connection is | instructs the mailer to keep calling the
| aborted for some reason, until a valid "End | destination system, if the connection is
| of files" signal is received (i.e. no more | aborted for some reason, until a valid "End
| files remain to pick up). | of files" signal is received (i.e. no more
| files remain to pick up).
Notes
Notes
Xmail is related to the ARCmail 0.60 standard as adopted by the FTSC.
The exception is that any type of compression method may be used and Xmail is related to the ARCmail 0.60 standard as adopted by the FTSC.
the naming convention isn't necessarily limited to that of the The exception is that any type of compression method may be used and
ARCmail 0.60 standard. the naming convention isn't necessarily limited to that of the
ARCmail 0.60 standard.
Epilogue
Epilogue
Feedback would be appreciated and can be sent to me at the addresses
specified on the title page. Please send feedback via netmail. Feedback would be appreciated and can be sent to me at the addresses
</PRE> specified on the title page. Please send feedback via netmail.
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -1,363 +1,364 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>A Proposed Nodelist flag indicating Online Times of a Node.</TITLE> <HEAD>
</HEAD> <TITLE>A Proposed Nodelist flag indicating Online Times of a Node.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
| Document: FSC-0062 <PRE>
| Version: 003 | Document: FSC-0062
| Date: April 14, 1996 | Version: 003
| Author: David J. Thomas | Date: April 14, 1996
| Author: David J. Thomas
A Proposed Nodelist flag indicating Online Times of a Node
David J. Thomas A Proposed Nodelist flag indicating Online Times of a Node
2:442/600@fidonet.org David J. Thomas
2:442/600@fidonet.org
Status of this document:
Status of this document:
This FSC suggests a proposed protocol for the FidoNet(r) community,
and requests discussion and suggestions for improvements. This FSC suggests a proposed protocol for the FidoNet(r) community,
Distribution of this document is unlimited. and requests discussion and suggestions for improvements.
Distribution of this document is unlimited.
Fido and FidoNet are registered marks of Tom Jennings and Fido
Software. Fido and FidoNet are registered marks of Tom Jennings and Fido
Software.
Note
---- Note
----
Changes in content between the previous edition of this document, and this
edition, are signified by bars (|) in the left margin, except where Changes in content between the previous edition of this document, and this
otherwise specified. I have changed the format of the document slightly to edition, are signified by bars (|) in the left margin, except where
allow this. Where the format of the document has changed, but the actual otherwise specified. I have changed the format of the document slightly to
text has not, bars are not present. allow this. Where the format of the document has changed, but the actual
text has not, bars are not present.
Purpose
------- Purpose
-------
There are currently several systems within FidoNet that offer file request
or mail holding capabilities but are not continuously online. The only time There are currently several systems within FidoNet that offer file request
during which these nodes can be contacted with reference to the nodelist is or mail holding capabilities but are not continuously online. The only time
currently the Zone Mail Hour of the zone to which the systems belong. In during which these nodes can be contacted with reference to the nodelist is
theory, mailers can only use the zone mail hour(s) specified by the system currently the Zone Mail Hour of the zone to which the systems belong. In
in question to contact these nodes, which does not provide for any method theory, mailers can only use the zone mail hour(s) specified by the system
of file requesting or calling for echomail that does not conflict with the in question to contact these nodes, which does not provide for any method
Policy requirement that no echomail or files be transferred during the zone of file requesting or calling for echomail that does not conflict with the
mail hour. This means that, in practice, if it is known that a particular Policy requirement that no echomail or files be transferred during the zone
node is online for more time than ZMH alone, but less than 24 hours a day, mail hour. This means that, in practice, if it is known that a particular
it is necessary to "kludge," or set this up as a special situation, in most node is online for more time than ZMH alone, but less than 24 hours a day,
mailers whenever a node has to be contacted a number of times, whether it is necessary to "kludge," or set this up as a special situation, in most
regularly or irregularly. The proposed flag would benefit the mailers in mailers whenever a node has to be contacted a number of times, whether
such a way as to provide for them the online times that the node is usually regularly or irregularly. The proposed flag would benefit the mailers in
online for, thus cutting on the costs of calling a non-continuous mail such a way as to provide for them the online times that the node is usually
node, only to find that it is not available; and also, hopefully preventing online for, thus cutting on the costs of calling a non-continuous mail
annoyance for a sysop whose mailer is being called whilst it is not online, node, only to find that it is not available; and also, hopefully preventing
for example in the case of a voice/data shared line. annoyance for a sysop whose mailer is being called whilst it is not online,
for example in the case of a voice/data shared line.
Compatibility
------------- Compatibility
-------------
Since the current nodelist format is always being extended and nodelist
processors look only for the flags that they know about, there are no Since the current nodelist format is always being extended and nodelist
expected compatibility problems with the suggestion outlined below. processors look only for the flags that they know about, there are no
expected compatibility problems with the suggestion outlined below.
Format of additional nodelist flag
---------------------------------- Format of additional nodelist flag
----------------------------------
The proposed nodelist flag has the following form:
The proposed nodelist flag has the following form:
Txy
Txy
where x represents the startup time, and y the end time, in the following
format: where x represents the startup time, and y the end time, in the following
format:
+------+----+ +------+----+ +------+----+ +------+----+ +------+----+
|Letter|Time| |Letter|Time| |Letter|Time| |Letter|Time| |Letter|Time| +------+----+ +------+----+ +------+----+ +------+----+ +------+----+
+------+----+ +------+----+ +------+----+ +------+----+ +------+----+ |Letter|Time| |Letter|Time| |Letter|Time| |Letter|Time| |Letter|Time|
| A |0000| | F |0500| | K |1000| | P |1500| | U |2000| +------+----+ +------+----+ +------+----+ +------+----+ +------+----+
| a |0030| | f |0530| | k |1030| | p |1530| | u |2030| | A |0000| | F |0500| | K |1000| | P |1500| | U |2000|
| B |0100| | G |0600| | L |1100| | Q |1600| | V |2100| | a |0030| | f |0530| | k |1030| | p |1530| | u |2030|
| b |0130| | g |0630| | l |1130| | q |1630| | v |2130| | B |0100| | G |0600| | L |1100| | Q |1600| | V |2100|
| C |0200| | H |0700| | M |1200| | R |1700| | W |2200| | b |0130| | g |0630| | l |1130| | q |1630| | v |2130|
| c |0230| | h |0730| | m |1230| | r |1730| | w |2230| | C |0200| | H |0700| | M |1200| | R |1700| | W |2200|
| D |0300| | I |0800| | N |1300| | S |1800| | X |2300| | c |0230| | h |0730| | m |1230| | r |1730| | w |2230|
| d |0330| | i |0830| | n |1330| | s |1830| | x |2330| | D |0300| | I |0800| | N |1300| | S |1800| | X |2300|
| E |0400| | J |0900| | O |1400| | T |1900| | | | | d |0330| | i |0830| | n |1330| | s |1830| | x |2330|
| e |0430| | j |0930| | o |1430| | t |1930| | | | | E |0400| | J |0900| | O |1400| | T |1900| | | |
+------+----+ +------+----+ +------+----+ +------+----+ +------+----+ | e |0430| | j |0930| | o |1430| | t |1930| | | |
+------+----+ +------+----+ +------+----+ +------+----+ +------+----+
| This flag is not intended to be a user flag. The flag is intended to provide
| information to computerised mailer processes, and is not easily read by | This flag is not intended to be a user flag. The flag is intended to provide
| human beings (although they can of course interpret the meaning of the | information to computerised mailer processes, and is not easily read by
| flag); most mailers however do not attempt to interpret any information that | human beings (although they can of course interpret the meaning of the
| is specified as a user flag, assuming that it is there for the benefit of | flag); most mailers however do not attempt to interpret any information that
| human beings. Such mailers would not be able to make use of the information | is specified as a user flag, assuming that it is there for the benefit of
| provided, which is the purpose of the flag. | human beings. Such mailers would not be able to make use of the information
| provided, which is the purpose of the flag.
| This flag is of course not specified in FTS-0005 at the time of writing, but
| this is not regarded by FidoNet as a problem because other flags in current | This flag is of course not specified in FTS-0005 at the time of writing, but
| use are not specified in FTS-0005. | this is not regarded by FidoNet as a problem because other flags in current
| use are not specified in FTS-0005.
The case of the letter could be relevant. Whereas the case is currently not
used by any flags in the document describing the current format of the The case of the letter could be relevant. Whereas the case is currently not
nodelist, there exists the potential for the case of a letter to have used by any flags in the document describing the current format of the
relevant meaning. The case has to be correct for the CRC check calculation nodelist, there exists the potential for the case of a letter to have
to prove correct, and this would be a good use for the case of the letter. relevant meaning. The case has to be correct for the CRC check calculation
If it is necessary to ignore the case, then the upper on-the-hour time to prove correct, and this would be a good use for the case of the letter.
should be used, i.e. the time that is listed after the upper-case letter. If it is necessary to ignore the case, then the upper on-the-hour time
should be used, i.e. the time that is listed after the upper-case letter.
| These times are expressed in UTC so that the flag is useful for systems all
around the world, without the need for specific time zone information to be | These times are expressed in UTC so that the flag is useful for systems all
included in the nodelist. They do not adjust with daylight saving time for a around the world, without the need for specific time zone information to be
similar reason. Note the section on daylight saving time for information included in the nodelist. They do not adjust with daylight saving time for a
about handling adjustments without changing the flag; this is important. similar reason. Note the section on daylight saving time for information
about handling adjustments without changing the flag; this is important.
Where necessary, the times can wrap around midnight, so for example, for a
| node that is online between the hours of 1800 and 0600 UTC, the flag TSG Where necessary, the times can wrap around midnight, so for example, for a
would be a valid indication of this time. | node that is online between the hours of 1800 and 0600 UTC, the flag TSG
would be a valid indication of this time.
This nodelist entry is not required by any node. It is supplementary to the
#01, #02, #08, #09, #18, #20 flags and their !xx counterparts, though its This nodelist entry is not required by any node. It is supplementary to the
meaning is different. It has been suggested to me about the possibility of #01, #02, #08, #09, #18, #20 flags and their !xx counterparts, though its
an additional flag with the same meaning, but having a W as the first meaning is different. It has been suggested to me about the possibility of
letter, indicating that the node is also available for all hours during an additional flag with the same meaning, but having a W as the first
weekends; however, I believe that the simple inclusion of the single flag letter, indicating that the node is also available for all hours during
indicated above will solve most problems, as it does indicate a period for weekends; however, I believe that the simple inclusion of the single flag
non-CM nodes during which the node is available, which is all that is indicated above will solve most problems, as it does indicate a period for
really required. non-CM nodes during which the node is available, which is all that is
really required.
Daylight saving time
-------------------- Daylight saving time
--------------------
If a node changes online times with respect to UTC when daylight saving
time becomes effective (which would be the case with most part time nodes), If a node changes online times with respect to UTC when daylight saving
then this is to be taken into account when assigning this flag. An online time becomes effective (which would be the case with most part time nodes),
times flag assigned to a node should not be altered for the specific then this is to be taken into account when assigning this flag. An online
purpose of adjusting due to daylight saving time, since large difference times flag assigned to a node should not be altered for the specific
files (NODEDIFF's) would result if every node was allowed to do this, e.g. purpose of adjusting due to daylight saving time, since large difference
my node used to be online from 2300 to 0800 in local time, which in winter files (NODEDIFF's) would result if every node was allowed to do this, e.g.
| is UTC, but in the summer it becomes BST (British Summer Time). This is one my node used to be online from 2300 to 0800 in local time, which in winter
| hour ahead of UTC, and the corresponding availability times of my node | is UTC, but in the summer it becomes BST (British Summer Time). This is one
| during the summer period were 2200 to 0700 UTC. Therefore my online times | hour ahead of UTC, and the corresponding availability times of my node
flag would have indicated availability between the hours of 2300 and 0700 | during the summer period were 2200 to 0700 UTC. Therefore my online times
| UTC, the daily time period encompassing both times, so the flag would be flag would have indicated availability between the hours of 2300 and 0700
TXH. | UTC, the daily time period encompassing both times, so the flag would be
TXH.
Policy considerations
--------------------- Policy considerations
---------------------
This is a technical document. However, since the flag could make for an
increase in the size of difference files, the author feels that the This is a technical document. However, since the flag could make for an
following guidelines should be adopted concerning the use of the flag. increase in the size of difference files, the author feels that the
following guidelines should be adopted concerning the use of the flag.
The online times flag does not replace the requirement for exclusivity of
zone mail hour to be maintained. It is still annoying behaviour to have The online times flag does not replace the requirement for exclusivity of
this flag and be unavailable during ZMH, just as it is annoying behaviour zone mail hour to be maintained. It is still annoying behaviour to have
to have the CM (continuous mail) flag in one's entry, and disregard ZMH. this flag and be unavailable during ZMH, just as it is annoying behaviour
to have the CM (continuous mail) flag in one's entry, and disregard ZMH.
Except for during ZMH, the sysop of a node using this flag finding that
they need to take their mailer offline during the specified times to Except for during ZMH, the sysop of a node using this flag finding that
perform system maintenance, or for any other reason, would not be acting in they need to take their mailer offline during the specified times to
an annoying manner to do so, unless the practice is found to be continuous, perform system maintenance, or for any other reason, would not be acting in
in which case the flag's times could be reduced, or the flag itself could an annoying manner to do so, unless the practice is found to be continuous,
be removed from their node entry. in which case the flag's times could be reduced, or the flag itself could
be removed from their node entry.
It should be noted that this flag is present for the benefit of mailers,
not human beings. This means that the flag should be used only to indicate It should be noted that this flag is present for the benefit of mailers,
when a mailer is ready to receive calls. A system that uses a FidoNet- not human beings. This means that the flag should be used only to indicate
technology mailer in ZMH, and a human-access only system during other when a mailer is ready to receive calls. A system that uses a FidoNet-
period(s) of the day that cannot receive mail, should not use this flag. technology mailer in ZMH, and a human-access only system during other
This flag does not explicitly specify online times of a public access BBS, period(s) of the day that cannot receive mail, should not use this flag.
although for presumably most nodes with FidoNet-capable software, a public This flag does not explicitly specify online times of a public access BBS,
access BBS will be available during the times indicated. although for presumably most nodes with FidoNet-capable software, a public
access BBS will be available during the times indicated.
Where the flag is used, it should not often be changed. If a situation
exists, for example, where a node uses a certain set of times during the Where the flag is used, it should not often be changed. If a situation
first two weeks of a month, and a different set of times during the exists, for example, where a node uses a certain set of times during the
remainder period, the flag should be set to a time during each day of the first two weeks of a month, and a different set of times during the
month when the node is online. For example, if a node is online during remainder period, the flag should be set to a time during each day of the
1800-0800 for the first two weeks, and then during 2200-1000 for the month when the node is online. For example, if a node is online during
remainder, the time flag should specify 2200-0800 only. If there is no such 1800-0800 for the first two weeks, and then during 2200-1000 for the
time (other than ZMH) then no flag should be used. Of course, any permanent remainder, the time flag should specify 2200-0800 only. If there is no such
changes, and any necessary reductions in the times, should be permitted at time (other than ZMH) then no flag should be used. Of course, any permanent
any time, but changes owing only to daylight saving time should certainly changes, and any necessary reductions in the times, should be permitted at
be expressly forbidden. any time, but changes owing only to daylight saving time should certainly
be expressly forbidden.
File requests and user access are of course permitted during the online
times indicated (except ZMH). File requests and user access are of course permitted during the online
times indicated (except ZMH).
The above list may seem rather frightening! Please note that they are
guidelines rather than rules, unless FidoNet policy has included them as The above list may seem rather frightening! Please note that they are
rules. In the vast majority of situations where a node is online for a guidelines rather than rules, unless FidoNet policy has included them as
fixed set of hours per day, the only thing to watch out for is that you get rules. In the vast majority of situations where a node is online for a
the daylight saving time period right. Then you don't have to worry about fixed set of hours per day, the only thing to watch out for is that you get
changing it at any time, except when your own online times change. the daylight saving time period right. Then you don't have to worry about
changing it at any time, except when your own online times change.
Example
------- Example
-------
With regard to time zones now; this is a complicated topic, so I wish to
express an example. Imagine a node in Indiana, USA. It is online for the With regard to time zones now; this is a complicated topic, so I wish to
time period beginning 6 o'clock pm (1800) and ending 8 o'clock am (0800). express an example. Imagine a node in Indiana, USA. It is online for the
This changes with daylight saving time, so the times expressed effectively time period beginning 6 o'clock pm (1800) and ending 8 o'clock am (0800).
| become an hour earlier with respect to UTC during daylight saving time. This changes with daylight saving time, so the times expressed effectively
| become an hour earlier with respect to UTC during daylight saving time.
| Indiana is in the Central time zone, which is 6 hours behind UTC. Therefore,
| the online times in UTC can be expressed as 0000-1400 UTC during winter. | Indiana is in the Central time zone, which is 6 hours behind UTC. Therefore,
| During daylight saving time, however, the local time for Indiana is 5 hours | the online times in UTC can be expressed as 0000-1400 UTC during winter.
| behind UTC. The online times during this period are 0100-1500 UTC. The | During daylight saving time, however, the local time for Indiana is 5 hours
| subset should be used, so that the online times flag for the node should | behind UTC. The online times during this period are 0100-1500 UTC. The
| indicate availability between 0100 and 1400 UTC, which is indicated | subset should be used, so that the online times flag for the node should
| by the flag TBO. | indicate availability between 0100 and 1400 UTC, which is indicated
| by the flag TBO.
| (Thanks to a few people for pointing out that the previous example was in
| error; it assumed that Indiana was ahead of UTC, and not behind as is | (Thanks to a few people for pointing out that the previous example was in
| actually the case.) | error; it assumed that Indiana was ahead of UTC, and not behind as is
| actually the case.)
ANSI C routines to Calculate the Online Times Flag
-------------------------------------------------- ANSI C routines to Calculate the Online Times Flag
--------------------------------------------------
These were not provided in the first edition. Change bars will not be used
here, since they would interfere with the syntax of the presented routines. These were not provided in the first edition. Change bars will not be used
here, since they would interfere with the syntax of the presented routines.
The first program calculates the online times flag from the user's entry of
the online times of a system, expressed in the local time zone, and the The first program calculates the online times flag from the user's entry of
offset to UTC used by the user's country. It takes into account that the the online times of a system, expressed in the local time zone, and the
clock is put forward and back once a year by reducing the end time by one offset to UTC used by the user's country. It takes into account that the
hour. The program should work on any platform, and has been tested. clock is put forward and back once a year by reducing the end time by one
hour. The program should work on any platform, and has been tested.
=== start of code ===
/* TIMEFLAG.C === start of code ===
Calculates FSC-0062 time flag requirement from user input */ /* TIMEFLAG.C
Calculates FSC-0062 time flag requirement from user input */
#include <stdio.h>
#include &lt;stdio.h&gt;
char *onlineflag(char *on, char *off, int utc_diff);
char *onlineflag(char *on, char *off, int utc_diff);
void main()
{ void main()
char on[6], off[6]; int utc_diff; {
char on[6], off[6]; int utc_diff;
printf("\nPlease specify the time you come online [HH:MM]: ");
scanf("%s", on); printf("\nPlease specify the time you come online [HH:MM]: ");
printf("\nPlease specify the time you come offline [HH:MM]: "); scanf("%s", on);
scanf("%s", off); printf("\nPlease specify the time you come offline [HH:MM]: ");
printf("\nSpecify the difference between your local time zone in winter\n" scanf("%s", off);
"time and UTC (e.g. if your time zone is 6 hours behind UTC,\n" printf("\nSpecify the difference between your local time zone in winter\n"
"enter 6): "); "time and UTC (e.g. if your time zone is 6 hours behind UTC,\n"
scanf("%d", &utc_diff); "enter 6): ");
printf("\nYour online time flag is %s\n\n", scanf("%d", &amp;utc_diff);
onlineflag(on, off, utc_diff)); printf("\nYour online time flag is %s\n\n",
} onlineflag(on, off, utc_diff));
}
char *onlineflag(char *ontime, char *offtime, int utcdiff)
{ char *onlineflag(char *ontime, char *offtime, int utcdiff)
int onhour, onmin, offhour, offmin; {
static char flag[4]="T "; int onhour, onmin, offhour, offmin;
static char flag[4]="T ";
sscanf(ontime, "%d:%d", &onhour, &onmin);
sscanf(offtime, "%d:%d", &offhour, &offmin); sscanf(ontime, "%d:%d", &amp;onhour, &amp;onmin);
sscanf(offtime, "%d:%d", &amp;offhour, &amp;offmin);
if(onmin>30) ++onhour;
--offhour; /* to correct for daylight saving time */ if(onmin&gt;30) ++onhour;
onhour = (onhour+24+utcdiff) % 24; --offhour; /* to correct for daylight saving time */
offhour = (offhour+24+utcdiff) % 24; onhour = (onhour+24+utcdiff) % 24;
offhour = (offhour+24+utcdiff) % 24;
flag[1]='A'+onhour;
flag[2]='A'+offhour; flag[1]='A'+onhour;
flag[2]='A'+offhour;
if(onmin>0 && onmin<31) flag[1] += 'a'-'A';
if(offmin>29) flag[2] += 'a'-'A'; if(onmin&gt;0 &amp;&amp; onmin&lt;31) flag[1] += 'a'-'A';
if(offmin&gt;29) flag[2] += 'a'-'A';
return flag;
} return flag;
=== end of code === }
=== end of code ===
The second program calculates the online times from the time flag, input
as a pointer to char to the routine (this being of the format "Txy"). It The second program calculates the online times from the time flag, input
returns a pointer to a structure which contains the on- and off-times in as a pointer to char to the routine (this being of the format "Txy"). It
UTC. This is not a complete program; it is designed to be used by mailers returns a pointer to a structure which contains the on- and off-times in
to determine the valid online times. It has also been tested. UTC. This is not a complete program; it is designed to be used by mailers
to determine the valid online times. It has also been tested.
=== start of code ===
/* INTFLAG.C === start of code ===
Interprets online time flags and converts them to a set of UTC times */ /* INTFLAG.C
Interprets online time flags and converts them to a set of UTC times */
struct TIMES {
int on_hour; struct TIMES {
int on_min; int on_hour;
int off_hour; int on_min;
int off_min; int off_hour;
}; int off_min;
};
struct TIMES *interpret_flag(char *time_flag);
struct TIMES *interpret_flag(char *time_flag);
struct TIMES *interpret_flag(char *timeflag)
{ struct TIMES *interpret_flag(char *timeflag)
static struct TIMES times; {
static struct TIMES times;
times.on_min=0;
times.off_min=0; times.on_min=0;
times.off_min=0;
times.on_hour=timeflag[1]-'A';
if(times.on_hour>23) { times.on_hour=timeflag[1]-'A';
times.on_hour -= 'a'-'A'; if(times.on_hour&gt;23) {
times.on_min=30; times.on_hour -= 'a'-'A';
} times.on_min=30;
times.off_hour=timeflag[2]-'A'; }
if(times.off_hour>23) { times.off_hour=timeflag[2]-'A';
times.off_hour -= 'a'-'A'; if(times.off_hour&gt;23) {
times.off_min=30; times.off_hour -= 'a'-'A';
} times.off_min=30;
return &times; }
} return &times;
=== end of code === }
=== end of code ===
| The above routines can be copied and re-used as desired. I am now an
| amazing C programmer, but I still make no guarantees about them! :-) | The above routines can be copied and re-used as desired. I am now an
| amazing C programmer, but I still make no guarantees about them! :-)
Summary
------- Summary
-------
I believe this to be a neat and compact solution to, what is in my opinion,
one of the gravest problems currently facing FidoNet. In FidoNet, most I believe this to be a neat and compact solution to, what is in my opinion,
nodes are continuous mail, but it is important for the growth and one of the gravest problems currently facing FidoNet. In FidoNet, most
popularity of FidoNet that non-CM nodes do not receive many mailer calls at nodes are continuous mail, but it is important for the growth and
times when they are off line. Users are bad enough in this respect. It is popularity of FidoNet that non-CM nodes do not receive many mailer calls at
also useful for people wishing to contact hubs that are non-CM with mail times when they are off line. Users are bad enough in this respect. It is
for a downlink, and for people wishing to file request from a node that is also useful for people wishing to contact hubs that are non-CM with mail
not CM. There is no need for systems that are only online in zone mail hour for a downlink, and for people wishing to file request from a node that is
to adopt this flag; also, there is no need for CM systems to adopt this not CM. There is no need for systems that are only online in zone mail hour
flag. to adopt this flag; also, there is no need for CM systems to adopt this
flag.
Contacting the Author
--------------------- Contacting the Author
---------------------
My board is now online continuously, except for periods of down time during
| which the board is maintained (few and far between now that Linux is used). My board is now online continuously, except for periods of down time during
Netmail contact is therefore possible at any time. I went CM because of a | which the board is maintained (few and far between now that Linux is used).
certain number of nodes calling at the wrong times, and also users. Users Netmail contact is therefore possible at any time. I went CM because of a
weren't too bad, but I dislike 0600 am wake-up calls, repeated at regular certain number of nodes calling at the wrong times, and also users. Users
three-minute intervals for an hour, by mailers, rather intensely :-) weren't too bad, but I dislike 0600 am wake-up calls, repeated at regular
three-minute intervals for an hour, by mailers, rather intensely :-)
End of document.
</PRE> End of document.
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,122 +1,123 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Improving FidoNet/UseNet gating and Dupe Checking.</TITLE> <HEAD>
</HEAD> <TITLE>Improving FidoNet/UseNet gating and Dupe Checking.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
Document: FSC-0070 <PRE>
Date: 15-Jul-94 Document: FSC-0070
Revision: 002 Date: 15-Jul-94
Revision: 002
Improving Fidonet/Usenet gating and Dupe Checking
Improving Fidonet/Usenet gating and Dupe Checking
Franck Arnaud, Fidonet 2:320/213.666
Franck Arnaud, Fidonet 2:320/213.666
Status of this document
----------------------- Status of this document
-----------------------
This FSC suggests a proposed standard for the FidoNet(r) community,
and invites discussion and suggestions for improvements. Distribution of This FSC suggests a proposed standard for the FidoNet(r) community,
this document is unlimited. and invites discussion and suggestions for improvements. Distribution of
this document is unlimited.
Fido and FidoNet are registered marks of Tom Jennings and Fido Software.
Fido and FidoNet are registered marks of Tom Jennings and Fido Software.
Introduction
------------ Introduction
------------
The complexity of Usenet/Fidonet gating and the large number of gateways
has led to a non-negligible quantity of duplicates appearing regularly in The complexity of Usenet/Fidonet gating and the large number of gateways
both the Usenet and Fidonet worlds. This proposal defines a standard method has led to a non-negligible quantity of duplicates appearing regularly in
for gateway software to deal with conversion of message identifiers between both the Usenet and Fidonet worlds. This proposal defines a standard method
both worlds, so that we can improve the reliability of Usenet/Fidonet for gateway software to deal with conversion of message identifiers between
gateways. both worlds, so that we can improve the reliability of Usenet/Fidonet
gateways.
In this document "^" means <control-A> (character 01h).
In this document "^" means &lt;control-A&gt; (character 01h).
History
------- History
-------
Revision 002 adds details and makes the Fidonet to Usenet sheme FTS-0009
compliant. Revision 002 adds details and makes the Fidonet to Usenet sheme FTS-0009
compliant.
Usenet To Fidonet Message Identifier Conversion
----------------------------------------------- Usenet To Fidonet Message Identifier Conversion
-----------------------------------------------
A major problem is preventing messages gated into Fidonet from RFC822 from
being gated back to Usenet at another gateway with a new message id. The A major problem is preventing messages gated into Fidonet from RFC822 from
easy way to solve that is simply to store the RFC message ID in a kludge being gated back to Usenet at another gateway with a new message id. The
line. This kludge line could also allow identifying messages gated from easy way to solve that is simply to store the RFC message ID in a kludge
Usenet (this could be used by message editors to allow private replies to line. This kludge line could also allow identifying messages gated from
the nearest uucp gateway for example). Usenet (this could be used by message editors to allow private replies to
the nearest uucp gateway for example).
It is proposed that the ^RFCID: kludge is used to store the RFC Message-ID:
in Fidonet messages. Of course, the use of the RFCID kludge doesn't replace It is proposed that the ^RFCID: kludge is used to store the RFC Message-ID:
the standard fts-0009 Message-ID:. in Fidonet messages. Of course, the use of the RFCID kludge doesn't replace
the standard fts-0009 Message-ID:.
(Usenet) Message-ID: <92_feb_10_19192012901@prep.ai.mit.edu>
to (Fido) ^MSGID: 2:300/400.5 6789fedc (Usenet) Message-ID: &lt;92_feb_10_19192012901@prep.ai.mit.edu&gt;
^RFCID: 92_feb_10_19192012901@prep.ai.mit.edu to (Fido) ^MSGID: 2:300/400.5 6789fedc
^RFCID: 92_feb_10_19192012901@prep.ai.mit.edu
Note ^RFCID does not include the Message-ID enclosing "<" and ">".
Note ^RFCID does not include the Message-ID enclosing "&lt;" and "&gt;".
Then if a gateway finds a ^RFCID line in a Fido message, it will use it in
the Usenet message ID, instead of converting the ^MSGID. Then if a gateway finds a ^RFCID line in a Fido message, it will use it in
the Usenet message ID, instead of converting the ^MSGID.
Fidonet to Usenet Message Identifiers Conversion
------------------------------------------------ Fidonet to Usenet Message Identifiers Conversion
------------------------------------------------
The dupe checking in Usenet is based on the message ID. Fidonet now has its
own standard message identification standard (fts-0009). The dupe checking in Usenet is based on the message ID. Fidonet now has its
own standard message identification standard (fts-0009).
So it would be interesting if the same Fidonet message gated at different
gateways had the same ID in Usenet to help news processing programs in So it would be interesting if the same Fidonet message gated at different
stopping dupes. gateways had the same ID in Usenet to help news processing programs in
stopping dupes.
The proposed fido ^MSGID: to RFC1036 Message-ID: conversion method is
defined as below: The proposed fido ^MSGID: to RFC1036 Message-ID: conversion method is
defined as below:
The ^MSGID: value (a string) is not parsed and converted as below to the ID
part of Usenet's Message-ID. The Message-ID domain is the fidonet domain, The ^MSGID: value (a string) is not parsed and converted as below to the ID
"fidonet.org" if the gated echomail comes from the Fidonet(tm) network. part of Usenet's Message-ID. The Message-ID domain is the fidonet domain,
"fidonet.org" if the gated echomail comes from the Fidonet(tm) network.
To convert the MSGID string, the following rules are applied:
- Alphanumeric (a-z,A-Z,0-9) characters are kept intact (case preserved). To convert the MSGID string, the following rules are applied:
- Non-alphanumeric characters - including the space beetwen the origin - Alphanumeric (a-z,A-Z,0-9) characters are kept intact (case preserved).
address and the serial number - are converted to '-'. - Non-alphanumeric characters - including the space beetwen the origin
address and the serial number - are converted to '-'.
Some examples:
Some examples:
(Fido) ^MSGID: 2:300/400 12345AbC
to (Usenet) Message-ID: <2-300-400-12345AbC@fidonet.org> (Fido) ^MSGID: 2:300/400 12345AbC
to (Usenet) Message-ID: &lt;2-300-400-12345AbC@fidonet.org&gt;
(Fido) ^MSGID: 15:300/400.50@somenet abcd6789
to (Usenet) Message-ID: <15-300-400-50-somenet-abcd6789@fidonet.org> (Fido) ^MSGID: 15:300/400.50@somenet abcd6789
to (Usenet) Message-ID: &lt;15-300-400-50-somenet-abcd6789@fidonet.org&gt;
(Fido) ^MSGID: Internet.Domain.org aBcD1234
to (Usenet) Message-ID: <Internet-Domain-org-aBcD1234@fidonet.org> (Fido) ^MSGID: Internet.Domain.org aBcD1234
to (Usenet) Message-ID: &lt;Internet-Domain-org-aBcD1234@fidonet.org&gt;
(Fido) ^MSGID: "LZKkoe$1982 98a" 45678bcd
to (Usenet) Message-ID: <-LZKkoe-1982-98a--45678bcd@fidonet.org> (Fido) ^MSGID: "LZKkoe$1982 98a" 45678bcd
to (Usenet) Message-ID: &lt;-LZKkoe-1982-98a--45678bcd@fidonet.org&gt;
</PRE>
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

