Fidonet Policy Document

FidoNet Policy Document Version 4.07
June 9, 1989

This policy document has been accepted by vote of the FidoNet coordinator
structure, and is the current FidoNet policy document until superceded.

(There are no differences between this version and 4.06 except the statement

1 Overview

This document establishes the policy for sysops who are members of the
FidoNet organization of electronic bulletin board systems. FidoNet is
defined by a NodeList issued weekly by the International Coordinator.

Separate policy documents may be issued at the zone, region, or net level to
provide additional detail on local procedures. Ordinarily, these lower-level
policies may not contradict this policy. However, with the approval of the
International Coordinator, local policy can be used to implement differences
required due to local conditions. These local policies may not place
additional restrictions on members of FidoNet beyond those included in this
document, other than enforcement of local mail periods.

1.0 Language

The official language of FidoNet is English. All documents must exist in
English. Translation into other languages is encouraged.

1.1 Introduction

FidoNet is an amateur electronic mail system. As such, all of its partici-
pants and operators are unpaid volunteers. From its early beginning as a few
friends swapping messages back and forth (1984), it now (1989) includes over
5,000 systems on six continents.

FidoNet is not a common carrier or a value-added service network and is a
public network only in as much as the independent, constituent nodes may
individually provide public access to the network on their system.

FidoNet is large enough that it would quickly fall apart of its own weight
unless some sort of structure and control were imposed on it. Multinet
operation provides the structure. Decentralized management provides the
control. This document describes the procedures which have been developed to
manage the network.

1.2 Organization

FidoNet systems are grouped on several levels, and administration is decen-
tralized to correspond with these groupings. This overview provides a
summary of the structure; specific duties of the coordinator positions are
given later in the document.

1.2.1 Individual Systems and System Operators

The smallest subdivision of FidoNet is the individual system, corresponding
to a single entry in the nodelist. The system operator (sysop) formulates a
policy for running the board and dealing with users. The sysop must mesh
with the rest of the FidoNet system to send and receive mail, and the local
policy must be consistent with other levels of FidoNet. Users

The sysop is responsible for the actions of any user when they affect the
rest of FidoNet. (If a user is annoying, the sysop is annoying.) Any
traffic entering FidoNet via a given node, if not from the sysop, is consid-
ered to be from a user and is the responsibility of the sysop. (See section
2.1.3.) Points

A point is a FidoNet-compatible system that is not in the nodelist, but
communicates with FidoNet through a node referred to as a bossnode. A point
is generally regarded in the same manner as a user, for example, the bossnode
is responsible for mail from the point. (See section 2.1.3.) Points are
addressed by using the bossnode's nodelist address; for example, a point
system with a bossnode of 114/15 might be known as 114/15.12. Mail destined
for the point is sent to the bossnode, which then routes it to the point.

In supporting points, the bossnode makes use of a private net number which
should not be generally visible outside of the bossnode-point relationship.
Unfortunately, should the point call another system directly (to do a file
request, for example), the private network number will appear as the caller's
address. In this way, points are different from users, since they operate
FidoNet-compatible mailers which are capable of contacting systems other than
the bossnode.

1.2.3 Networks and Network Coordinators

A network is a collection of nodes in a local geographic area, usually
defined by an area of convenient telephone calling. Networks coordinate
their mail activity to decrease cost.

The Network Coordinator is responsible for maintaining the list of nodes for
the network, and for forwarding netmail sent to members of the network from
other FidoNet nodes. The Network Coordinator may make arrangements to handle
outgoing netmail, but is not required to do so.

The Network Coordinator is appointed by the Regional Coordinator. Network Routing Hubs

Network Routing Hubs exist only in some networks. They may be appointed by
the Network Coordinator, in order to assist in the management of a large net-
work. The exact duties and procedures are a matter for the Network Coordina-
tor and the hubs to arrange, and will not be discussed here, except that a
network coordinator cannot delegate responsibility to mediate disputes.

1.2.4 Regions and Regional Coordinators

A region is a well-defined geographic area containing nodes which may or may
not be combined into networks. A typical region will contain many nodes in
networks, and a few independent nodes which are not a part of any network.

The Regional Coordinator maintains the list of independent nodes in the
region and accepts nodelists from the Network Coordinators in the region.
These are compiled to create a regional nodelist, which is then sent to the
Zone Coordinator. A Regional Coordinator does not perform message-forwarding
services for any nodes in the region.

Regional Coordinators are appointed by the Zone Coordinator.

1.2.5 Zones and Zone Coordinators

A zone is a large geographic area containing many regions, covering one or
more countries and/or continents.