File diff suppressed because it is too large Load Diff

View File

@ -1,305 +1,306 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>File Forwarding in Fidonet Technology Networks.</TITLE> <HEAD>
</HEAD> <TITLE>File Forwarding in Fidonet Technology Networks.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
| Document: FSC-0087 <PRE>
| Version: 001 | Document: FSC-0087
| Date: 31 October, 1995 | Version: 001
| | Date: 31 October, 1995
| Robert Williamson FidoNet#1:167/104.0 |
| Robert Williamson FidoNet#1:167/104.0
File Forwarding in Fidonet Technology Networks
Robert Williamson FidoNet#1:167/104.0 robert@ecs.mtlnet.org File Forwarding in Fidonet Technology Networks
Robert Williamson FidoNet#1:167/104.0 robert@ecs.mtlnet.org
Purpose:
To document current practices in File Forwarding and the minimum Purpose:
requirements and known extensions of the TIC file format. To document current practices in File Forwarding and the minimum
requirements and known extensions of the TIC file format.
Acknowledgements:
The TIC file format was introduced by Barry Geller, in the MSDOS Acknowledgements:
File Forwarder, Tick. Useful extensions to this format were introduced The TIC file format was introduced by Barry Geller, in the MSDOS
by Harald Helms, in the MSDOS FileForwarder, AllFix. File Forwarder, Tick. Useful extensions to this format were introduced
by Harald Helms, in the MSDOS FileForwarder, AllFix.
Terminology:
FTN - Fidonet Technolgy Network, such as FIDONET, AMIGANET or IBMNET. Terminology:
Sometimes used interchangably with the term DOMAIN. FTN - Fidonet Technolgy Network, such as FIDONET, AMIGANET or IBMNET.
Sometimes used interchangably with the term DOMAIN.
FNC - FileName Conversion, process of converting filenames to msdos 8.3
format for transmission. FNC - FileName Conversion, process of converting filenames to msdos 8.3
format for transmission.
FQFA - Fully Qualified FTN Address, the format is
FTN#Zone:Net/Node.Point FQFA - Fully Qualified FTN Address, the format is
FTN#Zone:Net/Node.Point
CRC - Cyclic Redundancy Check, method to determine whether some data
has been altered. CRC-32 is used in File Forwarding. CRC - Cyclic Redundancy Check, method to determine whether some data
has been altered. CRC-32 is used in File Forwarding.
TIC - a file that contains control information for the File Forwarding
system. These files are named xxSTAMP.TIC, where xx is an TIC - a file that contains control information for the File Forwarding
abbreviation representing the File Forwarding program name and system. These files are named xxSTAMP.TIC, where xx is an
stamp is a unixdate stamp truncated to 6 characters. abbreviation representing the File Forwarding program name and
stamp is a unixdate stamp truncated to 6 characters.
UTC - Universal Time Coordinated, the time at the 0o meridian
(Greenwich); previously called GMT UTC - Universal Time Coordinated, the time at the 0o meridian
(Greenwich); previously called GMT
forwarding - the process of creating and sending tic files and the
associated file to one's downlinks. forwarding - the process of creating and sending tic files and the
associated file to one's downlinks.
ticking - the processing of reading and verifying a tic file and it's
associated file. ticking - the processing of reading and verifying a tic file and it's
associated file.
hatching - the process of introducing a new file into a fileecho
hatching - the process of introducing a new file into a fileecho
cross-hatching - the process of forwarding a file from one fileecho
(ususally restricted) to another cross-hatching - the process of forwarding a file from one fileecho
(ususally restricted) to another
Associated File - The file listed in the FILE field of the TIC file.
Associated File - The file listed in the FILE field of the TIC file.
Note that use of UPPERCASE on tic file keywords in this document in
for display purposes only. Note that use of UPPERCASE on tic file keywords in this document in
for display purposes only.
Format of a TIC file:
Format of a TIC file:
Addressing:
In a tic file any form of FTN address representation from 3d to Addressing:
FQFA may be used. All File Forwarders must understand the In a tic file any form of FTN address representation from 3d to
following formats: FQFA may be used. All File Forwarders must understand the
zone:net/node - 3D following formats:
zone:net/node.point - 4D zone:net/node - 3D
zone:net/node@ftn - 5D - point 0 assumed zone:net/node.point - 4D
zone:net/node.point@ftn - 5D zone:net/node@ftn - 5D - point 0 assumed
ftn#zone:net/node.point - fqfa zone:net/node.point@ftn - 5D
ftn#zone:net/node.point - fqfa
File Forwarders should have configurable options per site as to the
type of addressing each of it's downlinks can understand. File Forwarders should have configurable options per site as to the
type of addressing each of it's downlinks can understand.
Dates:
All dates are expressed in UTC. Dates:
All dates are expressed in UTC.
TimeDateStamps:
All TimeDateStamps are unix TimeDateStamps (# of seconds since Jan TimeDateStamps:
1, 1960) in UTC and expressed in hexadecimal notation. All TimeDateStamps are unix TimeDateStamps (# of seconds since Jan
1, 1960) in UTC and expressed in hexadecimal notation.
Case Insensitivity:
the format is completely case-insensitive. It is general practice Case Insensitivity:
that the first letter of a keyword is uppercase. This is not a the format is completely case-insensitive. It is general practice
requirement. that the first letter of a keyword is uppercase. This is not a
requirement.
Order Dependancy:
keywords are not order dependant. Order Dependancy:
Order dependancy is required in some groupings of a keyword, such keywords are not order dependant.
as PATH, VIA, DESC and APP. Order dependancy is required in some groupings of a keyword, such
as PATH, VIA, DESC and APP.
Modification of address fields on PassThrough:
The forwarding site may modify the addresses in any keyword field Modification of address fields on PassThrough:
to make them compliant with the addressing limitations of each The forwarding site may modify the addresses in any keyword field
downlink. to make them compliant with the addressing limitations of each
downlink.
Stripping of SeenBys:
The forwarding site may strip seenbys to current FTN, ZONE or NET, Stripping of SeenBys:
when not forwarding outside of current FTN, ZONE or NET. This does The forwarding site may strip seenbys to current FTN, ZONE or NET,
not imply nor permit the stripping of of a direct downlink which is when not forwarding outside of current FTN, ZONE or NET. This does
outside the current strip filter. not imply nor permit the stripping of of a direct downlink which is
outside the current strip filter.
Keywords:
There are no colons on keywords. Keywords:
There are no colons on keywords.
Each keyword line is terminated with CR LF pair.
Each keyword line is terminated with CR LF pair.
The maximum length of a keyword line is 256 characters, including the
CRLF termination. Some keyword lines may have a shorter limit. The maximum length of a keyword line is 256 characters, including the
CRLF termination. Some keyword lines may have a shorter limit.
Keywords are separated from their data by a single space. There is
no space if there is no data associated with the keyword. Keywords are separated from their data by a single space. There is
eg: ReturnReceipt no space if there is no data associated with the keyword.
eg: ReturnReceipt
Keywords are case-insensitive and order independant.
Keywords are case-insensitive and order independant.
Keywords not understood are to be passed-though.
Keywords not understood are to be passed-though.
Known Keywords that are blank should not be passed though.
For example, an empty AREADESC, could be either dropped or the Known Keywords that are blank should not be passed though.
blank replaced with the proper description. For example, an empty AREADESC, could be either dropped or the
blank replaced with the proper description.
Most Keywords are passed through when processing.
There are exceptions. In some cases, a site-specific replacement Most Keywords are passed through when processing.
may be created. There are exceptions. In some cases, a site-specific replacement
Keywords marked with a ^ should not be passed-through. may be created.
Keywords marked with a ^ should not be passed-through.
Keywords marked with a * are REQUIRED when processing a TIC file.
If any of these are missing, the tic file should be considered as Keywords marked with a * are REQUIRED when processing a TIC file.
BAD and the associated file not forwarded to downlinks. If any of these are missing, the tic file should be considered as
BAD and the associated file not forwarded to downlinks.
Keywords marked with a # are CREATED when hatching or forwarding.
Keywords marked with a # are CREATED when hatching or forwarding.
*# AREA [AreaName]
the TagName of the file area. *# AREA [AreaName]
the TagName of the file area.
AREADESC [description of area] OPTIONAL
a short (80 chars) description of the file area. This could be AREADESC [description of area] OPTIONAL
the description found in FileBone.NA a short (80 chars) description of the file area. This could be
the description found in FileBone.NA
*# FILE [File being sent]
the name of the file being sent, no path *# FILE [File being sent]
the filename must conform to msdos 8.3 format, unless it is known the name of the file being sent, no path
that the receiving site can handle longer filenames. the filename must conform to msdos 8.3 format, unless it is known
that the receiving site can handle longer filenames.
^# FULLNAME [original filename before FNC] OPTIONAL FNC only
the original filename (no path) before FileName Conversion ^# FULLNAME [original filename before FNC] OPTIONAL FNC only
the original filename (no path) before FileName Conversion
*# CRC [CRC-32 in hex]
crc of the file being sent, 8 hexadecimal characters *# CRC [CRC-32 in hex]
crc of the file being sent, 8 hexadecimal characters
^ MAGIC [MagicName] OPTIONAL
Name under which the file can be FREQed from the site listed in ^ MAGIC [MagicName] OPTIONAL
FROM. This is NOT passed though when forwarding, unless the Name under which the file can be FREQed from the site listed in
MAGIC name is the same on the forwarding site. It can be FROM. This is NOT passed though when forwarding, unless the
replaced by the appropriate name. MAGIC name is the same on the forwarding site. It can be
replaced by the appropriate name.
REPLACES [FileName] OPTIONAL
Filename (no path) of a file hatched in the AREA that the REPLACES [FileName] OPTIONAL
associated file replaces. If the site expects FNC files, and the Filename (no path) of a file hatched in the AREA that the
filename does not confrom to msdos 8.3 convention, the REPLACES associated file replaces. If the site expects FNC files, and the
name should also be FNC. filename does not confrom to msdos 8.3 convention, the REPLACES
name should also be FNC.
# DESC [Description]
Description of the file, limited to 80 characters per line, # DESC [Description]
including CRLF termination. Description of the file, limited to 80 characters per line,
If multiple LDESC lines are used, the DESC line must provide the including CRLF termination.
maximum information. No File Forwadrer is required to passthough If multiple LDESC lines are used, the DESC line must provide the
or make use of any extra DESC line after the first. maximum information. No File Forwadrer is required to passthough
or make use of any extra DESC line after the first.
# LDESC [multiple lines]
A long description of the file. LDESC does NOT replace DESC, it # LDESC [multiple lines]
is used IN ADDITION to the short description. No File Forwarder A long description of the file. LDESC does NOT replace DESC, it
is required make use of LESC lines. is used IN ADDITION to the short description. No File Forwarder
is required make use of LESC lines.
# SIZE [Bytes] OPTIONAL, SHOULD be required
Length of the file in bytes # SIZE [Bytes] OPTIONAL, SHOULD be required
Length of the file in bytes
DATE [TimeDateStamp]
TimeDateStamp of the file. Can be date of creation of archive. DATE [TimeDateStamp]
TimeDateStamp of the file. Can be date of creation of archive.
RELEASE [TimeDateStamp]
Date when file is TO BE released. Usually used by SDS, but can RELEASE [TimeDateStamp]
be used by ADS as well. Date when file is TO BE released. Usually used by SDS, but can
be used by ADS as well.
AUTHOR [name]
Name of the author of the software package being hatched. This AUTHOR [name]
field is obviously not applicable to Newsletters, Nodelists and Name of the author of the software package being hatched. This
Diffs and the like. field is obviously not applicable to Newsletters, Nodelists and
Diffs and the like.
SOURCE [authors_address]
FTN address of the Author of the software package being hatched. SOURCE [authors_address]
Not necessary the same as the ORIGIN hatch site. Does not have FTN address of the Author of the software package being hatched.
to be an FTN address. Not necessary the same as the ORIGIN hatch site. Does not have
to be an FTN address.
^ APP [program] [Application Specific Information]
The APP keyword is a keyword known to programs of the name ^ APP [program] [Application Specific Information]
indicated. APP'S are order dependent and must be passed though. The APP keyword is a keyword known to programs of the name
indicated. APP'S are order dependent and must be passed though.
*# ORIGIN [Address]
Site where file entered the fileecho *# ORIGIN [Address]
Site where file entered the fileecho
*^# FROM [Address] [Pwd]
Site that is forwarding the file to the next site. Pwd is *^# FROM [Address] [Pwd]
optional and rarely used, IF AT ALL. Pwd is NEVER passed through. Site that is forwarding the file to the next site. Pwd is
optional and rarely used, IF AT ALL. Pwd is NEVER passed through.
^ TO [Address] OPTIONAL
Site to which this TIC and the assocaited file are being sent. ^ TO [Address] OPTIONAL
This keyword is included in the .TIC file when: Site to which this TIC and the assocaited file are being sent.
a) the file is being routed via another system which permits This keyword is included in the .TIC file when:
such routing. a) the file is being routed via another system which permits
b) the platform in use does not have any FTN software such routing.
independant method of associating a file nd it's b) the platform in use does not have any FTN software
destination. eg. platforms that do not have filenotes independant method of associating a file nd it's
that could contain this information as part of the destination. eg. platforms that do not have filenotes
filesystem. that could contain this information as part of the
filesystem.
If the address in the TO line is that of the receiving site, the
field is not passed through when forwarding. If the address in If the address in the TO line is that of the receiving site, the
the TO lines IS NOT that of the receiving site, it should be field is not passed through when forwarding. If the address in
forwarded to the TO site, if a routing agreement is in place with the TO lines IS NOT that of the receiving site, it should be
the sending site. forwarded to the TO site, if a routing agreement is in place with
the sending site.
*^# CREATED [by] [Program Banner]
File Forwarder which created the TIC file. This is generally in *^# CREATED [by] [Program Banner]
the form: File Forwarder which created the TIC file. This is generally in
Created [by] program_name version [copyright_info] the form:
Created [by] program_name version [copyright_info]
VIA [FROM CREATED] OPTIONAL (tracking)
Copy of CREATED line of FROM, with 'Created [by]' stripped and VIA [FROM CREATED] OPTIONAL (tracking)
FROM prepended. Always passed though. The VIA is only created Copy of CREATED line of FROM, with 'Created [by]' stripped and
by the receiving site when forwarding. It is never created by the FROM prepended. Always passed though. The VIA is only created
hatching site. Therefore, in any TIC file, the addresses in the by the receiving site when forwarding. It is never created by the
FROM and VIA should never be the same. hatching site. Therefore, in any TIC file, the addresses in the
examples: FROM and VIA should never be the same.
Via 1:167/100 ALLFIX+ 4.31 Copyright (C) 1992,95 Harald Harms (2:281/910) examples:
Via FIDONET#1:167/104.0 XTick 3 Copyright (c) 1995 Robert Williamson FIDONET#1:167/104.0 Via 1:167/100 ALLFIX+ 4.31 Copyright (C) 1992,95 Harald Harms (2:281/910)
Via FIDONET#1:167/104.0 XTick 3 Copyright (c) 1995 Robert Williamson FIDONET#1:167/104.0
*# PATH [Address] [TimeDateStamp] [date and time]
Address of Site which has forwarded the file. TimeDateStamp, *# PATH [Address] [TimeDateStamp] [date and time]
date and time is that of when the Site received and Processed the Address of Site which has forwarded the file. TimeDateStamp,
file. date and time is that of when the Site received and Processed the
file.
* # SEENBY [Address]
Site which has received the file. There are multiple lines of * # SEENBY [Address]
Seenby and they are unordered. Site which has received the file. There are multiple lines of
Seenby and they are unordered.
* PW [password]
Site or Area password. This is case-insensitive and should be at * PW [password]
least 5 characters in length. Site or Area password. This is case-insensitive and should be at
least 5 characters in length.
PGP [signature]
PrettyGoodPrivacy signature. To be discussed. PGP [signature]
PrettyGoodPrivacy signature. To be discussed.
^ ReceiptRequest -no data- OPTIONAL
A request to the receiving system to generate a IsReturnReceipt ^ ReceiptRequest -no data- OPTIONAL
(attribute word bit 13) messsage, in the same manner it would if A request to the receiving system to generate a IsReturnReceipt
it had received a message with the FileAttach an ReturnReceipt (attribute word bit 13) messsage, in the same manner it would if
attributes and a subject of the filename. it had received a message with the FileAttach an ReturnReceipt
There is NO requirement to recognize this keyword. It should attributes and a subject of the filename.
never be passed through. There is NO requirement to recognize this keyword. It should
never be passed through.
Transmission of Files:
Transmission of Files:
The associated file, that is, the file Listed in the FILE field of the
TIC file, should always be sent FIRST. In the case of a failed session, The associated file, that is, the file Listed in the FILE field of the
sending the FILE first prevents the orphaning of the file that is TIC file, should always be sent FIRST. In the case of a failed session,
normally caused by the deletion or movement of the TIC file to BAD. sending the FILE first prevents the orphaning of the file that is
normally caused by the deletion or movement of the TIC file to BAD.
File Forwarders should not move or delete orphaned TIC files, but this
can neither be relied upon nor mandated. File Forwarders should not move or delete orphaned TIC files, but this
can neither be relied upon nor mandated.
File Forwaders should be transparent to the renaming of file by
mailers. This means that if the mailer renames a duplicate file by File Forwaders should be transparent to the renaming of file by
renaming or bumpinmg a numeric extension, the File Forwarder should be mailers. This means that if the mailer renames a duplicate file by
able to use the size and crc fields of the TIC to find and properly renaming or bumpinmg a numeric extension, the File Forwarder should be
rename the associated file referred to in the TIC. able to use the size and crc fields of the TIC to find and properly
rename the associated file referred to in the TIC.
File Forwaders should always delete and dequeue unsent TIC files when
re-hatching the same or updated version of an associated file. The File Forwaders should always delete and dequeue unsent TIC files when
implementor may wish to allow exceptions for periodicals such as re-hatching the same or updated version of an associated file. The
nodediffs and newsletters. implementor may wish to allow exceptions for periodicals such as
nodediffs and newsletters.
-to be continued-
</PRE> -to be continued-
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,326 +1,327 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Compatibility and Link Qualifier Extensions for EMSI Sessions</TITLE> <HEAD>
</HEAD> <TITLE>Compatibility and Link Qualifier Extensions for EMSI Sessions</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
| Document: FSC-0088 <PRE>
| Version: 001 | Document: FSC-0088
| Date: 31 October, 1995 | Version: 001
| | Date: 31 October, 1995
| Robert Williamson FidoNet#1:167/104.0 |
| Robert Williamson FidoNet#1:167/104.0
Compatibility and Link Qualifier Extensions for EMSI Sessions
Robert Williamson FidoNet#1:167/104.0 robert@ecs.mtlnet.org Compatibility and Link Qualifier Extensions for EMSI Sessions
Robert Williamson FidoNet#1:167/104.0 robert@ecs.mtlnet.org
Purpose:
Purpose:
The basic purpose of this document is to start discussions which will
hopefully result in an improved handshake negotiation protocol. The basic purpose of this document is to start discussions which will
hopefully result in an improved handshake negotiation protocol.
Scope:
Scope:
Relation of flags to Types of files transferred:
Relation of flags to Types of files transferred:
The FSC-0056 EMSI specification (hereafter referred to as EMSI-I)
makes little distinction between ARCmail/packets and other types of The FSC-0056 EMSI specification (hereafter referred to as EMSI-I)
files, such as files attached and TIC'ed files. In EMSI-I, the term makes little distinction between ARCmail/packets and other types of
'Mail' when not used in conjunction with the term 'compressed', is files, such as files attached and TIC'ed files. In EMSI-I, the term
interpreted to mean ANY file. 'Mail' when not used in conjunction with the term 'compressed', is
interpreted to mean ANY file.
This extension (hereafter referred to as EMSI-II) makes reference to
and allows control of types of files in addition to 'compressed mail'. This extension (hereafter referred to as EMSI-II) makes reference to
References to 'Mail' are changed to 'File' where common practice so and allows control of types of files in addition to 'compressed mail'.
indicates. The additional qualifier flags described provide for more References to 'Mail' are changed to 'File' where common practice so
control as to the types of files a system is prepared to receive. indicates. The additional qualifier flags described provide for more
control as to the types of files a system is prepared to receive.
Relation of flags to presented addresses:
Relation of flags to presented addresses:
The EMSI-I specification does not allow qualification for any address
other than the PRIMARY address. This means that Link flags are limited The EMSI-I specification does not allow qualification for any address
in application to either all presented addresses or to the primary other than the PRIMARY address. This means that Link flags are limited
presented address only. in application to either all presented addresses or to the primary
presented address only.
This extension also allows application of Link flags to specific
addresses other than the primary. This extension also allows application of Link flags to specific
addresses other than the primary.
Distinctions between Calling and Answering System:
Distinctions between Calling and Answering System:
In the EMSI-I spec, the type of flags that may be presented is limited
by the status of the site. Certain flags may only be presented when In the EMSI-I spec, the type of flags that may be presented is limited
the site is the caller and other flags may only be presented when the by the status of the site. Certain flags may only be presented when
site is the answerer. This proposed extension removes this the site is the caller and other flags may only be presented when the
distinction. site is the answerer. This proposed extension removes this
distinction.
In the EMSI-I spec, certain Link and Capability (a.k.a: Compatibility)
flags are caller-driven, while others are controlled by the answering In the EMSI-I spec, certain Link and Capability (a.k.a: Compatibility)
system. This specification attempts to harmonize these discrepancies. flags are caller-driven, while others are controlled by the answering
system. This specification attempts to harmonize these discrepancies.
A attempt is made to remain somewhat backwards compatible and to have
new flags follow the original flag naming convention. However, IMHO, A attempt is made to remain somewhat backwards compatible and to have
it would be preferable to harmonize the flags; reducing the number of new flags follow the original flag naming convention. However, IMHO,
them while retaining the fine type control, so that the same codes are it would be preferable to harmonize the flags; reducing the number of
used in all sessions. them while retaining the fine type control, so that the same codes are
used in all sessions.
Under both EMSI-I and EMSI-II, any flags that are not understood, are
to be ignored. Therfore, if a site presents it's flags in EMSI-II Under both EMSI-I and EMSI-II, any flags that are not understood, are
format and the other site does not do EMSI-II, it is permissable for to be ignored. Therfore, if a site presents it's flags in EMSI-II
that site to interpret all flags according to EMSI-I specifications. format and the other site does not do EMSI-II, it is permissable for
that site to interpret all flags according to EMSI-I specifications.
Specifics:
Specifics:
Compatibility flags:
Compatibility flags:
Compatibility flags consist of a string of codes that specify the
PROTOCOL CAPABILITIES and ENABLED FEATURES of the mailer. Compatibility flags consist of a string of codes that specify the
PROTOCOL CAPABILITIES and ENABLED FEATURES of the mailer.
ARC, XMA
These EMSI-I compatibility flags have no meaning relavant to the ARC, XMA
transfer of files and are not to be presented under EMSI-II. If These EMSI-I compatibility flags have no meaning relavant to the
received, they are to be ignored. transfer of files and are not to be presented under EMSI-II. If
received, they are to be ignored.
FNC
The FNC EMSI-I compatibility flag has been identified as a 'mistake' by FNC
the author of EMSI-I. This is agreeable as that specification called The FNC EMSI-I compatibility flag has been identified as a 'mistake' by
for the creation of a filename that was ALWAYS 8.3, not the author of EMSI-I. This is agreeable as that specification called
up-to-8.up-to-3. for the creation of a filename that was ALWAYS 8.3, not
It is not to be presented under EMSI-II. If received as a up-to-8.up-to-3.
compatibility flag, it is to be ignored. It is not to be presented under EMSI-II. If received as a
compatibility flag, it is to be ignored.
Protocol Selection:
Protocol Selection:
In the EMSI-I spec, a requirement is placed upon the calling system to
present it's available protocols in order of preference. A quote In the EMSI-I spec, a requirement is placed upon the calling system to
follows: present it's available protocols in order of preference. A quote
follows:
The calling system must list supported protocols first and
descending order of preference (the most desirable protocol The calling system must list supported protocols first and
should be listed first). descending order of preference (the most desirable protocol
The answering system should only present one protocol and it should be listed first).
should be the first item in the compatibility_codes field. The answering system should only present one protocol and it
should be the first item in the compatibility_codes field.
Some mailer authors have interpreted 'the compatibility_codes field' in
the second sentence to mean that of the answering system, thereby Some mailer authors have interpreted 'the compatibility_codes field' in
making protocol selection RECEIVER-PREFS driven. This interpretation the second sentence to mean that of the answering system, thereby
makes unnecessary the 'decending order' requirement placed upon the making protocol selection RECEIVER-PREFS driven. This interpretation
calling system, so shall be considered in conflict with that makes unnecessary the 'decending order' requirement placed upon the
requirement. calling system, so shall be considered in conflict with that
requirement.
Most mailer authors have interpreted that phrase to mean the
'compatibility_codes field' OF THE CALLER, thereby making protocol Most mailer authors have interpreted that phrase to mean the
selection CALLER-PREFS driven. Since EMSI-I was intended to be "a 'compatibility_codes field' OF THE CALLER, thereby making protocol
clear protocol definition for state-of-the-art E-Mail systems to selection CALLER-PREFS driven. Since EMSI-I was intended to be "a
follow", they cannot be faulted for interpretation. Caller-prefs clear protocol definition for state-of-the-art E-Mail systems to
driven selection is state-of-the-art, receiver-prefs driven selection follow", they cannot be faulted for interpretation. Caller-prefs
is older technolgy, such as Wazoo. driven selection is state-of-the-art, receiver-prefs driven selection
is older technolgy, such as Wazoo.
This specification requires that the second interpretation,
CALLER-PREFS driven, be mandatory. This specification requires that the second interpretation,
CALLER-PREFS driven, be mandatory.
New Compatibilty Flags:
---------------------- New Compatibilty Flags:
----------------------
EII
Indicates that the system will interpret flags under this EII
specification, if other end also presents this flag. IF either or both Indicates that the system will interpret flags under this
systems do not present this flag, all interpretations are done specification, if other end also presents this flag. IF either or both
according to EMSI-I. systems do not present this flag, all interpretations are done
according to EMSI-I.
DFB
Indicates that the system presenting is capabable of fall-back to DFB
FTS1/WAZOO negotiation in the case of failure of EMSI handshake or no Indicates that the system presenting is capabable of fall-back to
common protocol. Since ZMO is the minimum required protocol, NCP FTS1/WAZOO negotiation in the case of failure of EMSI handshake or no
should only occur if the answering system presents more than one common protocol. Since ZMO is the minimum required protocol, NCP
protocol.. (ie. it's broken) should only occur if the answering system presents more than one
protocol.. (ie. it's broken)
FRQ
Indicates that the system will accept and process file requests FRQ
received during outbound calls. In other words, the calling system Indicates that the system will accept and process file requests
will do a second turnaround for uni-directional protocols, to send the received during outbound calls. In other words, the calling system
files requested, at his cost. will do a second turnaround for uni-directional protocols, to send the
files requested, at his cost.
NRQ
NRQ should be presented ONLY IF the mailer does not have a file request NRQ
server, task or function and cannot accept requests.. It should NOT be NRQ should be presented ONLY IF the mailer does not have a file request
used to indicate that the function is temporarly disabled. server, task or function and cannot accept requests.. It should NOT be
used to indicate that the function is temporarly disabled.
When examined, No requests will be sent. It would be advisable that
the mailer alert the system operator of this occurance to prevent When examined, No requests will be sent. It would be advisable that
continued polling of the remote site. the mailer alert the system operator of this occurance to prevent
continued polling of the remote site.
Protocol Capabilities:
Protocol Capabilities:
Protocol capability flags are presented in decending order of
preference by the caller. The answering system selects and presents Protocol capability flags are presented in decending order of
the FIRST protocol from the callers list that it supports. The preference by the caller. The answering system selects and presents
answering system must present only ONE protocol. the FIRST protocol from the callers list that it supports. The
answering system must present only ONE protocol.
HYD Hydra bi-directional (link flags define parameters)
JAN Janus bi-directional HYD Hydra bi-directional (link flags define parameters)
TZA DirectZap (TrapDoor DirectZap varient) JAN Janus bi-directional
DZA DirectZap (Zmodem variant, reduced escape set) TZA DirectZap (TrapDoor DirectZap varient)
ZAP ZedZap (Zmodem variant, upe 8K blocks) DZA DirectZap (Zmodem variant, reduced escape set)
ZMO Zmodem w/1,024 packets (Wazoo ZedZip) ZAP ZedZap (Zmodem variant, upe 8K blocks)
SLK SeaLink (no TYSNC, No MDM7, No TeLink) ZMO Zmodem w/1,024 packets (Wazoo ZedZip)
(8-32k window/ReSync/OverDrive/LongNames) SLK SeaLink (no TYSNC, No MDM7, No TeLink)
(8-32k window/ReSync/OverDrive/LongNames)
NCP
This is presented if no compatible protocol can be negotiated under NCP
EMSI. Since in most FTN networks, a common protocol DOES exist, This is presented if no compatible protocol can be negotiated under
fallback to WaZoo and FTS1 negotiation is expected. If these EMSI. Since in most FTN networks, a common protocol DOES exist,
negotiation methods are not available, the session is terminated. fallback to WaZoo and FTS1 negotiation is expected. If these
negotiation methods are not available, the session is terminated.
This condition should never occur under normal circumstances. It
should be considered as a problem with the design or configuration of This condition should never occur under normal circumstances. It
one of the mailers involved. should be considered as a problem with the design or configuration of
one of the mailers involved.
Link flags:
---------- Link flags:
----------
Link flags consist of a string of codes that specify DESIRED CONNECT
CONDITIONS. They apply to the CURRENT SESSION ONLY. Under EMSI-I, Link flags consist of a string of codes that specify DESIRED CONNECT
there are four TYPES of link flags: communications parameters, session CONDITIONS. They apply to the CURRENT SESSION ONLY. Under EMSI-I,
parameters, pickup options and hold options. Under EMSI-II, only three there are four TYPES of link flags: communications parameters, session
types are used, the communications parameters type is REMOVED, as it parameters, pickup options and hold options. Under EMSI-II, only three
serves no purpose whatsoever in FTN operations. types are used, the communications parameters type is REMOVED, as it
serves no purpose whatsoever in FTN operations.
Link Session options:
Link Session options:
FNC
If either system presents this flag, it is an indication that the FNC
presenting system requires filename conversion to cp/m-msdos If either system presents this flag, it is an indication that the
conventions. The other system will convert filenames to cp/m cpm/msdos presenting system requires filename conversion to cp/m-msdos
8.3 conventions before sending. conventions. The other system will convert filenames to cp/m cpm/msdos
The convention is defined as a filename consisting of two 8.3 conventions before sending.
parts, the filepart and extension. The filepart and extension are The convention is defined as a filename consisting of two
separated by a period ".". The filepart may be from 1 to 8 characters parts, the filepart and extension. The filepart and extension are
in length and the extension may be from 0 to 3 characters. The separated by a period ".". The filepart may be from 1 to 8 characters
character set shall be any uppercase character in the range A-Z and any in length and the extension may be from 0 to 3 characters. The
numeric character in the range 0-9. If the extension is of zero character set shall be any uppercase character in the range A-Z and any
length, the period may or may not be present. numeric character in the range 0-9. If the extension is of zero
length, the period may or may not be present.
RMA
Indicates that the presenting site is able to send and process multiple RMA
file requests. If both sites present this flag, the caller will send Indicates that the presenting site is able to send and process multiple
any REQ files found for each AKA presented by the answering system. file requests. If both sites present this flag, the caller will send
The answering system will process each received REQ. any REQ files found for each AKA presented by the answering system.
The answering system will process each received REQ.
RH1
Indicates that under the Hydra protocol, batch one contains file RH1
requests only, while batch 2 is reserved for all other files. Indicates that under the Hydra protocol, batch one contains file
requests only, while batch 2 is reserved for all other files.
(others to be defined)
(others to be defined)
Pickup and Hold Flags:
Pickup and Hold Flags:
Under the EMSI-I specification, Link Pickup flags are only presented
when calling (an Outbound Session) and are examined and processed only Under the EMSI-I specification, Link Pickup flags are only presented
when answering (an Inbound Session) and Link Hold flags are only when calling (an Outbound Session) and are examined and processed only
presented when answering (an Inbound Session) and are examined and when answering (an Inbound Session) and Link Hold flags are only
processed only when calling (an Outbound Session). presented when answering (an Inbound Session) and are examined and
processed only when calling (an Outbound Session).
With EMSI-II, BOTH Pickup and Hold flags are presented by both sites
during a session. This allows more control for those systems, for With EMSI-II, BOTH Pickup and Hold flags are presented by both sites
example, which cannot modify addresses presented or rotate akas to during a session. This allows more control for those systems, for
change the primary address presented on a per-session or per-site example, which cannot modify addresses presented or rotate akas to
basis. change the primary address presented on a per-session or per-site
basis.
Link Pickup and Hold:
Link Pickup and Hold:
Each system can present one of three (or more) Link options related to
application of addresses. If neither of these flags are presented, PUA Each system can present one of three (or more) Link options related to
is to be assumed. application of addresses. If neither of these flags are presented, PUA
is to be assumed.
Neither PUA nor PUP is to be presented if only one address was
presented. Neither PUA nor PUP is to be presented if only one address was
presented.
PUP Pickup FILES for primary address only
/ PUA Pickup FILES for all presented addresses PUP Pickup FILES for primary address only
/ PUn Pickup FILES for address number n in AKA list / PUA Pickup FILES for all presented addresses
one of | / PUn Pickup FILES for address number n in AKA list
\ one of |
\ NPU No FILE pickup desired. (calling system) \
HAT Hold all FILES (answering system) \ NPU No FILE pickup desired. (calling system)
HAn Hold all FILES for address number n in AKA list HAT Hold all FILES (answering system)
HAn Hold all FILES for address number n in AKA list
Qualifiers:
Qualifiers:
Qualifiers are processed in the order presented, with any conflict
being resolved by subsequent qualifiers overridding any conflicting Qualifiers are processed in the order presented, with any conflict
previous qualifier in the list. being resolved by subsequent qualifiers overridding any conflicting
previous qualifier in the list.
Qualifiers may be not be presented with either NPU or HAT and should be
ignored if received with NPU or HAT. Qualifiers may be not be presented with either NPU or HAT and should be
ignored if received with NPU or HAT.
PickUp:
PickUp:
PMO PickUp Mail (ARCmail and Packets) ONLY
PMn PickUp Mail ONLY for address number n in AKA list PMO PickUp Mail (ARCmail and Packets) ONLY
PMn PickUp Mail ONLY for address number n in AKA list
NFE No TIC'S, associated files or files
attachs desired NFE No TIC'S, associated files or files
NFn No TIC'S, associated files or file attaches, attachs desired
for address number n in AKA list NFn No TIC'S, associated files or file attaches,
for address number n in AKA list
NXP No compressed mail pickup desired
NXn No compressed mail pickup desired, NXP No compressed mail pickup desired
for address number n in AKA list NXn No compressed mail pickup desired,
for address number n in AKA list
NRQ File requests not accepted by caller
This flag is presented if file request processing NRQ File requests not accepted by caller
is disabled TEMPORARILY for any reason This flag is presented if file request processing
NRn File requests not accepted by caller is disabled TEMPORARILY for any reason
for address number n in AKA list NRn File requests not accepted by caller
for address number n in AKA list
Note that NFE,NPX,NRQ != NPU
Note that NFE,NPX,NRQ != NPU
Hold:
Hold:
HNM Hold all traffic EXCEPT Mail (ARCmail and Packets)
HNn Hold all traffic EXCEPT Mail (ARCmail and Packets) HNM Hold all traffic EXCEPT Mail (ARCmail and Packets)
for address number n in AKA list HNn Hold all traffic EXCEPT Mail (ARCmail and Packets)
for address number n in AKA list
HXT Hold compressed mail traffic.
HXn Hold compressed mail traffic. HXT Hold compressed mail traffic.
for address number n in AKA list HXn Hold compressed mail traffic.
for address number n in AKA list
HFE Hold tic's and associated files
and file attaches other than mail HFE Hold tic's and associated files
HFn Hold tic's and associated files and file attaches other than mail
and file attaches other than mail HFn Hold tic's and associated files
for address number n in AKA list and file attaches other than mail
for address number n in AKA list
HRQ Hold file requests (not processed at this time)
This flag is presented if file request processing HRQ Hold file requests (not processed at this time)
is disabled TEMPORARILY for any reason This flag is presented if file request processing
HRn Hold file requests (not processed at this time) is disabled TEMPORARILY for any reason
for address number n in AKA list HRn Hold file requests (not processed at this time)
for address number n in AKA list
Note that HXT,HRQ,HFE == HAT
</PRE> Note that HXT,HRQ,HFE == HAT
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,60 +1,61 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>ISDN nodelist flags (rev.002).</TITLE> <HEAD>
</HEAD> <TITLE>ISDN nodelist flags (rev.002).</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
| Document: fsc-0091 <PRE>
| Version: 001 | Document: fsc-0091
| Date: 01 Jun 1996 | Version: 001
| Arjen Lentz, 2:283/512 | Date: 01 Jun 1996
| Arjen Lentz, 2:283/512
ISDN nodelist flags (rev.002) Arjen Lentz (agl@bitbike.com)
addendum to FTS-0005 FidoNet 2:283/512 ISDN nodelist flags (rev.002) Arjen Lentz (agl@bitbike.com)
superceding FSC-0075 October 30th, 1995 addendum to FTS-0005 FidoNet 2:283/512
superceding FSC-0075 October 30th, 1995
Input from Michael Buenter, Jan Ceuleers, Chris Lueders, and others. Thanks!
Input from Michael Buenter, Jan Ceuleers, Chris Lueders, and others. Thanks!
The proposed new information text in nodelist trailer is as follows:
The proposed new information text in nodelist trailer is as follows:
Nodelist Specification of minimal support required for this flag;
flag any additional support to be arranged via agreement between users Nodelist Specification of minimal support required for this flag;
======== ================================================================= flag any additional support to be arranged via agreement between users
V110L ITU-T V.110 19k2 async ('low'). ======== =================================================================
V110H ITU-T V.110 38k4 async ('high'). V110L ITU-T V.110 19k2 async ('low').
V120L ITU-T V.120 56k async, layer 2 framesize 259, window 7, modulo 8. V110H ITU-T V.110 38k4 async ('high').
V120H ITU-T V.120 64k async, layer 2 framesize 259, window 7, modulo 8. V120L ITU-T V.120 56k async, layer 2 framesize 259, window 7, modulo 8.
X75 ITU-T X.75 SLP (single link procedure) with 64kbit/s B channel; V120H ITU-T V.120 64k async, layer 2 framesize 259, window 7, modulo 8.
layer 2 max.framesize 2048, window 2, non-ext.mode (modulo 8); X75 ITU-T X.75 SLP (single link procedure) with 64kbit/s B channel;
layer 3 transparent (no packet layer). layer 2 max.framesize 2048, window 2, non-ext.mode (modulo 8);
ISDN Other configurations. Use *only* if none of the above fits. layer 3 transparent (no packet layer).
=========================================================================== ISDN Other configurations. Use *only* if none of the above fits.
NOTE: No flag implies another. Each capability MUST be specifically listed. ===========================================================================
If no modem connects are support, the nodelist speed field should be 300. NOTE: No flag implies another. Each capability MUST be specifically listed.
If no modem connects are support, the nodelist speed field should be 300.
Conversion from old to new ISDN capability flags:
- Nodes in the USA currently use the 'ISDN' flag. Conversion from old to new ISDN capability flags:
Most will be able to change to V120H (64k lines). - Nodes in the USA currently use the 'ISDN' flag.
Also many to V120L,V120H (64k lines) with autodetecting equipment. Most will be able to change to V120H (64k lines).
Some to only V120L (still with 56k lines). Also many to V120L,V120H (64k lines) with autodetecting equipment.
- Nodes in Europe currently use the ISDNA, ISDNB and ISDNC flags. Some to only V120L (still with 56k lines).
A simple translation will do the trick here. - Nodes in Europe currently use the ISDNA, ISDNB and ISDNC flags.
ISDNA -> V110L A simple translation will do the trick here.
ISDNB -> V110H ISDNA -&gt; V110L
ISDNC -> X75 ISDNB -&gt; V110H
ISDNC -&gt; X75
</PRE>
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,243 +1,244 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>New control lines for forwarded messages.</TITLE> <HEAD>
</HEAD> <TITLE>New control lines for forwarded messages.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
| Document: FSC-0092 <PRE>
| Version: 001 | Document: FSC-0092
| Date: September 12th 1996 | Version: 001
| Author: Michael Hohner | Date: September 12th 1996
| Author: Michael Hohner
New control lines
for forwarded messages New control lines
for forwarded messages
by
Michael Hohner by
2:2490/2520.17 Michael Hohner
2:2490/2520.17
September 1996
September 1996
Status of this document:
Status of this document:
This document proposes a standard for the Fidonet(tm) community
and for other networks using Fido technology. It may be freely This document proposes a standard for the Fidonet(tm) community
distributed if unchanged. and for other networks using Fido technology. It may be freely
distributed if unchanged.
You can reach the author at one of the addresses listed at the end
of the document. You can reach the author at one of the addresses listed at the end
of the document.
Abstract:
Abstract:
Most fidonet message editors offer a "forward" function. Using
this function a user A can sort of "redirect" a message from user B Most fidonet message editors offer a "forward" function. Using
to another user C, maybe because A is not the correct recipient or this function a user A can sort of "redirect" a message from user B
because C is a better person to answer the message. The name and to another user C, maybe because A is not the correct recipient or
address of B are usually included in the forward in free-text format. because C is a better person to answer the message. The name and
The message text is included in non-quoted format. address of B are usually included in the forward in free-text format.
The message text is included in non-quoted format.
A problem arises when the final recipient C wants to reply to sender B
of the forwarded message. The forward contains the intermediate user A A problem arises when the final recipient C wants to reply to sender B
as the sender. So user C must insert the name and address of B of the forwarded message. The forward contains the intermediate user A
manually, using the information contained in the message text. The as the sender. So user C must insert the name and address of B
message editor of C can't do this automatically because of the manually, using the information contained in the message text. The
free-text format. The editor will also use incorrect quote initials, message editor of C can't do this automatically because of the
which is at least irritating. free-text format. The editor will also use incorrect quote initials,
which is at least irritating.
This document introduces 6 new control lines which contain the header
information of the original message. With these control lines the This document introduces 6 new control lines which contain the header
message editor can use the original header information automatically. information of the original message. With these control lines the
message editor can use the original header information automatically.
Specifications:
Specifications:
There are 7 new control lines: FWDFROM, FWDTO, FWDORIG, FWDDEST,
FWDSUBJ, FWDAREA, FWDMSGID. As all control lines they start with an There are 7 new control lines: FWDFROM, FWDTO, FWDORIG, FWDDEST,
ASCII 01 character followed by the control line name followed by FWDSUBJ, FWDAREA, FWDMSGID. As all control lines they start with an
whitespace followed by the control line's content followed by ASCII 13. ASCII 01 character followed by the control line name followed by
whitespace followed by the control line's content followed by ASCII 13.
Please note that all these control lines do not have a colon (like the
control lines in FTS-0001). This would be just waste of space. Please note that all these control lines do not have a colon (like the
control lines in FTS-0001). This would be just waste of space.
FWDFROM
------- FWDFROM
-------
This control line contains the name of the original sender as found in
the FROM field of the original message. Leading and trailing This control line contains the name of the original sender as found in
whitespace should be removed. This control line should be omitted the FROM field of the original message. Leading and trailing
altogether if the FROM field is empty. whitespace should be removed. This control line should be omitted
altogether if the FROM field is empty.
FWDTO
----- FWDTO
-----
This control line contains the name of the original recipient as found
in the TO field of the original message. Leading and trailing This control line contains the name of the original recipient as found
whitespace should be removed. This control line should be omitted in the TO field of the original message. Leading and trailing
altogether if the TO field is empty. whitespace should be removed. This control line should be omitted
altogether if the TO field is empty.
FWDORIG
------- FWDORIG
-------
This control line contains the address of the original sender as found
in the ORIG field of the original message. The usual 5D ASCII notation This control line contains the address of the original sender as found
(zone:net/node.point@domain) should be used. This control line should in the ORIG field of the original message. The usual 5D ASCII notation
be omitted altogether if the address is not known. (zone:net/node.point@domain) should be used. This control line should
be omitted altogether if the address is not known.
FWDDEST
------- FWDDEST
-------
This control line contains the address of the original recipient as
found in the DEST field of the original message. The usual 5D ASCII This control line contains the address of the original recipient as
notation (zone:net/node.point@domain) should be used. This control line found in the DEST field of the original message. The usual 5D ASCII
should be omitted altogether if the address is not known or unsure notation (zone:net/node.point@domain) should be used. This control line
(as it is the case with forwarded echomail messages). should be omitted altogether if the address is not known or unsure
(as it is the case with forwarded echomail messages).
FWDSUBJ
------- FWDSUBJ
-------
This control line contains the subject line of the original message.
This control line should be omitted altogether if the SUBJ field is This control line contains the subject line of the original message.
empty. This control line should be omitted altogether if the SUBJ field is
This control line should by made optional for security reasons. Echo empty.
manager passwords are too easily revealed with it. This control line should by made optional for security reasons. Echo
manager passwords are too easily revealed with it.
FWDAREA
------- FWDAREA
-------
This control line contains the name of the echomail area where the
original message was forwarded from. It should be omitted altogether This control line contains the name of the echomail area where the
if the original message was not forwarded from an echomail area. original message was forwarded from. It should be omitted altogether
if the original message was not forwarded from an echomail area.
FWDMSGID
-------- FWDMSGID
--------
This control line contains the MSGID control line of the original
message. It should be omitted altogether if a MSGID control line is not This control line contains the MSGID control line of the original
present in the original message. message. It should be omitted altogether if a MSGID control line is not
present in the original message.
Usage:
Usage:
When the "forward" function of the message editor is invoked, the
editor program should generate the proposed control lines from the When the "forward" function of the message editor is invoked, the
header of the original message. If the original message already was editor program should generate the proposed control lines from the
a forwarded one (indicated by the presence of at least a FWDORIG header of the original message. If the original message already was
control line), the editor should keep all FWD* control lines and should a forwarded one (indicated by the presence of at least a FWDORIG
not add any FWD* control lines. This preserves the FWD* control lines control line), the editor should keep all FWD* control lines and should
of the first forwarder, containing the header data of the author of not add any FWD* control lines. This preserves the FWD* control lines
the original message. of the first forwarder, containing the header data of the author of
the original message.
The editor should not generate FWD* control lines, if the message isn't
to be forwarded. A mail forwarding robot may also generate these The editor should not generate FWD* control lines, if the message isn't
control lines, if it not just readdresses the message. to be forwarded. A mail forwarding robot may also generate these
control lines, if it not just readdresses the message.
When the "reply" function of the editor is invoked the program should
use the control lines' contents instead of the header information. The When the "reply" function of the editor is invoked the program should
control lines should not be included in the reply. use the control lines' contents instead of the header information. The
control lines should not be included in the reply.
Since it may not be immediately clear whether the user wants to reply
to the forwarder or to the original sender, the editor should offer a Since it may not be immediately clear whether the user wants to reply
means to ignore the proposed control lines and start a "normal" reply to the forwarder or to the original sender, the editor should offer a
instead, e.g. by two distinct functions, user preference or dialog. means to ignore the proposed control lines and start a "normal" reply
instead, e.g. by two distinct functions, user preference or dialog.
Pseudo code:
Pseudo code:
forwarding_message:
if is_forwarded_message then forwarding_message:
don't change FWD* control lines if is_forwarded_message then
else don't change FWD* control lines
add FWD* control lines else
add FWD* control lines
quoting_message:
if is_forwarded_message then quoting_message:
if reply_to_forwarder then if is_forwarded_message then
use header data (normal quoting) if reply_to_forwarder then
else use header data (normal quoting)
use FWD* control lines else
remove FWD* control lines from reply use FWD* control lines
else remove FWD* control lines from reply
use header data (normal quoting) else
use header data (normal quoting)
other_functions:
remove/ignore FWD* control lines other_functions:
remove/ignore FWD* control lines
Example:
Example:
Message from Joe User to my boss node:
Message from Joe User to my boss node:
From: Joe User 1:234/567
To: Harry Herrmannsdoerfer 2:2490/2520 From: Joe User 1:234/567
Subj: Some questions To: Harry Herrmannsdoerfer 2:2490/2520
@MSGID: 1:234/567 12345678 Subj: Some questions
Text: Hello Harry! @MSGID: 1:234/567 12345678
... Text: Hello Harry!
...
Harry forwards the message to me:
Harry forwards the message to me:
From: Harry Herrmannsdoerfer 2:2490/2520
To: Michael Hohner 2:2490/2520.17 From: Harry Herrmannsdoerfer 2:2490/2520
Subj: Joe's message To: Michael Hohner 2:2490/2520.17
@FWDFROM Joe User Subj: Joe's message
@FWDORIG 1:234/567 @FWDFROM Joe User
@FWDTO Harry Herrmannsdoerfer @FWDORIG 1:234/567
@FWDDEST 2:2490/2520 @FWDTO Harry Herrmannsdoerfer
@FWDSUBJ Some questions @FWDDEST 2:2490/2520
@FWDMSGID 1:234/567 12345678 @FWDSUBJ Some questions
Text: Hi Michael! @FWDMSGID 1:234/567 12345678
... Text: Hi Michael!
...
My answer using the new control lines:
My answer using the new control lines:
From: Michael Hohner 2:2490/2520.17
To: Joe User 1:234/567 From: Michael Hohner 2:2490/2520.17
Subj: Some questions To: Joe User 1:234/567
@REPLY: 1:234/567 12345678 Subj: Some questions
Text: Hi Joe! @REPLY: 1:234/567 12345678
Text: Hi Joe!
JU> ...
... JU&gt; ...
...
Compatiblity:
Compatiblity:
Editor programs which are not prepared for the proposed control lines
usually just ignore them and remove them from a reply. A reply goes Editor programs which are not prepared for the proposed control lines
to the forwarder. Nothing gained and nothing lost. usually just ignore them and remove them from a reply. A reply goes
to the forwarder. Nothing gained and nothing lost.
Implementations:
Implementations:
This proposal is implemented in the author's Fidonet editor
"FleetStreet for OS/2" (versions 1.17 and above). This proposal is implemented in the author's Fidonet editor
"FleetStreet for OS/2" (versions 1.17 and above).
Contacting the author:
Contacting the author:
The author may be contacted electronically at the following addresses:
The author may be contacted electronically at the following addresses:
Fidonet: 2:2490/2520.17
Internet: miho@osn.de Fidonet: 2:2490/2520.17
CompuServe: 100425,1754 Internet: miho@osn.de
CompuServe: 100425,1754
Suggestions, comments and corrections are always welcome.
Suggestions, comments and corrections are always welcome.
</PRE>
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,156 +1,157 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Reduced seen-by lines.</TITLE> <HEAD>
</HEAD> <TITLE>Reduced seen-by lines.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
| Document: FSC-0093 <PRE>
| Version: 001 | Document: FSC-0093
| Date: 13 September, 1996 | Version: 001
| Title: Reduced seen-by lines | Date: 13 September, 1996
| Author: Frank Ellermann, 2:240/5815.1 | Title: Reduced seen-by lines
| Author: Frank Ellermann, 2:240/5815.1
Reduced seen-by lines
Frank Ellermann, 2:240/5815.1 Reduced seen-by lines
Frank Ellermann, 2:240/5815.1
Abstract
-------- Abstract
A way to save great amounts (estimated 10 %) of echo mail traffic by --------
reducing "seen by" informations, compatible with existing echo mail A way to save great amounts (estimated 10 %) of echo mail traffic by
tossers conforming to FTS-0004. reducing "seen by" informations, compatible with existing echo mail
tossers conforming to FTS-0004.
Definitions
----------- Definitions
A thorough understanding of FTS-0004 is required, the reader should -----------
be familiar with PATH and SEEN-BY lines in echo mail, illegal and A thorough understanding of FTS-0004 is required, the reader should
legal echo mail distribution topologies, i.e. dup-rings, as well be familiar with PATH and SEEN-BY lines in echo mail, illegal and
as with some pre-requisite knowledge of zones, 4D and 2D addresses, legal echo mail distribution topologies, i.e. dup-rings, as well
and the "sticky" 2D notation in PATH and SEEN-BY lines. as with some pre-requisite knowledge of zones, 4D and 2D addresses,
and the "sticky" 2D notation in PATH and SEEN-BY lines.
PATH: path lines as specified in FTS-0004
FSB: full seen-by informations as specified in FTS-0004 PATH: path lines as specified in FTS-0004
TSB: tiny seen-by informations as mentioned in FTS-0004, see below FSB: full seen-by informations as specified in FTS-0004
RSB: reduced seen-by informations specified below TSB: tiny seen-by informations as mentioned in FTS-0004, see below
dupe: multiple arrival of the same echo mail (e.g. different paths) RSB: reduced seen-by informations specified below
dupe: multiple arrival of the same echo mail (e.g. different paths)
Examples of echo mail distribution topologies
--------------------------------------------- Examples of echo mail distribution topologies
In all examples a) to d) echo mail entered at system 1 is sent to ---------------------------------------------
systems 2 and 3 with FSB 1 2 3. Therefore system 2 (3) knows, that In all examples a) to d) echo mail entered at system 1 is sent to
system 3 (2) already got this mail, topology a) is perfectly legal. systems 2 and 3 with FSB 1 2 3. Therefore system 2 (3) knows, that
system 3 (2) already got this mail, topology a) is perfectly legal.
a) 1 - 3 b) 1 - 3 c) 1 - 3 d) 1 - 2
| / | | | / | | X | a) 1 - 3 b) 1 - 3 c) 1 - 3 d) 1 - 2
2 2 - 4 2 - 4 2 - 4 | / | | | / | | X |
2 2 - 4 2 - 4 2 - 4
In the exanmples b) and c) both systems 2 and 3 forward all mails
from system 1 to system 4, these topologies contain a dup-ring and In the exanmples b) and c) both systems 2 and 3 forward all mails
are therefore illegal following FTS-0004. from system 1 to system 4, these topologies contain a dup-ring and
are therefore illegal following FTS-0004.
The examples a) and d) show fully connected polygons with three or
four nodes. In example d) a mail entered at system 1 is sent to The examples a) and d) show fully connected polygons with three or
systems 2, 3, and 4 with FSB 1 2 3 4. The topologies a) and d) are four nodes. In example d) a mail entered at system 1 is sent to
perfectly legal, there are no dupes caused by distribution. systems 2, 3, and 4 with FSB 1 2 3 4. The topologies a) and d) are
perfectly legal, there are no dupes caused by distribution.
In example b) each mail entered at system 1 reaching system 4 via
system 2 carries FSB 1 2 3 4, therefore system 4 will not forward In example b) each mail entered at system 1 reaching system 4 via
such mails to 3. Using TSB at system 2 the same mails would carry system 2 carries FSB 1 2 3 4, therefore system 4 will not forward
TSB 2 4, therefore system 4 would forward them to 3 as dupes. such mails to 3. Using TSB at system 2 the same mails would carry
TSB 2 4, therefore system 4 would forward them to 3 as dupes.
Note that illegal topologies as in example b) and c) cause dupes
with either FSB or TSB. The real problem with TSB is example b), Note that illegal topologies as in example b) and c) cause dupes
as it allows for loop mails on the dup-ring 1 - 2 - 3 - 4 - ... with either FSB or TSB. The real problem with TSB is example b),
and vice versa, if no additional checks for dupes are employed. as it allows for loop mails on the dup-ring 1 - 2 - 3 - 4 - ...
and vice versa, if no additional checks for dupes are employed.
With RSB (specified below) systems contained in the PATH are not
stripped from the seen-by informations, therefore RSB avoid loop With RSB (specified below) systems contained in the PATH are not
mail much like FSB. stripped from the seen-by informations, therefore RSB avoid loop
mail much like FSB.
FSB algorithm
------------- FSB algorithm
1) add own system to the PATH. -------------
2) all area links not contained in the FSB qualify as recipients. 1) add own system to the PATH.
3) add own address(es) to the FSB set if not already contained. 2) all area links not contained in the FSB qualify as recipients.
4) add recipients to FSB, sort FSB, forward mail to recipients. 3) add own address(es) to the FSB set if not already contained.
4) add recipients to FSB, sort FSB, forward mail to recipients.
TSB algorithm
------------- TSB algorithm
1) add own system to the PATH. -------------
2) all area links not contained in the TSB qualify as recipients. 1) add own system to the PATH.
3) strip old TSB and start new TSB with own address(es). 2) all area links not contained in the TSB qualify as recipients.
4) add recipients to TSB, sort TSB and forward mail to recipients. 3) strip old TSB and start new TSB with own address(es).
4) add recipients to TSB, sort TSB and forward mail to recipients.
RSB algorithm
------------- RSB algorithm
1) add own system to the PATH. -------------
2) all area links not contained in the RSB qualify as recipients. 1) add own system to the PATH.
3) strip RSB addresses not matching an address in the PATH, then 2) all area links not contained in the RSB qualify as recipients.
add own address(es) to the RSB set if not already contained. 3) strip RSB addresses not matching an address in the PATH, then
4) add recipients to RSB, sort RSB and forward mail to recipients. add own address(es) to the RSB set if not already contained.
4) add recipients to RSB, sort RSB and forward mail to recipients.
PATH considerations
------------------- PATH considerations
There are 2 problems with the PATH kludge as specified in FTS-0004: -------------------
There are 2 problems with the PATH kludge as specified in FTS-0004:
First like in the FSB the addresses in the PATH are 2D, and having
the same 2D address in different zones is possible. Therefore zone First like in the FSB the addresses in the PATH are 2D, and having
gates are required to use the TSB algorithm. Unfortunately the PATH the same 2D address in different zones is possible. Therefore zone
is forwarded without regarding zone gating, therefore detection of gates are required to use the TSB algorithm. Unfortunately the PATH
loop mail based solely on the PATH could be erroneous. is forwarded without regarding zone gating, therefore detection of
loop mail based solely on the PATH could be erroneous.
Further FTS-0004 (written 1989) expects future echo mail tossers to
implement PATH support, but doesn't require this support from old Further FTS-0004 (written 1989) expects future echo mail tossers to
implementations. Strictly spoken the PATH is still only an option. implement PATH support, but doesn't require this support from old
implementations. Strictly spoken the PATH is still only an option.
In some areas of FidoNet (e.g. in zone 2) at least all non-terminal
nodes are required to fully support the PATH line, therefore this In some areas of FidoNet (e.g. in zone 2) at least all non-terminal
problem will probably not show up in praxis. Of course any tosser nodes are required to fully support the PATH line, therefore this
implementing the RSB feature is required to fully support the PATH. problem will probably not show up in praxis. Of course any tosser
implementing the RSB feature is required to fully support the PATH.
Summary
------- Summary
To show the benfits of RSB compared with FSB assume the following: -------
To show the benfits of RSB compared with FSB assume the following:
An echo mail travels from node to echo hub, host, major star, echo
host, hub, and finally arrives at a recipient. Each routing system An echo mail travels from node to echo hub, host, major star, echo
has 10 links, i.e. FSB at the recipient contain 51 addresses, about host, hub, and finally arrives at a recipient. Each routing system
400 characters, but RSB only 15 addresses in about 150 characters. has 10 links, i.e. FSB at the recipient contain 51 addresses, about
400 characters, but RSB only 15 addresses in about 150 characters.
Therefore in an echo mail with 2500 characters about 10 % of its
size can be reduced using RSB in favour of FSB. If this estimation Therefore in an echo mail with 2500 characters about 10 % of its
is applicable on world wide FidoNet echo mail traffic, RSB can save size can be reduced using RSB in favour of FSB. If this estimation
us an immense amount of costs. is applicable on world wide FidoNet echo mail traffic, RSB can save
us an immense amount of costs.
This document can be adopted by the FTSC as FTS, in this case it
has to be regarded as an addition to FTS-0004 with the extension, This document can be adopted by the FTSC as FTS, in this case it
that all non-terminal nodes are required to support PATH lines as has to be regarded as an addition to FTS-0004 with the extension,
specified in FTS-0004. that all non-terminal nodes are required to support PATH lines as
specified in FTS-0004.
For additional informations (e.g. aspects of zone gating) feel free
to send mails to Frank Ellermann 2:240/5815 or leo@bfispc.hanse.de For additional informations (e.g. aspects of zone gating) feel free
to send mails to Frank Ellermann 2:240/5815 or leo@bfispc.hanse.de
- eof -
</PRE> - eof -
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,210 +1,211 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Timezone information in FTN messages.</TITLE> <HEAD>
</HEAD> <TITLE>Timezone information in FTN messages.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
********************************************************************** <PRE>
FTSC FIDONET TECHNICAL STANDARDS COMMITTEE **********************************************************************
********************************************************************** FTSC FIDONET TECHNICAL STANDARDS COMMITTEE
**********************************************************************
Publication: FSP-1001
Revision: 2 Publication: FSP-1001
Title: Timezone information in FTN messages Revision: 2
Author: Odinn Sorensen, 2:236/77 Title: Timezone information in FTN messages
Revision Date: 27 September 1997 Author: Odinn Sorensen, 2:236/77
Expiry Date: 13 September 1999 Revision Date: 27 September 1997
---------------------------------------------------------------------- Expiry Date: 13 September 1999
Contents: ----------------------------------------------------------------------
1. Scope Contents:
2. Current practice 1. Scope
3. Kludge specification 2. Current practice
4. Timezone table 3. Kludge specification
5. Examples 4. Timezone table
---------------------------------------------------------------------- 5. Examples
----------------------------------------------------------------------
Status of this document
----------------------- Status of this document
-----------------------
This document is a Fidonet Standards Proposal (FSP).
This document is a Fidonet Standards Proposal (FSP).
This document specifies an optional Fidonet standard protocol for
the Fidonet community, and requests discussion and suggestions for This document specifies an optional Fidonet standard protocol for
improvements. the Fidonet community, and requests discussion and suggestions for
improvements.
This document is released to the public domain, and may be used,
copied or modified for any purpose whatever. This document is released to the public domain, and may be used,
copied or modified for any purpose whatever.
Abstract
-------- Abstract
--------
Current practice for Fidonet Technology Network (FTN) messages is to
store dates in local time. Timezone information (if known) is Current practice for Fidonet Technology Network (FTN) messages is to
usually lost. This document specifies a standard for storage of store dates in local time. Timezone information (if known) is
timezone information in FTN messages, in the form of a kludge named usually lost. This document specifies a standard for storage of
TZUTC. timezone information in FTN messages, in the form of a kludge named
TZUTC.
1. Scope
-------- 1. Scope
--------
This standard is specified for FTN messages in any form where
timezone information is not integrated in the message storage or This standard is specified for FTN messages in any form where
transport format. Specifically any form where the information would timezone information is not integrated in the message storage or
be lost if not stored in a kludge, such as in FTS-1 stored messages transport format. Specifically any form where the information would
or packets. be lost if not stored in a kludge, such as in FTS-1 stored messages
or packets.
2. Current practice
------------------- 2. Current practice
-------------------
Some kludges already exist to specify the timezone of messages,
notably "TZUTC" and "TZUTCINFO". Other kludges may exist. Some kludges already exist to specify the timezone of messages,
notably "TZUTC" and "TZUTCINFO". Other kludges may exist.
To the authors knowledge, no official specification exists for any
of these kludges. To the authors knowledge, no official specification exists for any
of these kludges.
From observations of these kludges in actual messages, TZUTC and
TZUTCINFO are identical except for the name. TZUTCINFO is probably From observations of these kludges in actual messages, TZUTC and
named after the JAM msgbase subfield of the same name. TZUTCINFO are identical except for the name. TZUTCINFO is probably
named after the JAM msgbase subfield of the same name.
This document adopts and documents the TZUTC kludge because it is
the shortest of them. This document adopts and documents the TZUTC kludge because it is
the shortest of them.
3. Kludge specification
----------------------- 3. Kludge specification
-----------------------
Messages which conform to this specification must add the kludge:
Messages which conform to this specification must add the kludge:
^aTZUTC: <current offset from UTC>
^aTZUTC: &lt;current offset from UTC&gt;
The offset has the format <[-]hhmm>, where hhmm is the number of
hours and minutes that local time is offset from UTC. If local time The offset has the format &lt;[-]hhmm&gt;, where hhmm is the number of
is WEST of UTC (Greenwich), then the offset is NEGATIVE. See the hours and minutes that local time is offset from UTC. If local time
table below for typical offsets. is WEST of UTC (Greenwich), then the offset is NEGATIVE. See the
table below for typical offsets.
Note that the hh in a timezone offset is not limited to a maximum of
12. This is because the International Date Line does not run exactly Note that the hh in a timezone offset is not limited to a maximum of
along the boundary between zone -1200 and +1200. The minutes part is 12. This is because the International Date Line does not run exactly
00 for most timezones. along the boundary between zone -1200 and +1200. The minutes part is
00 for most timezones.
All four digits must be present. If the offset is negative, there
must be a minus ('-', ASCII 45, 2Dh) in front of the offset. All four digits must be present. If the offset is negative, there
must be a minus ('-', ASCII 45, 2Dh) in front of the offset.
Implementations must NOT put a plus ('+', ASCII 43, 2Bh) in front of
the offset for positive numbers, but robust implementations should Implementations must NOT put a plus ('+', ASCII 43, 2Bh) in front of
be prepared to find (and ignore) a plus if it exists. the offset for positive numbers, but robust implementations should
be prepared to find (and ignore) a plus if it exists.
If local time changes as a result of, for example, daylight savings
time, then the offset in TZUTC need to be changed to reflect this. If local time changes as a result of, for example, daylight savings
time, then the offset in TZUTC need to be changed to reflect this.
When this kludge is present in a message, the "date written" field
in the stored message is guaranteed to be in local time for the When this kludge is present in a message, the "date written" field
given timezone. Note that this specification does not specify the in the stored message is guaranteed to be in local time for the
timezone for any other date fields. Other date fields (such as "date given timezone. Note that this specification does not specify the
received, arrived, processed, etc.") are usually in local time for timezone for any other date fields. Other date fields (such as "date
the system on which the messages are stored. received, arrived, processed, etc.") are usually in local time for
the system on which the messages are stored.
4. Timezone table
----------------- 4. Timezone table
-----------------
This table gives examples of typical timezones.
This table gives examples of typical timezones.
-1000 Alaska-Hawaii Standard Time
-0900 Hawaii Daylight Time -1000 Alaska-Hawaii Standard Time
-0800 Pacific Standard Time -0900 Hawaii Daylight Time
-0700 Pacific Daylight Time -0800 Pacific Standard Time
-0700 Mountain Standard Time -0700 Pacific Daylight Time
-0600 Mountain Daylight Time -0700 Mountain Standard Time
-0600 Central Standard Time -0600 Mountain Daylight Time
-0500 Central Daylight Time -0600 Central Standard Time
-0500 Eastern Standard Time -0500 Central Daylight Time
-0400 Eastern Daylight Time -0500 Eastern Standard Time
-0400 Atlantic Standard Time -0400 Eastern Daylight Time
-0330 Newfoundland Standard Time -0400 Atlantic Standard Time
-0300 Atlantic Daylight Time -0330 Newfoundland Standard Time
-0100 West Africa Time -0300 Atlantic Daylight Time
0000 Greenwich Mean Time -0100 West Africa Time
0100 Central European Time 0000 Greenwich Mean Time
0100 British Summer Time 0100 Central European Time
0200 Central European Summer Time 0100 British Summer Time
0200 Eastern European Time 0200 Central European Summer Time
0800 Australian Western Time 0200 Eastern European Time
0800 China Coast Time 0800 Australian Western Time
0900 Japan Standard Time 0800 China Coast Time
0900 Australian Western Daylight Time 0900 Japan Standard Time
0930 Australian Central Standard Time 0900 Australian Western Daylight Time
1000 Australian Eastern Standard Time 0930 Australian Central Standard Time
1030 Australian Central Daylight Time 1000 Australian Eastern Standard Time
1100 Australian Eastern Daylight Time 1030 Australian Central Daylight Time
1200 New Zealand Standard Time 1100 Australian Eastern Daylight Time
1300 New Zealand Daylight Time 1200 New Zealand Standard Time
1300 New Zealand Daylight Time
5. Examples
----------- 5. Examples
-----------
^aTZUTC: 0000
^aTZUTC: 0200 ^aTZUTC: 0000
^aTZUTC: -0700 ^aTZUTC: 0200
^aTZUTC: -0700
6. Redundancy
------------- 6. Redundancy
-------------
If the TZUTC data duplicates a field in a storage format in such a
way that no information is lost in conversion to or from the field, If the TZUTC data duplicates a field in a storage format in such a
then it is recommended that the kludge is not stored in the message. way that no information is lost in conversion to or from the field,
However, implementations are allowed to store the TZUTC even when then it is recommended that the kludge is not stored in the message.
redundant. However, implementations are allowed to store the TZUTC even when
redundant.
A. References
------------- A. References
-------------
[FTS-1] "A Basic FidoNet(r) Technical Standard Revision 16", Randy
Bush. September 1995. [FTS-1] "A Basic FidoNet(r) Technical Standard Revision 16", Randy
Bush. September 1995.
[JAM] "The JAM message base proposal", Joaquim Homrighausen, Andrew
Milner, Mats Birch and Mats Wallin. July 1993. [JAM] "The JAM message base proposal", Joaquim Homrighausen, Andrew
Milner, Mats Birch and Mats Wallin. July 1993.
B. Author contact data
---------------------- B. Author contact data
----------------------
Odinn Sorensen
Fidonet: 2:236/77 Odinn Sorensen
E-mail: odinn@goldware.dk Fidonet: 2:236/77
WWW: http://www.goldware.dk E-mail: odinn@goldware.dk
WWW: http://www.goldware.dk
C. History
---------- C. History
----------
Rev.1, 970913: First release.
Rev.2, 970927: Updated the timezone table. Added section about Rev.1, 970913: First release.
redundancy. Clarified what happens when local time Rev.2, 970927: Updated the timezone table. Added section about
changes. Clarified some of what the specification redundancy. Clarified what happens when local time
doesn't cover. changes. Clarified some of what the specification
doesn't cover.
**********************************************************************
</PRE> **********************************************************************
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,140 +1,141 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Numeric reply indication in FTN subject lines.</TITLE> <HEAD>
</HEAD> <TITLE>Numeric reply indication in FTN subject lines.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
********************************************************************** <PRE>
FTSC FIDONET TECHNICAL STANDARDS COMMITTEE **********************************************************************
********************************************************************** FTSC FIDONET TECHNICAL STANDARDS COMMITTEE
**********************************************************************
Publication: FSP-1002
Revision: 2 Publication: FSP-1002
Title: Numeric reply indication in FTN subject lines Revision: 2
Author: Odinn Sorensen, 2:236/77 Title: Numeric reply indication in FTN subject lines
Revision Date: 19 October 1997 Author: Odinn Sorensen, 2:236/77
Expiry Date: 11 October 1999 Revision Date: 19 October 1997
---------------------------------------------------------------------- Expiry Date: 11 October 1999
Contents: ----------------------------------------------------------------------
1. Scope Contents:
2. Format 1. Scope
3. Reply procedure 2. Format
---------------------------------------------------------------------- 3. Reply procedure
----------------------------------------------------------------------
Status of this document
----------------------- Status of this document
-----------------------
This document is a Fidonet Standards Proposal (FSP).
This document is a Fidonet Standards Proposal (FSP).
This document specifies an optional Fidonet standard protocol for
the Fidonet community, and requests discussion and suggestions for This document specifies an optional Fidonet standard protocol for
improvements. the Fidonet community, and requests discussion and suggestions for
improvements.
This document is released to the public domain, and may be used,
copied or modified for any purpose whatever. This document is released to the public domain, and may be used,
copied or modified for any purpose whatever.
Abstract
-------- Abstract
--------
When making a reply to a message, there are currently three common
ways to handle the subject line: When making a reply to a message, there are currently three common
ways to handle the subject line:
1. Don't change it.
2. Insert the string "Re: " in front of it. 1. Don't change it.
3. Insert the string "Re^n: " in front of it, where 'n' is increased 2. Insert the string "Re: " in front of it.
by one if the original subject was already a reply. 3. Insert the string "Re^n: " in front of it, where 'n' is increased
by one if the original subject was already a reply.
This document concerns itself with specifying the third variant.
This document concerns itself with specifying the third variant.
1. Scope
-------- 1. Scope
--------
This standard is specified for all FTN messages. Implementations
will typically be message editors and other software that creates This standard is specified for all FTN messages. Implementations
replies to messages. will typically be message editors and other software that creates
replies to messages.
2. Format
--------- 2. Format
---------
The format is "Re^n: ", where n is an unsigned integer number with
one or more digits. The range of the number must be at least 0 to The format is "Re^n: ", where n is an unsigned integer number with
255. Negative numbers are not allowed. Note that there must be a one or more digits. The range of the number must be at least 0 to
space after the colon. The letters are not case sensitive, but 255. Negative numbers are not allowed. Note that there must be a
uppercase 'R' and lowercase 'e' is recommended. space after the colon. The letters are not case sensitive, but
uppercase 'R' and lowercase 'e' is recommended.
3. Reply procedure
------------------ 3. Reply procedure
------------------
When making a reply that conforms to this specification, this
procedure, or a functionally identical one, must be followed: When making a reply that conforms to this specification, this
procedure, or a functionally identical one, must be followed:
1. If the original subject does not have a leading "Re: " or
"Re^n: ", put the string "Re: " in front of it. Don't use a 1. If the original subject does not have a leading "Re: " or
number here. "Re^n: ", put the string "Re: " in front of it. Don't use a
number here.
Example: "Hello world" -> "Re: Hello world"
Example: "Hello world" -&gt; "Re: Hello world"
2. If the original subject has a leading "Re: ", put the string
"Re^2: " in front of the subject. 2. If the original subject has a leading "Re: ", put the string
"Re^2: " in front of the subject.
Example: "Re: Hello world" -> "Re^2: Hello world"
Example: "Re: Hello world" -&gt; "Re^2: Hello world"
3. If the original subject has a leading "Re^n: ", increase the
number 'n' by one and modify the subject accordingly. 3. If the original subject has a leading "Re^n: ", increase the
number 'n' by one and modify the subject accordingly.
Example: "Re^4: Hello world" -> "Re^5: Hello world"
Example: "Re^4: Hello world" -&gt; "Re^5: Hello world"
Notes:
Notes:
* The numbers 0 and 1 should not occur in the "Re^n: " string under
normal circumstances, but a robust implementation should just * The numbers 0 and 1 should not occur in the "Re^n: " string under
increase the number in any case. normal circumstances, but a robust implementation should just
increase the number in any case.
* The number should not be increased beyond the range of the number
type used in the implementation, or in other words, it should not * The number should not be increased beyond the range of the number
roll around to zero. If it can't be increased, leave it alone. type used in the implementation, or in other words, it should not
roll around to zero. If it can't be increased, leave it alone.
* When inserting the "Re: " or "Re^n: " string in front of the
subject, information from the end might be lost, because the * When inserting the "Re: " or "Re^n: " string in front of the
message storage or packet formats use fixed length subject fields. subject, information from the end might be lost, because the
Intelligent subject-based reply linking software should be aware message storage or packet formats use fixed length subject fields.
of this and try to link correctly anyway. Intelligent subject-based reply linking software should be aware
of this and try to link correctly anyway.
A. Author contact data
---------------------- A. Author contact data
----------------------
Odinn Sorensen
Fidonet: 2:236/77 Odinn Sorensen
E-mail: odinn@goldware.dk Fidonet: 2:236/77
WWW: http://www.goldware.dk E-mail: odinn@goldware.dk
WWW: http://www.goldware.dk
B. History
---------- B. History
----------
Rev.1, 971011: First release.
Rev.2, 971019: Added note that "Re" is not case sensitive. Rev.1, 971011: First release.
Rev.2, 971019: Added note that "Re" is not case sensitive.
**********************************************************************
</PRE> **********************************************************************
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,116 +1,117 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Suggested use of Nodelist Fields.</TITLE> <HEAD>
</HEAD> <TITLE>Suggested use of Nodelist Fields.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
********************************************************************** <PRE>
FTSC FIDONET TECHNICAL STANDARDS COMMITTEE **********************************************************************
********************************************************************** FTSC FIDONET TECHNICAL STANDARDS COMMITTEE
**********************************************************************
Publication: FSP-1003
Revision: 1 Publication: FSP-1003
Title: Suggested use of Nodelist Fields Revision: 1
Author: Lee Kindness Title: Suggested use of Nodelist Fields
Revision Date: 15 May 1997 Author: Lee Kindness
Expiry Date: 15 May 1999 Revision Date: 15 May 1997
---------------------------------------------------------------------- Expiry Date: 15 May 1999
Contents: ----------------------------------------------------------------------
1. Field 3, Node Name Contents:
2. Field 4, Location 1. Field 3, Node Name
3. Field 5, Sysop Name 2. Field 4, Location
---------------------------------------------------------------------- 3. Field 5, Sysop Name
----------------------------------------------------------------------
Status of this document
----------------------- Status of this document
-----------------------
This document is a Fidonet Standards Proposal (FSP).
This document is a Fidonet Standards Proposal (FSP).
This document specifies an optional Fidonet standard protocol for
the Fidonet community, and requests discussion and suggestions for This document specifies an optional Fidonet standard protocol for
improvements. the Fidonet community, and requests discussion and suggestions for
improvements.
This document is released to the public domain, and may be used,
copied or modified for any purpose whatever. This document is released to the public domain, and may be used,
copied or modified for any purpose whatever.
Introduction
------------ Introduction
------------
This document makes recommendations on the use of various fields in
the distribution nodelist (St. Louis nodelist format", fts-0005). This document makes recommendations on the use of various fields in
Naturally it is the choice of the *C's if they want to use them. the distribution nodelist (St. Louis nodelist format", fts-0005).
Remember the fts-0005 requirements should still be adhered to. Naturally it is the choice of the *C's if they want to use them.
Remember the fts-0005 requirements should still be adhered to.
1. Field 3, Node Name
--------------------- 1. Field 3, Node Name
---------------------
The node name field should be no more than 20 characters long. For
comparison in nodelist.122'1997 the minimum entry was 1, maximum 51! The node name field should be no more than 20 characters long. For
and the average was 14. comparison in nodelist.122'1997 the minimum entry was 1, maximum 51!
and the average was 14.
For zone entries this field should contain a description of the
zones area, (eg North America, Europe). For region entries it should For zone entries this field should contain a description of the
contain the country/state, for host entries the local area name and zones area, (eg North America, Europe). For region entries it should
for hub entries a description of the area the hub serves. contain the country/state, for host entries the local area name and
for hub entries a description of the area the hub serves.
2. Field 4, Location
-------------------- 2. Field 4, Location
--------------------
This field contains the location of the node. It should usually be
expressed as the primary local location (town, suburb, city, etc.) This field contains the location of the node. It should usually be
plus an identifier of the regional geopolitical administrative expressed as the primary local location (town, suburb, city, etc.)
district (state, province, department, county, etc.). Wherever plus an identifier of the regional geopolitical administrative
possible, standard postal abbreviations for the major regional district (state, province, department, county, etc.). Wherever
district should be used (IL, BC, NSW, UK, etc.). possible, standard postal abbreviations for the major regional
district should be used (IL, BC, NSW, UK, etc.).
For zone and region entries this field should also have the julian
day of segment creation appended to it (eg "Somearea_(122)") to aid For zone and region entries this field should also have the julian
checks on the validity of the nodelist. day of segment creation appended to it (eg "Somearea_(122)") to aid
checks on the validity of the nodelist.
3. Field 5, Sysop Name
---------------------- 3. Field 5, Sysop Name
----------------------
This field contains the name of the system operator. Entries such as
"postmaster" and "uucp" should not be used. Aliases should not be This field contains the name of the system operator. Entries such as
permitted in this field (as they give Fidonet a 'less respectable' "postmaster" and "uucp" should not be used. Aliases should not be
image). permitted in this field (as they give Fidonet a 'less respectable'
image).
A. Author contact data
---------------------- A. Author contact data
----------------------
Lee Kindness
Fidonet: n/a Lee Kindness
E-mail: wangi@earthling.net Fidonet: n/a
WWW: http://www.scms.rgu.ac.uk/students/cs_yr94/lk/fido.html E-mail: wangi@earthling.net
WWW: http://www.scms.rgu.ac.uk/students/cs_yr94/lk/fido.html
B. History
---------- B. History
----------
Rev.1, 971101: First release as FSP, based on the Fidonews 14/20
article. Transformed into FSP document by Odinn Rev.1, 971101: First release as FSP, based on the Fidonews 14/20
Sorensen. article. Transformed into FSP document by Odinn
Sorensen.
**********************************************************************
</PRE> **********************************************************************
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,257 +1,258 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Standard FidoNet Addressing.</TITLE> <HEAD>
</HEAD> <TITLE>Standard FidoNet Addressing.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
********************************************************************** <PRE>
FTSC FIDONET TECHNICAL STANDARDS COMMITTEE **********************************************************************
********************************************************************** FTSC FIDONET TECHNICAL STANDARDS COMMITTEE
**********************************************************************
Publication: FSP-1004
Revision: 1 Publication: FSP-1004
Title: Standard Fidonet Addressing Revision: 1
Author: Lee Kindness Title: Standard Fidonet Addressing
Revision Date: 15 May 1997 Author: Lee Kindness
Expiry Date: 15 May 1999 Revision Date: 15 May 1997
---------------------------------------------------------------------- Expiry Date: 15 May 1999
Contents: ----------------------------------------------------------------------
1. Standard Fidonet Addressing Contents:
2. Internet Gateway Addressing 1. Standard Fidonet Addressing
3. Routing Address Syntax 2. Internet Gateway Addressing
---------------------------------------------------------------------- 3. Routing Address Syntax
----------------------------------------------------------------------
Status of this document
----------------------- Status of this document
-----------------------
This document is a Fidonet Standards Proposal (FSP).
This document is a Fidonet Standards Proposal (FSP).
This document specifies an optional Fidonet standard protocol for
the Fidonet community, and requests discussion and suggestions for This document specifies an optional Fidonet standard protocol for
improvements. the Fidonet community, and requests discussion and suggestions for
improvements.
This document is released to the public domain, and may be used,
copied or modified for any purpose whatever. This document is released to the public domain, and may be used,
copied or modified for any purpose whatever.
Introduction
------------ Introduction
------------
This document describes the standard form of addressing in Fidonet
today along with the common method of addressing via internet This document describes the standard form of addressing in Fidonet
gateways. In addition it proposes an extended addressing syntax, today along with the common method of addressing via internet
useful for routing purposes. This is a draft for comments and gateways. In addition it proposes an extended addressing syntax,
suggestions. useful for routing purposes. This is a draft for comments and
suggestions.
1. Standard Fidonet Addressing
------------------------------ 1. Standard Fidonet Addressing
------------------------------
Fidonet addressing uses the following format:
Fidonet addressing uses the following format:
ZZ:NN/FF.PP@DO
ZZ:NN/FF.PP@DO
where the fields refer to...
where the fields refer to...
ZZ - Zone Number: The zone the node is part of.
Min: 1 Max: 32767 ZZ - Zone Number: The zone the node is part of.
If 'ZZ:' is missing then assume 1 as the zone. Min: 1 Max: 32767
If 'ZZ:' is missing then assume 1 as the zone.
NN - Net Number: The network the node is a member of.
Min: 1 Max: 32767 NN - Net Number: The network the node is a member of.
Must be present. Min: 1 Max: 32767
Must be present.
FF - Node Number: The actual node number.
Min: -1 Max: 32767 FF - Node Number: The actual node number.
Must be present. Min: -1 Max: 32767
Must be present.
PP - Point Number: If the system is a point rather than a node then
this is their point number off the node. PP - Point Number: If the system is a point rather than a node then
Min: 0 Max: 32767 this is their point number off the node.
If '.PP' is missing then assume 0 (ie not a Min: 0 Max: 32767
point) as the point number. If '.PP' is missing then assume 0 (ie not a
point) as the point number.
DO - Domain: The name of the 'Fidonet Technology Network'.
Maximum length of 8 characters. The domain DO - Domain: The name of the 'Fidonet Technology Network'.
should not include periods, thus 'fidonet.org' Maximum length of 8 characters. The domain
is invalid (should be fidonet). should not include periods, thus 'fidonet.org'
If '@DO' is missing then fidonet can be assumed. is invalid (should be fidonet).
If '@DO' is missing then fidonet can be assumed.
The following are all valid examples:
1:234/5.6@fidonet (a '5D' address) => 1:234/5.6@fidonet The following are all valid examples:
2:34/6.78 (a '4D' address) => 2:34/6.78@fidonet 1:234/5.6@fidonet (a '5D' address) =&gt; 1:234/5.6@fidonet
4:610/34 (a '3D' address) => 4:610/34.0@fidonet 2:34/6.78 (a '4D' address) =&gt; 2:34/6.78@fidonet
123/45 (a '2D' address) => 1:123/45.0@fidonet 4:610/34 (a '3D' address) =&gt; 4:610/34.0@fidonet
955:95/2@othernet (another FTN) => 955:95/2.0@othernet 123/45 (a '2D' address) =&gt; 1:123/45.0@fidonet
2:259/-1 (node application) => 2:259/-1.0@fidonet 955:95/2@othernet (another FTN) =&gt; 955:95/2.0@othernet
2:259/-1 (node application) =&gt; 2:259/-1.0@fidonet
The limits on each various part of the address are a result of
fts-0005 (zone, net, node, point), fsc-0045 (domain) and Policy 4 The limits on each various part of the address are a result of
(-1 node address for node application). fts-0005 (zone, net, node, point), fsc-0045 (domain) and Policy 4
(-1 node address for node application).
2. Internet Gateway Addressing
------------------------------ 2. Internet Gateway Addressing
------------------------------
An internet user can send email/netmail to a fidonet user via one of
the fidonet->internet gateway systems (it's out-with the scope of An internet user can send email/netmail to a fidonet user via one of
this document to describe the semantics of posting). The internet the fidonet-&gt;internet gateway systems (it's out-with the scope of
user would send an email to a Fidonet user by using an email address this document to describe the semantics of posting). The internet
of the following syntax: user would send an email to a Fidonet user by using an email address
of the following syntax:
user.name@pPP.fFF.nNN.zZZ.gateway.domain
user.name@pPP.fFF.nNN.zZZ.gateway.domain
where the fields refer to...
where the fields refer to...
user.name - Name: Name of the user the email is being sent
to, spaces replaced by periods. user.name - Name: Name of the user the email is being sent
to, spaces replaced by periods.
PP - Point Number: As Fidonet address (FA)
If '.pPP' is missing 0 is assumed. PP - Point Number: As Fidonet address (FA)
If '.pPP' is missing 0 is assumed.
FF - Node Number: As FA
Must be present. FF - Node Number: As FA
Must be present.
NN - Net Number: As FA
Must be present. NN - Net Number: As FA
Must be present.
ZZ - Zone Number: As FA
Must be present. ZZ - Zone Number: As FA
Must be present.
gate.way - Gateway: Internet domain of the gateway, for
example 'fidonet.org'. gate.way - Gateway: Internet domain of the gateway, for
Must be present. example 'fidonet.org'.
Must be present.
The following are all valid examples (assuming 'fidonet.org' is an
internet gateway): The following are all valid examples (assuming 'fidonet.org' is an
internet gateway):
joe.bloggs@p6.f5.n234.z1.fidonet.org => 1:234/5.6@fidonet
harry.cat@p78.f6.n34.z2.fidonet.org => 2:34/6.78@fidonet joe.bloggs@p6.f5.n234.z1.fidonet.org =&gt; 1:234/5.6@fidonet
i.be.jolly@f34.n610.z4.fidonet.org => 4:610/34.0@fidonet harry.cat@p78.f6.n34.z2.fidonet.org =&gt; 2:34/6.78@fidonet
i.be.jolly@f34.n610.z4.fidonet.org =&gt; 4:610/34.0@fidonet
and if 'foo.bar.org.uk' is a gateway for 'othernet':
and if 'foo.bar.org.uk' is a gateway for 'othernet':
louise.hat@f2.n95.z955.foo.bar.org.uk => 955:95/2.0@othernet
louise.hat@f2.n95.z955.foo.bar.org.uk =&gt; 955:95/2.0@othernet
3. Routing Address Syntax
------------------------- 3. Routing Address Syntax
-------------------------
The two previous address types (Fidonet and Internet->Fidonet
gateway) are common practice, this however is a suggested standard The two previous address types (Fidonet and Internet-&gt;Fidonet
of addressing for routing tables. The routing address has the gateway) are common practice, this however is a suggested standard
following syntax: of addressing for routing tables. The routing address has the
following syntax:
DD:ZZ:RR:NN:HH:FF:PP
DD:ZZ:RR:NN:HH:FF:PP
where the fields refer to:
where the fields refer to:
DD - Domain: As FA
Must be present, even if blank (ie a leading DD - Domain: As FA
':') to ensure we always have 6 ':'s in an Must be present, even if blank (ie a leading
address to aid pattern matching. ':') to ensure we always have 6 ':'s in an
address to aid pattern matching.
ZZ - Zone Number: As FA
Must be present. ZZ - Zone Number: As FA
Must be present.
RR - Region Number: The region (from fts-0005 nodelist) that the
following network is in. RR - Region Number: The region (from fts-0005 nodelist) that the
Min: 1 Max: 32767 following network is in.
Must be present. Min: 1 Max: 32767
Must be present.
NN - Net Number: As FA
Must be present. NN - Net Number: As FA
Must be present.
HH - Hub: The hub (from fts-0005 nodelist) that the node
is under, or 0 (host hub). HH - Hub: The hub (from fts-0005 nodelist) that the node
Min: 1 Max: 32767 is under, or 0 (host hub).
Must be present. Min: 1 Max: 32767
Must be present.
FF - Node Number: As FA
Must be present. FF - Node Number: As FA
Must be present.
PP - Point Number: As FA
Must be present. PP - Point Number: As FA
Must be present.
':' has been chosen as the separator as it is not a POSIX regular
expression character or globing character (where as '.' is) and thus ':' has been chosen as the separator as it is not a POSIX regular
always easy use of wildcards on the address. The following points expression character or globing character (where as '.' is) and thus
should be noted: always easy use of wildcards on the address. The following points
should be noted:
1. All addresses have 6 ':'s
2. The domain is at the front, the address gets more specific to 1. All addresses have 6 ':'s
the right 2. The domain is at the front, the address gets more specific to
3. Nodes have 0 as their point number the right
4. A zone net has identical zone, region and net fields 3. Nodes have 0 as their point number
5. A region net has identical region and net fields 4. A zone net has identical zone, region and net fields
5. A region net has identical region and net fields
Example fidonet addresses converted to routing addresses:
Example fidonet addresses converted to routing addresses:
fidonet:2:25:259:0:7:0 => 2:259/7.0@fidonet, region 25, hub 0
fidonet:1:1:1:0:23:0 => 1:1/23.0@fidonet, zone 1 net fidonet:2:25:259:0:7:0 =&gt; 2:259/7.0@fidonet, region 25, hub 0
:955:9551:95:300:45:0 => 955:95/45.0, region 9551, hub 300 fidonet:1:1:1:0:23:0 =&gt; 1:1/23.0@fidonet, zone 1 net
fidonet:2:25:25:0:0:0 => 2:25/0.0@fidonet, R25C :955:9551:95:300:45:0 =&gt; 955:95/45.0, region 9551, hub 300
cnet:12:34:341:100:1:7 => 12:341/1.7@cnet, region 34, hub 100 fidonet:2:25:25:0:0:0 =&gt; 2:25/0.0@fidonet, R25C
:2:25:259:300:300:0 => 2:259/300.0, region 25, hub 300 cnet:12:34:341:100:1:7 =&gt; 12:341/1.7@cnet, region 34, hub 100
:2:25:259:300:300:0 =&gt; 2:259/300.0, region 25, hub 300
Example POSIX regular expression patterns on routing addresses:
Example POSIX regular expression patterns on routing addresses:
[a-z]*:[0-9]+:[0-9]+:[0-9]+:[0-9]+:[0-9]+:[0-9]+ (any address)
[a-z]*(:[0-9]+)+ (any address) [a-z]*:[0-9]+:[0-9]+:[0-9]+:[0-9]+:[0-9]+:[0-9]+ (any address)
fidonet:2:25:[0-9]+:[0-9]+:[0-9]+:[0-9]+ (region 25 node) [a-z]*(:[0-9]+)+ (any address)
fidonet:2:25(:[0-9]+)+ (region 25 node) fidonet:2:25:[0-9]+:[0-9]+:[0-9]+:[0-9]+ (region 25 node)
fidonet:1:12:125(:[0-9]+)+ (all net 1:125 nodes) fidonet:2:25(:[0-9]+)+ (region 25 node)
fidonet:1:12:125:200(:[0-9]+)+ (all hub 1:125/200 downlinks) fidonet:1:12:125(:[0-9]+)+ (all net 1:125 nodes)
fidonet:1:12:125:200:2:[0-9]+ (all 1:125/2 points) fidonet:1:12:125:200(:[0-9]+)+ (all hub 1:125/200 downlinks)
fidonet:1:12:125:[0-9]+:(25|34|56):0 fidonet:1:12:125:200:2:[0-9]+ (all 1:125/2 points)
(nodes 1:125/25.0, 1:125/34.0 and 1:125/56.0) fidonet:1:12:125:[0-9]+:(25|34|56):0
(nodes 1:125/25.0, 1:125/34.0 and 1:125/56.0)
Example 'DOS style' patterns on routing addresses:
Example 'DOS style' patterns on routing addresses:
*:*:*:*:*:*:* (any address)
fidonet:2:25:*:*:*:* (region 25 node) *:*:*:*:*:*:* (any address)
fidonet:1:12:125:*:*:* (all net 1:125 nodes) fidonet:2:25:*:*:*:* (region 25 node)
fidonet:1:12:125:200:*:* (all hub 1:125/200 downlinks) fidonet:1:12:125:*:*:* (all net 1:125 nodes)
fidonet:1:12:125:200:2:* (all 1:125/2 points) fidonet:1:12:125:200:*:* (all hub 1:125/200 downlinks)
fidonet:1:12:125:*:3*:0 (any net 1:125 nodes starting with 3) fidonet:1:12:125:200:2:* (all 1:125/2 points)
fidonet:1:12:125:*:3?:0 (net 1:125 nodes 30 thru 39) fidonet:1:12:125:*:3*:0 (any net 1:125 nodes starting with 3)
fidonet:1:12:125:*:3?:0 (net 1:125 nodes 30 thru 39)
The standard doesn't define which standard of pattern matching to
use, only the format of the addresses. These routing addresses would The standard doesn't define which standard of pattern matching to
be used in routing tables and configurations. use, only the format of the addresses. These routing addresses would
be used in routing tables and configurations.
A. Author contact data
---------------------- A. Author contact data
----------------------
Lee Kindness
Fidonet: n/a Lee Kindness
E-mail: wangi@earthling.net Fidonet: n/a
WWW: http://www.scms.rgu.ac.uk/students/cs_yr94/lk/fido.html E-mail: wangi@earthling.net
WWW: http://www.scms.rgu.ac.uk/students/cs_yr94/lk/fido.html
B. History
---------- B. History
----------
Rev.1, 971101: First release as FSP, based on the Fidonews 14/20
article. Transformed into FSP document by Odinn Rev.1, 971101: First release as FSP, based on the Fidonews 14/20
Sorensen. article. Transformed into FSP document by Odinn
Sorensen.
**********************************************************************
</PRE> **********************************************************************
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,450 +1,451 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Zone 2 nodelist flags.</TITLE> <HEAD>
</HEAD> <TITLE>Zone 2 nodelist flags.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
********************************************************************** <PRE>
FTSC FIDONET TECHNICAL STANDARDS COMMITTEE **********************************************************************
********************************************************************** FTSC FIDONET TECHNICAL STANDARDS COMMITTEE
**********************************************************************
Publication: FSP-1005
Revision: 6 Publication: FSP-1005
Title: Zone 2 nodelist flags Revision: 6
Author: Frank Ellermann, 2:240/5815.1 Title: Zone 2 nodelist flags
Revision Date: 27 November 1997 Author: Frank Ellermann, 2:240/5815.1
Expiry Date: 27 November 1999 Revision Date: 27 November 1997
--------------------------------------------------------------------- Expiry Date: 27 November 1999
Contents: ---------------------------------------------------------------------
1. Introduction Contents:
2. FTS-0005 flags 1. Introduction
3. User flags 2. FTS-0005 flags
4. Approved zone 2 user flags 3. User flags
5. Flag implications 4. Approved zone 2 user flags
6. Invalid combinations 5. Flag implications
7. Baud rate field 6. Invalid combinations
8. Thanks to... 7. Baud rate field
--------------------------------------------------------------------- 8. Thanks to...
---------------------------------------------------------------------
1. Introduction
--------------- 1. Introduction
This document informs about known differences of FidoNet zone 2 ---------------
nodelist flags from FTS-0005.003. The ultimate sources for these This document informs about known differences of FidoNet zone 2
informations are the current Z2 nodelist epilogue and the setup nodelist flags from FTS-0005.003. The ultimate sources for these
for flag corrections at Z2C, but it may be difficult to get these informations are the current Z2 nodelist epilogue and the setup
sources for readers in other zones. for flag corrections at Z2C, but it may be difficult to get these
sources for readers in other zones.
| All changes since version 5 are marked by a bar at the left edge.
It is (again) possible to list V32b and V42b in zone 2, upper case | All changes since version 5 are marked by a bar at the left edge.
V32B or V42B is not more enforced. Currently new flags needed for It is (again) possible to list V32b and V42b in zone 2, upper case
IP-connectivity are under test in zone 2 (only internally), e.g. V32B or V42B is not more enforced. Currently new flags needed for
IP-connectivity are under test in zone 2 (only internally), e.g.
-> VM VModem, default port 3141, dummy country code 000-
-> IFC IFCico, default port 60179, dummy country code 000- -&gt; VM VModem, default port 3141, dummy country code 000-
-> BND BinkP, default port 24544, dummy country code 000- -&gt; IFC IFCico, default port 60179, dummy country code 000-
-> IP general IP connectivity, dummy country code 000- -&gt; BND BinkP, default port 24544, dummy country code 000-
-> TELN Telnet dummy country code 000- -&gt; IP general IP connectivity, dummy country code 000-
-&gt; TELN Telnet dummy country code 000-
2. FTS-0005 flags
----------------- 2. FTS-0005 flags
The following flags are used as specified in FTS-0005.003: -----------------
The following flags are used as specified in FTS-0005.003:
CM Continuous Mail, node accepts mail 24 hours a day
MO Mailer Only (no BBS) CM Continuous Mail, node accepts mail 24 hours a day
LO Listed Only, node accepts calls only from listed MO Mailer Only (no BBS)
node numbers in the current FidoNet nodelist LO Listed Only, node accepts calls only from listed
node numbers in the current FidoNet nodelist
-> V21 ITU-T V21 300 bps full duplex (obsolete)
V22 ITU-T V22 1200 bps full duplex (obsolescent) -&gt; V21 ITU-T V21 300 bps full duplex (obsolete)
V22 ITU-T V22 1200 bps full duplex (obsolescent)
| In zone 2 the value 1200 in the baud rate field implies V22. Only
| two nodes not supporting at least V22bis, ISDN, or IP still exist | In zone 2 the value 1200 in the baud rate field implies V22. Only
| in the zone 2 segment. Flag V22 is almost obsolete, and V21 is | two nodes not supporting at least V22bis, ISDN, or IP still exist
| already removed in Z2. Both flags should be dropped from the next | in the zone 2 segment. Flag V22 is almost obsolete, and V21 is
| FTS-0005 version. | already removed in Z2. Both flags should be dropped from the next
| FTS-0005 version.
V29 ITU-T V29 9600 bps half duplex (obsolescent)
-> V33 ITU-T V33 14400 bps half duplex (obsolete) V29 ITU-T V29 9600 bps half duplex (obsolescent)
-&gt; V33 ITU-T V33 14400 bps half duplex (obsolete)
V33 cannot be used in connecting FidoNet nodes over public dial-up
lines and is most probably a historical error in FTS-0005. A very V33 cannot be used in connecting FidoNet nodes over public dial-up
similar argument is applicable on V29, all nodes flying this flag lines and is most probably a historical error in FTS-0005. A very
support at least V32. Today only one node in Z2 still flies V29, similar argument is applicable on V29, all nodes flying this flag
and V33 is already removed in Z2. Both flags should be dropped in support at least V32. Today only one node in Z2 still flies V29,
the next FTS-0005 version. and V33 is already removed in Z2. Both flags should be dropped in
the next FTS-0005 version.
V32 ITU-T V32 9600 bps full duplex
V32b ITU-T V32bis 14400 bps full duplex (implies V32) V32 ITU-T V32 9600 bps full duplex
| V34 ITU-T V34 28800 bps full duplex (33600 bps option) V32b ITU-T V32bis 14400 bps full duplex (implies V32)
| V34 ITU-T V34 28800 bps full duplex (33600 bps option)
FTS-0005 specifies V32b and V42b (capital V and small b), current
nodelist practice in FidoNet shows all combinations of small and FTS-0005 specifies V32b and V42b (capital V and small b), current
capital letters for flags. This was no problem before FSC-0062 nodelist practice in FidoNet shows all combinations of small and
introduced case-sensitive flags. The best solution is to stick to capital letters for flags. This was no problem before FSC-0062
the current practice and treat all old flags as case-insensitive. introduced case-sensitive flags. The best solution is to stick to
the current practice and treat all old flags as case-insensitive.
H96 Hayes V9600
HST USR Courier HST up to 9600 (implies MNP) H96 Hayes V9600
H14 USR Courier HST up to 14400 (implies HST) HST USR Courier HST up to 9600 (implies MNP)
-> H16 USR Courier HST up to 16800 (implies H14 and V42b) H14 USR Courier HST up to 14400 (implies HST)
MAX Microcom AX/96xx series (almost obsolete) -&gt; H16 USR Courier HST up to 16800 (implies H14 and V42b)
PEP Packet Ensemble Protocol MAX Microcom AX/96xx series (almost obsolete)
CSP Compucom Speedmodem PEP Packet Ensemble Protocol
-> ZYX Zyxel series 16800 bps (implies V32b and V42b) CSP Compucom Speedmodem
-> V32T V.32 Terbo 19200 bps (implies V32b) -&gt; ZYX Zyxel series 16800 bps (implies V32b and V42b)
VFC V.Fast Class 28800 bps (should imply V32b and V42b) -&gt; V32T V.32 Terbo 19200 bps (implies V32b)
VFC V.Fast Class 28800 bps (should imply V32b and V42b)
If a flag directly or indirectly implies other flags, then these
other flags are not shown in a nodelist entry, because this would If a flag directly or indirectly implies other flags, then these
be redundant. Unfortunately the rules for redundancies in zone 2 other flags are not shown in a nodelist entry, because this would
and FTS-0005 are different. Zone 2 continued to avoid redundancy be redundant. Unfortunately the rules for redundancies in zone 2
with most "new" flags, but FTS-0005.003 specified no redundancies and FTS-0005 are different. Zone 2 continued to avoid redundancy
for "new" flags like ZYX, H16, V32T, or VFC. "New" flags in this with most "new" flags, but FTS-0005.003 specified no redundancies
context are flags approved by FidoNet International Coordinators for "new" flags like ZYX, H16, V32T, or VFC. "New" flags in this
since 1989, when FTS-0005.TXT, the predecesssor of FTS-0005.003, context are flags approved by FidoNet International Coordinators
was published. since 1989, when FTS-0005.TXT, the predecesssor of FTS-0005.003,
was published.
For details see the chapter "implications" below, for now only
note, that in zone 2 H16 implies V42b, ZYX implies V32b and V42b, For details see the chapter "implications" below, for now only
and V32T implies V32b. note, that in zone 2 H16 implies V42b, ZYX implies V32b and V42b,
and V32T implies V32b.
Zone 1 and zone 2 have introduced a user flag Z19 approved by the
corresponding Zone Coordinator. User flags are discussed later, Zone 1 and zone 2 have introduced a user flag Z19 approved by the
for now only note, that in zone 2 ZYX is specified as Zyxel 16k8, corresponding Zone Coordinator. User flags are discussed later,
while FTS-0005.003 not knowing Z19 specifies ZYX as generic flag for now only note, that in zone 2 ZYX is specified as Zyxel 16k8,
for all Zyxel protocol speeds. while FTS-0005.003 not knowing Z19 specifies ZYX as generic flag
for all Zyxel protocol speeds.
Today only one node in FidoNet still really flies MAX, this flag
is obsolete and should be dropped from FTS-0005. The flags CSP Today only one node in FidoNet still really flies MAX, this flag
(7 nodes worldwide) and H96 should be marked as obsolescent. is obsolete and should be dropped from FTS-0005. The flags CSP
(7 nodes worldwide) and H96 should be marked as obsolescent.
| MNP Microcom Networking Protocol 2-4 error correction
| V42 ITU-T LAP-M error correction w/ fallback to MNP 2-4 | MNP Microcom Networking Protocol 2-4 error correction
| V42b ITU-T V.42bis BTLZ data compression over V.42 LAP-M | V42 ITU-T LAP-M error correction w/ fallback to MNP 2-4
| V42b ITU-T V.42bis BTLZ data compression over V.42 LAP-M
The next version of FTS-0005 should adopt the better V42b and
MNP definitions of the zone 3 nodelist epilogue. FTS-0005.003 The next version of FTS-0005 should adopt the better V42b and
specifies an implication of V42 by V42b, but the exact meaning of MNP definitions of the zone 3 nodelist epilogue. FTS-0005.003
the flag MNP is unclear. Most probably this flag was meant to specifies an implication of V42 by V42b, but the exact meaning of
| indicate support of MNP 2-4, and in this sense V42 implies MNP. the flag MNP is unclear. Most probably this flag was meant to
| indicate support of MNP 2-4, and in this sense V42 implies MNP.
| Note the difference between the flag V42b (implying V42) and the
| standard V.42bis (not necessarily based on LAP-M as data link | Note the difference between the flag V42b (implying V42) and the
| layer protocol), without this difference the flag V42b would be | standard V.42bis (not necessarily based on LAP-M as data link
| ambiguous for combined modem and ISDN node entries. | layer protocol), without this difference the flag V42b would be
| ambiguous for combined modem and ISDN node entries.
MN No compression supported in insecure inbound
MN No compression supported in insecure inbound
XA Bark and WaZOO file/update requests
XB Bark file/update requests, WaZOO file requests XA Bark and WaZOO file/update requests
XC Bark file requests, WaZOO file/update requests XB Bark file/update requests, WaZOO file requests
XP Bark file/update requests XC Bark file requests, WaZOO file/update requests
XR Bark and WaZOO file requests XP Bark file/update requests
XW WaZOO file requests XR Bark and WaZOO file requests
XX WaZOO file/update requests XW WaZOO file requests
XX WaZOO file/update requests
These flags are equivalent in FTS-0005 and in the zone 2 segment.
These flags are equivalent in FTS-0005 and in the zone 2 segment.
Gx..x Gateway to domain 'x..x'
Gx..x Gateway to domain 'x..x'
Valid values for this flag are assigned by the Fido International
Coordinator, FTS-0005.003 explicitly mentions GUUCP. In zone 2 Valid values for this flag are assigned by the Fido International
only GUUCP gateways are flagged. Coordinator, FTS-0005.003 explicitly mentions GUUCP. In zone 2
only GUUCP gateways are flagged.
#01 Zone 5 mail hour (01:00 - 02:00 UTC) w/ Bell 212A
#02 Zone 2 mail hour (02:30 - 03:30 UTC) w/ Bell 212A #01 Zone 5 mail hour (01:00 - 02:00 UTC) w/ Bell 212A
-> #08 Zone 4 mail hour (08:00 - 09:00 UTC) w/ Bell 212A #02 Zone 2 mail hour (02:30 - 03:30 UTC) w/ Bell 212A
#09 Zone 1 mail hour (09:00 - 10:00 UTC) w/ Bell 212A -&gt; #08 Zone 4 mail hour (08:00 - 09:00 UTC) w/ Bell 212A
#18 Zone 3 mail hour (18:00 - 19:00 UTC) w/ Bell 212A #09 Zone 1 mail hour (09:00 - 10:00 UTC) w/ Bell 212A
#20 Zone 6 mail hour (20:00 - 21:00 UTC) w/ Bell 212A #18 Zone 3 mail hour (18:00 - 19:00 UTC) w/ Bell 212A
#20 Zone 6 mail hour (20:00 - 21:00 UTC) w/ Bell 212A
The variants !01, !02, !08, !09, !18, and !20 indicate missing
Bell 212A support. In zone 2 #02 or !02 would be obviously The variants !01, !02, !08, !09, !18, and !20 indicate missing
redundant. Bell 212A support. In zone 2 #02 or !02 would be obviously
redundant.
Today less than four 1200 modems (V22 or Bell 212A) are listed.
A future version of FTS-0005 should drop !mn variants together Today less than four 1200 modems (V22 or Bell 212A) are listed.
with V21 and V22 flags. A future version of FTS-0005 should drop !mn variants together
with V21 and V22 flags.
Further most non-CM systems flagging #mn or !mn today probably
want to show additional online times instead of additional mail Further most non-CM systems flagging #mn or !mn today probably
hours. As soon as FSC-0062 flags have been approved by the IC want to show additional online times instead of additional mail
or adopted as FTS by the FTSC, the following version of FTS-0005 hours. As soon as FSC-0062 flags have been approved by the IC
should mark #mn as obsolescent and recommend the more flexible or adopted as FTS by the FTSC, the following version of FTS-0005
FSC-0062 flags (see below). should mark #mn as obsolescent and recommend the more flexible
FSC-0062 flags (see below).
3. User flags
------------- 3. User flags
An example for one of several problems in zone 2 with user flags: -------------
An example for one of several problems in zone 2 with user flags:
...,U,Z19,V110H,V120L,V120H,X75,ENC,NEC
...,U,Z19,V110H,V120L,V120H,X75,ENC,NEC
These flags indicate a modern Zyxel ISDN-modem and two additional
user flags ENC and NEC. This possible user flags string contains These flags indicate a modern Zyxel ISDN-modem and two additional
34 characters, but at most 32 characters are allowed in FTS-0005. user flags ENC and NEC. This possible user flags string contains
34 characters, but at most 32 characters are allowed in FTS-0005.
...,U,Z19,V110L,V110H,X75,ISDNA,ISDNB,ISDNC
...,U,Z19,V110L,V110H,X75,ISDNA,ISDNB,ISDNC
During the period for the replacement of old by new ISDN flags
(several months !) many nodes listed both old and new flags for During the period for the replacement of old by new ISDN flags
maximal compatibility, and no problems with nodelist compilers (several months !) many nodes listed both old and new flags for
or mailers caused by too long user flags strings were reported. maximal compatibility, and no problems with nodelist compilers
or mailers caused by too long user flags strings were reported.
Therefore the length limit in FTS-0005 is probably unnecessary
and at least inconsequent: Other nodelist fields like the system Therefore the length limit in FTS-0005 is probably unnecessary
name are unlimited, so why only restrict the user flags string ? and at least inconsequent: Other nodelist fields like the system
To help developpers an upper limit of e.g. 255 characters for a name are unlimited, so why only restrict the user flags string ?
nodelist line and 63 characters for fields 3 to 6 would be more To help developpers an upper limit of e.g. 255 characters for a
useful. nodelist line and 63 characters for fields 3 to 6 would be more
useful.
The next problem with user flag strings as specified in FTS-0005
is their introduction by the letter U with no comma following: The next problem with user flag strings as specified in FTS-0005
is their introduction by the letter U with no comma following:
Nodelist compilers could parse ...,UISDN,USR in user flags ISDN
and USR. But USR cannot be approved as "real" flag, because the Nodelist compilers could parse ...,UISDN,USR in user flags ISDN
combination ...,USR,UISDN would then be parsed in SR and UISDN. and USR. But USR cannot be approved as "real" flag, because the
combination ...,USR,UISDN would then be parsed in SR and UISDN.
Other side effects of the FTS-0005 specification are additional
difficulties in finding flags. Almost all flags are separated Other side effects of the FTS-0005 specification are additional
by a comma, only the first user flag can be an exception to this difficulties in finding flags. Almost all flags are separated
simple rule. If the order of user flags has no meaning, then... by a comma, only the first user flag can be an exception to this
simple rule. If the order of user flags has no meaning, then...
...,UV120L,V120H
...,UV120H,V120L ...,UV120L,V120H
...,UV120H,V120L
... are equivalent. A "simple" solution of this problem could be
to treat UV120L as synonym for V120L, and UV120H as synonym for ... are equivalent. A "simple" solution of this problem could be
V120H. Similar problems show up, if user flags are counted, etc. to treat UV120L as synonym for V120L, and UV120H as synonym for
V120H. Similar problems show up, if user flags are counted, etc.
Obviously a nodelist compiler looking for user flags has always
to consider the case "user flag separated by comma". In zone 2 Obviously a nodelist compiler looking for user flags has always
this idea was simply extended to the first user flag: to consider the case "user flag separated by comma". In zone 2
this idea was simply extended to the first user flag:
All flags are separated by commas. Flags not yet approved by the
International Coordinator or the FTSC (i.e. user flags only used All flags are separated by commas. Flags not yet approved by the
experimentally or locally) are separated by a new pseudo flag U. International Coordinator or the FTSC (i.e. user flags only used
experimentally or locally) are separated by a new pseudo flag U.
-> U pseudo flag to the left of at least one user flag
-&gt; U pseudo flag to the left of at least one user flag
All flags following this pseudo flag U are user flags, all flags
before this pseudo flag are "real" flags specified in FTS-0005 or All flags following this pseudo flag U are user flags, all flags
approved by the International Coordinator. before this pseudo flag are "real" flags specified in FTS-0005 or
approved by the International Coordinator.
Because this definition should be compatible with any reasonable
software implementation based on FTS-0005.003, and simplifies the Because this definition should be compatible with any reasonable
handling of user flags significantly, a future FTS-0005 version software implementation based on FTS-0005.003, and simplifies the
will hopefully adopt it. handling of user flags significantly, a future FTS-0005 version
will hopefully adopt it.
4. Approved zone 2 user flags
----------------------------- 4. Approved zone 2 user flags
In zone 2 user flags have to be approved by the Zone Coordinator. -----------------------------
Currently the following zone 2 user flags exist: In zone 2 user flags have to be approved by the Zone Coordinator.
Currently the following zone 2 user flags exist:
-> V110L ITU-T V.110 19k2 async 'Low' (former ISDNA)
-> V110H ITU-T V.110 38k4 async 'High' (former ISDNB) -&gt; V110L ITU-T V.110 19k2 async 'Low' (former ISDNA)
-> V120L ITU-T V.120 56k6 async, N1 = 259, W = 7, modulo 8 -&gt; V110H ITU-T V.110 38k4 async 'High' (former ISDNB)
-> V120H ITU-T V.120 64k async, N1 = 259, W = 7, modulo 8 -&gt; V120L ITU-T V.120 56k6 async, N1 = 259, W = 7, modulo 8
-> X75 ITU-T X.75 SLP (single link procedure), -&gt; V120H ITU-T V.120 64k async, N1 = 259, W = 7, modulo 8
64kbit/s B channel; layer 2 max. framesize N1 = 2048, -&gt; X75 ITU-T X.75 SLP (single link procedure),
window size W = 2, frame numbering modulo 8; 64kbit/s B channel; layer 2 max. framesize N1 = 2048,
layer 3 transparent (no packet layer) window size W = 2, frame numbering modulo 8;
-> ISDN Other configuration, used only if none of above fits layer 3 transparent (no packet layer)
-&gt; ISDN Other configuration, used only if none of above fits
These ISDN flags follow the specification in FSC-0091.
These ISDN flags follow the specification in FSC-0091.
-> Tyz Online time flags as specified in FSC-0062
-&gt; Tyz Online time flags as specified in FSC-0062
The flag Tyz is used by non-CM nodes online not only during ZMH,
y is a letter indicating the start and z a letter indicating the The flag Tyz is used by non-CM nodes online not only during ZMH,
end of the online period as defined below (times in UTC): y is a letter indicating the start and z a letter indicating the
end of the online period as defined below (times in UTC):
A 0:00, a 0:30, B 1:00, b 1:30, C 2:00, c 2:30,
D 3:00, d 3:30, E 4:00, e 4:30, F 5:00, f 5:30, A 0:00, a 0:30, B 1:00, b 1:30, C 2:00, c 2:30,
G 6:00, g 6:30, H 7:00, h 7:30, I 8:00, i 8:30, D 3:00, d 3:30, E 4:00, e 4:30, F 5:00, f 5:30,
J 9:00, j 9:30, K 10:00, k 10:30, L 11:00, l 11:30, G 6:00, g 6:30, H 7:00, h 7:30, I 8:00, i 8:30,
M 12:00, m 12:30, N 13:00, n 13:30, O 14:00, o 14:30, J 9:00, j 9:30, K 10:00, k 10:30, L 11:00, l 11:30,