The Zone Coordinator compiles the nodelists from all of the regions in the
zone, and creates the master nodelist and difference file, which is then
distributed over FidoNet in the zone. A Zone Coordinator does not perform
message-forwarding services for any nodes in the zone.

Zone Coordinators are selected by the Regional Coordinators in that zone.

1.2.6 Zone Coordinator Council

In certain cases, the Zone Coordinators work as a council to provide advice
to the International Coordinator. The arrangement is similar to that between
a president and advisors. In particular, this council considers inter-zonal
issues. This includes, but is not limited to: working out the details of
nodelist production, mediating inter-zonal disputes, and such issues not
addressed at a lower level of FidoNet.

1.2.7 International Coordinator

The International Coordinator is the "first among equals" Zone Coordinator,
and coordinates the joint production of the master nodelist by the Zone

The International Coordinator acts as the chair of the Zone Coordinator
Council and as the overseer of elections -- arranging the announcement of
referenda, the collection and counting of the ballots, and announcing the
results for those issues that affect FidoNet as a whole.

The International Coordinator is selected by the Zone Coordinators.

1.2.8 Top-down Organization. Checks and Balances.

These levels act to distribute the administration and control of FidoNet to
the lowest possible level, while still allowing for coordinated action over
the entire mail system. Administration is made possible by operating in a
top-down manner. That is, a person at any given level is responsible to the
level above, and responsible for the level below.

For example, a Regional Coordinator is responsible to the Zone Coordinator
for anything that happens in the region. From the point of view of the Zone
Coordinator, the Regional Coordinator is completely responsible for the
smooth operation of the region. Likewise, from the point of view of the
Regional Coordinator, the Network Coordinator is completely responsible for
the smooth operation of the network.

If a person at any level above sysop is unable to properly perform their
duties, the person at the next level may replace them. For example, if a
Regional Coordinator fails to perform, the Zone Coordinator can replace him.

To provide for checks and balances at the highest level of FidoNet, there are
two exceptions to this top-down organization. Zone Coordinators and the
International Coordinator are selected by a majority vote of the coordinators
at the level below. Similarly, decisions made by the International Coordina-
tor can be reversed by the Zone Coordinator Council, and decisions made by a
Zone Coordinator can be reversed by the Regional Coordinators. See sections
6 and 7 for details. Decisions made by other coordinators are not subject to
reversal by a vote of the lower level, but instead are subject to the appeal
process described in section 9.5.

1.3 Definitions

1.3.1 FidoNews

FidoNews is a weekly newsletter distributed in electronic form throughout the
network. It is an important medium by which FidoNet sysops communicate with
each other. FidoNews provides a sense of being a community of people with
common interests. Accordingly, sysops and users are encouraged to contribute
to FidoNews. Contributions are submitted to node 1:1/1; a file describing
the format to be used is available from 1:1/1 and many other systems.

1.3.2 Geography

Each level of FidoNet is geographically contained by the level immediately
above it. A given geographic location is covered by one zone and one region
within that zone, and is either in one network or not in a network. There
are never two zones, two regions, or two networks which cover the same
geographic area.

If a node is in the area of a network, it should be listed in that network,
not as an independent in the region. (The primary exception to this is a
node receiving inordinate amounts of host-routed mail; see section 4.2).
Network boundaries are based on calling areas as defined by the local
telephone company. Even in the case of areas where node density is so great
that more than one network is needed to serve one local calling area, a geo-
graphic guideline is used to decide which nodes belong to what network.
Network membership is based on geographic or other purely technical ratio-
nale. It is not based on personal or social factors.

There are cases in which the local calling areas lead to situations where
logic dictates that a node physically in one FidoNet Region should be
assigned to another. In those cases, with the agreement of the Regional
Coordinators and Zone Coordinator involved, exemptions may be granted. Such
exemptions are described in section 5.6.

1.3.3 Zone Mail Hour

Zone Mail Hour (ZMH) is a defined time during which all nodes in a zone are
required to be able to accept netmail. Each Fidonet zone defines a ZMH and
publishes the time of its ZMH to all other Fidonet zones. See sections 2.1.8
and 10.2.

Zone Mail Hour has previously been referred to as National Mail Hour and
Network Mail hour. The term Zone Mail Hour is more accurate.

1.3.4 Nodelist

The nodelist is a file updated weekly which contains the addresses of all
recognized FidoNet nodes. This file is currently made available by the Zone
Coordinator not later than Zone Mail Hour each Saturday, and is available
electronically for download or file request at no charge. To be included in
the nodelist, a system must meet the requirements defined by this document.
No other requirements may be imposed.