P 15:00, p 15:30, Q 16:00, q 16:30, R 17:00, r 17:30, M 12:00, m 12:30, N 13:00, n 13:30, O 14:00, o 14:30,
S 18:00, s 18:30, T 19:00, t 19:30, U 20:00, u 20:30, P 15:00, p 15:30, Q 16:00, q 16:30, R 17:00, r 17:30,
V 21:00, v 21:30, W 20:00, w 20:30, X 23:00, x 23:30. S 18:00, s 18:30, T 19:00, t 19:30, U 20:00, u 20:30,
V 21:00, v 21:30, W 20:00, w 20:30, X 23:00, x 23:30.
For example TuB shows an online period from 20:30 until 1:00 UTC.
For example TuB shows an online period from 20:30 until 1:00 UTC.
-> Z19 Zyxel series 19200 bps (implies ZYX)
-> X2C x2 client w/ 56000 bps (should imply V34 and V42b) -&gt; Z19 Zyxel series 19200 bps (implies ZYX)
-> X2S x2 server w/ 64000 bps (should imply V34 and V42b) -&gt; X2C x2 client w/ 56000 bps (should imply V34 and V42b)
-&gt; X2S x2 server w/ 64000 bps (should imply V34 and V42b)
-> K12 Systems offering all educational K12-conferences
-> ENC The node accepts inbound encrypted mail -&gt; K12 Systems offering all educational K12-conferences
-&gt; ENC The node accepts inbound encrypted mail
-> NC Network Coordinator (only if the NC is not the host)
-> NEC Net Echomail Coordinator (at most one per net) -&gt; NC Network Coordinator (only if the NC is not the host)
-> REC Region Echomail Coordinator (at most one per region) -&gt; NEC Net Echomail Coordinator (at most one per net)
-&gt; REC Region Echomail Coordinator (at most one per region)
Redundant AKAs used to indicate echomail coordination in zone 2
are no longer permitted. One *EC flag is valid for all AKAs of Redundant AKAs used to indicate echomail coordination in zone 2
a given sysop. are no longer permitted. One *EC flag is valid for all AKAs of
a given sysop.
5. Flag implications
-------------------- 5. Flag implications
Flag implications directly or indirectly specified in FTS-0005: --------------------
Flag implications directly or indirectly specified in FTS-0005:
HST => MNP
H14 => MNP HST HST =&gt; MNP
H16 => MNP HST H14 H14 =&gt; MNP HST
V42b => V42 (MNP ?) H16 =&gt; MNP HST H14
V32b => V32 V42b =&gt; V42 (MNP ?)
V32b =&gt; V32
Flag implications specified in the zone 2 nodelist epilogue:
Flag implications specified in the zone 2 nodelist epilogue:
HST => MNP
H14 => HST MNP HST =&gt; MNP
-> H16 => V42 MNP V42b H14 HST H14 =&gt; HST MNP
-> V42b => V42 MNP -&gt; H16 =&gt; V42 MNP V42b H14 HST
-> ZYX => V42 MNP V42b V32 V32b -&gt; V42b =&gt; V42 MNP
-> Z19 => V42 MNP V42b V32 V32b ZYX -&gt; ZYX =&gt; V42 MNP V42b V32 V32b
V32b => V32 -&gt; Z19 =&gt; V42 MNP V42b V32 V32b ZYX
-> V32T => V32 V32b V32b =&gt; V32
-&gt; V32T =&gt; V32 V32b
-> V110L => ISDN
-> V110H => ISDN -&gt; V110L =&gt; ISDN
-> V120L => ISDN -&gt; V110H =&gt; ISDN
-> V120H => ISDN -&gt; V120L =&gt; ISDN
-> X75 => ISDN -&gt; V120H =&gt; ISDN
-&gt; X75 =&gt; ISDN
The latter ISDN flag redundancies are a consequence of FSC-0091.
Maybe some of the following implications could be added in zone 2: The latter ISDN flag redundancies are a consequence of FSC-0091.
Maybe some of the following implications could be added in zone 2:
VFC => V32 V32b MNP V42 V42b
X2C => V34 MNP V42 V42b VFC =&gt; V32 V32b MNP V42 V42b
X2S => V34 MNP V42 V42b X2C =&gt; V34 MNP V42 V42b
X2S =&gt; V34 MNP V42 V42b
Flag implications (i.e. not listing redundant flags) have several
advantages: Some old nodelist tools are unable to handle too long Flag implications (i.e. not listing redundant flags) have several
lines. Old flags like HST, MNP, V42, or V32 vanish automatically, advantages: Some old nodelist tools are unable to handle too long
if they are implied by H16, V42b, V32b, or better. Redundancies lines. Old flags like HST, MNP, V42, or V32 vanish automatically,
defined globally for the whole nodelist help to avoid flag errors. if they are implied by H16, V42b, V32b, or better. Redundancies
defined globally for the whole nodelist help to avoid flag errors.
6. Invalid combinations
----------------------- 6. Invalid combinations
All file request flags exclude each other (at most 1 is possible): -----------------------
XA, XB, XC, XP, XR, XW, and XX. For flag checkers only supporting All file request flags exclude each other (at most 1 is possible):
implications a good approximation based on FTS-0005 definitions is XA, XB, XC, XP, XR, XW, and XX. For flag checkers only supporting
implications a good approximation based on FTS-0005 definitions is
| XA => XW XR XP XB XC XX,
| XB => XW XR XP, | XA =&gt; XW XR XP XB XC XX,
| XC => XW XR XX, | XB =&gt; XW XR XP,
| XR => XW, | XC =&gt; XW XR XX,
| XX => XW. | XR =&gt; XW,
| XX =&gt; XW.
Further X2C cannot be combined with X2S, and FSC-62 Tyz-flags are
not possible with CM. Also Tyz with y = z is of course incorrect. Further X2C cannot be combined with X2S, and FSC-62 Tyz-flags are
not possible with CM. Also Tyz with y = z is of course incorrect.
Some modem protocols are "proprietary" in a sense, that all today
known modems can fly at most one of the corresponding modem flags: Some modem protocols are "proprietary" in a sense, that all today
MAX, CSP, H96, PEP, HST, H14, H16, ZYX, and Z19. known modems can fly at most one of the corresponding modem flags:
MAX, CSP, H96, PEP, HST, H14, H16, ZYX, and Z19.
A few "old" modem protocol flags are known to be invalid if used
together with "new" protocol flags, i.e. each "old" flag excludes A few "old" modem protocol flags are known to be invalid if used
all "new" flags and vice versa: together with "new" protocol flags, i.e. each "old" flag excludes
all "new" flags and vice versa:
"Old" in this sense are MAX, CSP, H96, HST, H14, V32, and PEP.
"New" in this sense are X2S, X2C, V34, VFC, V32T, and H16. "Old" in this sense are MAX, CSP, H96, HST, H14, V32, and PEP.
"New" in this sense are X2S, X2C, V34, VFC, V32T, and H16.
For Z2 add ZYX as "old" and Z19 as "new". A simple REXX script to
test some known inconsistencies is available as NLSCHECK.REX at For Z2 add ZYX as "old" and Z19 as "new". A simple REXX script to
the site of the author. While erroneously listing redundant flags test some known inconsistencies is available as NLSCHECK.REX at
causes no harm, other errors like combining V34 with HST or Z19 the site of the author. While erroneously listing redundant flags
with H16 indicate serious problems, which can result in connection causes no harm, other errors like combining V34 with HST or Z19
failures or other damage. with H16 indicate serious problems, which can result in connection
failures or other damage.
7. Baud rate field
------------------ 7. Baud rate field
The baud rate field 7 in the nodelist as specified in FTS-0005 is ------------------
nearly useless today: Except from a few remaining 1200 and 2400 The baud rate field 7 in the nodelist as specified in FTS-0005 is
nodes almost all nodelist entries show either 9600 for all modem nearly useless today: Except from a few remaining 1200 and 2400
protocols better than V22bis or 300 for ISDN (or IP) only nodes. nodes almost all nodelist entries show either 9600 for all modem
No more V21 or Bell 103 modems are listed for more than 2 years. protocols better than V22bis or 300 for ISDN (or IP) only nodes.
No more V21 or Bell 103 modems are listed for more than 2 years.
The baud rate values 19200 and 38400 specified in FTS-0005.003
have not been used in the FidoNet nodelist. So all a reasonable The baud rate values 19200 and 38400 specified in FTS-0005.003
nodelist compiler can do today, is treat 300 as indicator for have not been used in the FidoNet nodelist. So all a reasonable
ISDN or IP only, and treat unknown or missing values in field 7 nodelist compiler can do today, is treat 300 as indicator for
like 9600. ISDN or IP only, and treat unknown or missing values in field 7
like 9600.
A new meaning for field 7 as speed field could be really useful.
An example is ZYX, if we would have 16800, 19200, 28800, and 33600 A new meaning for field 7 as speed field could be really useful.
as speed values, then their combination with ZYX is all we need An example is ZYX, if we would have 16800, 19200, 28800, and 33600
technically, Z19 would be unnecessary. Another example is HST, as speed values, then their combination with ZYX is all we need
flags H14 and H16 are unnecessary, if HST is combined with 9600, technically, Z19 would be unnecessary. Another example is HST,
14400, 16800, 28800, or better. Variants of PEP could be shown in flags H14 and H16 are unnecessary, if HST is combined with 9600,
the speed field without new flags. "Enhanced V32.terbo" could be 14400, 16800, 28800, or better. Variants of PEP could be shown in
shown by 21600. the speed field without new flags. "Enhanced V32.terbo" could be
shown by 21600.
Most important: V34 may have the famous bug not allowing connects
from new "V34+", unless the caller disabled symbol rate 3429. If Most important: V34 may have the famous bug not allowing connects
"V34+" is indicated by speed 33600 or better, then an appropriate from new "V34+", unless the caller disabled symbol rate 3429. If
setup for all kinds of V34 connects is possible. "V34+" is indicated by speed 33600 or better, then an appropriate
setup for all kinds of V34 connects is possible.
A future version of FTS-0005 hopefully allows the following speed
values in field 7: A future version of FTS-0005 hopefully allows the following speed
values in field 7:
300 reserved for ISDN or IP only (for historical reasons)
1200 obsolete (either V.22 in Z2 / Z3, or Bell 212A in Z1) 300 reserved for ISDN or IP only (for historical reasons)
2400 implies V22bis, qualifies as least common denominator 1200 obsolete (either V.22 in Z2 / Z3, or Bell 212A in Z1)
9600 default, used with PEP, V32, HST, H96, (CSP), (MAX) 2400 implies V22bis, qualifies as least common denominator
12000 rare variant of V32 9600 default, used with PEP, V32, HST, H96, (CSP), (MAX)
14400 used with V32b or HST (obsoleting H14) 12000 rare variant of V32
16800 used with ZYX or HST (obsoleting H16) 14400 used with V32b or HST (obsoleting H14)
19200 used with V32T or ZYX (obsoleting Z19) 16800 used with ZYX or HST (obsoleting H16)
21600 rare variant of V32T (no "H21" needed) 19200 used with V32T or ZYX (obsoleting Z19)
28800 used with VFC or V34 21600 rare variant of V32T (no "H21" needed)
33600 used with V34 (no V34+ or V34b needed) 28800 used with VFC or V34
| 56000 used with X2C, X2S, or V.PCM 33600 used with V34 (no V34+ or V34b needed)
| 56000 used with X2C, X2S, or V.PCM
Allowing more than 12 speed values or allowing speed values above
64000 could break existing software (MakeNL, V7). Therefore the Allowing more than 12 speed values or allowing speed values above
next step in FidoNet could be, to add 12000, 14400, 16800, 19200, 64000 could break existing software (MakeNL, V7). Therefore the
21600, 28800, 33600, and 56000, where 19200 is already specified next step in FidoNet could be, to add 12000, 14400, 16800, 19200,
in FTS-5 since 1989. 21600, 28800, 33600, and 56000, where 19200 is already specified
in FTS-5 since 1989.
8. Thanks to...
--------------- 8. Thanks to...
Ben Baker St. Louis nodelist format ---------------
Rick Moore FTS-0005.TXT Ben Baker St. Louis nodelist format
David Nugent FTS-0005.003 and NLTOOLS Rick Moore FTS-0005.TXT
Jonny Bergdahl ERRFLAGS 2.6 David Nugent FTS-0005.003 and NLTOOLS
Ward Dossche Zone 2 nodelist epilogue Jonny Bergdahl ERRFLAGS 2.6
David J. Thomas FSC-0062.003 (FRL-0062) Ward Dossche Zone 2 nodelist epilogue
Jan Ceuleers FSC-0075.001 (FRL-0075) David J. Thomas FSC-0062.003 (FRL-0062)
Arjen Lentz FSC-0091.001 (FRL-0091) Jan Ceuleers FSC-0075.001 (FRL-0075)
Leonard Erickson CHECKNL 2.14 and many discussions in NET_DEV Arjen Lentz FSC-0091.001 (FRL-0091)
Jim Barchuk LNDL 2.7 Leonard Erickson CHECKNL 2.14 and many discussions in NET_DEV
Marius Ellen FASTV7 2.04 Jim Barchuk LNDL 2.7
| Jan Vermeulen, Ian Smith, Gisbert Rudolph, Carlos Fernandez Sanz, Marius Ellen FASTV7 2.04
| Tom Schlangen, Craig Ford, Pedro Lima, and many others... | Jan Vermeulen, Ian Smith, Gisbert Rudolph, Carlos Fernandez Sanz,
| Tom Schlangen, Craig Ford, Pedro Lima, and many others...
**********************************************************************
</PRE> **********************************************************************
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,159 +1,160 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Kludge for specifying addition e-mail reply addresses.</TITLE> <HEAD>
</HEAD> <TITLE>Kludge for specifying addition e-mail reply addresses.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
********************************************************************** <PRE>
FTSC FIDONET TECHNICAL STANDARDS COMMITTEE **********************************************************************
********************************************************************** FTSC FIDONET TECHNICAL STANDARDS COMMITTEE
**********************************************************************
Publication: FSP-1006
Revision: 1 Publication: FSP-1006
Title: Kludge for specifying addition e-mail reply addresses Revision: 1
Author: Ramon van der Winkel, 1:320/42.46 Title: Kludge for specifying addition e-mail reply addresses
ramon@wsd.wline.se Author: Ramon van der Winkel, 1:320/42.46
Revision Date: 12 December 1997 ramon@wsd.wline.se
Expiry Date: 12 December 1999 Revision Date: 12 December 1997
---------------------------------------------------------------------- Expiry Date: 12 December 1999
Contents: ----------------------------------------------------------------------
1. Scope Contents:
2. Background 1. Scope
3. Format 2. Background
4. Implementation notes 3. Format
5. Example 4. Implementation notes
---------------------------------------------------------------------- 5. Example
----------------------------------------------------------------------
Status of this document
----------------------- Status of this document
-----------------------
This document is a Fidonet Standards Proposal (FSP).
This document is a Fidonet Standards Proposal (FSP).
This document specifies an optional Fidonet standard protocol for
the Fidonet community, and requests discussion and suggestions for This document specifies an optional Fidonet standard protocol for
improvements. the Fidonet community, and requests discussion and suggestions for
improvements.
This document is released to the public domain, and may be used,
copied or modified for any purpose whatever. This document is released to the public domain, and may be used,
copied or modified for any purpose whatever.
Abstract
-------- Abstract
--------
An Internet message can have several reply addresses. After gating
to FidoNet, the recipient is only presented with one of the reply An Internet message can have several reply addresses. After gating
addresses. The others are lost. This is a suggestion for an to FidoNet, the recipient is only presented with one of the reply
additional kludge to FSC-0035 to change that. addresses. The others are lost. This is a suggestion for an
additional kludge to FSC-0035 to change that.
1. Scope
-------- 1. Scope
--------
This standard is specified for FTN netmail messages sent by a
FidoNet-to-Internet gateway to a recipient. Message editors will This standard is specified for FTN netmail messages sent by a
have to support this to allow the user to select the reply address FidoNet-to-Internet gateway to a recipient. Message editors will
to use. have to support this to allow the user to select the reply address
to use.
2. Background
------------- 2. Background
-------------
An Internet message has three headers to indicate where to send a
reply. These are, in order of priority, Reply-To:, Sender: and An Internet message has three headers to indicate where to send a
From:. When a message is distributed by a mailing list, then one of reply. These are, in order of priority, Reply-To:, Sender: and
the headers could contain the e-mail address of the poster and one From:. When a message is distributed by a mailing list, then one of
of the other headers the address of the mailing list. the headers could contain the e-mail address of the poster and one
of the other headers the address of the mailing list.
When the message is gated to FidoNet, the gateway currently selects
of the reply addresses and creates the message so that a reply will When the message is gated to FidoNet, the gateway currently selects
return at the gateway and sent to this one address. The other of the reply addresses and creates the message so that a reply will
addresses are lost. return at the gateway and sent to this one address. The other
addresses are lost.
The FSC-0035 kludges REPLYTO and REPLYADDR allow for one return
address only. This is a proposal for an additional kludge inserted The FSC-0035 kludges REPLYTO and REPLYADDR allow for one return
by the gateway to specify an addtional reply address. The message address only. This is a proposal for an additional kludge inserted
editor used by the recipient will present a list of all reply by the gateway to specify an addtional reply address. The message
addresses and allows the user to select the appropriate address. editor used by the recipient will present a list of all reply
addresses and allows the user to select the appropriate address.
This way, the user can send a message back to the mailing list (for
distribution), or to the e-mail address of the poster only. This way, the user can send a message back to the mailing list (for
distribution), or to the e-mail address of the poster only.
3. Format
--------- 3. Format
---------
Following the REPLYTO and REPLYADDR kludges, one or more kludges
with the name REPLYALSO can be inserted, each listing one possible Following the REPLYTO and REPLYADDR kludges, one or more kludges
reply address. with the name REPLYALSO can be inserted, each listing one possible
reply address.
@REPLYALSO <e-mail address>
@REPLYALSO &lt;e-mail address&gt;
Where <e-mail address> is in the form of
Where &lt;e-mail address&gt; is in the form of
ramon@wsd.wline.se
or ramon@wsd.wline.se
wsd.wline.se!ramon or
wsd.wline.se!ramon
Each line MUST contain one address only.
Each line MUST contain one address only.
4. Implementation notes
----------------------- 4. Implementation notes
-----------------------
Gateways supporting the REPLYALSO kludge MUST put the the reply
address with the highest priority in the REPLYADDR kludge. The order Gateways supporting the REPLYALSO kludge MUST put the the reply
of priority is Reply-To:, Sender: and From: header. The other address with the highest priority in the REPLYADDR kludge. The order
addresses may be listed in any priority. of priority is Reply-To:, Sender: and From: header. The other
addresses may be listed in any priority.
5. Example
---------- 5. Example
----------
From: odinn@goldware.dk, 1:320/42
To: Ramon van der Winkel, 1:320/42.46 From: odinn@goldware.dk, 1:320/42
Subj: Another test To: Ramon van der Winkel, 1:320/42.46
--------------------------------------- Subj: Another test
@INTL 1:320/42 1:320/42 ---------------------------------------
@TOPT 46 @INTL 1:320/42 1:320/42
@MSGID: wgmid$<123455@goldware.dk> 45AB23CD @TOPT 46
@REPLYTO UUCP 1:320/42 @MSGID: wgmid$&lt;123455@goldware.dk&gt; 45AB23CD
@REPLYADDR odinn@goldware.dk @REPLYTO UUCP 1:320/42
@REPLYALSO newftsc-l@brazerko.com @REPLYADDR odinn@goldware.dk
This message was distributed by the mailing list "New FTSC" @REPLYALSO newftsc-l@brazerko.com
at brazerko.com. This message was distributed by the mailing list "New FTSC"
at brazerko.com.
...
...
A. Author contact data
---------------------- A. Author contact data
----------------------
Ramon van der Winkel
Fidonet: 1:320/42.46 Ramon van der Winkel
E-mail: ramon@wsd.wline.se Fidonet: 1:320/42.46
WWW: http://www2.sbbs.se/hp/ramon E-mail: ramon@wsd.wline.se
WWW: http://www2.sbbs.se/hp/ramon
B. History
---------- B. History
----------
Rev.1, 971212: First release.
Rev.1, 971212: First release.
**********************************************************************
</PRE> **********************************************************************
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,162 +1,163 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Multiple recipient address specification to gateway.</TITLE> <HEAD>
</HEAD> <TITLE>Multiple recipient address specification to gateway.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
********************************************************************** <PRE>
FTSC FIDONET TECHNICAL STANDARDS COMMITTEE **********************************************************************
********************************************************************** FTSC FIDONET TECHNICAL STANDARDS COMMITTEE
**********************************************************************
Publication: FSP-1007
Revision: 1 Publication: FSP-1007
Title: Multiple recipient address specification to gateway Revision: 1
Author: Ramon van der Winkel, 1:320/42.46 Title: Multiple recipient address specification to gateway
ramon@wsd.wline.se Author: Ramon van der Winkel, 1:320/42.46
Revision Date: 12 December 1997 ramon@wsd.wline.se
Expiry Date: 12 December 1999 Revision Date: 12 December 1997
---------------------------------------------------------------------- Expiry Date: 12 December 1999
Contents: ----------------------------------------------------------------------
1. Scope Contents:
2. Background 1. Scope
3. Format 2. Background
4. Implementation notes for gateways 3. Format
5. Example 4. Implementation notes for gateways
---------------------------------------------------------------------- 5. Example
----------------------------------------------------------------------
Status of this document
----------------------- Status of this document
-----------------------
This document is a Fidonet Standards Proposal (FSP).
This document is a Fidonet Standards Proposal (FSP).
This document specifies an optional Fidonet standard protocol for
the Fidonet community, and requests discussion and suggestions for This document specifies an optional Fidonet standard protocol for
improvements. the Fidonet community, and requests discussion and suggestions for
improvements.
This document is released to the public domain, and may be used,
copied or modified for any purpose whatever. This document is released to the public domain, and may be used,
copied or modified for any purpose whatever.
Abstract
-------- Abstract
--------
Private messages within FidoNet only have one recipient address.
Multiple copies of the same message have to be sent to a FidoNet- Private messages within FidoNet only have one recipient address.
to-Internet gateway in order to address multiple recipients. This is Multiple copies of the same message have to be sent to a FidoNet-
a proposal to indicate the addresses of multiple recipients in the to-Internet gateway in order to address multiple recipients. This is
body of the message sent to the gateway. a proposal to indicate the addresses of multiple recipients in the
body of the message sent to the gateway.
1. Scope
-------- 1. Scope
--------
This standard is specified for FTN netmail messages sent to a
FidoNet-to-Internet gateway. Users are able to add this information This standard is specified for FTN netmail messages sent to a
manually, although message editors could support this and make it FidoNet-to-Internet gateway. Users are able to add this information
transparent to the user. manually, although message editors could support this and make it
transparent to the user.
2. Background
------------- 2. Background
-------------
Three types of recipient addresses can be specified on the Internet
and are reflected in this suggestion: To, Cc and Bcc. "To" are the Three types of recipient addresses can be specified on the Internet
primary recipient(s) of the message. "Cc" is short for Carbon Copy and are reflected in this suggestion: To, Cc and Bcc. "To" are the
and lists the recipients that are intended to receive the message as primary recipient(s) of the message. "Cc" is short for Carbon Copy
"informational". The last option "Bcc" is short for Blind Carbon and lists the recipients that are intended to receive the message as
Copy. Recipients lists as Bcc recipients will not show up in the "informational". The last option "Bcc" is short for Blind Carbon
headers of the Internet message, but get a copy anyway. Copy. Recipients lists as Bcc recipients will not show up in the
headers of the Internet message, but get a copy anyway.
3. Format
--------- 3. Format
---------
Immediately following the kludge lines, one or more of the following
lines can be inserted in the message. If a To: line is present, then Immediately following the kludge lines, one or more of the following
these lines follow the To: line. lines can be inserted in the message. If a To: line is present, then
these lines follow the To: line.
GW-To: <e-mail address>[,<e-mail address>[...]]
GW-Cc: <e-mail address>[,<e-mail address>[...]] GW-To: &lt;e-mail address&gt;[,&lt;e-mail address&gt;[...]]
GW-Bcc: <e-mail address>[,<e-mail address>[...]] GW-Cc: &lt;e-mail address&gt;[,&lt;e-mail address&gt;[...]]
GW-Bcc: &lt;e-mail address&gt;[,&lt;e-mail address&gt;[...]]
Where <e-mail address> is in the form of
Where &lt;e-mail address&gt; is in the form of
ramon@wsd.wline.se
or ramon@wsd.wline.se
wsd.wline.se!ramon or
wsd.wline.se!ramon
Multiple addresses can be specified on the same line, separated by a
comma with optionally spaces around the comma. There is no limit Multiple addresses can be specified on the same line, separated by a
regarding the length of the line. The line must be terminated by a comma with optionally spaces around the comma. There is no limit
single carriage return. regarding the length of the line. The line must be terminated by a
single carriage return.
The GW-To: line replaces the To: lines.
The GW-To: line replaces the To: lines.
The reason for GW-Cc is that "Cc:" by itself is expanded by some
editors and used to generate multiple copies of a message. The reason for GW-Cc is that "Cc:" by itself is expanded by some
editors and used to generate multiple copies of a message.
4. Implementation notes for gateways
------------------------------------ 4. Implementation notes for gateways
------------------------------------
Gateways supporting this format add the e-mail addresses mentioned
in any of these three headers to the envelope file and create on Gateways supporting this format add the e-mail addresses mentioned
outbound (probably UUCP or SMTP) body text message. Rules for the in any of these three headers to the envelope file and create on
maximum length of envelope files (if any) apply. outbound (probably UUCP or SMTP) body text message. Rules for the
maximum length of envelope files (if any) apply.
The headers section of the RFC822 message will list the e-mail
addresses under the To: and Cc: headers. A Bcc: header must not be The headers section of the RFC822 message will list the e-mail
added! addresses under the To: and Cc: headers. A Bcc: header must not be
added!
5. Example
---------- 5. Example
----------
From: Ramon van der Winkel, 1:320/42.46
To: UUCP, 1:320/42 From: Ramon van der Winkel, 1:320/42.46
Subj: New header test To: UUCP, 1:320/42
--------------------------------------- Subj: New header test
@INTL 1:320/42 1:320/42 ---------------------------------------
@FMPT 46 @INTL 1:320/42 1:320/42
GW-To: groupElist@newftsc.org @FMPT 46
GW-Cc: odinn@goldware.dk GW-To: groupElist@newftsc.org
GW-Bcc: groupAadmin@newftsc.org GW-Cc: odinn@goldware.dk
Hi! GW-Bcc: groupAadmin@newftsc.org
Hi!
This is a test
This is a test
Ramon
Ramon
A. Author contact data
---------------------- A. Author contact data
----------------------
Ramon van der Winkel
Fidonet: 1:320/42.46 Ramon van der Winkel
E-mail: ramon@wsd.wline.se Fidonet: 1:320/42.46
WWW: http://www2.sbbs.se/hp/ramon E-mail: ramon@wsd.wline.se
WWW: http://www2.sbbs.se/hp/ramon
B. History
---------- B. History
----------
Rev.1, 971212: First release.
Rev.1, 971212: First release.
**********************************************************************
</PRE> **********************************************************************
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,275 +1,276 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>New control lines for forwarding messages.</TITLE> <HEAD>
</HEAD> <TITLE>New control lines for forwarding messages.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
********************************************************************** <PRE>
FTSC FIDONET TECHNICAL STANDARDS COMMITTEE **********************************************************************
********************************************************************** FTSC FIDONET TECHNICAL STANDARDS COMMITTEE
**********************************************************************
Publication: FSP-1008
Revision: 2 Publication: FSP-1008
Title: New control lines for forwarded messages Revision: 2
Author: Michael Hohner, 2:2490/2520.17 Title: New control lines for forwarded messages
Revision Date: 29 December 1997 Author: Michael Hohner, 2:2490/2520.17
Expiry Date: 29 December 1999 Revision Date: 29 December 1997
---------------------------------------------------------------------- Expiry Date: 29 December 1999
Contents: ----------------------------------------------------------------------
1. Specifications Contents:
2. Usage 1. Specifications
3. Compatiblity 2. Usage
4. Known implementations 3. Compatiblity
---------------------------------------------------------------------- 4. Known implementations
----------------------------------------------------------------------
Status of this document
----------------------- Status of this document
-----------------------
This document is a Fidonet Standards Proposal (FSP).
This document is a Fidonet Standards Proposal (FSP).
This document specifies an optional Fidonet standard protocol for
the Fidonet community, and requests discussion and suggestions for This document specifies an optional Fidonet standard protocol for
improvements. the Fidonet community, and requests discussion and suggestions for
improvements.
This document is released to the public domain, and may be used,
copied or modified for any purpose whatever. This document is released to the public domain, and may be used,
copied or modified for any purpose whatever.
This revision is an update to FRL-0092.001. The basic specifications
are unchanged. This revision is an update to FRL-0092.001. The basic specifications
are unchanged.
Abstract
-------- Abstract
--------
Most fidonet message editors offer a "forward" function. Using this
function a user A ("forwarder") can sort of "redirect" a message Most fidonet message editors offer a "forward" function. Using this
from user B ("author") to another user C ("final recipient"), maybe function a user A ("forwarder") can sort of "redirect" a message
because the forwarder is not the correct recipient, or because the from user B ("author") to another user C ("final recipient"), maybe
final recipient is a better person to answer the message. The name because the forwarder is not the correct recipient, or because the
and address of the author are usually included in the forward in final recipient is a better person to answer the message. The name
free-text format. The message text is included in non-quoted format. and address of the author are usually included in the forward in
free-text format. The message text is included in non-quoted format.
A problem arises when the final recipient wants to reply to the
author of the forwarded message. The forward contains the forwarder A problem arises when the final recipient wants to reply to the
as the sender. So the final recipient must insert the name and author of the forwarded message. The forward contains the forwarder
address of the author manually, using the information contained in as the sender. So the final recipient must insert the name and
the message text. The message editor of the final recipient can't do address of the author manually, using the information contained in
this automatically because of the free-text format. The editor will the message text. The message editor of the final recipient can't do
also use incorrect quote initials, which is at least irritating. this automatically because of the free-text format. The editor will
also use incorrect quote initials, which is at least irritating.
This document introduces 7 new control lines which contain the
header information of the original message. With these control lines This document introduces 7 new control lines which contain the
the message editor can use the original header information header information of the original message. With these control lines
automatically. the message editor can use the original header information
automatically.
1. Specifications
----------------- 1. Specifications
-----------------
There are 7 new control lines: FWDFROM, FWDTO, FWDORIG, FWDDEST,
FWDSUBJ, FWDAREA, FWDMSGID. As all control lines they start with an There are 7 new control lines: FWDFROM, FWDTO, FWDORIG, FWDDEST,
ASCII 01 character (SOH) followed by the control line name followed FWDSUBJ, FWDAREA, FWDMSGID. As all control lines they start with an
by whitespace followed by the control line's content followed by ASCII 01 character (SOH) followed by the control line name followed
ASCII 13 (CR). by whitespace followed by the control line's content followed by
ASCII 13 (CR).
Please note that all these control lines do not have a colon (like
the control lines in FTS-0001). This would be just waste of space. Please note that all these control lines do not have a colon (like
the control lines in FTS-0001). This would be just waste of space.
FWDFROM
------- FWDFROM
-------
This control line contains the name of the original sender as found
in the FROM field of the original message. Leading and trailing This control line contains the name of the original sender as found
whitespace should be removed. This control line should be omitted in the FROM field of the original message. Leading and trailing
altogether if the FROM field is empty. whitespace should be removed. This control line should be omitted
altogether if the FROM field is empty.
FWDTO
----- FWDTO
-----
This control line contains the name of the original recipient as
found in the TO field of the original message. Leading and trailing This control line contains the name of the original recipient as
whitespace should be removed. This control line should be omitted found in the TO field of the original message. Leading and trailing
altogether if the TO field is empty. whitespace should be removed. This control line should be omitted
altogether if the TO field is empty.
FWDORIG
------- FWDORIG
-------
This control line contains the address of the original sender as
found in the ORIG field of the original message. The usual 5D ASCII This control line contains the address of the original sender as
notation (zone:net/node.point@domain) should be used. This control found in the ORIG field of the original message. The usual 5D ASCII
line should be omitted altogether if the address is not known. notation (zone:net/node.point@domain) should be used. This control
line should be omitted altogether if the address is not known.
FWDDEST
------- FWDDEST
-------
This control line contains the address of the original recipient as
found in the DEST field of the original message. The usual 5D ASCII This control line contains the address of the original recipient as
notation (zone:net/node.point@domain) should be used. This control found in the DEST field of the original message. The usual 5D ASCII
line should be omitted altogether if the address is not known or notation (zone:net/node.point@domain) should be used. This control
unsure (as it is the case with forwarded echomail messages). line should be omitted altogether if the address is not known or
unsure (as it is the case with forwarded echomail messages).
FWDSUBJ
------- FWDSUBJ
-------
This control line contains the subject line of the original message.
This control line should be omitted altogether if the SUBJ field is This control line contains the subject line of the original message.
empty. This control line should be omitted altogether if the SUBJ field is
empty.
This control line should by made optional for security reasons. Echo
manager passwords are too easily revealed with it. This control line should by made optional for security reasons. Echo
manager passwords are too easily revealed with it.
FWDAREA
------- FWDAREA
-------
This control line contains the name of the echomail area where the
original message was forwarded from. It should be omitted altogether This control line contains the name of the echomail area where the
if the original message was not forwarded from an echomail area. original message was forwarded from. It should be omitted altogether
if the original message was not forwarded from an echomail area.
FWDMSGID
-------- FWDMSGID
--------
This control line contains the MSGID control line of the original
message. It should be omitted altogether if a MSGID control line is This control line contains the MSGID control line of the original
not present in the original message. message. It should be omitted altogether if a MSGID control line is
not present in the original message.
2. Usage
-------- 2. Usage
--------
When the "forward" function of the message editor is invoked, the
editor program should generate the proposed control lines from the When the "forward" function of the message editor is invoked, the
header of the original message. If the original message already was editor program should generate the proposed control lines from the
a forwarded one (indicated by the presence of at least a FWDORIG header of the original message. If the original message already was
control line), the editor should keep all FWD* control lines and a forwarded one (indicated by the presence of at least a FWDORIG
should not add any FWD* control lines. This preserves the FWD* control line), the editor should keep all FWD* control lines and
control lines of the first forwarder, containing the header data of should not add any FWD* control lines. This preserves the FWD*
the author of the original message. control lines of the first forwarder, containing the header data of
the author of the original message.
The editor should not generate FWD* control lines, if the message
isn't to be forwarded. A mail forwarding robot may also generate The editor should not generate FWD* control lines, if the message
these control lines, if it not just readdresses the message. isn't to be forwarded. A mail forwarding robot may also generate
these control lines, if it not just readdresses the message.
When the "reply" function of the editor is invoked the program
should use the control lines' contents instead of the header When the "reply" function of the editor is invoked the program
information. The control lines should not be included in the reply. should use the control lines' contents instead of the header
information. The control lines should not be included in the reply.
Since it may not be immediately clear whether the user wants to
reply to the forwarder or to the original sender, the editor should Since it may not be immediately clear whether the user wants to
offer a means to ignore the proposed control lines and start a reply to the forwarder or to the original sender, the editor should
"normal" reply instead, e.g. by two distinct functions, by user offer a means to ignore the proposed control lines and start a
preference or a dialog. "normal" reply instead, e.g. by two distinct functions, by user
preference or a dialog.
Pseudo code:
Pseudo code:
forwarding_message:
if is_forwarded_message then forwarding_message:
don't change FWD* control lines if is_forwarded_message then
else don't change FWD* control lines
add FWD* control lines else
add FWD* control lines
quoting_message:
if is_forwarded_message then quoting_message:
if reply_to_forwarder then if is_forwarded_message then
use header data (normal quoting) if reply_to_forwarder then
else use header data (normal quoting)
use FWD* control lines else
remove FWD* control lines from reply use FWD* control lines
else remove FWD* control lines from reply
use header data (normal quoting) else
use header data (normal quoting)
other_functions:
remove/ignore FWD* control lines other_functions:
remove/ignore FWD* control lines
Example:
Example:
Message from Joe User to my boss node:
Message from Joe User to my boss node:
From: Joe User 1:234/567
To: Harry Herrmannsdoerfer 2:2490/2520 From: Joe User 1:234/567
Subj: Some questions To: Harry Herrmannsdoerfer 2:2490/2520
@MSGID: 1:234/567 12345678 Subj: Some questions
Text: Hello Harry! @MSGID: 1:234/567 12345678
... Text: Hello Harry!
...
Harry forwards the message to me:
Harry forwards the message to me:
From: Harry Herrmannsdoerfer 2:2490/2520
To: Michael Hohner 2:2490/2520.17 From: Harry Herrmannsdoerfer 2:2490/2520
Subj: Joe's message To: Michael Hohner 2:2490/2520.17
@FWDFROM Joe User Subj: Joe's message
@FWDORIG 1:234/567 @FWDFROM Joe User
@FWDTO Harry Herrmannsdoerfer @FWDORIG 1:234/567
@FWDDEST 2:2490/2520 @FWDTO Harry Herrmannsdoerfer
@FWDSUBJ Some questions @FWDDEST 2:2490/2520
@FWDMSGID 1:234/567 12345678 @FWDSUBJ Some questions
Text: Hi Michael! @FWDMSGID 1:234/567 12345678
... Text: Hi Michael!
...
My answer using the new control lines:
My answer using the new control lines:
From: Michael Hohner 2:2490/2520.17
To: Joe User 1:234/567 From: Michael Hohner 2:2490/2520.17
Subj: Some questions To: Joe User 1:234/567
@REPLY: 1:234/567 12345678 Subj: Some questions
Text: Hi Joe! @REPLY: 1:234/567 12345678
Text: Hi Joe!
JU> ...
... JU&gt; ...
...
3. Compatiblity
--------------- 3. Compatiblity
---------------
Editor programs which are not prepared for these proposed control
lines usually just ignore them and remove them from a reply. A reply Editor programs which are not prepared for these proposed control
goes to the forwarder. Nothing gained and nothing lost. lines usually just ignore them and remove them from a reply. A reply
goes to the forwarder. Nothing gained and nothing lost.
4. Known implementations
------------------------ 4. Known implementations
------------------------
This proposal is implemented in the author's Fidonet editor
"FleetStreet for OS/2" (versions 1.17 and newer). This proposal is implemented in the author's Fidonet editor
"FleetStreet for OS/2" (versions 1.17 and newer).
Also implemented in Odinn Sorensens Fidonet editor "GoldED"
(versions 3.00.Alpha5 and newer). Also implemented in Odinn Sorensens Fidonet editor "GoldED"
(versions 3.00.Alpha5 and newer).
A. Contacting the author
------------------------ A. Contacting the author
------------------------
The author may be contacted electronically at the following
addresses: The author may be contacted electronically at the following
addresses:
Fidonet: 2:2490/2520.17
Internet: miho@osn.de Fidonet: 2:2490/2520.17
Internet: miho@osn.de
Suggestions, comments and corrections are always welcome.
Suggestions, comments and corrections are always welcome.
B. History
---------- B. History
----------
Rev.1, 19960912: First release as FSC-0092.001.
Rev.2, 19971229: Submitted as FSP. Rev.1, 19960912: First release as FSC-0092.001.
Rev.2, 19971229: Submitted as FSP.
**********************************************************************
</PRE> **********************************************************************
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,142 +1,143 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Year 2000 issues in FTN software.</TITLE> <HEAD>
</HEAD> <TITLE>Year 2000 issues in FTN software.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
********************************************************************** <PRE>
FTSC FIDONET TECHNICAL STANDARDS COMMITTEE **********************************************************************
********************************************************************** FTSC FIDONET TECHNICAL STANDARDS COMMITTEE
**********************************************************************
Publication: FSP-1009
Revision: 1 Publication: FSP-1009
Title: Year 2000 issues in FTN software Revision: 1
Author: Michael Hohner, 2:2490/2520.17 Title: Year 2000 issues in FTN software
Revision Date: 29 December 1997 Author: Michael Hohner, 2:2490/2520.17
Expiry Date: 29 December 1999 Revision Date: 29 December 1997
---------------------------------------------------------------------- Expiry Date: 29 December 1999
Contents: ----------------------------------------------------------------------
1. Introduction Contents:
2. Generating Fidonet timestamps 1. Introduction
3. Interpreting Fidonet timestamps 2. Generating Fidonet timestamps
---------------------------------------------------------------------- 3. Interpreting Fidonet timestamps
----------------------------------------------------------------------
Status of this document
----------------------- Status of this document
-----------------------
This document is a Fidonet Standards Proposal (FSP).
This document is a Fidonet Standards Proposal (FSP).
This document specifies an optional Fidonet standard protocol for
the Fidonet community, and requests discussion and suggestions for This document specifies an optional Fidonet standard protocol for
improvements. the Fidonet community, and requests discussion and suggestions for
improvements.
This document is released to the public domain, and may be used,
copied or modified for any purpose whatever. This document is released to the public domain, and may be used,
copied or modified for any purpose whatever.
Abstract
-------- Abstract
--------
The year 2000 causes problems in many computer programs which use
two-digit year numbers. Current Fidonet software faces the very same The year 2000 causes problems in many computer programs which use
problems. This FSP specifies procedures which enable FTN software to two-digit year numbers. Current Fidonet software faces the very same
run without problems after the year 2000. problems. This FSP specifies procedures which enable FTN software to
run without problems after the year 2000.
1. Introduction
--------------- 1. Introduction
---------------
Software using two-digit year numbers may cause problems in the year
2000. When the year number rolls over from "99" to "00", some Software using two-digit year numbers may cause problems in the year
software may interpret the resulting year number as "1900" instead 2000. When the year number rolls over from "99" to "00", some
of "2000". Such programs may contain code like this: software may interpret the resulting year number as "1900" instead
of "2000". Such programs may contain code like this:
calendar_year = year_number + 1900; /* wrong! */
calendar_year = year_number + 1900; /* wrong! */
Fidonet software faces the very same problem: the year number in
packed messages (see FTS-0001) has only two digits. Some programs Fidonet software faces the very same problem: the year number in
interpreting this number incorrectly may decide that messages from packed messages (see FTS-0001) has only two digits. Some programs
the year 1900 are too old and discard them. Other programs probably interpreting this number incorrectly may decide that messages from
just display a wrong calendar year. the year 1900 are too old and discard them. Other programs probably
just display a wrong calendar year.
The long-term solution would be a transition to four-digit year
numbers. However, this would require new data formats and cause The long-term solution would be a transition to four-digit year
every existing software to fail. So a short-term solution is numbers. However, this would require new data formats and cause
required, resulting in only minimal changes in software. This FSP every existing software to fail. So a short-term solution is
contains guidelines for proper year-number interpretation. The required, resulting in only minimal changes in software. This FSP
author encourages all FTN software authors to check their software contains guidelines for proper year-number interpretation. The
for possible year-2000 problems (and release fixed versions during author encourages all FTN software authors to check their software
the next three years). for possible year-2000 problems (and release fixed versions during
the next three years).
2. Generating Fidonet timestamps
-------------------------------- 2. Generating Fidonet timestamps
--------------------------------
This should not cause much headache. However, some software may use
the following algorithm: This should not cause much headache. However, some software may use
the following algorithm:
year_number = calendar_year - 1900 /* wrong! */
year_number = calendar_year - 1900 /* wrong! */
This will result in a three-digit year number in 2000 and lead to
incorrect Fidonet timestamps. This will result in a three-digit year number in 2000 and lead to
incorrect Fidonet timestamps.
One correct algorithm is:
One correct algorithm is:
year_number = calendar_year mod 100 /* correct! */
year_number = calendar_year mod 100 /* correct! */
3. Interpreting Fidonet timestamps
---------------------------------- 3. Interpreting Fidonet timestamps
----------------------------------
We can make use of the fact that Fidonet didn't exist before 1980,
i.e. no messages were created before 1980. So any year number We can make use of the fact that Fidonet didn't exist before 1980,
smaller than 80 can't mean "year 19xx", but can only mean "year i.e. no messages were created before 1980. So any year number
20xx". One algorithm for correct year number interpretation is: smaller than 80 can't mean "year 19xx", but can only mean "year
20xx". One algorithm for correct year number interpretation is:
if year_number < 80 then
calendar_year = 2000 + year_number if year_number &lt; 80 then
else calendar_year = 2000 + year_number
calendar_year = 1900 + year_number else
calendar_year = 1900 + year_number
Fidonet software should only use the calendar year for further
processing, not the year number from the timestamp. Fidonet software should only use the calendar year for further
processing, not the year number from the timestamp.
This solution will work until 2080, giving us another 80+ years to
finally let some innovation happen in Fidonet. This solution will work until 2080, giving us another 80+ years to
finally let some innovation happen in Fidonet.
A. Contacting the author
------------------------ A. Contacting the author
------------------------
The author may be contacted electronically at the following
addresses: The author may be contacted electronically at the following
addresses:
Fidonet: 2:2490/2520.17
Internet: miho@osn.de Fidonet: 2:2490/2520.17
Internet: miho@osn.de
Suggestions, comments and corrections are always welcome.
Suggestions, comments and corrections are always welcome.
B. History
---------- B. History
----------
Rev.1, 19971229: Submitted as FSP.
Rev.1, 19971229: Submitted as FSP.
**********************************************************************
</PRE> **********************************************************************
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,242 +1,243 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>FTSC Document FSP-1010, Revision 001</TITLE> <HEAD>
<BODY <TITLE>FTSC Document FSP-1010, Revision 001</TITLE>
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
********************************************************************** <PRE>
FTSC FIDONET TECHNICAL STANDARDS COMMITTEE **********************************************************************
********************************************************************** FTSC FIDONET TECHNICAL STANDARDS COMMITTEE
**********************************************************************
Publication: FSP-1010
Revision: 1 Publication: FSP-1010
Title: Via kludge specification Revision: 1
Author: Colin Turner, Title: Via kludge specification
Joaquim Homrighausen Author: Colin Turner,
Revision Date: 26 April 1999 Joaquim Homrighausen
Expiry Date: 26 April 2001 Revision Date: 26 April 1999
---------------------------------------------------------------------- Expiry Date: 26 April 2001
Contents: ----------------------------------------------------------------------
1. Current practice Contents:
2. Kludge specification 1. Current practice
3. Examples 2. Kludge specification
4. Deprecated formats 3. Examples
---------------------------------------------------------------------- 4. Deprecated formats
----------------------------------------------------------------------
Status of this document
----------------------- Status of this document
-----------------------
This document is a Fidonet Standards Proposal (FSP).
This document is a Fidonet Standards Proposal (FSP).
This document specifies an optional Fidonet standard protocol for
the Fidonet community, and requests discussion and suggestions for This document specifies an optional Fidonet standard protocol for
improvements. the Fidonet community, and requests discussion and suggestions for
improvements.
This document is released to the public domain, and may be used,
copied or modified for any purpose whatever. This document is released to the public domain, and may be used,
copied or modified for any purpose whatever.
Abstract
-------- Abstract
--------
Current practice for Fidonet Technology Network (FTN) NetMail
messages is to track their progress through the network and Current practice for Fidonet Technology Network (FTN) NetMail
programs by using control lines. These control lines are in messages is to track their progress through the network and
the form of a kludge named Via. programs by using control lines. These control lines are in
the form of a kludge named Via.
1. Current practice
------------------- 1. Current practice
-------------------
As NetMail messages are routed through a FidoNet Technology Network
or as they are processed on a system, Via control lines are used to As NetMail messages are routed through a FidoNet Technology Network
track their progress. or as they are processed on a system, Via control lines are used to
track their progress.
A single NetMail message may have any number of Via control lines.
A single NetMail message may have any number of Via control lines.
The Via control lines are stored in a block which starts after any
message text. New Via lines should be added to the end of the block The Via control lines are stored in a block which starts after any
separated from the preceding control line by a single ASCII &lt;CR&gt; message text. New Via lines should be added to the end of the block
character (0Dh). separated from the preceding control line by a single ASCII &lt;CR&gt;
character (0Dh).
A Via control line is typically added:
A Via control line is typically added:
when a netmail packer packs the NetMail for transmission to
another system; when a netmail packer packs the NetMail for transmission to
another system;
when a netmail tracker inspects a NetMail.
when a netmail tracker inspects a NetMail.
2. Kludge specification
----------------------- 2. Kludge specification
-----------------------
The Via control line is formatted as a number of fields, separated
by single space (20h) characters, as follows The Via control line is formatted as a number of fields, separated
by single space (20h) characters, as follows
^AVia: &lt;FTN Address&gt; @YYYYMMDD.HHMMSS[.Precise][.Time Zone]
&lt;Program Name&gt; &lt;Version&gt; [Serial Number]&lt;CR&gt; ^AVia: &lt;FTN Address&gt; @YYYYMMDD.HHMMSS[.Precise][.Time Zone]
&lt;Program Name&gt; &lt;Version&gt; [Serial Number]&lt;CR&gt;
Where ^A denotes the ASCII &lt;SOH&gt; (01h) character, and &lt;CR&gt; is the
character (0Dh). Where ^A denotes the ASCII &lt;SOH&gt; (01h) character, and &lt;CR&gt; is the
character (0Dh).
The fields are defined as follows:
The fields are defined as follows:
FTN Address
----------- FTN Address
-----------
This field is mandatory and is the FidoNet Technology address of
the system inserting the kludge. This may or may not include a This field is mandatory and is the FidoNet Technology address of
domain indicator. the system inserting the kludge. This may or may not include a
domain indicator.
@YYYYMMDD.HHMMSS
---------------- @YYYYMMDD.HHMMSS
----------------
This field is mandatory and consists of a time stamp. This is the
time at which the stamp was placed. The subcomponents are This field is mandatory and consists of a time stamp. This is the
time at which the stamp was placed. The subcomponents are
YYYY, the calendar year, in full four digit, decimal form;
MM, the calendar month, in the range 01 to 12, this must be a YYYY, the calendar year, in full four digit, decimal form;
zero padded, two digit decimal number; MM, the calendar month, in the range 01 to 12, this must be a
DD, the day of the month, in the range 01 to 31, this must be a zero padded, two digit decimal number;
zero padded, two digit decimal number; DD, the day of the month, in the range 01 to 31, this must be a
HH, hours, in the range 00 to 23, this must be a zero padded, zero padded, two digit decimal number;
two digit decimal number; HH, hours, in the range 00 to 23, this must be a zero padded,
MM, minutes, in the range 00 to 59, this must be a zero padded, two digit decimal number;
two digit decimal number; MM, minutes, in the range 00 to 59, this must be a zero padded,
SS. seconds, in the range 00 to 59, this must be a zero padded, two digit decimal number;
two digit decimal number. SS. seconds, in the range 00 to 59, this must be a zero padded,
two digit decimal number.
Precise
------- Precise
-------
This field is optional and takes the form of extra precision in the
time stamp. This field is optional and takes the form of extra precision in the
time stamp.
If this field is present:
If this field is present:
it must begin with a single period character;
it must begin with a single period character;
this period must be followed by one or more decimal digits;
this period must be followed by one or more decimal digits;
the field has ended when another period or space is encountered;
the field has ended when another period or space is encountered;
each decimal digit in the field following this character
represents the time of the via line in fractions of a second, each decimal digit in the field following this character
such that the the first digit represents tenths of a second, represents the time of the via line in fractions of a second,
the second digit represents hundreds of a second and so on. such that the the first digit represents tenths of a second,
the second digit represents hundreds of a second and so on.
Time Zone
--------- Time Zone
---------
This field is optional, and must be a short, widely accepted
alphabetical abbreviation of the time zone that the time stamp This field is optional, and must be a short, widely accepted
in the Via line pertains to. alphabetical abbreviation of the time zone that the time stamp
in the Via line pertains to.
The use of various Time Zone values is deprecated, implementations
should attempt to convert the timestamp in the kludge to Universal The use of various Time Zone values is deprecated, implementations
Time (GMT or UTC) and use the &quot;UTC&quot; Time Zone indicator, where should attempt to convert the timestamp in the kludge to Universal
possible. Time (GMT or UTC) and use the &quot;UTC&quot; Time Zone indicator, where
possible.
The Time Zone field may only be ommitted when it is not possible
for the implementation to determine the correct offset from UTC, The Time Zone field may only be ommitted when it is not possible
and in this case the time stamp must represent local time on the for the implementation to determine the correct offset from UTC,
generating system. and in this case the time stamp must represent local time on the
generating system.
Program Name
------------ Program Name
------------
This field is mandatory, and must follow the format used in the PID
control line (detailed in FSC-46). This field is mandatory, and must follow the format used in the PID
control line (detailed in FSC-46).
Version
------- Version
-------
This field is mandatory, and must follow the format used in the PID
control line (detailed in FSC-46). This field is mandatory, and must follow the format used in the PID
control line (detailed in FSC-46).
Serial Number
------------- Serial Number
-------------
This field is optional, and must follow the format used in the PID
control line (detailed in FSC-46). This field is optional, and must follow the format used in the PID
control line (detailed in FSC-46).
Note that unlike many kludges, the &quot;Via&quot; text of the kludge itself
is in mixed, and not all upper case. Note that unlike many kludges, the &quot;Via&quot; text of the kludge itself
is in mixed, and not all upper case.
3. Examples
----------- 3. Examples
-----------
Example of valid usage are
Example of valid usage are
^AVia 2:443/13 @19990305.043212.UTC O/T-Track+ 2.69
^AVia 2:443/13@fidonet @19980331.231202.UTC FrontDoor 2.32.mL ^AVia 2:443/13 @19990305.043212.UTC O/T-Track+ 2.69
^AVia 2:443/13.0 @19990101.002102.UTC FastEcho 1.46.1 21321 ^AVia 2:443/13@fidonet @19980331.231202.UTC FrontDoor 2.32.mL
^AVia 2:443/13 @19990323.230132 FakeMail 1.2 ^AVia 2:443/13.0 @19990101.002102.UTC FastEcho 1.46.1 21321
^AVia 2:2480/18@fidonet @19990307.182128.47.UTC ITrack+ 1.3/G6 FP000069 ^AVia 2:443/13 @19990323.230132 FakeMail 1.2
^AVia 2:2480/18@fidonet @19990307.182128.47.UTC ITrack+ 1.3/G6 FP000069
4. Deprecated formats
--------------------- 4. Deprecated formats
---------------------
Some other formats for the Via line are in use today, but these
formats are rather variable and inconsistent in nature, while Some other formats for the Via line are in use today, but these
the format specified above is both more widespread and more formats are rather variable and inconsistent in nature, while
consistent. the format specified above is both more widespread and more
consistent.
New implentations may need to parse these formats, but must not
generate them. New implentations may need to parse these formats, but must not
generate them.
The formats in use include, but are not limited to
The formats in use include, but are not limited to
&lt;NAME&gt; [VERSION] [SERIAL] &lt;ADDRESS&gt; &lt;TIMESTAMP&gt; &lt;TIMEZONE&gt;
&lt;NAME&gt; &lt;ADDRESS&gt;, &lt;TIMESTAMP&gt; &lt;TIMEZONE&gt; &lt;VERSION&gt; &lt;NAME&gt; [VERSION] [SERIAL] &lt;ADDRESS&gt; &lt;TIMESTAMP&gt; &lt;TIMEZONE&gt;
&lt;NAME&gt; &lt;ADDRESS&gt;, &lt;TIMESTAMP&gt; &lt;TIMEZONE&gt; &lt;VERSION&gt;
Not that the time stamp in the above formats is also widely
variable, and takes forms which include, but may not be limited to Not that the time stamp in the above formats is also widely
variable, and takes forms which include, but may not be limited to
&lt;Day&gt; &lt;Month&gt; &lt;Year&gt; AT &lt;Hour&gt;:&lt;Min&gt;:[Sec]
&lt;Day of Week&gt; &lt;Month&gt; &lt;Day of Month&gt; &lt;Year&gt; &lt;Hour&gt;:&lt;Min&gt;:&lt;Sec&gt; &lt;Day&gt; &lt;Month&gt; &lt;Year&gt; AT &lt;Hour&gt;:&lt;Min&gt;:[Sec]
ON &lt;Day of Month&gt; &lt;Month&gt; &lt;Year&gt; &lt;Hour&gt;:&lt;Min&gt;:&lt;Sec&gt; &lt;Day of Week&gt; &lt;Month&gt; &lt;Day of Month&gt; &lt;Year&gt; &lt;Hour&gt;:&lt;Min&gt;:&lt;Sec&gt;
&lt;Month&gt;/&lt;Day&gt; &lt;Hour&gt;:&lt;Min&gt; ON &lt;Day of Month&gt; &lt;Month&gt; &lt;Year&gt; &lt;Hour&gt;:&lt;Min&gt;:&lt;Sec&gt;
@YYMMDDHHMMSS &lt;Month&gt;/&lt;Day&gt; &lt;Hour&gt;:&lt;Min&gt;
@YYMMDDHHMMSS
In the last listed format, observe in particular the two digit year
and lack of period to seperate the date from time. In the last listed format, observe in particular the two digit year
and lack of period to seperate the date from time.
A. References
------------- A. References
-------------
[FTS-1] &quot;A Basic FidoNet(r) Technical Standard Revision 16&quot;, Randy
Bush. September 1995. [FTS-1] &quot;A Basic FidoNet(r) Technical Standard Revision 16&quot;, Randy
Bush. September 1995.
[FSC-46] &quot;A Product Identifier for FidoNet Message Handlers&quot;,
Joaquim Homrighausen, August 1994. [FSC-46] &quot;A Product Identifier for FidoNet Message Handlers&quot;,
Joaquim Homrighausen, August 1994.
B. Author contact data
---------------------- B. Author contact data
----------------------
Colin Turner
Fidonet: 2:443/13 Colin Turner
E-mail: ct@piglets.com Fidonet: 2:443/13
WWW: http://www.piglets.com E-mail: ct@piglets.com
WWW: http://www.piglets.com
Joaquim Homrighausen
Fidonet: 2:201/330 Joaquim Homrighausen
E-mail: joho@defsol.se Fidonet: 2:201/330
WWW: http://www.defsol.se E-mail: joho@defsol.se
WWW: http://www.defsol.se
C. History
---------- C. History
----------
Rev.1, 990426: First release.
Rev.1, 990426: First release.
**********************************************************************
</PRE> **********************************************************************
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A> </PRE>
</BODY> <A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>