Partial nodelists (single-zone, for example) may be made available at
different levels in FidoNet. The full list as published by the International
Coordinator is regarded as the official FidoNet nodelist, and is used in
circumstances such as determination of eligibility for voting. All parts
that make up the full nodelist are available on each Zone Coordinator's and
each Regional Coordinator's system.

1.3.5 Excessively Annoying Behavior

There are references throughout this policy to "excessively annoying behav-
ior", especially in section 9 (Resolution of Disputes). It is difficult to
define this term, as it is based upon the judgement of the coordinator
structure. Generally speaking, annoying behavior irritates, bothers, or
causes harm to some other person. It is not necessary to break a law to be

There is a distinction between excessively annoying behavior and (simply)
annoying behavior. For example, there is a learning curve that each new
sysop must climb, both in the technical issues of how to set up the software
and the social issues of how to interact with FidoNet. It is a rare sysop
who, at some point in this journey, does not manage to annoy others. Only
when such behavior persists, after being pointed out to the sysop, does it
becomes excessively annoying. This does not imply that it is not possible to
be excessively annoying without repetition (for example, deliberate falsifi-
cation of mail would likely be excessively annoying on the very first try),
but simply illustrates that a certain amount of tolerance is extended.

Refer to section 9 and the case studies (section 10.3) for more information.

1.3.6 Commercial Use

FidoNet is an amateur network. Participants spend their own time and money
to make it work for the good of all the users. It is not appropriate for a
commercial enterprise to take advantage of these volunteer efforts to further
their own business interests. On the other hand, FidoNet provides a
convenient and effective means for companies and users to exchange informa-
tion, to the mutual benefit of all.

Network Coordinators could be forced to subsidize commercial operations by
forwarding host-routed netmail, and could even find themselves involved in a
lawsuit if any guarantee was suggested for mail delivery. It is therefore
FidoNet policy that commercial mail is not to be routed. "Commercial mail"
includes mail which furthers specific business interests without being of
benefit to the net as a whole. Examples include company-internal mail,
inter-corporate mail, specific product inquiries (price quotes, for in-
stance), orders and their follow-ups, and all other subjects specifically
related to business.

2 Sysop Procedures

2.1 General

2.1.1 The Basics

As the sysop of an individual node, you can generally do as you please, as
long as you observe mail events, are not excessively annoying to other nodes
in FidoNet, and do not promote or participate in the distribution of pirated
copyrighted software or other illegal behavior via FidoNet.

2.1.2 Familiarity with Policy

In order to understand the meaning of "excessively annoying", it is incumbent
upon all sysops to occasionally re-read FidoNet policy. New sysops must
familiarize themselves with policy before requesting a node number.

2.1.3 Responsible for All Traffic Entering FidoNet Via the Node

The sysop listed in the nodelist entry is responsible for all traffic
entering FidoNet via that system. This includes (but is not limited to)
traffic entered by users, points, and any other networks for which the system
might act as a gateway. If a sysop allows "outside" messages to enter
FidoNet via the system, the gateway system must be clearly identified by
FidoNet node number as the point of origin of that message, and it must act
as a gateway in the reverse direction. Should such traffic result in a
violation of Policy, the sysop must rectify the situation.

2.1.4 Encryption and Review of Mail

FidoNet is an amateur system. Our technology is such that the privacy of
messages cannot be guaranteed. As a sysop, you have the right to review
traffic flowing through your system, if for no other reason than to ensure
that the system is not being used for illegal or commercial purposes.
Encryption obviously makes this review impossible. Therefore, encrypted
and/or commercial traffic that is routed without the express permission of
all the links in the delivery system constitutes annoying behavior. See
section 1.3.6 for a definition of commercial traffic.

2.1.5 No Alteration of Routed Mail

You may not modify, other than as required for routing or other technical
purposes, any message, netmail or echomail, passing through the system from
one FidoNet node to another. If you are offended by the content of a
message, the procedure described in section 2.1.7 must be used.

2.1.6 Private Netmail

The word "private" should be used with great care, especially with users of a
BBS. Some countries have laws which deal with "private mail", and it should
be made clear that the word "private" does not imply that no person other
than the recipient can read messages. Sysops who cannot provide this
distinction should consider not offering users the option of "private mail".

If a user sends a "private message", the user has no control over the number
of intermediate systems through which that message is routed. A sysop who
sends a message to another sysop can control this aspect by sending the
message direct to the recipient's system, thus guaranteeing that only the
recipient or another individual to whom that sysop has given authorization
can read the message. Thus, a sysop may have different expectations than a
casual user. No Disclosure of in-transit mail

Disclosing or in any way using information contained in private netmail
traffic not addressed to you or written by you is considered annoying
behavior, unless the traffic has been released by the author or the recipient
as a part of a formal policy complaint. This does not apply to echomail
which is by definition a broadcast medium, and where private mail is often
used to keep a sysop-only area restricted. Private mail addressed to you

The issue of private mail which is addressed to you is more difficult than
the in-transit question treated in the previous section. A common legal
opinion holds that when you receive a message it becomes your property and
you have a legal right to do with it what you wish. Your legal right does
not excuse you from annoying others.