File diff suppressed because it is too large Load Diff

View File

@ -1,268 +1,269 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>FTSC Product ID List.</TITLE> <HEAD>
</HEAD> <TITLE>FTSC Product ID List.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
********************************************************************** <PRE>
FTSC FIDONET TECHNICAL STANDARDS COMMITTEE **********************************************************************
********************************************************************** FTSC FIDONET TECHNICAL STANDARDS COMMITTEE
**********************************************************************
Publication: FTA-1005
Revision: 3 Publication: FTA-1005
Title: FTSC Product Codes Revision: 3
Author: Administrator Title: FTSC Product Codes
Revision Date: 22 March 1998 Author: Administrator
Expiry Date: 22 March 1998 Revision Date: 22 March 1998
---------------------------------------------------------------------- Expiry Date: 22 March 1998
Contents: ----------------------------------------------------------------------
1. Format of product code list Contents:
2. Application for a product code 1. Format of product code list
---------------------------------------------------------------------- 2. Application for a product code
----------------------------------------------------------------------
1. Format of product code list
------------------------------ 1. Format of product code list
------------------------------
The FTSC publishes a list of all product codes issued. The filename
is FTSCPROD.nnn, where nnn is a number which increases with each The FTSC publishes a list of all product codes issued. The filename
revision. is FTSCPROD.nnn, where nnn is a number which increases with each
revision.
The list is an ASCII text file with one line per product. Each line
contains a number of fields, delimited by commas. Some fields may The list is an ASCII text file with one line per product. Each line
contain more than one value. In this case, the different values are contains a number of fields, delimited by commas. Some fields may
delimited with a forward slash ('/'). Spaces in fields are replaced contain more than one value. In this case, the different values are
with underscores ('_'). Fields are not case-sensitive. delimited with a forward slash ('/'). Spaces in fields are replaced
with underscores ('_'). Fields are not case-sensitive.
These are the fields which are currently defined:
These are the fields which are currently defined:
code,name,platform,type,contact,netaddr[,assigned[,updated]]
code,name,platform,type,contact,netaddr[,assigned[,updated]]
code The product code. 4 digits hexadecimal.
name Product name. code The product code. 4 digits hexadecimal.
platform Platforms(s) supported. name Product name.
type Type(s) of product. platform Platforms(s) supported.
contact Name of contact person. type Type(s) of product.
netaddr FidoNet address of contact person. contact Name of contact person.
assigned Date the product code was originally assigned. netaddr FidoNet address of contact person.
updated Date of last update of the product code data. assigned Date the product code was originally assigned.
updated Date of last update of the product code data.
Platforms
--------- Platforms
See the list for examples. (Will be specified more firmly later). ---------
See the list for examples. (Will be specified more firmly later).
Product types
------------- Product types
Mailer A mailer is a product that exchanges mail with FTS-0001, -------------
FTS-0006, EMSI or other protocols that include a product Mailer A mailer is a product that exchanges mail with FTS-0001,
code field. FTS-0006, EMSI or other protocols that include a product
Packer A packer is a product that creates .PKT files. code field.
Packer A packer is a product that creates .PKT files.
Dates
----- Dates
The format is YYYYMMDD. A date field may also be blank. -----
The format is YYYYMMDD. A date field may also be blank.
If you write software which is dependant on this format, please make
it tolerant of additional fields after these for upwards If you write software which is dependant on this format, please make
compatibility. it tolerant of additional fields after these for upwards
compatibility.
2. Application for a product code
--------------------------------- 2. Application for a product code
---------------------------------
FidoNet products without an allocated product code which either
create Type-2 packets, or negotiate FTS-0001 sessions must use a FidoNet products without an allocated product code which either
product code FEh (254d) in Type-2 compatible packet headers. This create Type-2 packets, or negotiate FTS-0001 sessions must use a
code as been reserved for that purpose (use by product without a product code FEh (254d) in Type-2 compatible packet headers. This
product code). The product code FFh (255d) has been reserved to code as been reserved for that purpose (use by product without a
indicate that the product code is stored elsewhere in the packet product code). The product code FFh (255d) has been reserved to
header at an as yet unallocated offset. indicate that the product code is stored elsewhere in the packet
header at an as yet unallocated offset.
The FTSC is currently working on an update to the Type-2 packet
specification, to allow 16-bit codes while keeping full backward The FTSC is currently working on an update to the Type-2 packet
compatibility with 8-bit codes (something which the current Type-2 specification, to allow 16-bit codes while keeping full backward
proposals in the FSC's are not). Until the specification is ready, compatibility with 8-bit codes (something which the current Type-2
16-bit codes are issued with the low byte set to FFh (255d). proposals in the FSC's are not). Until the specification is ready,
16-bit codes are issued with the low byte set to FFh (255d).
Below is an application form for an FTSC product code, which is used
to identify your product when used in FidoNet, and providing a means Below is an application form for an FTSC product code, which is used
by which you can be contacted should your product be found to identify your product when used in FidoNet, and providing a means
responsible for problems encountered during its use. The issuance of by which you can be contacted should your product be found
this product code in no way implies authorisation or approval of responsible for problems encountered during its use. The issuance of
your product for use on the network, only provides a means of ready this product code in no way implies authorisation or approval of
identification. your product for use on the network, only provides a means of ready
identification.
This application should be completed and submitted for only `real'
and completed products which will be used by FidoNet systems. If you This application should be completed and submitted for only `real'
are currently developing a product which is not yet ready for use on and completed products which will be used by FidoNet systems. If you
the network out of experimental stage, use product code 0 (zero) are currently developing a product which is not yet ready for use on
which is, by convention, reserved for this purpose. the network out of experimental stage, use product code 0 (zero)
which is, by convention, reserved for this purpose.
Please answer the questions as accurately and completely as
possible. We need to know what will actually be used on the net, so Please answer the questions as accurately and completely as
describe only the current product, and leave future features and possible. We need to know what will actually be used on the net, so
plans for the comments section. describe only the current product, and leave future features and
plans for the comments section.
Send the completed form to the administrator of the FidoNet
Technical Standards Committee. Please see FTA-1003 for addresses. Send the completed form to the administrator of the FidoNet
Technical Standards Committee. Please see FTA-1003 for addresses.
We hope that you will take the time to revise your answers by
submitting updates as your product changes. A summary of the We hope that you will take the time to revise your answers by
information you provide is compiled into a list of all product codes submitting updates as your product changes. A summary of the
published and updated periodically by the FTSC called information you provide is compiled into a list of all product codes
"FTSCPROD.nnn". published and updated periodically by the FTSC called
"FTSCPROD.nnn".
A. Application Form
------------------- A. Application Form
-------------------
--- Cut along here ---------------------------------------------------
--- Cut along here ---------------------------------------------------
FTSC Product Code Application
============================= FTSC Product Code Application
=============================
Type of application
------------------- Type of application
-------------------
1. Mark whichever is appropriate:
1. Mark whichever is appropriate:
____ New product application
____ Update existing product for existing product code ____ ____ New product application
____ Update existing product for existing product code ____
2. If this is an update, please briefly state the nature of the
update (change author's node number, change of product name, etc.) 2. If this is an update, please briefly state the nature of the
update (change author's node number, change of product name, etc.)
__________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________
Product information
------------------- Product information
-------------------
3. What is the name of the product and the current version name or
number? 3. What is the name of the product and the current version name or
number?
__________________________________________________________________
__________________________________________________________________
4. What is the name, FidoNet node, and postal address, and voice
number of the person(s) or organization responsible for the 4. What is the name, FidoNet node, and postal address, and voice
product? Where should inquiries be directed and who should be number of the person(s) or organization responsible for the
contacted if the product is thought to cause errors on the product? Where should inquiries be directed and who should be
network? contacted if the product is thought to cause errors on the
network?
__________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________
5. What operating systems does it currently run on?
5. What operating systems does it currently run on?
__________________________________________________________________
__________________________________________________________________
6. Does the product contain a 'mailer'? E.g. the package transmits
mail to other FidoNet systems and can fall back to FTS-0001, 6. Does the product contain a 'mailer'? E.g. the package transmits
though it may handle other protocols. mail to other FidoNet systems and can fall back to FTS-0001,
though it may handle other protocols.
__________________________________________________________________
__________________________________________________________________
7. If the answer to question (6) is yes, what additional protocols
other than FTS-0001 does the product support? Refer to the 7. If the answer to question (6) is yes, what additional protocols
specific FTSC document which details this protocol, if any. other than FTS-0001 does the product support? Refer to the
specific FTSC document which details this protocol, if any.
__________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________
With what additions or restrictions?
With what additions or restrictions?
__________________________________________________________________
__________________________________________________________________
8. Is the package capable of servicing file requests, and if so,
'Bark' style (FTS-0008) and/or WaZOO .REQ (FTS-0006) or both? 8. Is the package capable of servicing file requests, and if so,
'Bark' style (FTS-0008) and/or WaZOO .REQ (FTS-0006) or both?
__________________________________________________________________
__________________________________________________________________
With what additions or restrictions?
With what additions or restrictions?
__________________________________________________________________
__________________________________________________________________
9. Is your software capable of functioning as a Continuous Mail
system? i.e. nodes running it might be marked as such in the 9. Is your software capable of functioning as a Continuous Mail
FidoNet nodelist? system? i.e. nodes running it might be marked as such in the
FidoNet nodelist?
__________________________________________________________________
__________________________________________________________________
10. How is the product distributed?
10. How is the product distributed?
Public Domain ____________ Shareware ______________
Commercial ____________ Other ______________ Public Domain ____________ Shareware ______________
Object code ____________ Source code ______________ Commercial ____________ Other ______________
Object code ____________ Source code ______________
Comments: ________________________________________________________
__________________________________________________________________ Comments: ________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________
11. Please give additional comments to describe your product.
11. Please give additional comments to describe your product.
__________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________ __________________________________________________________________
__________________________________________________________________
--- Cut along here ---------------------------------------------------
--- Cut along here ---------------------------------------------------
B. Acknowledgements
------------------- B. Acknowledgements
-------------------
The application form was inspired by one originally published in
FSC-0022 and later FSC-0090, originally by Bob Hartman, Jim Long, The application form was inspired by one originally published in
and Randy Bush and modified by Rick Moore and David Nugent. FSC-0022 and later FSC-0090, originally by Bob Hartman, Jim Long,
and Randy Bush and modified by Rick Moore and David Nugent.
C. History
---------- C. History
----------
Rev.1, 19970407: First non-draft release. Author Adrian Walker.
Rev.2, 19971229: Author changed to Administrator. Reformatted Rev.1, 19970407: First non-draft release. Author Adrian Walker.
document slightly. Changed all dates in the lists Rev.2, 19971229: Author changed to Administrator. Reformatted
to 4 digit centuries. Added information about document slightly. Changed all dates in the lists
status of 16-bit product codes. to 4 digit centuries. Added information about
Rev.3, 19980322: Moved the product code list out of the document and status of 16-bit product codes.
into a separate list, FTSCPROD.nnn. Added an Rev.3, 19980322: Moved the product code list out of the document and
application form. Revised text about 16 bit codes. into a separate list, FTSCPROD.nnn. Added an
application form. Revised text about 16 bit codes.
**********************************************************************
</PRE> **********************************************************************
</PRE>
<A HREF="./"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="./"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

File diff suppressed because it is too large Load Diff

View File

@ -1,414 +1,415 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Echomail Specification.</TITLE> <HEAD>
</HEAD> <TITLE>Echomail Specification.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
FTS-0004 EchoMail Specification <PRE>
FTS-0004 EchoMail Specification
This document is directly derived from the documentation of
This document is directly derived from the documentation of
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
The Conference Mail System
The Conference Mail System
By
Bob Hartman By
Sysop of FidoNet(tm) node 132/101 Bob Hartman
Sysop of FidoNet(tm) node 132/101
(C) Copyright 1986,87, Spark Software, Inc.
(C) Copyright 1986,87, Spark Software, Inc.
427-3 Amherst Street
CS 2032, Suite 232 427-3 Amherst Street
Nashua, N.H. 03061 CS 2032, Suite 232
Nashua, N.H. 03061
ALL RIGHTS RESERVED.
ALL RIGHTS RESERVED.
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
version 3.31 of 12 December, 1987.
version 3.31 of 12 December, 1987.
With Bob Hartman's kind consent, copying for the purpose of technological
research and advancement is allowed. With Bob Hartman's kind consent, copying for the purpose of technological
research and advancement is allowed.
-------------------------------------------------------------------------------
------------------------------------------------------------------------------- -------------------------------------------------------------------------------
-------------------------------------------------------------------------------
WHAT IS THE CONFERENCE MAIL SYSTEM?
WHAT IS THE CONFERENCE MAIL SYSTEM?
Conference Mail is a technique to permit several nodes on a
network to share a message base, similar in concept to the Conference Mail is a technique to permit several nodes on a
conferences available on many of the computer services, but it is network to share a message base, similar in concept to the
most closely related to the Usenet system consisting of more than conferences available on many of the computer services, but it is
8,000 systems world wide. All systems sharing a given conference most closely related to the Usenet system consisting of more than
see any messages entered into the conference by any of the 8,000 systems world wide. All systems sharing a given conference
participating systems. This can be implemented in such a way as see any messages entered into the conference by any of the
to be totally transparent to the users of a particular node. In participating systems. This can be implemented in such a way as
fact, they may not even be aware of the network being used to to be totally transparent to the users of a particular node. In
move their messages about from node to node! Unfortunately, this fact, they may not even be aware of the network being used to
has its disadvantages also - most users who are not educated move their messages about from node to node! Unfortunately, this
about Conference Mail do not realize the messages transmitted has its disadvantages also - most users who are not educated
cost MANY sysops (system operators) money, not just the local about Conference Mail do not realize the messages transmitted
sysop. This is an important consideration in Conference Mail and cost MANY sysops (system operators) money, not just the local
should not be taken lightly. In a conference with 100 systems as sysop. This is an important consideration in Conference Mail and
participants the cost per message can get quite high. should not be taken lightly. In a conference with 100 systems as
participants the cost per message can get quite high.
The Conference Mail System is designed to operate in conjunction
with a FidoNet compatible mail server. The currently supported The Conference Mail System is designed to operate in conjunction
mail servers are Fido(tm), SEAdog(tm), Opus, and Dutchie. Since with a FidoNet compatible mail server. The currently supported
the mail server is a prerequisite to using the Conference Mail mail servers are Fido(tm), SEAdog(tm), Opus, and Dutchie. Since
System, it will be assumed you already have your mail server the mail server is a prerequisite to using the Conference Mail
operating correctly on your system, and you are connected into System, it will be assumed you already have your mail server
FidoNet or a compatible network. operating correctly on your system, and you are connected into
FidoNet or a compatible network.
HISTORY OF THE CONFERENCE MAIL SYSTEM
HISTORY OF THE CONFERENCE MAIL SYSTEM
In late 1985, Jeff Rush, a Fido sysop in Dallas, wanted a
convenient means of sharing ideas with the other Dallas sysops. In late 1985, Jeff Rush, a Fido sysop in Dallas, wanted a
He created a system of programs he called Echomail, and the convenient means of sharing ideas with the other Dallas sysops.
Dallas sysops' Conference was born. He created a system of programs he called Echomail, and the
Dallas sysops' Conference was born.
Within a short time sysops in other areas began hearing of this
marvelous new gadget and Echomail took on a life of its own. Within a short time sysops in other areas began hearing of this
Today, a scant year and a half later, the FidoNet public network marvelous new gadget and Echomail took on a life of its own.
boasts a myriad of conferences varying in size from the dozen-or- Today, a scant year and a half later, the FidoNet public network
so participants in the FidoNet Technical Standards Committee boasts a myriad of conferences varying in size from the dozen-or-
Conference to the Sysops' Conference with several hundred so participants in the FidoNet Technical Standards Committee
participants. It is not uncommon for a node to carry 30 or more Conference to the Sysops' Conference with several hundred
conferences and share those conferences with 10 or more nodes. participants. It is not uncommon for a node to carry 30 or more
conferences and share those conferences with 10 or more nodes.
HOW IT WORKS
HOW IT WORKS
The Conference Mail System is functionally compatible with the
original Echomail utilities. In general, the process is: The Conference Mail System is functionally compatible with the
original Echomail utilities. In general, the process is:
1. A message is entered into a designated area on a FidoNet
compatible system. 1. A message is entered into a designated area on a FidoNet
compatible system.
2. This message is "Exported" along with some control information
to each system "linked" to the conference through the originating 2. This message is "Exported" along with some control information
system. to each system "linked" to the conference through the originating
system.
3. Each of the receiving systems "Import" the message into the
proper Conference Mail area. 3. Each of the receiving systems "Import" the message into the
proper Conference Mail area.
4. The receiving systems then "Export" these messages, along with
additional control information, to each of their conference 4. The receiving systems then "Export" these messages, along with
links. additional control information, to each of their conference
links.
5. Return to step 3.
5. Return to step 3.
As you can see, the method is quite simple - in general. Of
course, following the steps literally would mean messages would As you can see, the method is quite simple - in general. Of
never stop being Exported and transmitted to other systems. This course, following the steps literally would mean messages would
obviously would not be desired or the network would quickly never stop being Exported and transmitted to other systems. This
become overburdened. The information contained in the 'control obviously would not be desired or the network would quickly
information' section is used to prevent transmitting the same become overburdened. The information contained in the 'control
message more than once to a single system. information' section is used to prevent transmitting the same
message more than once to a single system.
CONFERENCE MAIL MESSAGE CONTROL INFORMATION
CONFERENCE MAIL MESSAGE CONTROL INFORMATION
There are five pieces of control information associated with a
Conference Mail message. Some are optional, some are not. There are five pieces of control information associated with a
Normally this information is never entered by the person creating Conference Mail message. Some are optional, some are not.
the message. The following control fields determine how Normally this information is never entered by the person creating
Conference Mail is handled: the message. The following control fields determine how
Conference Mail is handled:
1. Area line
1. Area line
This is the first line of a conference mail message. Its
actual appearance is: This is the first line of a conference mail message. Its
actual appearance is:
AREA:CONFERENCE
AREA:CONFERENCE
Where CONFERENCE is the name of the conference. This line is
added when a conference is being "Exported" to another Where CONFERENCE is the name of the conference. This line is
system. It is based upon information found in the AREAS.BBS added when a conference is being "Exported" to another
(configuration) File for the designated message area. This system. It is based upon information found in the AREAS.BBS
field is REQUIRED by the receiving system to "Import" a (configuration) File for the designated message area. This
message into the correct Conference Mail area. field is REQUIRED by the receiving system to "Import" a
message into the correct Conference Mail area.
2. Tear Line
2. Tear Line
This line is near the end of a message and consists of three
dashes (---) followed by an optional program specifier. This line is near the end of a message and consists of three
This is used to show the first program used to add Echomail dashes (---) followed by an optional program specifier.
compatible control information to the message. The tear line This is used to show the first program used to add Echomail
generated by Conference Mail looks like: compatible control information to the message. The tear line
generated by Conference Mail looks like:
--- <a small product-specific banner>
--- &lt;a small product-specific banner&gt;
This field is optional for most Echomail compatible
processors, and is added by the Conference Mail System to This field is optional for most Echomail compatible
ensure complete compatibility. Some systems will place this processors, and is added by the Conference Mail System to
line in the message when it is first created, but it is ensure complete compatibility. Some systems will place this
normally added when the message is first "exported." line in the message when it is first created, but it is
normally added when the message is first "exported."
3. Origin line
3. Origin line
This line appears near the bottom of a message and gives a
small amount of information about the system where it This line appears near the bottom of a message and gives a
originated. It looks like: small amount of information about the system where it
originated. It looks like:
* Origin: The Conference Mail BBS (1:132/101)
* Origin: The Conference Mail BBS (1:132/101)
The " * Origin: " part of the line is a constant field.
This is followed by the name of the system as taken from the The " * Origin: " part of the line is a constant field.
AREAS.BBS file or a file named ORIGIN located in the DOS This is followed by the name of the system as taken from the
directory of the designated message area. The complete AREAS.BBS file or a file named ORIGIN located in the DOS
network address (1:132/101 in this case) is added by the directory of the designated message area. The complete
program inserting the line. This field is generated at the network address (1:132/101 in this case) is added by the
same time as the tear line, and therefore may either be program inserting the line. This field is generated at the
generated at the time of creation or during the first same time as the tear line, and therefore may either be
"export" processing. Although the Origin line is not generated at the time of creation or during the first
required by all Echomail processors, it is added by the "export" processing. Although the Origin line is not
Conference Mail System to ensure complete compatibility. required by all Echomail processors, it is added by the
Conference Mail System to ensure complete compatibility.
4. Seen-by Lines
4. Seen-by Lines
There can be many seen-by lines at the end of Conference
Mail messages, and they are the real "meat" of the control There can be many seen-by lines at the end of Conference
information. They are used to determine the systems to Mail messages, and they are the real "meat" of the control
receive the exported messages. The format of the line is: information. They are used to determine the systems to
receive the exported messages. The format of the line is:
SEEN-BY: 132/101 113 136/601 1014/1
SEEN-BY: 132/101 113 136/601 1014/1
The net/node numbers correspond to the net/node numbers of
the systems having already received the message. In this way The net/node numbers correspond to the net/node numbers of
a message is never sent to a system twice. In a conference the systems having already received the message. In this way
with many participants the number of seen-by lines can be a message is never sent to a system twice. In a conference
very large. This line is added if it is not already a part with many participants the number of seen-by lines can be
of the message, or added to if it already exists, each time very large. This line is added if it is not already a part
a message is exported to other systems. This is a REQUIRED of the message, or added to if it already exists, each time
field, and Conference Mail will not function correctly if a message is exported to other systems. This is a REQUIRED
this field is not put in place by other Echomail compatible field, and Conference Mail will not function correctly if
programs. this field is not put in place by other Echomail compatible
programs.
5. PATH Lines
5. PATH Lines
These are the last lines in a Conference Mail message and
are a new addition, and therefore is not supported by all These are the last lines in a Conference Mail message and
Echomail processors. It appears as follows: are a new addition, and therefore is not supported by all
Echomail processors. It appears as follows:
^aPATH: 132/101 1014/1
^aPATH: 132/101 1014/1
Where the ^a stands for Control-A (ASCII character 1) and
the net/nodes listed correspond to those systems having Where the ^a stands for Control-A (ASCII character 1) and
processed the message before it reached the current system. the net/nodes listed correspond to those systems having
This is not the same as the seen-by lines, because those processed the message before it reached the current system.
lines list all systems the message has been sent to, while This is not the same as the seen-by lines, because those
the path line contains all systems having actually processed lines list all systems the message has been sent to, while
the message. This is not a required field, and few echomail the path line contains all systems having actually processed
processors currently support it, however it can be used the message. This is not a required field, and few echomail
safely with any other system, since the line(s) will be processors currently support it, however it can be used
ignored. For a discussion on how the path line can be safely with any other system, since the line(s) will be
helpful, see the "Advanced Features" section of this manual. ignored. For a discussion on how the path line can be
helpful, see the "Advanced Features" section of this manual.
METHODS OF SENDING CONFERENCE MAIL
METHODS OF SENDING CONFERENCE MAIL
To this point the issue of how Conference Mail is actually sent
has been glossed over entirely. The phrase has been, "the message To this point the issue of how Conference Mail is actually sent
is exported to another system." What exactly does this mean? has been glossed over entirely. The phrase has been, "the message
Well, for starters lets show what is called the "basic" setup: is exported to another system." What exactly does this mean?
Well, for starters lets show what is called the "basic" setup:
In this setup exported mail is placed into the FidoNet mail area.
Each message exported from a Conference Mail area has one In this setup exported mail is placed into the FidoNet mail area.
message generated for each receiving system. This mail is then Each message exported from a Conference Mail area has one
sent the same as any other network mail. When Echomail was first message generated for each receiving system. This mail is then
created this was the only way mail could be sent. sent the same as any other network mail. When Echomail was first
created this was the only way mail could be sent.
The "basic" method has some disadvantages. First, since Echomail
has grown so large it is not uncommon to get 200 new messages per The "basic" method has some disadvantages. First, since Echomail
day imported into various message bases. It is also not uncommon has grown so large it is not uncommon to get 200 new messages per
for a system to be exporting messages to 4 or 5 other systems. day imported into various message bases. It is also not uncommon
Simple arithmetic shows 800-1000 messages per day would be sent for a system to be exporting messages to 4 or 5 other systems.
in normal netmail! This puts a tremendous strain on any netmail Simple arithmetic shows 800-1000 messages per day would be sent
system, not to mention transmission time and the resultant phone in normal netmail! This puts a tremendous strain on any netmail
charges. When this limitation of Echomail was first noticed a lot system, not to mention transmission time and the resultant phone
of people started scratching their heads wondering what to do. If charges. When this limitation of Echomail was first noticed a lot
a solution could not be found it appeared Echomail would of people started scratching their heads wondering what to do. If
certainly overrun the capabilities of FidoNet. a solution could not be found it appeared Echomail would
certainly overrun the capabilities of FidoNet.
Thom Henderson (from System Enhancement Associates) came up with
the original ARCmail program. Having previously written the ARC Thom Henderson (from System Enhancement Associates) came up with
file archiving and compression program, he knew the savings the original ARCmail program. Having previously written the ARC
achievable by having all of the netmail messages placed in .ARC file archiving and compression program, he knew the savings
format for transmission. As a byproduct, the messages no longer achievable by having all of the netmail messages placed in .ARC
appeared in the netmail area, but were included in a file format for transmission. As a byproduct, the messages no longer
attached to a message (see your FidoNet mailer manual for file appeared in the netmail area, but were included in a file
attaches). In this way the tremendous number of messages attached to a message (see your FidoNet mailer manual for file
generated, and the phone bill problems were both solved. attaches). In this way the tremendous number of messages
generated, and the phone bill problems were both solved.
Unfortunately, ARCmail required the messages to first be placed
into the netmail area before it could be run. In effect, it Unfortunately, ARCmail required the messages to first be placed
caused the messages to be scanned once when they were exported, into the netmail area before it could be run. In effect, it
once during the ARCmail phase, once when ARCmail was run at the caused the messages to be scanned once when they were exported,
other end to get the messages out of .ARC format, and once when once during the ARCmail phase, once when ARCmail was run at the
those messages were later imported into a message base on the other end to get the messages out of .ARC format, and once when
receiving system. The Conference Mail System solves this problem those messages were later imported into a message base on the
by eliminating the ARCmail program. Conference Mail builds the receiving system. The Conference Mail System solves this problem
ARCmail files during Export, and unpacks them during Import. This by eliminating the ARCmail program. Conference Mail builds the
way messages are exported directly to ARCmail style file ARCmail files during Export, and unpacks them during Import. This
attaches, and imported directly from ARCmail style file attaches. way messages are exported directly to ARCmail style file
The scanning phases between importing and exporting messages are attaches, and imported directly from ARCmail style file attaches.
totally removed and processing time is proportionally reduced. The scanning phases between importing and exporting messages are
totally removed and processing time is proportionally reduced.
This is now the most common method for sending Conference Mail
between systems. The overhead involved in doing it during the This is now the most common method for sending Conference Mail
importing and exporting phases is much less than what is involved between systems. The overhead involved in doing it during the
if ARCmailing is not utilized. This was a primary consideration importing and exporting phases is much less than what is involved
in the design and implementation of the Conference Mail System, if ARCmailing is not utilized. This was a primary consideration
and as a result the entire system is optimized for this type of in the design and implementation of the Conference Mail System,
use. Please refer to the Import and Export functions for and as a result the entire system is optimized for this type of
specifics on how to use the ARCmailing feature. use. Please refer to the Import and Export functions for
specifics on how to use the ARCmailing feature.
CONFERENCE TOPOLOGY
CONFERENCE TOPOLOGY
The way in which systems link together for a particular
conference is called the "conference topology." It is important The way in which systems link together for a particular
to know this structure for two reasons: 1) It is important to conference is called the "conference topology." It is important
have a topology which is efficient in the transfer of the to know this structure for two reasons: 1) It is important to
Conference Mail messages, and 2) It is important to have a have a topology which is efficient in the transfer of the
topology which will not cause systems to see the same messages Conference Mail messages, and 2) It is important to have a
more than once. topology which will not cause systems to see the same messages
more than once.
Efficiency can be measured in a number of ways; least time
involved for all systems to receive a message, least cost for all Efficiency can be measured in a number of ways; least time
systems to receive a message, and fewest phone calls required for involved for all systems to receive a message, least cost for all
all systems to receive a message are all valid indicators of systems to receive a message, and fewest phone calls required for
efficiency. Users of Echomail compatible systems have determined all systems to receive a message are all valid indicators of
(through trial and error) the best measure of efficiency is a efficiency. Users of Echomail compatible systems have determined
combination of all three of the measurements given above. (through trial and error) the best measure of efficiency is a
Balancing the equation is not trivial, but some guidelines can be combination of all three of the measurements given above.
given: Balancing the equation is not trivial, but some guidelines can be
given:
1. Never have two systems attempting to send Conference mail
to each other at the same time. This results in "collisions" 1. Never have two systems attempting to send Conference mail
that will cause both systems to fail. To avoid this, one to each other at the same time. This results in "collisions"
system should be responsible for polling while the other that will cause both systems to fail. To avoid this, one
system is holding mail. This arrangement can alternate based system should be responsible for polling while the other
upon various criteria, but both systems should never be system is holding mail. This arrangement can alternate based
attempting to call each other at the same time. upon various criteria, but both systems should never be
attempting to call each other at the same time.
2. Have nodes form "stars" for distribution of Conference
Mail. This arrangement has several nodes all receiving their 2. Have nodes form "stars" for distribution of Conference
Conference Mail from the same system. In general the systems Mail. This arrangement has several nodes all receiving their
on the "outside" of the star poll the system on the Conference Mail from the same system. In general the systems
"inside". The system on the "inside" in turn polls other on the "outside" of the star poll the system on the
systems to receive the Conference Mail that is being passed "inside". The system on the "inside" in turn polls other
on to the "outside" systems. systems to receive the Conference Mail that is being passed
on to the "outside" systems.
3. Utilize fully connected polygons with a few vertices.
Nodes can be connected in a triangle (A sends to B and C, B 3. Utilize fully connected polygons with a few vertices.
sends to A and C, C sends to A and B) or a fully connected Nodes can be connected in a triangle (A sends to B and C, B
square (all corners of the square send to all of the other sends to A and C, C sends to A and B) or a fully connected
corners). This method is useful for getting Conference Mail square (all corners of the square send to all of the other
messages to each node as quickly as possible. corners). This method is useful for getting Conference Mail
messages to each node as quickly as possible.
All of these efficiency guidelines have to be tempered with the
guidelines dealing with keeping duplicate messages from being All of these efficiency guidelines have to be tempered with the
exported. Duplicates will occur in any topology that forms a guidelines dealing with keeping duplicate messages from being
closed polygon that is not fully connected. Take for example the exported. Duplicates will occur in any topology that forms a
following configuration: closed polygon that is not fully connected. Take for example the
following configuration:
A ----- B
| | A ----- B
| | | |
C ----- D | |
C ----- D
This square is a closed polygon that is not fully connected. It
is capable of generating duplicates as follows: This square is a closed polygon that is not fully connected. It
is capable of generating duplicates as follows:
1. A message is entered on node A.
1. A message is entered on node A.
2. Node A exports the message to node B and node C placing
the seen-by for A, B, and C in the message as it does so. 2. Node A exports the message to node B and node C placing
the seen-by for A, B, and C in the message as it does so.
3. Node B sees that node D is not listed in the seen-by and
exports the message to node D. 3. Node B sees that node D is not listed in the seen-by and
exports the message to node D.
4. Node C sees that node D is not listed in the seen-by and
exports the message to node D. 4. Node C sees that node D is not listed in the seen-by and
exports the message to node D.
At this point node D has received the same message twice - a
duplicate was generated. Normally a "dup-ring" will not be as At this point node D has received the same message twice - a
simple as a square. Generally it will be caused by a system on duplicate was generated. Normally a "dup-ring" will not be as
one end of a long chain accidentally connecting to a system on simple as a square. Generally it will be caused by a system on
the other end of the chain. This causes the two ends of the chain one end of a long chain accidentally connecting to a system on
to become connected, forming a polygon. the other end of the chain. This causes the two ends of the chain
to become connected, forming a polygon.
In FidoNet this problem is reduced somewhat by having "Regional
Echomail Coordinators" (RECS) that try to keep track of Echomail In FidoNet this problem is reduced somewhat by having "Regional
connections within their regions of the world. A further rule Echomail Coordinators" (RECS) that try to keep track of Echomail
which is followed is that only the RECS are allowed to make connections within their regions of the world. A further rule
inter-regional connections for the larger conferences. In return, which is followed is that only the RECS are allowed to make
the RECS have established a very efficient topology which gets inter-regional connections for the larger conferences. In return,
messages from coast to coast, and onto over 200 systems in less the RECS have established a very efficient topology which gets
than 24 hours. If no one were willing to follow the rules, then messages from coast to coast, and onto over 200 systems in less
this system would collapse, but due to the excellent efficiency than 24 hours. If no one were willing to follow the rules, then
it has remained intact for over a year. this system would collapse, but due to the excellent efficiency
it has remained intact for over a year.
Why a PATH line?
Why a PATH line?
As was previously mentioned, the PATH line is a new concept in
Echomail. It stores the net/node numbers of each system having As was previously mentioned, the PATH line is a new concept in
actually processed a message. This information is useful in Echomail. It stores the net/node numbers of each system having
correcting the biggest problem encountered by nodes running an actually processed a message. This information is useful in
Echomail compatible system - the problem of finding the cause of correcting the biggest problem encountered by nodes running an
duplicate messages. How does the PATH line help solve this Echomail compatible system - the problem of finding the cause of
problem? Take the following path line as an example: duplicate messages. How does the PATH line help solve this
problem? Take the following path line as an example:
^aPATH: 107/6 107/312 132/101
^aPATH: 107/6 107/312 132/101
This shows the message was processed by system 107/6 and
transferred to system 107/312. It further shows system 107/312 This shows the message was processed by system 107/6 and
transferred the message to 132/101, and 132/101 processed it transferred to system 107/312. It further shows system 107/312
again. Now take the following path line as the example: transferred the message to 132/101, and 132/101 processed it
again. Now take the following path line as the example:
^aPATH: 107/6 107/312 107/528 107/312 132/101
^aPATH: 107/6 107/312 107/528 107/312 132/101
This shows the message having been processed by node 107/312 on
more than one occasion. Based upon the earlier description of the This shows the message having been processed by node 107/312 on
'information control' fields in Echomail messages, this clearly more than one occasion. Based upon the earlier description of the
is an error in processing (see the section entitled "How it 'information control' fields in Echomail messages, this clearly
Works"). This further shows node 107/528 as the node which is an error in processing (see the section entitled "How it
apparently processed the message incorrectly. In this case the Works"). This further shows node 107/528 as the node which
path line can be used to quickly locate the source of duplicate apparently processed the message incorrectly. In this case the
messages. path line can be used to quickly locate the source of duplicate
messages.
In a conference with many participants it becomes almost
impossible to determine the exact topology used. In these cases In a conference with many participants it becomes almost
the use of the path line can help a coordinator of the conference impossible to determine the exact topology used. In these cases
track any possible breakdowns in the overall topology, while not the use of the path line can help a coordinator of the conference
substantially increasing the amount of information transmitted. track any possible breakdowns in the overall topology, while not
Having this small amount of information added to the end of each substantially increasing the amount of information transmitted.
message pays for itself very quickly when it can be used to help Having this small amount of information added to the end of each
detect a topology problem causing duplicate messages to be message pays for itself very quickly when it can be used to help
transmitted to each system. detect a topology problem causing duplicate messages to be
transmitted to each system.
-30-
</PRE> -30-
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -1,485 +1,491 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Bark file-request protocol extension.</TITLE> <HEAD>
</HEAD> <TITLE>Bark file-request protocol extension.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
Document: FTS-0008 <PRE>
Version: 003 Document: FTS-0008
Date: 15-Oct-1990 Version: 003
Updates: FTS-0001 Date: 15-Oct-1990
Updates: FTS-0001
An Enhanced FidoNet(r) Technical Standard
Extending FTS-0001 to include Bark requests An Enhanced FidoNet(r) Technical Standard
Extending FTS-0001 to include Bark requests
October 15, 1990
October 15, 1990
Status of this document:
Status of this document:
This document specifies an optional standard for the FidoNet community.
Implementation of the protocols defined in this document is not mandatory, This document specifies an optional standard for the FidoNet community.
but all implementations of these protocols are expected to adhere to this Implementation of the protocols defined in this document is not mandatory,
standard. Distribution of this document is subject to the limitations of but all implementations of these protocols are expected to adhere to this
the copyright notice displayed below. standard. Distribution of this document is subject to the limitations of
the copyright notice displayed below.
Copyright 1989-90 by Philip L. Becker. Portions of this document are
copyright 1986-90 by Randy Bush and are incorporated with his consent. Copyright 1989-90 by Philip L. Becker. Portions of this document are
All rights reserved. A right to distribute only without modification and copyright 1986-90 by Randy Bush and are incorporated with his consent.
only at no charge is granted. Under no circumstances is this document to All rights reserved. A right to distribute only without modification and
be reproduced or distributed as part of or packaged with any product or only at no charge is granted. Under no circumstances is this document to
other sales transaction for which any fee is charged. Any and all other be reproduced or distributed as part of or packaged with any product or
reproduction or excerpting requires the explicit written consent of the other sales transaction for which any fee is charged. Any and all other
copyright holders. reproduction or excerpting requires the explicit written consent of the
copyright holders.
A. Introduction
A. Introduction
1. This Document
1. This Document
This document describes the standard for "Bark" type FidoNet file
request operation. Bark file requests are an extension to the basic This document describes the standard for "Bark" type FidoNet file
FTS-0001 mail session, and this document presents these requests as a request operation. Bark file requests are an extension to the basic
modification to that document. FTS-0001 mail session, and this document presents these requests as a
modification to that document.
2. What are File Requests?
2. What are File Requests?
File Requests are a way of requesting that a specific file be sent during
a FidoNet mail session. This has many advantages over simply logging on to File Requests are a way of requesting that a specific file be sent during
a BBS and downloading a file: a FidoNet mail session. This has many advantages over simply logging on to
a BBS and downloading a file:
o You need not be a validated user
o You need not be a validated user
o You don't have to spend time searching for the file on the BBS
o You don't have to spend time searching for the file on the BBS
o You can schedule the file request to take place at any time without
your being near your computer. o You can schedule the file request to take place at any time without
your being near your computer.
There are two commonly used types of file requests on FidoNet today, WaZOO
and Bark requests. WaZOO requests are used by Opus and BinkleyTerm, and There are two commonly used types of file requests on FidoNet today, WaZOO
are not documented here. See the document FTS-0006 by V. Perriello for a and Bark requests. WaZOO requests are used by Opus and BinkleyTerm, and
description of these. Bark requests were the first file request extension are not documented here. See the document FTS-0006 by V. Perriello for a
to the FTS-0001 protocol, and are supported (at least partially) by many description of these. Bark requests were the first file request extension
mailers, including SEAdog, Dutchie, BinkleyTerm, and to a certain extent to the FTS-0001 protocol, and are supported (at least partially) by many
Opus. This document describes how to implement Bark-type file requests. mailers, including SEAdog, Dutchie, BinkleyTerm, and to a certain extent
Opus. This document describes how to implement Bark-type file requests.
B. Terms Used in this Document
B. Terms Used in this Document
1. The diagrams and notations used in this document are the same as those used
in the FTS-0001 document. Please see FTS-0001 for a description of these. 1. The diagrams and notations used in this document are the same as those used
This document should be considered as an extension to the FTS-0001 session in the FTS-0001 document. Please see FTS-0001 for a description of these.
layer protocol, and you will require FTS-0001 in addition to this document This document should be considered as an extension to the FTS-0001 session
to fully understand what is presented here. layer protocol, and you will require FTS-0001 in addition to this document
to fully understand what is presented here.
In addition to the data description language described in FTS-0001 section
A.4, one extra terminal used in this notation: In addition to the data description language described in FTS-0001 section
A.4, one extra terminal used in this notation:
(* terminals *)
someName<max> - String of up to max chars, NOT null terminated (* terminals *)
C. Performing File Requests someName&lt;max&gt; - String of up to max chars, NOT null terminated
1. Introduction
C. Performing File Requests
A Bark request consists of transmitting a special Bark Request packet which
contains a filename, a date (used for update requests), and optionally a 1. Introduction
password. The system receiving the request then decides if it can send the
requested file or not, and if it can does so using the same protocol used A Bark request consists of transmitting a special Bark Request packet which
to send attached files. Bark request handling is always controlled by the contains a filename, a date (used for update requests), and optionally a
answering system, and consists of two phases. In phase one, the receiving password. The system receiving the request then decides if it can send the
system asks the calling system to honor requests it may have to ask for requested file or not, and if it can does so using the same protocol used
files from the caller. In phase two, the receiving system allows the to send attached files. Bark request handling is always controlled by the
calling system to request files from it. answering system, and consists of two phases. In phase one, the receiving
system asks the calling system to honor requests it may have to ask for
Update file requests are the same as normal file requests, with one files from the caller. In phase two, the receiving system allows the
exception. If the date in the Bark Request packet (described below) is calling system to request files from it.
greater than or equal to the date of the actual file requested, the file
will not be sent. The requestor should set the date to the date of the Update file requests are the same as normal file requests, with one
the actual file on its own end if an update request is desired. exception. If the date in the Bark Request packet (described below) is
greater than or equal to the date of the actual file requested, the file
will not be sent. The requestor should set the date to the date of the
D. The Bark Request Packet the actual file on its own end if an update request is desired.
1. Data Link Layer Data Definition.
D. The Bark Request Packet
The Bark Request packet is a variable-sized packet containing a header, a
filename, a date (which is used only for update requests - in a normal file 1. Data Link Layer Data Definition.
request it's 0) and an optional password. When receiving a Bark Request
packet, the ETX may be used to determine the end of the data portion. Note The Bark Request packet is a variable-sized packet containing a header, a
that the CRC is sent in the reverse byte order of a normal CRC XMODEM data filename, a date (which is used only for update requests - in a normal file
block (see FTS-0001 section G.1). request it's 0) and an optional password. When receiving a Bark Request
packet, the ETX may be used to determine the end of the data portion. Note
Note: some systems will send a password in the data block even if none is that the CRC is sent in the reverse byte order of a normal CRC XMODEM data
needed. Incoming passwords should be ignored unless the other system is block (see FTS-0001 section G.1).
trying to request a passworded file.
Note: some systems will send a password in the data block even if none is
needed. Incoming passwords should be ignored unless the other system is
trying to request a passworded file.
Bark File Request Packet
Offset
dec hex
.-----------------------------------------------. Bark File Request Packet
0 0 | ACK - Start of Bark Request - 06H | Offset
+-----------------------------------------------+ dec hex
1 1 | Filename - Packed DOS file format | .-----------------------------------------------.
+-----------------------------------------------+ 0 0 | ACK - Start of Bark Request - 06H |
n n | SPACE - 20H | +-----------------------------------------------+
+-----------------------------------------------+ 1 1 | Filename - Packed DOS file format |
n n | Date (0 if not Update Request) | +-----------------------------------------------+
+-----------------------------------------------+ n n | SPACE - 20H |
n n | SPACE - 20H (only if pswd follows) | +-----------------------------------------------+
+-----------------------------------------------+ n n | Date (0 if not Update Request) |
n n | Password (optional) | +-----------------------------------------------+
+-----------------------------------------------+ n n | SPACE - 20H (only if pswd follows) |
n n | ETX - End of RESYNC packet - 03H | +-----------------------------------------------+
+-----------------------------------------------+ n n | Password (optional) |
n n | (*1) CRC low order byte | +-----------------------------------------------+
+-----------------------------------------------+ n n | ETX - End of RESYNC packet - 03H |
n n | (*1) CRC high order byte | +-----------------------------------------------+
`-----------------------------------------------' n n | (*1) CRC low order byte |
+-----------------------------------------------+
*1 - CRC does not include the ACK or ETX and is n n | (*1) CRC high order byte |
in the reverse byte order from the CRC in a `-----------------------------------------------'
normal XMODEM data packet.
2. Data Description Notation of Bark Request Packet *1 - CRC does not include the ACK or ETX and is
in the reverse byte order from the CRC in a
DataBlock (no password) = ACK normal XMODEM data packet.
Filename<12>
Space 2. Data Description Notation of Bark Request Packet
Date<11>
ETX DataBlock (no password) = ACK
CRC Filename&lt;12&gt;
Space
DataBlock (with password) = ACK Date&lt;11&gt;
Filename<12> ETX
Space CRC
Date<11>
Space DataBlock (with password) = ACK
Password<6|8> Filename&lt;12&gt;
ETX Space
CRC Date&lt;11&gt;
Space
ACK = 06H (* Header for file request block *) Password&lt;6|8&gt;
Space = 20H (* Space character *) ETX
ETX = 03H (* End of block *) CRC
Filename (* Name of file requested *) ACK = 06H (* Header for file request block *)
Date (* ASCII string; the number of seconds Space = 20H (* Space character *)
since midnight, January 1, 1970 *) ETX = 03H (* End of block *)
Password (* The password needed to request this
file, if any. Maximum length is 6 for Filename (* Name of file requested *)
BinkleyTerm and Opus, 8 for SEAdog Date (* ASCII string; the number of seconds
and Dutchie. *) since midnight, January 1, 1970 *)
Password (* The password needed to request this
CRC = crc[2] (* CCITT Cyclic Redundancy Check. The file, if any. Maximum length is 6 for
same algorithm as used for XModem BinkleyTerm and Opus, 8 for SEAdog
CRCs. The CRC is calculated on and Dutchie. *)
all data in the block between but
not including the ACK and the ETX *) CRC = crc[2] (* CCITT Cyclic Redundancy Check. The
E. Session Layer Protocol: same algorithm as used for XModem
CRCs. The CRC is calculated on
This section describes the modified FTS-0001 session layer protocol. This all data in the block between but
is the only area of FTS-0001 which is modified to implement Bark style file not including the ACK and the ETX *)
requests. File Requests are performed at the end of the normal FidoNet
mail session, after any mail pickup is performed. E. Session Layer Protocol:
The diagrams below desribe the session level protocol with Bark file This section describes the modified FTS-0001 session layer protocol. This
requests implemented. The state tables have been broken into subroutines is the only area of FTS-0001 which is modified to implement Bark style file
but the FTS-0001 portion is not functionally changed. FTS-0001 sender requests. File Requests are performed at the end of the normal FidoNet
states S4 through S7 are now table "Send Mail SM0". FTS-0001 receiver mail session, after any mail pickup is performed.
states R3 through R6 are now table "Receive Mail RM0". They are not
functionally changed in any way from FTS-0001, they are just broken out The diagrams below desribe the session level protocol with Bark file
to allow them to be used as subroutines. Finally Sender states S0 through requests implemented. The state tables have been broken into subroutines
S3 are unchanged, as are Receiver states R0 through R2. but the FTS-0001 portion is not functionally changed. FTS-0001 sender
states S4 through S7 are now table "Send Mail SM0". FTS-0001 receiver
The remaining FTS-0001 states are enhanced to implement the Bark file states R3 through R6 are now table "Receive Mail RM0". They are not
request protocol. In addition, the subroutine state tables "Send Bark SB0" functionally changed in any way from FTS-0001, they are just broken out
and "Receive Bark RB0" have been added to handle the actual file requests. to allow them to be used as subroutines. Finally Sender states S0 through
S3 are unchanged, as are Receiver states R0 through R2.
The following diagrams fully replace the Session Layer protocol state
tables in FTS-0001. No other changes to FTS-0001 are required to implement The remaining FTS-0001 states are enhanced to implement the Bark file
the Bark File request feature. request protocol. In addition, the subroutine state tables "Send Bark SB0"
Sender (Top level) and "Receive Bark RB0" have been added to handle the actual file requests.
.-----+----------+-------------------------+-------------------------+-----. The following diagrams fully replace the Session Layer protocol state
|State| State | Predicate(s) | Action(s) | Next| tables in FTS-0001. No other changes to FTS-0001 are required to implement
| # | Name | | | St | the Bark File request feature.
+-----+----------+-------------------------+-------------------------+-----+
| S0 | SendInit | | dial modem | S1 | Sender (Top level)
+-----+----------+-+-----------------------+-------------------------+-----+
| S1 | WaitCxD |1| carrier detected | delay 1-5 seconds | S2 | .-----+----------+-------------------------+-------------------------+-----.
| | (*1) | | | Set SLO if > 2400bps, | | |State| State | Predicate(s) | Action(s) | Next|
| | | | | Reset SLO if <= 2400bps | | | # | Name | | | St |
| | +-+-----------------------+-------------------------+-----+ +-----+----------+-------------------------+-------------------------+-----+
| | |2| busy, etc. | report no connection | exit| | S0 | SendInit | | dial modem | S1 |
| | +-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| | |3| voice | report no carrier | exit| | S1 | WaitCxD |1| carrier detected | delay 1-5 seconds | S2 |
| | +-+-----------------------+-------------------------+-----+ | | (*1) | | | Set SLO if &gt; 2400bps, | |
| | |4| carrier not detected | report no connection | exit| | | | | | Reset SLO if &lt;= 2400bps | |
| | | | within 60 seconds | | | | | +-+-----------------------+-------------------------+-----+
+-----+----------+-+-----------------------+-------------------------+-----+ | | |2| busy, etc. | report no connection | exit|
| S2 | WhackCRs |1| over 30 seconds | report no response <cr> | exit| | | +-+-----------------------+-------------------------+-----+
| | +-+-----------------------+-------------------------+-----+ | | |3| voice | report no carrier | exit|
| | |2| ?? <cr>s received | delay 1 sec | S3 | | | +-+-----------------------+-------------------------+-----+
| | +-+-----------------------+-------------------------+-----+ | | |4| carrier not detected | report no connection | exit|
| | |3| <cr>s not received | send <cr> <sp> <cr> <sp>| S2 | | | | | within 60 seconds | | |
| | | | | delay ??? secs | | +-----+----------+-+-----------------------+-------------------------+-----+
+-----+----------+-+-----------------------+-------------------------+-----+ | S2 | WhackCRs |1| over 30 seconds | report no response &lt;cr&gt; | exit|
| S3 | WaitClear|1| no input for 0.5 secs | send TSYNCH = AEH | S4 | | | +-+-----------------------+-------------------------+-----+
| | +-+-----------------------+-------------------------+-----+ | | |2| ?? &lt;cr&gt;s received | delay 1 sec | S3 |
| | |2| over 60 seconds | hang up, report garbage | exit| | | +-+-----------------------+-------------------------+-----+
| | | | and line not clear | | | | | |3| &lt;cr&gt;s not received | send &lt;cr&gt; &lt;sp&gt; &lt;cr&gt; &lt;sp&gt;| S2 |
+-----+----------+-+-----------------------+-------------------------+-----+ | | | | | delay ??? secs | |
| S4 | SendMail | | (Send Mail SM0) | S5 | +-----+----------+-+-----------------------+-------------------------+-----+
+-----+----------+-+-----------------------+-------------------------+-----+ | S3 | WaitClear|1| no input for 0.5 secs | send TSYNCH = AEH | S4 |
| S5 | TryPickup|1| Rcv TSYNC | (Receive Mail RM0) | S5 | | | +-+-----------------------+-------------------------+-----+
| | (*2) +-+-----------------------+-------------------------+-----+ | | |2| over 60 seconds | hang up, report garbage | exit|
| | |2| Rcv SYN | (Receive Bark Req RB0) | S5 | | | | | and line not clear | | |
| | +-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| | |3| Rcv ENQ | (Do Bark Requests SB0) | S5 | | S4 | SendMail | | (Send Mail SM0) | S5 |
| | +-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| | |4| Rcv 'C' or NAK | Send EOT | S5 | | S5 | TryPickup|1| Rcv TSYNC | (Receive Mail RM0) | S5 |
| | +-+-----------------------+-------------------------+-----+ | | (*2) +-+-----------------------+-------------------------+-----+
| | |5| Rcv Other Char | Send SUB | S5 | | | |2| Rcv SYN | (Receive Bark Req RB0) | S5 |
| | +-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| | |6| No Data for 45 secs | Hang Up | exit| | | |3| Rcv ENQ | (Do Bark Requests SB0) | S5 |
`-----+----------+-+-----------------------+-------------------------+-----' | | +-+-----------------------+-------------------------+-----+
| | |4| Rcv 'C' or NAK | Send EOT | S5 |
*1 - This state is shown for the extended SEAlink protocol. Omit the | | +-+-----------------------+-------------------------+-----+
set/reset SLO actions if adding Bark to a strict FTS-0001 protocol | | |5| Rcv Other Char | Send SUB | S5 |
implementation, or if not implementing overdrive in SEAdog. | | +-+-----------------------+-------------------------+-----+
| | |6| No Data for 45 secs | Hang Up | exit|
*2 - To refuse to pickup mail (S5.1) may send a CAN and stay in (S5). `-----+----------+-+-----------------------+-------------------------+-----'
Note: Although the above shows the sender emitting only one TSYNCH, it is *1 - This state is shown for the extended SEAlink protocol. Omit the
recommended that a timeout of 5-20 seconds should initiate another TSYNCH. set/reset SLO actions if adding Bark to a strict FTS-0001 protocol
The receiver should tolerate multiple TSYNCHs. implementation, or if not implementing overdrive in SEAdog.
Receiver (Top Level)
*2 - To refuse to pickup mail (S5.1) may send a CAN and stay in (S5).
The receiving FSM is given an external timer, the expiration of which
will cause termination with a result of 'no calls' (R0.2). Note: Although the above shows the sender emitting only one TSYNCH, it is
.-----+----------+-------------------------+-------------------------+-----. recommended that a timeout of 5-20 seconds should initiate another TSYNCH.
|State| State | Predicate(s) | Action(s) | Next| The receiver should tolerate multiple TSYNCHs.
| # | Name | | | St | Receiver (Top Level)
+-----+----------+-+-----------------------+-------------------------+-----+
| R0 | WaitCxD |1| carrier detected | | R1 | The receiving FSM is given an external timer, the expiration of which
| | +-+-----------------------+-------------------------+-----+ will cause termination with a result of 'no calls' (R0.2).
| | |2| external timer expires| report no calls | exit| .-----+----------+-------------------------+-------------------------+-----.
+-----+----------+-+-----------------------+-------------------------+-----+ |State| State | Predicate(s) | Action(s) | Next|
| R1 | WaitBaud |1| baud rate detected | send signon with <cr>s | R2 | | # | Name | | | St |
| | +-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| | |2| no detect in ?? secs | hang up, report no baud | exit| | R0 | WaitCxD |1| carrier detected | | R1 |
+-----+----------+-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| R2 | WaitTsync|1| TSYNCH received | ignore input not TSYNCH | R3 | | | |2| external timer expires| report no calls | exit|
| | +-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| | |2| 60 seconds timeout | hang up, report not Fido| exit| | R1 | WaitBaud |1| baud rate detected | send signon with <cr>s | R2 |
+-----+----------+-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| R3 | RecMail | | (Receive Mail RM0) | R4 | | | |2| no detect in ?? secs | hang up, report no baud | exit|
+-----+----------+-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| R4 | AllowPkup|1| Have pickup for sender| Send Tsync, | R5 | | R2 | WaitTsync|1| TSYNCH received | ignore input not TSYNCH | R3 |
| | | | | Set T1=1 sec | | | | +-+-----------------------+-------------------------+-----+
| | +-+-----------------------+-------------------------+-----+ | | |2| 60 seconds timeout | hang up, report not Fido| exit|
| | |2| No pickup for sender | | R6 | +-----+----------+-+-----------------------+-------------------------+-----+
+-----+----------+-+-----------------------+-------------------------+-----+ | R3 | RecMail | | (Receive Mail RM0) | R4 |
| R5 | WtPickup |1| Rcv NAK or 'C' | (Send Mail SM0) | R6 | +-----+----------+-+-----------------------+-------------------------+-----+
| | +-+-----------------------+-------------------------+-----+ | R4 | AllowPkup|1| Have pickup for sender| Send Tsync, | R5 |
| | |2| Rcv SUB | Send Tsync, | R5 | | | | | | Set T1=1 sec | |
| | | | | Set T1=1 sec | | | | +-+-----------------------+-------------------------+-----+
| | +-+-----------------------+-------------------------+-----+ | | |2| No pickup for sender | | R6 |
| | |3| Rcv CAN | Report Mail Refused | R6 | +-----+----------+-+-----------------------+-------------------------+-----+
| | +-+-----------------------+-------------------------+-----+ | R5 | WtPickup |1| Rcv NAK or 'C' | (Send Mail SM0) | R6 |
| | |4| T1 expired | Send Tsync, | R5 | | | +-+-----------------------+-------------------------+-----+
| | | | | Set T1=1 sec | | | | |2| Rcv SUB | Send Tsync, | R5 |
| | +-+-----------------------+-------------------------+-----+ | | | | | Set T1=1 sec | |
| | |5| 45 secs in R5 | Hang Up, report error | exit| | | +-+-----------------------+-------------------------+-----+
+-----+----------+-+-----------------------+-------------------------+-----+ | | |3| Rcv CAN | Report Mail Refused | R6 |
| R6 | AskBark |1| Wish to make requests | Send SYN | R7 | | | +-+-----------------------+-------------------------+-----+
| | (*1) +-+-----------------------+-------------------------+-----+ | | |4| T1 expired | Send Tsync, | R5 |
| | |2| No requests to make | | R8 | | | | | | Set T1=1 sec | |
+-----+----------+-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| R7 | DoRequest|1| Rcv CAN | Report Requests Refused | R8 | | | |5| 45 secs in R5 | Hang Up, report error | exit|
| | +-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| | |2| Rcv ENQ | (Send Bark SB0) | R8 | | R6 | AskBark |1| Wish to make requests | Send SYN | R7 |
| | +-+-----------------------+-------------------------+-----+ | | (*1) +-+-----------------------+-------------------------+-----+
| | |3| Rcv SUB | Send SYN | R7 | | | |2| No requests to make | | R8 |
| | +-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| | |4| Rcv NAK or 'C' | Send EOT | R6 | | R7 | DoRequest|1| Rcv CAN | Report Requests Refused | R8 |
| | +-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| | |5| Rcv Other | eat character | R7 | | | |2| Rcv ENQ | (Send Bark SB0) | R8 |
| | +-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| | |6| 5 sec, no input | Send SYN | R7 | | | |3| Rcv SUB | Send SYN | R7 |
| | +-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| | |7| 45 secs in R7 | | R8 | | | |4| Rcv NAK or 'C' | Send EOT | R6 |
+-----+----------+-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| R8 | WtPickup |1| Allow File Request | (Receive Bark RB0), | exit| | | |5| Rcv Other | eat character | R7 |
| | | | | Hang Up | | | | +-+-----------------------+-------------------------+-----+
| | +-+-----------------------+-------------------------+-----+ | | |6| 5 sec, no input | Send SYN | R7 |
| | |2| Disallow Requests | Hang Up | exit| | | +-+-----------------------+-------------------------+-----+
`-----+----------+-+-----------------------+-------------------------+-----' | | |7| 45 secs in R7 | | R8 |
*1 - Some implementations always do (R6.1) even if they have no requests. +-----+----------+-+-----------------------+-------------------------+-----+
Sender - Send Mail | R8 | WtPickup |1| Allow File Request | (Receive Bark RB0), | exit|
| | | | | Hang Up | |
.-----+----------+-------------------------+-------------------------+-----. | | +-+-----------------------+-------------------------+-----+
|State| State | Predicate(s) | Action(s) | Next| | | |2| Disallow Requests | Hang Up | exit|
| # | Name | | | St | `-----+----------+-+-----------------------+-------------------------+-----'
+-----+----------+-------------------------+-------------------------+-----+ *1 - Some implementations always do (R6.1) even if they have no requests.
| SM0 | SendMail | | (XMODEM send packet XS0)| SM1 | Sender - Send Mail
+-----+----------+-+-----------------------+-------------------------+-----+
| SM1 | CheckMail|1| XMODEM successful | (Fido registers success)| SM2 | .-----+----------+-------------------------+-------------------------+-----.
| | +-+-----------------------+-------------------------+-----+ |State| State | Predicate(s) | Action(s) | Next|
| | |2| XMODEM fail or timeout| hang up, report mail bad| exit| | # | Name | | | St |
+-----+----------+-+-----------------------+-------------------------+-----+ +-----+----------+-------------------------+-------------------------+-----+
| SM2 | SendFiles| | (BATCH send files BS0) | SM3 | | SM0 | SendMail | | (XMODEM send packet XS0)| SM1 |
+-----+----------+-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| SM3 | CheckFile|1| BATCH send successful | report success | exit| | SM1 | CheckMail|1| XMODEM successful | (Fido registers success)| SM2 |
| | +-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| | |2| BATCH send failed | hang up, rept files fail| exit| | | |2| XMODEM fail or timeout| hang up, report mail bad| exit|
`-----+----------+-+-----------------------+-------------------------+-----' +-----+----------+-+-----------------------+-------------------------+-----+
| SM2 | SendFiles| | (BATCH send files BS0) | SM3 |
+-----+----------+-+-----------------------+-------------------------+-----+
| SM3 | CheckFile|1| BATCH send successful | report success | exit|
Sender - Send Bark | | +-+-----------------------+-------------------------+-----+
| | |2| BATCH send failed | hang up, rept files fail| exit|
.-----+----------+-------------------------+-------------------------+-----. `-----+----------+-+-----------------------+-------------------------+-----'
|State| State | Predicate(s) | Action(s) | Next|
| # | Name | | | St |
+-----+----------+-+-----------------------+-------------------------+-----+
| SB0 | SendBark |1| File to request | Build Bark Request Pkt, | SB1 | Sender - Send Bark
| | | | | Set tries = 0 | |
| | +-+-----------------------+-------------------------+-----+ .-----+----------+-------------------------+-------------------------+-----.
| | |2| No more files to req | Send ETB | exit| |State| State | Predicate(s) | Action(s) | Next|
+-----+----------+-+-----------------------+-------------------------+-----+ | # | Name | | | St |
| SB1 | AskFile | | Send Bark Packet | SB2 | +-----+----------+-+-----------------------+-------------------------+-----+
+-----+----------+-+-----------------------+-------------------------+-----+ | SB0 | SendBark |1| File to request | Build Bark Request Pkt, | SB1 |
| SB2 | RcvFile |1| Rcv ACK | (Batch Receive BR0) | SB3 | | | | | | Set tries = 0 | |
| | +-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| | |2| Tries > 5 | Send ETB, report failed | exit| | | |2| No more files to req | Send ETB | exit|
| | +-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| | |3| Rcv Other | Purge input, Incr tries | SB1 | | SB1 | AskFile | | Send Bark Packet | SB2 |
| | +-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| | |4| 10 sec w/o ACK | Incr tries | SB1 | | SB2 | RcvFile |1| Rcv ACK | (Batch Receive BR0) | SB3 |
+-----+----------+-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| SB3 | NxtFile |1| Rcv ENQ | | SB0 | | | |2| Tries &gt; 5 | Send ETB, report failed | exit|
| | +-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| | |2| Rcv Other | Purge Input | SB3 | | | |3| Rcv Other | Purge input, Incr tries | SB1 |
| | +-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| | |3| 5 sec, no input | Send SUB | SB3 | | | |4| 10 sec w/o ACK | Incr tries | SB1 |
| | +-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| | |4| 45 sec in SB3 | Hang up, report error | exit| | SB3 | NxtFile |1| Rcv ENQ | | SB0 |
`-----+----------+-+-----------------------+-------------------------+-----' | | +-+-----------------------+-------------------------+-----+
Sender & Receiver - Receive Mail | | |2| Rcv Other | Purge Input | SB3 |
| | +-+-----------------------+-------------------------+-----+
.-----+----------+-------------------------+-------------------------+-----. | | |3| 5 sec, no input | Send SUB | SB3 |
|State| State | Predicate(s) | Action(s) | Next| | | +-+-----------------------+-------------------------+-----+
| # | Name | | | St | | | |4| 45 sec in SB3 | Hang up, report error | exit|
+-----+----------+-------------------------+-------------------------+-----+ `-----+----------+-+-----------------------+-------------------------+-----'
| RM0 | RecMail | | (XMODEM rec packet XR0) | RM1 | Sender &amp; Receiver - Receive Mail
+-----+----------+-+-----------------------+-------------------------+-----+
| RM1 | XRecEnd |1| XMODEM successful | delay 1 second | RM2 | .-----+----------+-------------------------+-------------------------+-----.
| | | | | flush input | | |State| State | Predicate(s) | Action(s) | Next|
| | +-+-----------------------+-------------------------+-----+ | # | Name | | | St |
| | |2| XMODEM failed | hang up, rept mail fail | exit| +-----+----------+-------------------------+-------------------------+-----+
+-----+----------+-+-----------------------+-------------------------+-----+ | RM0 | RecMail | | (XMODEM rec packet XR0) | RM1 |
| RM2 | RecFiles | | (BATCH rec files BR0) | RM3 | +-----+----------+-+-----------------------+-------------------------+-----+
+-----+----------+-+-----------------------+-------------------------+-----+ | RM1 | XRecEnd |1| XMODEM successful | delay 1 second | RM2 |
| RM3 | ChkFiles |1| BATCH recv successful | delay 2 secs, rprt good | exit| | | | | | flush input | |
| | +-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| | |2| BATCH recv failed | hang up, report bad file| exit| | | |2| XMODEM failed | hang up, rept mail fail | exit|
`-----+----------+-+-----------------------+-------------------------+-----' +-----+----------+-+-----------------------+-------------------------+-----+
| RM2 | RecFiles | | (BATCH rec files BR0) | RM3 |
+-----+----------+-+-----------------------+-------------------------+-----+
Sender & Receiver - Receive Bark | RM3 | ChkFiles |1| BATCH recv successful | delay 2 secs, rprt good | exit|
| | +-+-----------------------+-------------------------+-----+
.-----+----------+-------------------------+-------------------------+-----. | | |2| BATCH recv failed | hang up, report bad file| exit|
|State| State | Predicate(s) | Action(s) | Next| `-----+----------+-+-----------------------+-------------------------+-----'
| # | Name | | | St |
+-----+----------+-+-----------------------+-------------------------+-----+
| RB0 | HonorReq |1| Ok to honor request | Purge Input, Send ENQ, | RB1 | Sender &amp; Receiver - Receive Bark
| | | | | Set T1 = 2 seconds | |
| | +-+-----------------------+-------------------------+-----+ .-----+----------+-------------------------+-------------------------+-----.
| | |2| Don't wish to honor | Send CAN | exit| |State| State | Predicate(s) | Action(s) | Next|
+-----+----------+-+-----------------------+-------------------------+-----+ | # | Name | | | St |
| RB1 | WaitBark |1| Got ACK | Rcv Bark Packet (*1) | RB2 | +-----+----------+-+-----------------------+-------------------------+-----+
| | +-+-----------------------+-------------------------+-----+ | RB0 | HonorReq |1| Ok to honor request | Purge Input, Send ENQ, | RB1 |
| | |2| Got ETB | Report done | exit| | | | | | Set T1 = 2 seconds | |
| | +-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| | |3| Got ENQ | Send ETB | RB0 | | | |2| Don't wish to honor | Send CAN | exit|
| | +-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| | |4| T1 expired | Purge Input, Send ENQ, | RB1 | | RB1 | WaitBark |1| Got ACK | Rcv Bark Packet (*1) | RB2 |
| | | | | Set T1 = 2 seconds | | | | +-+-----------------------+-------------------------+-----+
| | +-+-----------------------+-------------------------+-----+ | | |2| Got ETB | Report done | exit|
| | |5| 20 seconds in RB1 | Hang Up, Report error | exit| | | +-+-----------------------+-------------------------+-----+
+-----+----------+-+-----------------------+-------------------------+-----+ | | |3| Got ENQ | Send ETB | RB0 |
| RB2 | AckBark |1| Bark Pkt Rcvd Good | Send ACK | RB3 | | | +-+-----------------------+-------------------------+-----+
| | +-+-----------------------+-------------------------+-----+ | | |4| T1 expired | Purge Input, Send ENQ, | RB1 |
| | |2| Bark Pkt Rcv Error | Send NAK | RB1 | | | | | | Set T1 = 2 seconds | |
+-----+----------+-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| RB3 | WaitStrt |1| Got 'C' or NAK | | RB4 | | | |5| 20 seconds in RB1 | Hang Up, Report error | exit|
| | +-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| | |2| No data for 3 seconds | Send ACK | RB3 | | RB2 | AckBark |1| Bark Pkt Rcvd Good | Send ACK | RB3 |
| | +-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| | |3| 15 seconds in RB3 | Hang Up, Report Error | exit| | | |2| Bark Pkt Rcv Error | Send NAK | RB1 |
+-----+----------+-+-----------------------+-------------------------+-----+ +-----+----------+-+-----------------------+-------------------------+-----+
| RB4 | SendFile |1| Can snd requested file| (Batch Send File BS0) | RB0 | | RB3 | WaitStrt |1| Got 'C' or NAK | | RB4 |
| | (*2) +-+-----------------------+-------------------------+-----+ | | +-+-----------------------+-------------------------+-----+
| | |2| Can't send file | Send EOT | RB0 | | | |2| No data for 3 seconds | Send ACK | RB3 |
`-----+----------+-+-----------------------+-------------------------+-----' | | +-+-----------------------+-------------------------+-----+
*1 - If SUB (16H) received before ETX go to RB0 to resync bark receive | | |3| 15 seconds in RB3 | Hang Up, Report Error | exit|
+-----+----------+-+-----------------------+-------------------------+-----+
*2 - While deciding if file exists, and if the password allows it to be | RB4 | SendFile |1| Can snd requested file| (Batch Send File BS0) | RB0 |
sent etc., a NUL may be sent to buy 20 seconds more on the timeout | | (*2) +-+-----------------------+-------------------------+-----+
on the other end if it is using the SEAlink extended FTS-0001 | | |2| Can't send file | Send EOT | RB0 |
specification protocol. Sending a NUL is harmless for a strict `-----+----------+-+-----------------------+-------------------------+-----'
FTS-0001 session, but will not buy more time. *1 - If SUB (16H) received before ETX go to RB0 to resync bark receive
</PRE>
*2 - While deciding if file exists, and if the password allows it to be
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A> sent etc., a NUL may be sent to buy 20 seconds more on the timeout
on the other end if it is using the SEAlink extended FTS-0001
</BODY> specification protocol. Sending a NUL is harmless for a strict
</HTML> FTS-0001 session, but will not buy more time.
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML>