In general, sensitive material should not be sent using FidoNet. This ideal
is often compromised, as FidoNet is our primary mode of communication. In
general, if the sender of a message specifically requests in the text of the
message that the contents be kept confidential, release of the message into a
public forum may be considered annoying.

There are exceptions. If someone is saying one thing in public and saying
the opposite in private mail, the recipient of the private mail should not be
subjected to harassment simply because the sender requests that the message
not be released. Judgement and common sense should be used in this area as
in all other aspects of FidoNet behavior.

2.1.7 Not Routing Mail

You are not required to route traffic if you have not agreed to do so. You
are not obligated to route traffic for all if you route it for any, unless
you hold a Network Coordinator or Hub Coordinator position. Routing traffic
through a node not obligated to perform routing without the permission of
that node may be annoying behavior. This includes unsolicited echomail.

If you do not forward a message when you previously agreed to perform such
routing, the message must be returned to the sysop of the node at which it
entered FidoNet with an explanation of why it was not forwarded. (It is not
necessary to return messages which are addressed to a node which is not in
the current nodelist.) Intentionally stopping an in-transit message without
following this procedure constitutes annoying behavior. In the case of a
failure to forward traffic due to a technical problem, it does not become
annoying unless it persists after being pointed out to the sysop.

2.1.8 Exclusivity of Zone Mail Hour

Zone Mail Hour is the heart of FidoNet, as this is when network mail is
passed between systems. Any system which wishes to be a part of FidoNet must
be able to receive mail during this time using the protocol defined in the
current FidoNet Technical Standards Committee publication (FTS-0001 at this
writing). It is permissible to have greater capability (for example, to
support additional protocols or extended mail hours), but the minimum
requirement is FTS-0001 capability during this one hour of the day.

This time is exclusively reserved for netmail. Many phone systems charge on
a per-call basis, regardless of whether a connect, no connect, or busy signal
is encountered. For this reason, any activity other than normal network mail
processing that ties up a system during ZMH is considered annoying behavior.
Echomail should not be transferred during ZMH. User (BBS) access to a system
is prohibited during ZMH.

A system which is a member of a local network may also be required to observe
additional mail events, as defined by the Network Coordinator. Access
restrictions during local network periods are left to the discretion of the
Network Coordinator.

2.1.9 Private Nodes

The rare exception to ZMH compliance is private nodes. Persons requesting
private nodes should be supported as points if possible. A private listing
is justified when the system must interface with many others, such as an
echomail distributor. In these cases, the exact manner and timing of mail
delivery is arranged between the private node and other systems. Such an
agreement between a private system and a hub is not binding on any replace-
ment for that hub. A private node must be a part of a network (they cannot
be independents in the region.)

Private listings impact each member of FidoNet, since they take up space in
everyone's nodelist. Private listings which are for the convenience of one
sysop (at the expense of every other sysop in FidoNet) are a luxury which is
no longer possible. Non-essential redundant listings (more than one listing
for the same telephone number, except as mandated by FTSC standards) also
fall into this category. Sysops requesting private or redundant listings
must justify them with a statement explaining how they benefit the local net
or FidoNet as a whole. The Network Coordinator or Regional Coordinator may
review this statement at any time and listings which are not justified will
be removed.

2.1.10 Observing Mail Events

Failure to observe the proper mail events is grounds for any node to be
dropped from FidoNet without notice (since notice is generally given by

2.1.11 Use of Current Nodelist

Network mail systems generally operate unattended, and place calls at odd
hours of the night. If a system tries to call an incorrect or out-of-date
number, it could cause some poor citizen's phone to ring in the wee hours of
the morning, much to the annoyance of innocent bystanders and civil authori-
ties. For this reason, a sysop who sends mail is obligated to obtain and use
the most recent edition of the nodelist as is practical.

2.1.12 Excommunication

A system which has been dropped from the network is said to be excommunicated
(i.e. denied communication). If you find that you have been excommunicated
without warning, your coordinator was unable to contact you. You should
rectify the problem and contact your coordinator.

Systems may also be dropped from the nodelist for cause. See section 9, and
sections 4.3 and 5.2.

It is considered annoying behavior to assist a system which was excommuni-
cated in circumventing that removal from the nodelist. For example, if you
decide to provide an echomail feed to your friend who has been excommuni-
cated, it is likely that your listing will also be removed.