View File

@ -1,104 +1,105 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Message identification and reply linkage.</TITLE> <HEAD>
</HEAD> <TITLE>Message identification and reply linkage.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
Document: FTS-0009 <PRE>
Version: 001 Document: FTS-0009
Date: 17-Dec-91 Version: 001
Date: 17-Dec-91
MSGID / REPLY
A standard for unique message identifiers MSGID / REPLY
and reply chain linkage A standard for unique message identifiers
and reply chain linkage
17 December, 1991
17 December, 1991
jim nutt
1:114/30@fidonet jim nutt
1:114/30@fidonet
Status of this document:
Status of this document:
This FTS (FidoNet(r) Technical Standard) specifies an optional
standard for the FidoNet community. Implementation of the This FTS (FidoNet(r) Technical Standard) specifies an optional
protocols defined in this document is not mandatory, but all standard for the FidoNet community. Implementation of the
implementations of these protocols are expected to adhere to this protocols defined in this document is not mandatory, but all
standard. Distribution of this document is unlimited. implementations of these protocols are expected to adhere to this
standard. Distribution of this document is unlimited.
Fido and FidoNet are registered marks of Tom Jennings and Fido
Software. Fido and FidoNet are registered marks of Tom Jennings and Fido
Software.
MSGID
MSGID
A MSGID line consists of the string "^AMSGID:" (where ^A is a
control-A (hex 01) and the double-quotes are not part of the A MSGID line consists of the string "^AMSGID:" (where ^A is a
string), followed by a space, the address of the originating control-A (hex 01) and the double-quotes are not part of the
system, and a serial number unique to that message on the string), followed by a space, the address of the originating
originating system, i.e.: system, and a serial number unique to that message on the
originating system, i.e.:
^AMSGID: origaddr serialno
^AMSGID: origaddr serialno
The originating address should be specified in a form that
constitutes a valid return address for the originating network. The originating address should be specified in a form that
If the originating address is enclosed in double-quotes, the constitutes a valid return address for the originating network.
entire string between the beginning and ending double-quotes is If the originating address is enclosed in double-quotes, the
considered to be the orginating address. A double-quote character entire string between the beginning and ending double-quotes is
within a quoted address is represented by by two consecutive considered to be the orginating address. A double-quote character
double-quote characters. The serial number may be any eight within a quoted address is represented by by two consecutive
character hexadecimal number, as long as it is unique - no two double-quote characters. The serial number may be any eight
messages from a given system may have the same serial number character hexadecimal number, as long as it is unique - no two
within a three years. The manner in which this serial number is messages from a given system may have the same serial number
generated is left to the implementor. within a three years. The manner in which this serial number is
generated is left to the implementor.
REPLY
REPLY
A REPLY line consists of the string "^AREPLY:" (where ^A is a
control-A (hex 01) and the double-quotes are not part of the A REPLY line consists of the string "^AREPLY:" (where ^A is a
string), followed by a space, and the origaddr and serialno control-A (hex 01) and the double-quotes are not part of the
fields of the MSGID line of the message to which this message is a string), followed by a space, and the origaddr and serialno
reply, i.e.: fields of the MSGID line of the message to which this message is a
reply, i.e.:
^AREPLY: origaddr serialno
^AREPLY: origaddr serialno
The origaddr and serialno fields must be identical to the
corresponding fields in the MSGID of the message to which this The origaddr and serialno fields must be identical to the
message is a reply. A REPLY line is never generated in a corresponding fields in the MSGID of the message to which this
message that is a reply to a message that does not contain a message is a reply. A REPLY line is never generated in a
MSGID line. message that is a reply to a message that does not contain a
MSGID line.
GENERAL
GENERAL
MSGID and REPLY lines should be placed before the text body of the
message in which they appear. MSGID and REPLY lines should be placed before the text body of the
message in which they appear.
Finally, a MSGID is generated only at the time of message
creation. An existing MSGID and/or REPLY should never be stripped Finally, a MSGID is generated only at the time of message
from a message passing through an intermediate system. No system creation. An existing MSGID and/or REPLY should never be stripped
should ever add an MSGID and/or REPLY to, or modify an existing from a message passing through an intermediate system. No system
MSGID / REPLY contained in, a message not originating on that should ever add an MSGID and/or REPLY to, or modify an existing
system. MSGID / REPLY contained in, a message not originating on that
system.
</PRE>
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,192 +1,193 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>Addessing Control Paragraphs.</TITLE> <HEAD>
</HEAD> <TITLE>Addessing Control Paragraphs.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<PRE> >
********************************************************************** <PRE>
FTSC FIDONET TECHNICAL STANDARDS COMMITTEE **********************************************************************
********************************************************************** FTSC FIDONET TECHNICAL STANDARDS COMMITTEE
**********************************************************************
Publication: FTS-4001
Revision: 1 Publication: FTS-4001
Title: ADDRESSING CONTROL PARAGRAPHS Revision: 1
Author(s): FTSC Title: ADDRESSING CONTROL PARAGRAPHS
Author(s): FTSC
Revision Date: 1 October 2000
Expiry Date: 1 October 2002 Revision Date: 1 October 2000
---------------------------------------------------------------------- Expiry Date: 1 October 2002
Contents: ----------------------------------------------------------------------
1. Credits Contents:
2. General 1. Credits
3. FMPT 2. General
4. TOPT 3. FMPT
5. INTL 4. TOPT
---------------------------------------------------------------------- 5. INTL
----------------------------------------------------------------------
Status of this document
----------------------- Status of this document
-----------------------
This document is a Fidonet Standard (FTS).
This document is a Fidonet Standard (FTS).
This document specifies a Fidonet standard for the Fidonet
community. This document specifies a Fidonet standard for the Fidonet
community.
This document is released to the public domain, and may be used,
copied or modified for any purpose whatever. This document is released to the public domain, and may be used,
copied or modified for any purpose whatever.
1. Credits
---------- 1. Credits
----------
This document is based on the work of Randy Bush and many others.
This document is based on the work of Randy Bush and many others.
2. General
---------- 2. General
----------
The general control paragraph format is specified in separate FTSC
documents. The general control paragraph format is specified in separate FTSC
documents.
The addressing control paragraphs specified in this document are
normally only used in netmail messages and not in echomail messages. The addressing control paragraphs specified in this document are
normally only used in netmail messages and not in echomail messages.
While it would be technically correct to use them also in echomail,
it is known that certain programs will misbehave if they are present While it would be technically correct to use them also in echomail,
there. It is therefore recommended that they should not be used in it is known that certain programs will misbehave if they are present
echomail at the present time. there. It is therefore recommended that they should not be used in
echomail at the present time.
If a program processing messages detects these control paragraphs in
an echomail message it is recommended that they are disregarded and If a program processing messages detects these control paragraphs in
deleted from any copies of that message exported to other systems. an echomail message it is recommended that they are disregarded and
deleted from any copies of that message exported to other systems.
Addressing of and address resolution for echomail messages should
instead be done with the help of packet and message header Addressing of and address resolution for echomail messages should
information. See separate FTSC documents. instead be done with the help of packet and message header
information. See separate FTSC documents.
To determine the address of the original sender of an echomail
message, the information in the Origin line should be used. See To determine the address of the original sender of an echomail
separate FTSC documents. message, the information in the Origin line should be used. See
separate FTSC documents.
3. FMPT
------- 3. FMPT
-------
The FMPT control paragraph shall be used to give information about
the point number of the original sender of a message if that point The FMPT control paragraph shall be used to give information about
number is not 0. If the point number of the original sender of a the point number of the original sender of a message if that point
message is 0 that message should not contain any FMPT control number is not 0. If the point number of the original sender of a
paragraph. message is 0 that message should not contain any FMPT control
paragraph.
The format of a FMPT control paragraph shall be:
The format of a FMPT control paragraph shall be:
&lt;SOH&gt;"FMPT &lt;point number&gt;"&lt;CR&gt;
&lt;SOH&gt;"FMPT &lt;point number&gt;"&lt;CR&gt;
where &lt;point number&gt; is the ASCII representation of the point number
of the sender. The point number shall be an unsigned integer in the where &lt;point number&gt; is the ASCII representation of the point number
range 1-65535. of the sender. The point number shall be an unsigned integer in the
range 1-65535.
E.g. a message from point number 1 of a certain node shall contain
the following FMPT control paragraph E.g. a message from point number 1 of a certain node shall contain
the following FMPT control paragraph
&lt;SOH&gt;"FMPT 1"&lt;CR&gt;
&lt;SOH&gt;"FMPT 1"&lt;CR&gt;
Note that the format of a FMPT control paragraph deviates from the
general format specified in separate FTSC documents in that it does Note that the format of a FMPT control paragraph deviates from the
not contain any colon after the control tag. general format specified in separate FTSC documents in that it does
not contain any colon after the control tag.
4. TOPT
------- 4. TOPT
-------
The TOPT control paragraph shall be used to give information about
the point number of the ultimate addressee of a message if that The TOPT control paragraph shall be used to give information about
point number is not 0. If the point number of the ultimate addressee the point number of the ultimate addressee of a message if that
of a message is 0 that message should not contain any TOPT control point number is not 0. If the point number of the ultimate addressee
paragraph. of a message is 0 that message should not contain any TOPT control
paragraph.
The format of a TOPT control paragraph shall be:
The format of a TOPT control paragraph shall be:
&lt;SOH&gt;"TOPT "&lt;point number&gt;&lt;CR&gt;
&lt;SOH&gt;"TOPT "&lt;point number&gt;&lt;CR&gt;
where &lt;point number&gt; is the ASCII representation of the point number
of the addressee. The point number shall be an unsigned integer in where &lt;point number&gt; is the ASCII representation of the point number
the range 1-65535. of the addressee. The point number shall be an unsigned integer in
the range 1-65535.
E.g. a message to point number 1 of a certain node shall contain the
following TOPT control paragraph E.g. a message to point number 1 of a certain node shall contain the
following TOPT control paragraph
&lt;SOH&gt;"TOPT 1"&lt;CR&gt;
&lt;SOH&gt;"TOPT 1"&lt;CR&gt;
Note that the format of a TOPT control paragraph deviates from the
general format specified in separate FTSC documents in that it does Note that the format of a TOPT control paragraph deviates from the
not contain any colon after the control tag. general format specified in separate FTSC documents in that it does
not contain any colon after the control tag.
5. INTL
------- 5. INTL
-------
The INTL control paragraph shall be used to give information about
the zone numbers of the original sender and the ultimate addressee The INTL control paragraph shall be used to give information about
of a message. the zone numbers of the original sender and the ultimate addressee
of a message.
The format of an INTL control paragraph shall be:
The format of an INTL control paragraph shall be:
&lt;SOH&gt;"INTL "&lt;destination address&gt;" "&lt;origin address&gt;&lt;CR&gt;
&lt;SOH&gt;"INTL "&lt;destination address&gt;" "&lt;origin address&gt;&lt;CR&gt;
where &lt;destination address&gt; shall be the representation of the
address of ultimate destination and &lt;origin address&gt; is the where &lt;destination address&gt; shall be the representation of the
representation of the address of the original sender of the message address of ultimate destination and &lt;origin address&gt; is the
in question. These addresses shall be given on the form representation of the address of the original sender of the message
&lt;zone&gt;:&lt;net&gt;/&lt;node&gt; where &lt;zone&gt; is the ASCII representation of the in question. These addresses shall be given on the form
zone number, &lt;net&gt; is the ASCII representation of the net number and &lt;zone&gt;:&lt;net&gt;/&lt;node&gt; where &lt;zone&gt; is the ASCII representation of the
&lt;node&gt; is the ASCII representation of the node number. Any point zone number, &lt;net&gt; is the ASCII representation of the net number and
number information shall be given in FMPT and TOPT control &lt;node&gt; is the ASCII representation of the node number. Any point
paragraphs. number information shall be given in FMPT and TOPT control
paragraphs.
E.g. a message from address 1:123/4.5 to 2:345/6.7 shall contain the
following INTL control paragraph E.g. a message from address 1:123/4.5 to 2:345/6.7 shall contain the
following INTL control paragraph
&lt;SOH&gt;"INTL 2:345/6 1:123/4"&lt;CR&gt;
&lt;SOH&gt;"INTL 2:345/6 1:123/4"&lt;CR&gt;
Note that the format of an INTL control paragraph deviates from the
general format specified in separate FTSC documents in that it does Note that the format of an INTL control paragraph deviates from the
not contain any colon after the control tag. general format specified in separate FTSC documents in that it does
not contain any colon after the control tag.
INTL control paragraphs are also often used even when both the
originating and the destination systems are in the same zone. This INTL control paragraphs are also often used even when both the
gives both the originating system and the destination system as well originating and the destination systems are in the same zone. This
as any intermediate routing systems unambiguous zone information gives both the originating system and the destination system as well
even in a situation where one system may be active in a number of as any intermediate routing systems unambiguous zone information
different (possibly non-FidoNet) zones. even in a situation where one system may be active in a number of
different (possibly non-FidoNet) zones.
Although it is known that some programs may route messages
incorrectly if the INTL control paragraph is present in messages Although it is known that some programs may route messages
where both the originating and the destination systems are in the incorrectly if the INTL control paragraph is present in messages
same zone, it is recommended that the INTL control paragraph is where both the originating and the destination systems are in the
always inserted into netmail messages in packet files. same zone, it is recommended that the INTL control paragraph is
always inserted into netmail messages in packet files.
A. History
---------- A. History
----------
Rev.1, 20001001: Initial Release.
Principal author Goran Eriksson. Rev.1, 20001001: Initial Release.
Principal author Goran Eriksson.
**********************************************************************
</PRE> **********************************************************************
</PRE>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,4 +1,5 @@
<HTML> <HTML>
<!-- $Id$ -->
<HEAD> <HEAD>
<TITLE>The Distribution Nodelist.</TITLE> <TITLE>The Distribution Nodelist.</TITLE>
</HEAD> </HEAD>
@ -446,7 +447,7 @@ C.&nbsp;History<BR>
<BR> <BR>
</TT> </TT>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A> <A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY> </BODY>
</HTML> </HTML>

View File

@ -1,4 +1,5 @@
<HTML> <HTML>
<!-- $Id$ -->
<HEAD> <HEAD>
<TITLE>The Distribution Nodelist.</TITLE> <TITLE>The Distribution Nodelist.</TITLE>
</HEAD> </HEAD>
@ -396,7 +397,7 @@ B.&nbsp;History<BR>
<BR> <BR>
</TT> </TT>
<A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A> <A HREF="index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY> </BODY>
</HTML> </HTML>