2.1.13 Timing of Zone Mail Hour

The exact timing of Zone Mail Hour for each zone is set by the Zone Coordina-
tor. See section 10.2.

2.1.14 Non-observance of Daylight Savings Time

FidoNet does not observe daylight savings time. In areas which observe
daylight savings time the FidoNet mail schedules must be adjusted in the same
direction as the clock change. Alternatively, you can simply leave your
system on standard time.

2.2 How to obtain a node number

You must first obtain a current nodelist so that you can send mail. You do
not need a node number to send mail, but you must have one in order for
others to send mail to you.

The first step in obtaining a current nodelist is to locate a FidoNet
bulletin board. Most bulletin board lists include at least a few FidoNet
systems, and usually identify them as such. Use a local source to obtain
documents because many networks have detailed information available which
explains the coverage area of the network and any special requirements or

Once you have a nodelist, you must determine which network or region covers
your area. Regions are numbered 1-99; network numbers are greater than 99.
Networks are more restricted in area than regions, but are preferred since
they improve the flow of mail and provide more services to their members. If
you cannot find a network which covers your area, then pick the region which

Once you have located the network or region in your area, send a message
containing a request for a node number to node zero of that network or
region. The request must be sent by netmail, as this indicates that your
system has FidoNet capability.

You must set up your software so that the from-address in your message does
not cause problems for the coordinator who receives it. If you pick the
address of an existing system, this will cause obvious problems. If your
software is capable of using address -1/-1, this is the traditional address
used by potential sysops. Otherwise use net/9999 (e.g. if you are applying
to net 123, set your system up as 123/9999). Many nets have specific
instructions available to potential sysops and these procedures may indicate
a preference for the from-address.

The message you send must include at least the following information:

1) Your name.
2) Your voice telephone number
3) The name of your system.
4) The city and state where your system is located.
5) The phone number to be used when calling your system.
6) Your hours of operation, netmail and BBS.
7) The maximum baud rate you can support.
8) The type of mailer software and modem you are using.

Your coordinator may contact you for additional information. All information
submitted will be kept confidential and will not be supplied to anyone except
the person who assumes the coordinator position at the resignation of the
current coordinator.

You must indicate that you have read, and agree to abide by, this document
and all the current policies of FidoNet.

Please allow at least two weeks for a node number request to be processed.
If you send your request to a Regional Coordinator, it may forwarded to the
appropriate Network Coordinator.

2.3 If You are Going Down

If your node will be down for an extended period (more than a day or two),
inform your coordinator as soon as possible. It is not your coordinator's
responsibility to chase you down for a status report, and if your system
stops accepting mail it will be removed from the nodelist.

Never put an answering machine or any other device which answers the phone on
your phone line while you are down. If you do, calling systems will get the
machine repeatedly, racking up large phone bills, which is very annoying. In
short, the only thing which should ever answer the telephone during periods
when the nodelist indicates that your node will accept mail is FidoNet-
compatible software which accepts mail.

If you will be leaving your system unattended for an extended period of time
(such as while you are on vacation), you should notify your coordinator.
Systems have a tendency to "crash" now and then, so you will probably want
your coordinator to know that it is a temporary condition if it happens while
you are away.

2.4 How to Form a Network

If there are several nodes in your area, but no network, a new network can be
formed. This has advantages to both you and to the rest of FidoNet. You
receive better availability of nodelist difference files and FidoNews, and
everyone else can take advantage of host-routing netmail to the new network.

The first step is to contact the other sysops in your area. You must decide
which nodes will comprise the network, and which of those nodes you would
like to be the Network Coordinator. Then consult your Regional Coordinator.
You must send the following information:

1) The region number(s), or network number(s) if a network is splitting
up, that are affected by the formation of your network. The Regional
Coordinator will inform the Zone Coordinator and the coordinators of any
affected networks that a new network is in formation.

2) A copy of the proposed network's nodelist segment. This file should
be attached to the message of application for a network number, and
should use the nodelist format described in the current version of the
appropriate FTSC publication. Please elect a name that relates to your
grouping, for example SoCalNet for nodes in the Southern California Area
and MassNet West for the Western Massachusetts Area. Remember if you
call yourself DOGNET it doesn't identify your area.

Granting a network number is not automatic. Even if the request is granted,
the network might not be structured exactly as you request. Your Regional
Coordinator will review your application and inform you of the decision.

Do not send a network number request to the Zone Coordinator. All network
number requests must be processed by the Regional Coordinator.

3 General Procedures for All Coordinators

3.1 Make Available Difference Files and FidoNews

Any Coordinator is responsible for obtaining and making available, on a
weekly basis, nodelist difference files and FidoNews.

3.2 Processing Nodelist Changes and Passing Them Upstream

Each coordinator is responsible for obtaining nodelist information from the
level below, processing it, and passing the results to the level above. The
timing of this process is determined by the requirements imposed by the level

3.3 Ensure the Latest Policy is Available

A Coordinator is responsible to make the current version of this document
available to the level below, and to encourage familiarity with it.

In addition, a coordinator is required to forward any local policies received
to the level above, and to review such policies. Although not required,
common courtesy dictates that when formulating a local policy, the participa-
tion of the level above should be solicited.

3.4 Minimize the Number of Hats Worn

Coordinators are encouraged to limit the number of FidoNet functions they
perform. A coordinator who holds two different positions compromises the
appeal process. For example, if the Network Coordinator is also the Regional
Coordinator, sysops in that network are denied one level of appeal.

Coordinators are discouraged from acting as echomail and software-distri-
bution hubs. If they do so, they should handle echomail (or other volume
distribution) on a system other than the administrative system. A coordina-
tor's system should be readily available to the levels immediately above and

Another reason to discourage multiple hats is the difficulty of replacing
services if someone leaves the network. For example, if a coordinator is the
echomail hub and the software-distribution hub, those services will be
difficult to restore when that person resigns.

3.5 Be a Member of the Area Administered

A coordinator must be a member of the area administered. That is, a Network
Coordinator must be a member of that network by virtue of geography. A
Regional Coordinator must be either a member of a network in the region, or
an independent in the region.

3.6 Encourage New Sysops to Enter FidoNet

A coordinator is encouraged to operate a public bulletin board system which
is freely available for the purpose of distributing Policy, FidoNews, and
Nodelists to potential new sysops. Dissemination of this information to
persons who are potential FidoNet sysops is important to the growth of
FidoNet, and coordinators should encourage development of new systems.

3.7 Tradition and Precedent

A coordinator is not bound by the practices of predecessor or peers beyond
the scope of this document.

In addition, a new coordinator has the right to review any decision made by
predecessors for compliance with Policy, and take whatever actions may be
necessary to rectify any situations not in compliance.

3.8 Technical Management

The primary responsibility of any coordinator is technical management of
network operations. Decisions must be made on technical grounds.

4 Network Coordinator Procedures

4.1 Responsibilities

A Network Coordinator has the following responsibilities:

1) To receive incoming mail for nodes in the network, and arrange
delivery to its recipients.

2) To assign node numbers to nodes in the network.

3) To maintain the nodelist for the network, and to send a copy of it to
the Regional Coordinator whenever it changes.

4) To make available to nodes in the network new nodelist difference
files, new issues of FidoNews, and new revisions of Network Policy
Documents as they are received, and to periodically check to insure that
nodes use up to date nodelists.

4.2 Routing Inbound Mail

It is your responsibility as Network Coordinator to coordinate the receipt
and forwarding of host-routed inbound netmail for nodes in your network. The
best way to accomplish this is left to your discretion.

If a node in your network is receiving large volumes of mail you can request
that the sysop contact the systems which are sending this mail and request
that they not host-route it. If the problem persists, you can request your
Regional Coordinator to assign the node a number as an independent and drop
the system from your network.

Occasionally a node will make a "bombing run" (sending one message to a great
many nodes). If a node in another network is making bombing runs on your
nodes and routing them through your inbound host, then you can complain to
the network coordinator of the offending node. (If the node is an indepen-
dent, complain to the regional coordinator.) Bombing runs are considered to
be annoying.

Another source of routing overload is echomail. Echomail cannot be allowed
to degrade the ability of FidoNet to handle normal message traffic. If a
node in your network is routing large volumes of echomail, you can ask the
sysop to either limit the amount of echomail or to stop routing echomail.

You are not required to forward encrypted, commercial, or illegal mail.
However, you must follow the procedures described in section 2.1.7 if you do
not forward the mail.

4.3 Assigning Node Numbers

It is your responsibility to assign node numbers to new nodes in your net-
work. You may also change the numbers of existing nodes in your network,
though you should check with your member nodes before doing so. You may
assign any numbers you wish, so long as each node has a unique number within
your network.

You must not assign a node number to any system until you have received a
formal request from that system by FidoNet mail. This will ensure that the
system is minimally operational. The strict maintenance of this policy has
been one of the great strengths of FidoNet.

It is also recommended, though not required, that you call a board which is
applying for a node number before assigning it a node number.

You may not assign a node number to a node in an area covered by an existing
network. Further, if you have nodes in an area covered by a network in
formation, those nodes must be transferred to the new network.

You should use network mail to inform a new sysop of the node number, as this
helps to insure that the system is capable of receiving network mail.