View File

@ -1,311 +1,312 @@
<HTML> <HTML>
<HEAD> <!-- $Id$ -->
<TITLE>FTSC Product ID List.</TITLE> <HEAD>
</HEAD> <TITLE>FTSC Product ID List.</TITLE>
</HEAD>
<!-- Background white, links blue (unvisited), navy (visited), red (active) -->
<BODY <!-- Background white, links blue (unvisited), navy (visited), red (active) -->
BGCOLOR="#FFFFFF" <BODY
TEXT="#000000" BGCOLOR="#FFFFFF"
LINK="#0000FF" TEXT="#000000"
VLINK="#000080" LINK="#0000FF"
ALINK="#FF0000" VLINK="#000080"
> ALINK="#FF0000"
<H2><DIV align=center>FTSC Product codes 22 jan 2000</DIV></H2><P> >
<PRE> <H2><DIV align=center>FTSC Product codes 22 jan 2000</DIV></H2><P>
0000,Fido,MS-DOS,Packer/mailer,Tom_Jennings,1:125/111 <PRE>
0001,Rover,MS-DOS,Packer/mailer,Bob_Hartman,1:104/501 0000,Fido,MS-DOS,Packer/mailer,Tom_Jennings,1:125/111
0002,SEAdog,MS-DOS,Packer/mailer,Thom_Henderson,1:107/542.1 0001,Rover,MS-DOS,Packer/mailer,Bob_Hartman,1:104/501
0003,WinDog,MS-DOS,Mailer,Solar_Wind_Computing,1:115/333 0002,SEAdog,MS-DOS,Packer/mailer,Thom_Henderson,1:107/542.1
0004,Slick-150,HP-150,Packer/mailer,Jerry_Bain,???? 0003,WinDog,MS-DOS,Mailer,Solar_Wind_Computing,1:115/333
0005,Opus,MS-DOS,Packer/mailer,Doug_Boone,1:124/4227 0004,Slick-150,HP-150,Packer/mailer,Jerry_Bain,????
0006,Dutchie,MS-DOS,Packer/mailer,Henk_Wevers,2:500/1 0005,Opus,MS-DOS,Packer/mailer,Doug_Boone,1:124/4227
0007,WPL_Library,Amiga,Mailer,Russell_McOrmand,1:163/109 0006,Dutchie,MS-DOS,Packer/mailer,Henk_Wevers,2:500/1
0008,Tabby,Macintosh,Packer/mailer,Michael_Connick,1:107/412 0007,WPL_Library,Amiga,Mailer,Russell_McOrmand,1:163/109
0009,SWMail,OS/2,Mailer,Solar_Wind_Computing,1:115/333 0008,Tabby,Macintosh,Packer/mailer,Michael_Connick,1:107/412
000A,Wolf-68k,CPM-68k,Packer/mailer,Robert_Heller,1:321/153 0009,SWMail,OS/2,Mailer,Solar_Wind_Computing,1:115/333
000B,QMM,QNX,Packer/mailer,Rick_Duff,1:167/201 000A,Wolf-68k,CPM-68k,Packer/mailer,Robert_Heller,1:321/153
000C,FrontDoor,MS-DOS,Packer/mailer,Joaquim_Homrighausen,2:270/17 000B,QMM,QNX,Packer/mailer,Rick_Duff,1:167/201
000D,GOmail,MS-DOS,Packer,Scott_Green,???? 000C,FrontDoor,MS-DOS,Packer/mailer,Joaquim_Homrighausen,2:270/17
000E,FFGate,MS-DOS,Packer,Ruedi_Kneubuehler,2:301/580 000D,GOmail,MS-DOS,Packer,Scott_Green,????
000F,FileMgr,MS-DOS,Packer,Erik_van_Emmerik,2:281/611 000E,FFGate,MS-DOS,Packer,Ruedi_Kneubuehler,2:301/580
0010,FIDZERCP,MS-DOS,Packer,Thorsten_Seidel,2:242/55 000F,FileMgr,MS-DOS,Packer,Erik_van_Emmerik,2:281/611
0011,MailMan,MS-DOS,Packer,Ron_Bemis,1:124/1113 0010,FIDZERCP,MS-DOS,Packer,Thorsten_Seidel,2:242/55
0012,OOPS,MS-DOS,Packer,Tom_Kashuba,1:322/379 0011,MailMan,MS-DOS,Packer,Ron_Bemis,1:124/1113
0013,GS-Point,Atari_ST,Packer/mailer,Harry_Lee,1:124/4230 0012,OOPS,MS-DOS,Packer,Tom_Kashuba,1:322/379
0014,BGMail,????,????,Ray_Gwinn,1:265/104 0013,GS-Point,Atari_ST,Packer/mailer,Harry_Lee,1:124/4230
0015,ComMotion/2,OS/2,Packer/mailer,Michael_Buenter,2:301/602 0014,BGMail,????,????,Ray_Gwinn,1:265/104
0016,OurBBS_Fidomailer,MS-DOS/Unix/Coherent,Packer/mailer,Brian_Keahl,1:133/524 0015,ComMotion/2,OS/2,Packer/mailer,Michael_Buenter,2:301/602
0017,FidoPcb,MS-DOS,Packer,Matjaz_Koce,2:380/100 0016,OurBBS_Fidomailer,MS-DOS/Unix/Coherent,Packer/mailer,Brian_Keahl,1:133/524
0018,WimpLink,Archimedes,Packer/mailer,Remco_de_Vreugd,2:283/307 0017,FidoPcb,MS-DOS,Packer,Matjaz_Koce,2:380/100
0019,BinkScan,MS-DOS,Packer,Shawn_Stoddard,1:362/101 0018,WimpLink,Archimedes,Packer/mailer,Remco_de_Vreugd,2:283/307
001A,D'Bridge,MS-DOS,Packer/mailer,Chris_Irwin,1:18/68 0019,BinkScan,MS-DOS,Packer,Shawn_Stoddard,1:362/101
001B,BinkleyTerm,MS-DOS,Mailer,Vince_Perriello,1:343/491 001A,D'Bridge,MS-DOS,Packer/mailer,Chris_Irwin,1:18/68
001C,Yankee,MS-DOS,Packer,Randy_Edwards,???? 001B,BinkleyTerm,MS-DOS,Mailer,Vince_Perriello,1:343/491
001D,uuGate,MS-DOS,Packer,Geoff_Watts,3:690/710 001C,Yankee,MS-DOS,Packer,Randy_Edwards,????
001E,Daisy,Apple_][,Packer/mailer,Raymond_&_Ken_Lo,3:700/1 001D,uuGate,MS-DOS,Packer,Geoff_Watts,3:690/710
001F,Polar_Bear,????,Packer/mailer,Kenneth_McLeod,1:101/190 001E,Daisy,Apple_][,Packer/mailer,Raymond_&_Ken_Lo,3:700/1
0020,The-Box,MS-DOS/Atari_ST,Packer/mailer,Jac_Kersing/Arjen_Lentz,2:283/333 001F,Polar_Bear,????,Packer/mailer,Kenneth_McLeod,1:101/190
0021,STARgate/2,OS/2,Packer/mailer,Shawn_Stoddard,1:362/101 0020,The-Box,MS-DOS/Atari_ST,Packer/mailer,Jac_Kersing/Arjen_Lentz,2:283/333
0022,TMail,MS-DOS,Packer,Larry_Lewis,3:713/600.1701 0021,STARgate/2,OS/2,Packer/mailer,Shawn_Stoddard,1:362/101
0023,TCOMMail,MS-DOS,Packer/mailer,Mike_Ratledge,1:372/888 0022,TMail,MS-DOS,Packer,Larry_Lewis,3:713/600.1701
0024,GIGO,MS-DOS,Packer,Jason_Fesler,1:203/7707,,940228 0023,TCOMMail,MS-DOS,Packer/mailer,Mike_Ratledge,1:372/888
0025,RBBSMail,MS-DOS,Packer,Jan_Terpstra,2:512/10 0024,GIGO,MS-DOS,Packer,Jason_Fesler,1:203/7707,,940228
0026,Apple-Netmail,Apple_][,Packer/mailer,Bill_Fenner,1:129/87 0025,RBBSMail,MS-DOS,Packer,Jan_Terpstra,2:512/10
0027,Chameleon,Amiga,Mailer,Juergen_Hermann,2:241/2.12 0026,Apple-Netmail,Apple_][,Packer/mailer,Bill_Fenner,1:129/87
0028,Majik_Board,MS-DOS,Packer/mailer,Dale_Barnes,1:3601/14.20 0027,Chameleon,Amiga,Mailer,Juergen_Hermann,2:241/2.12
0029,QM,MS-DOS,Packer,George_Peace,1:270/101 0028,Majik_Board,MS-DOS,Packer/mailer,Dale_Barnes,1:3601/14.20
002A,Point_And_Click,Amiga,Packer,Rob_Tillotson,1:201/40.302 0029,QM,MS-DOS,Packer,George_Peace,1:270/101
002B,Aurora_Three_Bundler,MS-DOS,Packer,Oliver_McDonald,???? 002A,Point_And_Click,Amiga,Packer,Rob_Tillotson,1:201/40.302
002C,FourDog,MS-DOS,Packer,Shay_Walters,1:376/12 002B,Aurora_Three_Bundler,MS-DOS,Packer,Oliver_McDonald,????
002D,MSG-PACK,MS-DOS,Packer,Tom_Hendricks,1:261/662 002C,FourDog,MS-DOS,Packer,Shay_Walters,1:376/12
002E,AMAX,MS-DOS,Packer,Alan_Applegate,1:104/36 002D,MSG-PACK,MS-DOS,Packer,Tom_Hendricks,1:261/662
002F,Domain_Communication_System,????,????,Hal_Duprie,1:101/106 002E,AMAX,MS-DOS,Packer,Alan_Applegate,1:104/36
0030,LesRobot,????,Packer,Lennart_Svensonn,2:501/2 002F,Domain_Communication_System,????,????,Hal_Duprie,1:101/106
0031,Rose,MS-DOS,Packer/mailer,Glen_Jackson,1:100/617 0030,LesRobot,????,Packer,Lennart_Svensonn,2:501/2
0032,Paragon,Amiga,Packer/mailer,Jon_Radoff,1:322/545 0031,Rose,MS-DOS,Packer/mailer,Glen_Jackson,1:100/617
0033,BinkleyTerm/oMMM/ST,Atari_ST,Packer/mailer,Bill_Scull,1:363/112,,19951209 0032,Paragon,Amiga,Packer/mailer,Jon_Radoff,1:322/545
0034,StarNet,Atari_ST,Mailer,Eric_Drewry,1:322/566 0033,BinkleyTerm/oMMM/ST,Atari_ST,Packer/mailer,Bill_Scull,1:363/112,,19951209
0035,ZzyZx,MS-DOS,Packer,Jason_Steck,1:124/424 0034,StarNet,Atari_ST,Mailer,Eric_Drewry,1:322/566
0036,QEcho,MS-DOS,Packer,The_QuickBBS_Group,1:363/1701 0035,ZzyZx,MS-DOS,Packer,Jason_Steck,1:124/424
0037,BOOM,MS-DOS,Packer,Andrew_Farmer,1:243/1 0036,QEcho,MS-DOS,Packer,The_QuickBBS_Group,1:363/1701
0038,PBBS,Amiga,Packer/mailer,Todd_Kover,1:261/1028 0037,BOOM,MS-DOS,Packer,Andrew_Farmer,1:243/1
0039,TrapDoor,Amiga,Mailer,Maximilian_Hantsch,2:310/6 0038,PBBS,Amiga,Packer/mailer,Todd_Kover,1:261/1028
003A,Welmat,Amiga,Mailer,Russell_McOrmand,1:163/109 0039,TrapDoor,Amiga,Mailer,Maximilian_Hantsch,2:310/6
003B,NetGate,Unix-386,Packer,David_Nugent,3:632/348 003A,Welmat,Amiga,Mailer,Russell_McOrmand,1:163/109
003C,Odie,MS-DOS,Mailer,Matt_Farrenkopf,1:105/376 003B,NetGate,Unix-386,Packer,David_Nugent,3:632/348
003D,Quick_Gimme,CPM-80/MS-DOS,Packer/mailer,Laeeth_Isaacs,2:254/18 003C,Odie,MS-DOS,Mailer,Matt_Farrenkopf,1:105/376
003E,dbLink,MS-DOS,Packer/mailer,Chris_Irwin,1:18/68 003D,Quick_Gimme,CPM-80/MS-DOS,Packer/mailer,Laeeth_Isaacs,2:254/18
003F,TosScan,MS-DOS,Packer,Joaquim_Homrighausen,2:270/17 003E,dbLink,MS-DOS,Packer/mailer,Chris_Irwin,1:18/68
0040,Beagle,MS-DOS,Mailer,Alexander_Holy,2:310/90 003F,TosScan,MS-DOS,Packer,Joaquim_Homrighausen,2:270/17
0041,Igor,MS-DOS,Mailer,Harry_Lee,1:124/4230 0040,Beagle,MS-DOS,Mailer,Alexander_Holy,2:310/90
0042,TIMS,MS-DOS,Packer/mailer,Bit_Bucket_Software,1:104/501 0041,Igor,MS-DOS,Mailer,Harry_Lee,1:124/4230
0043,Phoenix,MS-DOS,Packer/mailer,International_Telecommunications,1:296/5,,19930624 0042,TIMS,MS-DOS,Packer/mailer,Bit_Bucket_Software,1:104/501
0044,FrontDoor_APX,MS-DOS,Packer/mailer,Joaquim_Homrighausen,2:270/17 0043,Phoenix,MS-DOS,Packer/mailer,International_Telecommunications,1:296/5,,19930624
0045,XRS,MS-DOS,Packer,Mike_Ratledge,1:372/888 0044,FrontDoor_APX,MS-DOS,Packer/mailer,Joaquim_Homrighausen,2:270/17
0046,Juliet_Mail_System,Amiga,Packer,Gregory_Kritsch,1:163/109.30 0045,XRS,MS-DOS,Packer,Mike_Ratledge,1:372/888
0047,Jabberwocky,Macintosh,Packer,Eric_Larson,1:2605/620 0046,Juliet_Mail_System,Amiga,Packer,Gregory_Kritsch,1:163/109.30
0048,XST,MS-DOS,Packer,Wayne_Michaels,1:380/100 0047,Jabberwocky,Macintosh,Packer,Eric_Larson,1:2605/620
0049,MailStorm,Amiga,Packer,Russel_Miranda,1:268/106 0048,XST,MS-DOS,Packer,Wayne_Michaels,1:380/100
004A,BIX-Mail,????,Mailer,Bob_Hartman,1:104/501 0049,MailStorm,Amiga,Packer,Russel_Miranda,1:268/106
004B,IMAIL,MS-DOS,Packer,IMAIL_INC.,2:246/47 004A,BIX-Mail,????,Mailer,Bob_Hartman,1:104/501
004C,FTNGate,MS-DOS,Packer,Jason_Steck,1:104/424 004B,IMAIL,MS-DOS,Packer,IMAIL_INC.,2:246/47
004D,RealMail,MS-DOS,Packer,Taine_Gilliam,1:372/42 004C,FTNGate,MS-DOS,Packer,Jason_Steck,1:104/424
004E,Lora-CBIS,MS-DOS,Mailer,Marco_Maccaferri,2:332/402 004D,RealMail,MS-DOS,Packer,Taine_Gilliam,1:372/42
004F,TDCS,PDP-11,Packer/mailer,Terry_Ebdon,2:254/6 004E,Lora-CBIS,MS-DOS,Mailer,Marco_Maccaferri,2:332/402
0050,InterMail,MS-DOS,Packer/mailer,Peter_Stewart,1:369/35 004F,TDCS,PDP-11,Packer/mailer,Terry_Ebdon,2:254/6
0051,RFD,MS-DOS,Packer,Doug_Belkofer,1:234/10 0050,InterMail,MS-DOS,Packer/mailer,Peter_Stewart,1:369/35
0052,Yuppie!,MS-DOS,Packer,Leo_Moll,2:242/2 0051,RFD,MS-DOS,Packer,Doug_Belkofer,1:234/10
0053,EMMA,MS-DOS,Packer,Johan_Zwiekhorst,2:292/100 0052,Yuppie!,MS-DOS,Packer,Leo_Moll,2:242/2
0054,QBoxMail,QDOS,Packer/mailer,Jan_Bredenbeek,2:283/500 0053,EMMA,MS-DOS,Packer,Johan_Zwiekhorst,2:292/100
0055,Number_4,MS-DOS,Packer/mailer,Ola_Garstad,2:502/15 0054,QBoxMail,QDOS,Packer/mailer,Jan_Bredenbeek,2:283/500
0056,Number_5,MS-DOS,Packer/mailer,Ola_Garstad,2:502/15 0055,Number_4,MS-DOS,Packer/mailer,Ola_Garstad,2:502/15
0057,GSBBS,MS-DOS,Packer,Michelangelo_Jones,1:260/244 0056,Number_5,MS-DOS,Packer/mailer,Ola_Garstad,2:502/15
0058,Merlin,MS-DOS,Packer/mailer,Mark_Lewis,2:258/25 0057,GSBBS,MS-DOS,Packer,Michelangelo_Jones,1:260/244
0059,TPCS,MS-DOS,Packer,Mikael_Kjellstrom,2:201/211 0058,Merlin,MS-DOS,Packer/mailer,Mark_Lewis,2:258/25
005A,Raid,MS-DOS,Packer,George_Peace,1:270/101 0059,TPCS,MS-DOS,Packer,Mikael_Kjellstrom,2:201/211
005B,Outpost,MS-DOS,Packer/mailer,Mike_Dailor,???? 005A,Raid,MS-DOS,Packer,George_Peace,1:270/101
005C,Nizze,MS-DOS,Packer,Tomas_Nielsen,2:205/202 005B,Outpost,MS-DOS,Packer/mailer,Mike_Dailor,????
005D,Armadillo,Macintosh,Packer,Erik_Sea,1:221/109 005C,Nizze,MS-DOS,Packer,Tomas_Nielsen,2:205/202
005E,rfmail,Unix,Packer/mailer,Per_Lindqvist,2:201/332 005D,Armadillo,Macintosh,Packer,Erik_Sea,1:221/109
005F,Msgtoss,MS-DOS,Packer,Mike_Zakharoff,1:343/36 005E,rfmail,Unix,Packer/mailer,Per_Lindqvist,2:201/332
0060,InfoTex,MS-DOS,Packer/mailer,Jan_Spooren,2:292/852 005F,Msgtoss,MS-DOS,Packer,Mike_Zakharoff,1:343/36
0061,GEcho,MS-DOS,Packer,Gerard_van_der_Land,2:283/555,951209 0060,InfoTex,MS-DOS,Packer/mailer,Jan_Spooren,2:292/852
0062,CDEhost,MS-DOS,Packer,Dennis_D'Annunzio,1:379/28 0061,GEcho,MS-DOS,Packer,Gerard_van_der_Land,2:283/555,951209
0063,Pktize,MS-DOS,Packer,Joaquim_Homrighausen,2:270/17 0062,CDEhost,MS-DOS,Packer,Dennis_D'Annunzio,1:379/28
0064,PC-RAIN,MS-DOS,Packer/mailer,Ray_Hyder,1:272/40 0063,Pktize,MS-DOS,Packer,Joaquim_Homrighausen,2:270/17
0065,Truffle,MS-DOS/OS2,Mailer,Mike_Rissa,2:504/59 0064,PC-RAIN,MS-DOS,Packer/mailer,Ray_Hyder,1:272/40
0066,Foozle,Amiga,Packer,Peer_Hasselmeyer,2:247/4 0065,Truffle,MS-DOS/OS2,Mailer,Mike_Rissa,2:504/59
0067,White_Pointer,Macintosh,Packer/mailer,Alastair_Rakine,3:680/820 0066,Foozle,Amiga,Packer,Peer_Hasselmeyer,2:247/4
0068,GateWorks,MS-DOS,Packer,Jamie_Penner,1:153/1025 0067,White_Pointer,Macintosh,Packer/mailer,Alastair_Rakine,3:680/820
0069,Portal_of_Power,MS-DOS,Mailer,Soren_Ager,2:230/12 0068,GateWorks,MS-DOS,Packer,Jamie_Penner,1:153/1025
006A,MacWoof,Macintosh,Packer/mailer,Craig_Vaughan,1:109/342 0069,Portal_of_Power,MS-DOS,Mailer,Soren_Ager,2:230/12
006B,Mosaic,MS-DOS,Packer,Christopher_King,1:103/315 006A,MacWoof,Macintosh,Packer/mailer,Craig_Vaughan,1:109/342
006C,TPBEcho,MS-DOS,Packer,Gerd_Qualmann,2:242/1 006B,Mosaic,MS-DOS,Packer,Christopher_King,1:103/315
006D,HandyMail,MS-DOS,Packer/mailer,jim_nutt,1:114/30 006C,TPBEcho,MS-DOS,Packer,Gerd_Qualmann,2:242/1
006E,EchoSmith,MS-DOS,Packer,Noel_Crow,1:170/409 006D,HandyMail,MS-DOS,Packer/mailer,jim_nutt,1:114/30
006F,FileHost,MS-DOS,Packer,Mark_Cole,2:252/186 006E,EchoSmith,MS-DOS,Packer,Noel_Crow,1:170/409
0070,SFTS,MS-DOS,Packer,Bruce_Anderson,1:3402/6 006F,FileHost,MS-DOS,Packer,Mark_Cole,2:252/186
0071,Benjamin,MS-DOS,Packer/mailer,Stefan_Graf,2:245/4.5436 0070,SFTS,MS-DOS,Packer,Bruce_Anderson,1:3402/6
0072,RiBBS,OS9_(COCO),Packer/mailer,Ron_Bihler,1:104/54 0071,Benjamin,MS-DOS,Packer/mailer,Stefan_Graf,2:245/4.5436
0073,MP,MS-DOS,Packer,Ivan_Leong,6:600/28 0072,RiBBS,OS9_(COCO),Packer/mailer,Ron_Bihler,1:104/54
0074,Ping,MS-DOS,Packer,David_Nugent,3:632/348 0073,MP,MS-DOS,Packer,Ivan_Leong,6:600/28
0075,Door2Europe,MS-DOS,Packer/mailer,Michaela_Schoebel,2:247/14 0074,Ping,MS-DOS,Packer,David_Nugent,3:632/348
0076,SWIFT,MS-DOS,Packer/mailer,Hanno_van_der_Maas,2:500/2 0075,Door2Europe,MS-DOS,Packer/mailer,Michaela_Schoebel,2:247/14
0077,WMAIL,MS-DOS,Packer,Silvan_Calarco,2:334/100.2 0076,SWIFT,MS-DOS,Packer/mailer,Hanno_van_der_Maas,2:500/2
0078,RATS,MS-DOS,Packer,Jason_DeCaro,1:260/205 0077,WMAIL,MS-DOS,Packer,Silvan_Calarco,2:334/100.2
0079,Harry_the_Dirty_Dog,OS2,Mailer/packer,George_Edwards,3:632/340.7 0078,RATS,MS-DOS,Packer,Jason_DeCaro,1:260/205
007A,Maximus-CBCS,MS-DOS/OS2,Packer,Scott_Dudley,1:249/106 0079,Harry_the_Dirty_Dog,OS2,Mailer/packer,George_Edwards,3:632/340.7
007B,SwifEcho,MS-DOS,Packer,Dana_Bell,1:3801/8 007A,Maximus-CBCS,MS-DOS/OS2,Packer,Scott_Dudley,1:249/106
007C,GCChost,Amiga,Packer,Davide_Massarenti,2:332/505.3 007B,SwifEcho,MS-DOS,Packer,Dana_Bell,1:3801/8
007D,RPX-Mail,MS-DOS,Packer,Joerg_Wirtgen,2:241/4034 007C,GCChost,Amiga,Packer,Davide_Massarenti,2:332/505.3
007E,Tosser,MS-DOS,Packer,Albert_Ng,6:700/185 007D,RPX-Mail,MS-DOS,Packer,Joerg_Wirtgen,2:241/4034
007F,TCL,MS-DOS,Packer,Ulf_Hedlund,2:201/602 007E,Tosser,MS-DOS,Packer,Albert_Ng,6:700/185
0080,MsgTrack,MS-DOS,Packer,Andrew_Farmer,1:243/1 007F,TCL,MS-DOS,Packer,Ulf_Hedlund,2:201/602
0081,FMail,MS-DOS/DOS_DPMI/OS2/WIN32,Packer,Folkert_Wijnstra,2:283/619 0080,MsgTrack,MS-DOS,Packer,Andrew_Farmer,1:243/1
0082,Scantoss,MS-DOS,Packer,Michael_Matter,2:243/44.3443 0081,FMail,MS-DOS/DOS_DPMI/OS2/WIN32,Packer,Folkert_Wijnstra,2:283/619
0083,Point_Manager,Amiga,Packer,Pino_Aliberti,2:335/602.2,,19931012 0082,Scantoss,MS-DOS,Packer,Michael_Matter,2:243/44.3443
0084,IMBINK,MS-DOS,Packer,Mike_Hartmann,2:246/48 0083,Point_Manager,Amiga,Packer,Pino_Aliberti,2:335/602.2,,19931012
0085,Simplex,MS-DOS/OS2,Packer,Chris_Laforet,1:152/401 0084,IMBINK,MS-DOS,Packer,Mike_Hartmann,2:246/48
0086,UMTP,MS-DOS,Packer,Byron_Copeland,1:272/26 0085,Simplex,MS-DOS/OS2,Packer,Chris_Laforet,1:152/401
0087,Indaba,MS-DOS,Packer,Pieter_Muller,5:7102/11 0086,UMTP,MS-DOS,Packer,Byron_Copeland,1:272/26
0088,Echomail_Engine,MS-DOS,Packer,Joe_Jared,1:103/200 0087,Indaba,MS-DOS,Packer,Pieter_Muller,5:7102/11
0089,DragonMail,OS2,Packer,Patrick_O'Riva,1:143/37 0088,Echomail_Engine,MS-DOS,Packer,Joe_Jared,1:103/200
008A,Prox,MS-DOS,Packer,Gerhard_Hoogterp,2:283/1.2 0089,DragonMail,OS2,Packer,Patrick_O'Riva,1:143/37
008B,Tick,MS-DOS/OS2,Packer,Barry_Geller,1:266/12 008A,Prox,MS-DOS,Packer,Gerhard_Hoogterp,2:283/1.2
008C,RA-Echo,MS-DOS,Packer,Roger_Kirchhoff,2:245/4 008B,Tick,MS-DOS/OS2,Packer,Barry_Geller,1:266/12
008D,TrapToss,Amiga,Packer,Maximilian_Hantsch,2:310/6 008C,RA-Echo,MS-DOS,Packer,Roger_Kirchhoff,2:245/4
008E,Babel,MS-DOS/OS2,Packer,Jorgen_Abrahamsen,2:230/100.9 008D,TrapToss,Amiga,Packer,Maximilian_Hantsch,2:310/6
008F,UMS,Amiga,Packer,Martin_Horneffer,2:242/7.9 008E,Babel,MS-DOS/OS2,Packer,Jorgen_Abrahamsen,2:230/100.9
0090,RWMail,MS-DOS,Packer,Remko_Westrik,2:285/309.5 008F,UMS,Amiga,Packer,Martin_Horneffer,2:242/7.9
0091,WildMail,MS-DOS,Packer,Derek_Koopowitz,1:161/502 0090,RWMail,MS-DOS,Packer,Remko_Westrik,2:285/309.5
0092,AlMAIL,MS-DOS,Packer,Alan_Leung,1:348/207 0091,WildMail,MS-DOS,Packer,Derek_Koopowitz,1:161/502
0093,XCS,MS-DOS,Packer,Rudi_Kusters,2:512/34.4 0092,AlMAIL,MS-DOS,Packer,Alan_Leung,1:348/207
0094,Fone-Link,MS-DOS,Packer/mailer,Chris_Sloyan,1:269/602 0093,XCS,MS-DOS,Packer,Rudi_Kusters,2:512/34.4
0095,Dogfight,MS-DOS,Packer,Chris_Tyson,2:256/36 0094,Fone-Link,MS-DOS,Packer/mailer,Chris_Sloyan,1:269/602
0096,Ascan,MS-DOS,Packer,Arjen_van_Loon,2:281/1.397 0095,Dogfight,MS-DOS,Packer,Chris_Tyson,2:256/36
0097,FastMail,MS-DOS,Packer,Jan_Berends,2:282/5 0096,Ascan,MS-DOS,Packer,Arjen_van_Loon,2:281/1.397
0098,DoorMan,MS-DOS,Mailer,Christopher_Dean,1:105/70 0097,FastMail,MS-DOS,Packer,Jan_Berends,2:282/5
0099,PhaedoZap,Atari_ST,Packer,Jeff_Mitchell,1:229/422 0098,DoorMan,MS-DOS,Mailer,Christopher_Dean,1:105/70
009A,SCREAM,MS-DOS,Packer/mailer,Jem_Miller,1:147/33 0099,PhaedoZap,Atari_ST,Packer,Jeff_Mitchell,1:229/422
009B,MoonMail,MS-DOS,Packer/mailer,Hasse_Wigdahl,2:206/101 009A,SCREAM,MS-DOS,Packer/mailer,Jem_Miller,1:147/33
009C,Backdoor,Sinclair_QL,Packer,Erik_Slagter,2:283/500.3 009B,MoonMail,MS-DOS,Packer/mailer,Hasse_Wigdahl,2:206/101
009D,MailLink,Archimedes,Packer/mailer,Jan-Jaap_v._d._Geer,2:500/133.1138 009C,Backdoor,Sinclair_QL,Packer,Erik_Slagter,2:283/500.3
009E,Mail_Manager,MS-DOS,Packer,Andreas_Brodowski,2:241/4006 009D,MailLink,Archimedes,Packer/mailer,Jan-Jaap_v._d._Geer,2:500/133.1138
009F,Black_Star,Xenix_386,Packer/mailer,Jac_Kersing,2:283/333 009E,Mail_Manager,MS-DOS,Packer,Andreas_Brodowski,2:241/4006
00A0,Bermuda,Atari_ST/MS-DOS,Packer,Jac_Kersing,2:283/333 009F,Black_Star,Xenix_386,Packer/mailer,Jac_Kersing,2:283/333
00A1,PT,MS-DOS,Packer/mailer,Jerry_Andrew,1:109/426 00A0,Bermuda,Atari_ST/MS-DOS,Packer,Jac_Kersing,2:283/333
00A2,UltiMail,MS-DOS,Mailer,Brett_Floren,1:363/1000 00A1,PT,MS-DOS,Packer/mailer,Jerry_Andrew,1:109/426
00A3,GMD,MS-DOS,Packer,John_Souvestre,1:396/1 00A2,UltiMail,MS-DOS,Mailer,Brett_Floren,1:363/1000
00A4,FreeMail,MS-DOS,Packer,Chad_Nelson,1:109/536 00A3,GMD,MS-DOS,Packer,John_Souvestre,1:396/1
00A5,Meliora,MS-DOS,Packer,Erik_van_Riper,1:107/230 00A4,FreeMail,MS-DOS,Packer,Chad_Nelson,1:109/536
00A6,Foodo,CPM-80,Packer/mailer,Ron_Murray,3:690/640.7 00A5,Meliora,MS-DOS,Packer,Erik_van_Riper,1:107/230
00A7,MSBBS,CPM-80,Packer,Marc_Newman,1:106/601 00A6,Foodo,CPM-80,Packer/mailer,Ron_Murray,3:690/640.7
00A8,Boston_BBS,MS-DOS,Packer/mailer,Tom_Bradford,1:101/625 00A7,MSBBS,CPM-80,Packer,Marc_Newman,1:106/601
00A9,XenoMail,MS-DOS,Packer/mailer,Noah_Wood,1:284/14 00A8,Boston_BBS,MS-DOS,Packer/mailer,Tom_Bradford,1:101/625
00AA,XenoLink,Amiga,Packer/mailer,Jonathan_Forbes,1:250/642 00A9,XenoMail,MS-DOS,Packer/mailer,Noah_Wood,1:284/14
00AB,ObjectMatrix,MS-DOS,Packer,Roberto_Ceccarelli,2:332/305.1 00AA,XenoLink,Amiga,Packer/mailer,Jonathan_Forbes,1:250/642
00AC,Milquetoast,Win3/MS-DOS,Mailer,Vince_Perriello,1:343/491 00AB,ObjectMatrix,MS-DOS,Packer,Roberto_Ceccarelli,2:332/305.1
00AD,PipBase,MS-DOS,Packer,Roberto_Piola,2:334/306 00AC,Milquetoast,Win3/MS-DOS,Mailer,Vince_Perriello,1:343/491
00AE,EzyMail,MS-DOS,Packer,Peter_Davies,3:636/204 00AD,PipBase,MS-DOS,Packer,Roberto_Piola,2:334/306
00AF,FastEcho,MS-DOS,Packer,Tobias_Burchhardt,2:245/39 00AE,EzyMail,MS-DOS,Packer,Peter_Davies,3:636/204
00B0,IOS,Atari_ST/TT,Packer,Rinaldo_Visscher,2:280/3.1 00AF,FastEcho,MS-DOS,Packer,Tobias_Burchhardt,2:245/39
00B1,Communique,MS-DOS,Packer,Ian_Harris,3:620/251 00B0,IOS,Atari_ST/TT,Packer,Rinaldo_Visscher,2:280/3.1
00B2,PointMail,MS-DOS,Packer,Michele_Clinco,2:331/302.11 00B1,Communique,MS-DOS,Packer,Ian_Harris,3:620/251
00B3,Harvey's_Robot,MS-DOS,Packer,Harvey_Parisien,1:249/114 00B2,PointMail,MS-DOS,Packer,Michele_Clinco,2:331/302.11
00B4,2daPoint,MS-DOS,Packer,Ron_Pritchett,1:376/74 00B3,Harvey's_Robot,MS-DOS,Packer,Harvey_Parisien,1:249/114
00B5,CommLink,MS-DOS,Mailer,Steve_Shapiro,1:382/35 00B4,2daPoint,MS-DOS,Packer,Ron_Pritchett,1:376/74
00B6,fronttoss,MS-DOS,Packer,Dirk_Astrath,2:241/5603 00B5,CommLink,MS-DOS,Mailer,Steve_Shapiro,1:382/35
00B7,SysopPoint,MS-DOS,Packer,Rudolf_Heeb,2:243/44 00B6,fronttoss,MS-DOS,Packer,Dirk_Astrath,2:241/5603
00B8,PTMAIL,MS-DOS,Packer,Arturo_Krogulski,2:341/27.7 00B7,SysopPoint,MS-DOS,Packer,Rudolf_Heeb,2:243/44
00B9,MHS,MS-DOS/OS2/WINNT,Packer/mailer,Matthias_Hertzog,2:301/402,,19940310 00B8,PTMAIL,MS-DOS,Packer,Arturo_Krogulski,2:341/27.7
00BA,DLGMail,Amiga,Packer,Steve_Lewis,1:114/52 00B9,MHS,MS-DOS/OS2/WINNT,Packer/mailer,Matthias_Hertzog,2:301/402,,19940310
00BB,GatePrep,MS-DOS,Packer,Andrew_Allen,1:382/92 00BA,DLGMail,Amiga,Packer,Steve_Lewis,1:114/52
00BC,Spoint,MS-DOS,Packer,Conrad_Thompson,1:130/29.106 00BB,GatePrep,MS-DOS,Packer,Andrew_Allen,1:382/92
00BD,TurboMail,MS-DOS,Packer,B._J._Weschke,1:2606/403 00BC,Spoint,MS-DOS,Packer,Conrad_Thompson,1:130/29.106
00BE,FXMAIL,MS-DOS,Packer,Kenneth_Roach,1:208/401 00BD,TurboMail,MS-DOS,Packer,B._J._Weschke,1:2606/403
00BF,NextBBS,MS-DOS,Packer/mailer,Tomas_Hood,1:352/777 00BE,FXMAIL,MS-DOS,Packer,Kenneth_Roach,1:208/401
00C0,EchoToss,MS-DOS,Packer,Mikel_Beck,1:107/218 00BF,NextBBS,MS-DOS,Packer/mailer,Tomas_Hood,1:352/777
00C1,SilverBox,Amiga,Packer,David_Lebel,1:240/516 00C0,EchoToss,MS-DOS,Packer,Mikel_Beck,1:107/218
00C2,MBMail,MS-DOS,Packer,Ruud_Uphoff,2:500/116.1928 00C1,SilverBox,Amiga,Packer,David_Lebel,1:240/516
00C3,SkyFreq,Amiga,Packer,Luca_Spada,2:331/106 00C2,MBMail,MS-DOS,Packer,Ruud_Uphoff,2:500/116.1928
00C4,ProMailer,Amiga,Mailer,Ivan_Pintori,2:335/311.21 00C3,SkyFreq,Amiga,Packer,Luca_Spada,2:331/106
00C5,Mega_Mail,MS-DOS,Packer/mailer,Mirko_Mucko,2:242/94 00C4,ProMailer,Amiga,Mailer,Ivan_Pintori,2:335/311.21
00C6,YaBom,MS-DOS,Packer,Berin_Lautenbach,3:620/248 00C5,Mega_Mail,MS-DOS,Packer/mailer,Mirko_Mucko,2:242/94
00C7,TachEcho,MS-DOS,Packer,Tom_Zacios,1:107/376 00C6,YaBom,MS-DOS,Packer,Berin_Lautenbach,3:620/248
00C8,XAP,MS-DOS,Packer,Jeroen_Smulders,2:512/1.8 00C7,TachEcho,MS-DOS,Packer,Tom_Zacios,1:107/376
00C9,EZMAIL,MS-DOS,Packer,Torben_Paving,2:234/41 00C8,XAP,MS-DOS,Packer,Jeroen_Smulders,2:512/1.8
00CA,Arc-Binkley,Archimedes,Mailer,Geoff_Riley,2:250/208 00C9,EZMAIL,MS-DOS,Packer,Torben_Paving,2:234/41
00CB,Roser,MS-DOS,Packer,Chan_Kafai,6:700/158 00CA,Arc-Binkley,Archimedes,Mailer,Geoff_Riley,2:250/208
00CC,UU2,MS-DOS,Packer,Dmitri_Zavalishin,2:5020/32 00CB,Roser,MS-DOS,Packer,Chan_Kafai,6:700/158
00CD,NMS,MS-DOS,Packer/mailer,Michiel_de.Bruijn,2:285/505.2 00CC,UU2,MS-DOS,Packer,Dmitri_Zavalishin,2:5020/32
00CE,BBCSCAN,Archimedes,Packer/mailer,E._G._Snel,2:512/222.17 00CD,NMS,MS-DOS,Packer/mailer,Michiel_de.Bruijn,2:285/505.2
00CF,XBBS,MS-DOS,Packer,Mark_Kimes,1:380/16 00CE,BBCSCAN,Archimedes,Packer/mailer,E._G._Snel,2:512/222.17
00D0,LoTek_Vzrul,,Packer/mailer,Kevin_Gates,gates@sasknet.sk.ca,19951229,20000122 00CF,XBBS,MS-DOS,Packer,Mark_Kimes,1:380/16
00D1,Private_Point_Project,MS-DOS,Packer,Oliver_von_Bueren,2:301/701 00D0,LoTek_Vzrul,,Packer/mailer,Kevin_Gates,gates@sasknet.sk.ca,19951229,20000122
00D2,NoSnail,MS-DOS,Packer,Eddie_Rowe,1:19/124 00D1,Private_Point_Project,MS-DOS,Packer,Oliver_von_Bueren,2:301/701
00D3,SmlNet,MS-DOS,Packer,Steve_T._Gove,1:106/6 00D2,NoSnail,MS-DOS,Packer,Eddie_Rowe,1:19/124
00D4,STIR,MS-DOS,Packer,Paul_Martin,2:250/107.3 00D3,SmlNet,MS-DOS,Packer,Steve_T._Gove,1:106/6
00D5,RiscBBS,Archimedes,Packer,Carl_Declerck,2:292/500.10 00D4,STIR,MS-DOS,Packer,Paul_Martin,2:250/107.3
00D6,Hercules,Amiga,Packer/mailer,Andrew_Gray,1:231/590 00D5,RiscBBS,Archimedes,Packer,Carl_Declerck,2:292/500.10
00D7,AMPRGATE,MS-DOS,Packer/mailer,Mike_Bilow,1:323/120.1 00D6,Hercules,Amiga,Packer/mailer,Andrew_Gray,1:231/590
00D8,BinkEMSI,MS-DOS,Mailer,Tobias_Burchhardt,2:245/39 00D7,AMPRGATE,MS-DOS,Packer/mailer,Mike_Bilow,1:323/120.1
00D9,EditMsg,MS-DOS,Packer,G._K._Pace,1:374/26 00D8,BinkEMSI,MS-DOS,Mailer,Tobias_Burchhardt,2:245/39
00DA,Roof,Amiga,Packer,Robert_Williamson,1:167/104 00D9,EditMsg,MS-DOS,Packer,G._K._Pace,1:374/26
00DB,QwkPkt,MS-DOS,Packer,Ross_West,1:250/412 00DA,Roof,Amiga,Packer,Robert_Williamson,1:167/104
00DC,MARISCAN,MS-DOS,Packer,Mario_Elkati,2:341/14.9 00DB,QwkPkt,MS-DOS,Packer,Ross_West,1:250/412
00DD,NewsFlash,MS-DOS,Packer,Chris_Lueders,2:241/5306 00DC,MARISCAN,MS-DOS,Packer,Mario_Elkati,2:341/14.9
00DE,Paradise,MS-DOS,Packer/mailer,Kenneth_Wall,1:300/5 00DD,NewsFlash,MS-DOS,Packer,Chris_Lueders,2:241/5306
00DF,DogMatic-ACB,N/A,Packer/mailer,Martin_Allard,2:245/48 00DE,Paradise,MS-DOS,Packer/mailer,Kenneth_Wall,1:300/5
00E0,T-Mail,MS-DOS,Packer/mailer,Andy_Elkin,2:5030/15 00DF,DogMatic-ACB,N/A,Packer/mailer,Martin_Allard,2:245/48
00E1,JetMail,Atari_ST/STE/TT,Packer,Daniel_Roesen,2:243/93.8 00E0,T-Mail,MS-DOS,Packer/mailer,Andy_Elkin,2:5030/15
00E2,MainDoor,MS-DOS,Packer/mailer,Francisco_Sedano,2:341/20 00E1,JetMail,Atari_ST/STE/TT,Packer,Daniel_Roesen,2:243/93.8
00E3,Starnet_Products,MS-DOS/OS2,Mailer/Packer,Starnet_Software_Development,1:102/925,,19951209 00E2,MainDoor,MS-DOS,Packer/mailer,Francisco_Sedano,2:341/20
00E4,BMB,Amiga,Packer,Dentato_Remo,2:335/311.33 00E3,Starnet_Products,MS-DOS/OS2,Mailer/Packer,Starnet_Software_Development,1:102/925,,19951209
00E5,BNP,MS-DOS,Packer,Nathan_Moschkin,1:109/427 00E4,BMB,Amiga,Packer,Dentato_Remo,2:335/311.33
00E6,MailMaster,MS-DOS,Packer/mailer,Gary_Murphy,1:130/85 00E5,BNP,MS-DOS,Packer,Nathan_Moschkin,1:109/427
00E7,Mail_Manager_+Plus+,MS-DOS,Packer,Chip_Morrow,1:226/1240 00E6,MailMaster,MS-DOS,Packer/mailer,Gary_Murphy,1:130/85
00E8,BloufGate,Atari_ST/Unix,Packer,Vincent_Pomey,2:320/100.2 00E7,Mail_Manager_+Plus+,MS-DOS,Packer,Chip_Morrow,1:226/1240
00E9,CrossPoint,MS-DOS,Packer/mailer,Peter_Mandrella,2:2454/97.80,19920713,19960601 00E8,BloufGate,Atari_ST/Unix,Packer,Vincent_Pomey,2:320/100.2
00EA,DeltaEcho,MS-DOS,Packer,Mikael_Staldal,2:201/337 00E9,CrossPoint,MS-DOS,Packer/mailer,Peter_Mandrella,2:2454/97.80,19920713,19960601
00EB,ALLFIX,MS-DOS,Packer,Harald_Harms,2:512/145 00EA,DeltaEcho,MS-DOS,Packer,Mikael_Staldal,2:201/337
00EC,NetWay,Archimedes,Mailer,Steve_Haslam,2:250/116.3 00EB,ALLFIX,MS-DOS,Packer,Harald_Harms,2:512/145
00ED,MARSmail,Atari_ST,Packer,Folkert_val_Heusden,2:285/750.2,,19940122 00EC,NetWay,Archimedes,Mailer,Steve_Haslam,2:250/116.3
00EE,ITRACK,MS-DOS/OS2,Packer,Frank_Prade,2:2480/55,,19990119 00ED,MARSmail,Atari_ST,Packer,Folkert_val_Heusden,2:285/750.2,,19940122
00EF,GateUtil,MS-DOS,Packer,Michael_Skurka,1:397/2.1 00EE,ITRACK,MS-DOS/OS2,Packer,Frank_Prade,2:2480/55,,19990119
00F0,Bert,MS-DOS,Packer/mailer,Arnim_Wiezer,2:241/2104.9 00EF,GateUtil,MS-DOS,Packer,Michael_Skurka,1:397/2.1
00F1,Techno,MS-DOS,Packer,Patrik_Holmsten,2:203/133 00F0,Bert,MS-DOS,Packer/mailer,Arnim_Wiezer,2:241/2104.9
00F2,AutoMail,MS-DOS,Packer,Mats_Wallin,2:201/239 00F1,Techno,MS-DOS,Packer,Patrik_Holmsten,2:203/133
00F3,April,Amiga,Packer,Nick_de_Jong,2:282/309.3 00F2,AutoMail,MS-DOS,Packer,Mats_Wallin,2:201/239
00F4,Amanda,MS-DOS,Packer,David_Douthitt,1:121/99.14 00F3,April,Amiga,Packer,Nick_de_Jong,2:282/309.3
00F5,NmFwd,MS-DOS,Packer,Alberto_Pasquale,2:332/504 00F4,Amanda,MS-DOS,Packer,David_Douthitt,1:121/99.14
00F6,FileScan,MS-DOS,Packer,Matthias_Duesterhoeft,2:241/4512.2 00F5,NmFwd,MS-DOS,Packer,Alberto_Pasquale,2:332/504
00F7,FredMail,MS-DOS,Packer,Michael_Butler,3:712/515 00F6,FileScan,MS-DOS,Packer,Matthias_Duesterhoeft,2:241/4512.2
00F8,TP_Kom,MS-DOS,Packer/mailer,Per_Sten,2:201/124 00F7,FredMail,MS-DOS,Packer,Michael_Butler,3:712/515
00F9,FidoZerb,MS-DOS,Packer,Ulrich_Schlechte,2:241/3410.12 00F8,TP_Kom,MS-DOS,Packer/mailer,Per_Sten,2:201/124
00FA,!!MessageBase,MS-DOS,Packer/mailer,Holger_Lembke,2:240/500.20 00F9,FidoZerb,MS-DOS,Packer,Ulrich_Schlechte,2:241/3410.12
00FB,EMFido,Amiga,Packer,Gary_Glendown,2:249/3.999 00FA,!!MessageBase,MS-DOS,Packer/mailer,Holger_Lembke,2:240/500.20
00FC,GS-Toss,MS-DOS,Packer,Marco_Bungalski,2:241/2021 00FB,EMFido,Amiga,Packer,Gary_Glendown,2:249/3.999
00FD,QWKDoor,Atari_ST,Packer,Christian_Limpach,2:270/20.1 00FC,GS-Toss,MS-DOS,Packer,Marco_Bungalski,2:241/2021
00FE,No_product_id_allocated,Any,Packer,No_Author,3:3/20 00FD,QWKDoor,Atari_ST,Packer,Christian_Limpach,2:270/20.1
00FF,16-bit_product_id,Any,Packer/Mailer,No_Author,3:3/20 00FE,No_product_id_allocated,Any,Packer,No_Author,3:3/20
0100,Reserved,None,None,No_Author,3:3/20,19951209 00FF,16-bit_product_id,Any,Packer/Mailer,No_Author,3:3/20
0101,The_Brake!,Mailer,John_Gladkih,2:5051/16,19951209 0100,Reserved,None,None,No_Author,3:3/20,19951209
0102,Zeus_BBS,Amiga,Mailer,Alex_May,2:441/58.0,19951209 0101,The_Brake!,Mailer,John_Gladkih,2:5051/16,19951209
0103,XenoPhobe-Mailer,Msdos/Windows/OS2/Linux,Mailer,Peter_Kling,1:374/969.0,19951209 0102,Zeus_BBS,Amiga,Mailer,Alex_May,2:441/58.0,19951209
0104,None,None,None,None,0:0/0, 0103,XenoPhobe-Mailer,Msdos/Windows/OS2/Linux,Mailer,Peter_Kling,1:374/969.0,19951209
0105,Terminate,Msdos/Os2/Windows,Mailer/Packer,SerWiz_Comm_&_Bo_Bendtsen,2:254/261,19951209 0104,None,None,None,None,0:0/0,
0106,TeleMail,Msdos,Mailer/Packer,Juergen_Weigelt,2:2453/900,19951209 0105,Terminate,Msdos/Os2/Windows,Mailer/Packer,SerWiz_Comm_&_Bo_Bendtsen,2:254/261,19951209
0107,CMBBS,Msdos/Os2,Mailer/Packer,Christof_Engel,2:2490/5110,19951209 0106,TeleMail,Msdos,Mailer/Packer,Juergen_Weigelt,2:2453/900,19951209
0108,Shuttle,Windows,Mailer/Packer,MCH_Development_&_Marvin_Hart,1:106/500,19951209 0107,CMBBS,Msdos/Os2,Mailer/Packer,Christof_Engel,2:2490/5110,19951209
0109,Quater,Amiga,Mailer,Felice_Murolo,2:335/206,19951209 0108,Shuttle,Windows,Mailer/Packer,MCH_Development_&_Marvin_Hart,1:106/500,19951209
010A,Windo,Windows,Mailer,Alan_Chavis,1:147/55,19951209 0109,Quater,Amiga,Mailer,Felice_Murolo,2:335/206,19951209
010B,Xenia,Msdos/Os2,Mailer,Arjen_Lentz,2:283/512,19960601 010A,Windo,Windows,Mailer,Alan_Chavis,1:147/55,19951209
010C,GMS,AmigaOS,Mailer,Mirko_Viviani,2:331/213,19960601 010B,Xenia,Msdos/Os2,Mailer,Arjen_Lentz,2:283/512,19960601
010D,HNET,Msdos,???,Pedro_Jaramillo,1:102/160,19960601 010C,GMS,AmigaOS,Mailer,Mirko_Viviani,2:331/213,19960601
010E,Shotgun_Professional,Msdos,???,Brent_Shellenberg,1:140/146,19960621 010D,HNET,Msdos,???,Pedro_Jaramillo,1:102/160,19960601
010F,SLIPgate,Msdos,???,Kieran_Morrissey,3:634/376,19960723 010E,Shotgun_Professional,Msdos,???,Brent_Shellenberg,1:140/146,19960621
0110,BBBS,MSDOS/OS2/NT/Amiga/Unix,Mailer/Packer,Kim_Heino,2:22/222,19980216 010F,SLIPgate,Msdos,???,Kieran_Morrissey,3:634/376,19960723
0111,NewsGate,Windows/NT,Packer/Gateway,Leilo_denna_Pietra,2:335/244,19980216 0110,BBBS,MSDOS/OS2/NT/Amiga/Unix,Mailer/Packer,Kim_Heino,2:22/222,19980216
01FF,BBBS,MSDOS/OS2/NT/Amiga/Unix,Mailer/Packer,Kim_Heino,2:22/222,19980216 0111,NewsGate,Windows/NT,Packer/Gateway,Leilo_denna_Pietra,2:335/244,19980216
02FF,NewsGate,Windows/NT,Packer/Gateway,Leilo_denna_Pietra,2:335/244,19980216 01FF,BBBS,MSDOS/OS2/NT/Amiga/Unix,Mailer/Packer,Kim_Heino,2:22/222,19980216
03FF,Ravel,Macintosh,Mailer/Packer,Cyril_Moorzin,2:5030/700,19980310 02FF,NewsGate,Windows/NT,Packer/Gateway,Leilo_denna_Pietra,2:335/244,19980216
04FF,Beemail,Windows,Mailer/Packer,Andrius_Cepaitis,2:470/1,19980310 03FF,Ravel,Macintosh,Mailer/Packer,Cyril_Moorzin,2:5030/700,19980310
05FF,QuickToss,DOS,Packer,Sandra_Godinez,1:387/601.3,19980310 04FF,Beemail,Windows,Mailer/Packer,Andrius_Cepaitis,2:470/1,19980310
06FF,SpaceMail,???,Mailer,Andreas_Habicht,2:244/6121,19980710 05FF,QuickToss,DOS,Packer,Sandra_Godinez,1:387/601.3,19980310
07FF,Argus,Windows/NT,Mailer,Max_Masyutin,2:469/84,19990216 06FF,SpaceMail,???,Mailer,Andreas_Habicht,2:244/6121,19980710
08FF,Hurricane,Windows/NT/Solaris,Packer,Paul_Walker,2:254/175.44,19990216 07FF,Argus,Windows/NT,Mailer,Max_Masyutin,2:469/84,19990216
09FF,Hub_Mailer,OS2,Mailer,Viatcheslav_Odintsov,2:5020/181,19990216 08FF,Hurricane,Windows/NT/Solaris,Packer,Paul_Walker,2:254/175.44,19990216
0AFF,FDInt,MSDOS,Packer,Colin_Turner,2:443/13,19990216 09FF,Hub_Mailer,OS2,Mailer,Viatcheslav_Odintsov,2:5020/181,19990216
0BFF,GPMail,OS2,Mailer,Igor_Vanin,2:5030/448,19990216 0AFF,FDInt,MSDOS,Packer,Colin_Turner,2:443/13,19990216
0CFF,FTrack,NT/OS2,Tracker,Fyodor_Ustinov,2:5020/79,19990313 0BFF,GPMail,OS2,Mailer,Igor_Vanin,2:5030/448,19990216
0DFF,Nice_Tosser,DOS/OS2/Win32,Tosser,Robert_Agababyan,2:5020/234.1,19990518 0CFF,FTrack,NT/OS2,Tracker,Fyodor_Ustinov,2:5020/79,19990313
0EFF,LuckyGate,DOS/OS2/Linux,Packer,Pavel_Gulchouck,2:463/68,19990709 0DFF,Nice_Tosser,DOS/OS2/Win32,Tosser,Robert_Agababyan,2:5020/234.1,19990518
0FFF,McMail,DOS,Mailer,Simon_Slater,2:443/777,20000102 0EFF,LuckyGate,DOS/OS2/Linux,Packer,Pavel_Gulchouck,2:463/68,19990709
</PRE> 0FFF,McMail,DOS,Mailer,Simon_Slater,2:443/777,20000102
</PRE>
<A HREF="./"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0" width="33" height="35"> Go Back</A>
<A HREF="./"><IMG SRC="../images/b_arrow.gif" ALT="Back" Border="0">Go Back</A>
</BODY>
</HTML> </BODY>
</HTML>

View File

@ -1,4 +1,5 @@
<HTML> <HTML>
<!-- $Id$ -->
<HEAD> <HEAD>
<META http-equiv="Content-Type" content="text/html; charset=ISO 8859-1"> <META http-equiv="Content-Type" content="text/html; charset=ISO 8859-1">
<META http-equiv="Content-Style-Type" content="text/css"> <META http-equiv="Content-Style-Type" content="text/css">
@ -94,7 +95,7 @@ Michiel Broek.
<HR> <HR>
<A HREF="../index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Index" Border="0" width="33" height="35">Back to Index</A> <A HREF="../index.htm"><IMG SRC="../images/b_arrow.gif" ALT="Index" Border="0">Back to Index</A>
</BLOCKQUOTE> </BLOCKQUOTE>
</BODY> </BODY>
</HTML> </HTML>