If a node in your network is acting in a sufficiently annoying manner, then
you can take whatever action you deem fit, according to the circumstances of
the case.

4.4 Maintaining the Nodelist

You should implement name changes, phone number changes, and so forth in your
segment of the nodelist as soon as possible after the information is received
from the affected node. You should also on occasion send a message to every
node in your network to ensure that they are operational. If a node turns
out to be "off the air" with no prior warning, you can either mark the node
down or remove it from the nodelist. (Nodes are to be marked DOWN for a
maximum of two weeks, after which the line should be removed from the node-

At your discretion, you may distribute a portion of this workload to routing
hubs. In this case, you should receive the nodelists from the Hub Coordina-
tors within your network. You will need to maintain a set of nodelists for
each hub within your network, since you cannot count on getting an update
from each Hub Coordinator every week. You should assemble a master nodelist
for your network every week and send it to your Regional Coordinator by the
day and time designated. It is suggested that you do this as late as is
practical, so as to accommodate any late changes, balanced with the risk of
missing the connection with your Regional Coordinator and thus losing a week.

4.5 Making Available Policies, Nodelists and FidoNews

As a Network Coordinator you should obtain a new issue of FidoNews and a new
nodelist difference file every week from your Regional Coordinator. The
nodelist difference file is currently made available each Saturday, and
FidoNews is published each Monday. You must make these files available to
all nodes in the network, and you are encouraged to make them available to
the general public for download.

You should also obtain the most recent versions of the Policy documents that
bind the members of your network, and make those available to the nodes in
your network. Policies are released at sporadic intervals, so you should
also inform the nodes in your network when such events occur, and ensure the
nodes are generally familiar with the changes.

Policy, FidoNews, and the nodelist are the glue that holds us together.
Without them, we would cease to be a community, and become just another
random collection of bulletin boards.

5 Regional Coordinator Procedures

5.1 Responsibilities

A Regional Coordinator has the following responsibilities:

1) To assign node numbers to independent nodes in the region.

2) To encourage independent nodes in the region to join existing net-
works, or to form new networks.

3) To assign network numbers to networks in the region and define their

4) To compile a nodelist of all of the networks and independents in the
region, and to send a copy of it to the Zone Coordinator whenever it

5) To ensure the smooth operation of networks within the region.

6) To make new nodelist difference files, Policies, and issues of
FidoNews available to the Network Coordinators in the region as soon as
is practical.

5.2 Assigning Node Numbers

It is your responsibility to assign node numbers to independent nodes in your
region. You may also change the numbers of existing nodes in your region,
though you should check with the respective nodes before doing so. You may
assign any numbers you wish, so long as each node has a unique number within
your region.

You should not assign a node number to any system until you have received a
formal request from that system by FidoNet mail. This will ensure that the
system is minimally operational. The strict maintenance of this policy has
been one of the great strengths of FidoNet.

It is also recommended, though not required, that you call a board which is
applying for a node number before assigning it a node number.

You should use network mail to inform a new sysop of the node number, as this
helps to insure that the system is capable of receiving network mail.

If a node in your region is acting in a sufficiently annoying manner, then
you can take whatever action you deem fit, according to the circumstances of
the case.

If you receive a node number request from outside your region, you must
forward it to the most local coordinator for the requestor as you can deter-
mine. If you receive a node number request from a new node that is in an
area covered by an existing network, then you must forward the request to the
Coordinator of that network instead of assigning a number yourself.

If a network forms in an area for which you have independent nodes, those
nodes will be transferred to the local network as soon as is practical.

5.3 Encouraging the Formation and Growth of Networks

One of your main duties as a Regional Coordinator is to promote the growth of
networks in your region.

You should avoid having independent nodes in your region which are within the
coverage area of a network. There are, however, certain cases where a node
should not be a member of a network, such as a system with a large amount of
inbound netmail; see section 4.2.

If several independent nodes in your region are in a local area you should
encourage them to form a network, and if necessary you may require them to
form a network. Refer to section 2.4. Note that this is not intended to
encourage the formation of trivial networks. Obviously, one node does not
make a network. The exact number of nodes required for an effective network
must be judged according to the circumstances of the situation, and is left
to your discretion.

5.4 Assigning Network Numbers

It is your responsibility to assign network numbers to new networks forming
within your region. You are assigned a pool of network numbers to use for
this purpose by your Zone Coordinator. As a part of this function, it is the
responsibility of the Regional Coordinator to define the boundaries of the
networks in the region.

-1/-1, 2.3
Additional mail events in local network 2.1.8
Address in message to request node 2.2
Administrative Region 6.1
Advantages to network membership 2.2
Alteration of mail 2.1.5
Answering machine 2.3
Announcement of voting results 8.2
Annoying behavior 1.3.5, 1.4.8, 2.1.1, 2.1.2, 2.1.4, 2.1.6, 2.1.7, 2.1.8,
2.1.11, 2.3, 4.2, 4.3, 5.2, 9, 10
Appeal chain 9.5
Appointment of coordinators 1.2.3, 1.2.4, 5.7, 6.1
Availability of NodeList 1.3.4
Balloting Period 8.4
Bombing run 4.2
Boundaries 1.3.2
Business use of FidoNet 1.3.6
Calling areas 1.3.2, 5.6, 5.7
Case histories 9.10, 10.3
Chain of command 1.2.8
Changing node numbers 4.3, 5.2
Checks and balances 1.2.8
Commercial messages 1.3.6, 2.1.4, 4.2
Complaint (policy), 9
Contributions to FidoNews 1.3.1
Current nodelist 2.1.11
Daylight Savings Time 2.1.14
Difference file 4.5, 5.8, 8.2
Disclosing private mail 2.1.6
Discussion period 8.2
Disputes 9
Distribution of ballots 8.2
Down 2.3, 4.4, 5.5
Downloading by users 3.6, 4.5, 5.8
EchoMail 4.2, 9.9
Effective date (policy change) 8.2
Election of coordinators 1.2.5, 6.2, 7.2
Eligibility to vote 8.3
Encryption 2.1.4, 4.2
Exceptions 5.6
Excessively annoying behavior, 1.3.5, 2.1.1, 2.1.2, 2.1.4, 2.1.6,
2.1.7, 2.1.8, 2.1.11, 2.3, 4.2, 4.3, 5.2, 9, 10
Exclusivity of Zone Mail Hour 2.1.8
Excommunication 2.1.12, 4.3, 5.2, 9
Exemptions, node location 1.3.2, 5.6
Familiarity with policy 2.1.2, 2.2
FidoNews 1.3.1
availability 3.1, 4.5, 5.8
FTSC 2.1.8, 2.1.9, 2.4
Gateway 2.1.3
Geography 1.3.2, 5.6
Glue 4.5
Guarantee of mail delivery 1.3.6
Hats 3.4
Host-routed mail 4.2
How to obtain a node number 2.2
Hub, 4.4
Illegal behavior 2.1.1, 9.6
Illegal mail 4.2
Impeachment 8.7
In-transit mail
Independent node 4.2, 5.2
Inter-zonal questions 1.2.6
International Coordinator 1.4.1, 1.4.9, 7
Justification of private nodes 2.1.9
Language 1.0
Levels of FidoNet 1.2, 1.4
Local calling areas 1.3.2
Local policies 1.2, 3.3
Mail 1.2.3, 4.2
Mailer 2.2
Majority 8.6, 8.7.2
Member of area administrated 3.5
Modem 2.2
Modification of mail 2.1.5
National Mail Hour see Zone Mail Hour
advantages 2.2
boundaries 1.3.2, 5.4
definition 1.2.3
forming 2.4, 5.3
hub, 4.4
numbers 2.2, 5.4
Network Coordinator 1.2.3
procedures 4
replacement 5.7, 9.3
Network Mail Hour see Zone Mail Hour
New sysops 2.1.2, 3.6
Node numbers 4.3, 5.2
obtaining 2.2
Nodelist 1.3.4, 2.2, 4.4, 5.5
availability 3.1, 4.5, 5.8
changes 4.4, 5.2
current 2.1.11
definition 1.3.4
format 10.3
official 1.3.4
definition 1.2.1
down 2.3
Observing mail events 2.1.8, 2.1.10
Obtaining a node number 2.2
Offensive messages 2.1.5
Orders (commercial) 1.3.6
Partial nodelist 1.3.4
Pirated software 2.1.1
Point of origin 2.1.3
Points, 2.1.3
Policy 3.1, 3.3, 4.5, 5.8
changing 8
complaint, 9
familiarity with 2.1.2, 2.2
local 1.2, 3.3
Precedent 3.7, 9.10, 10.3
Private messsages 2.1.6
Private network
Private nodes 2.1.9
Problem resolution 9
Protocol 2.1.8
Public BBS 3.6
Ratification 7.1
Redundant nodes 2.1.9
Referendum 1.2.7, 8
Regional Coordinator 1.2.4
procedures 5
replacement 6.1, 9.4
Regions 1.2.4
Replacement of coordinators 1.2.8
Replacing services 3.4
Requirements to be in NodeList 1.3.4, 2.1.2, 2.2
Resignation of ZC 8.7.4
Resolution of disputes 9
Results Announcement 8.2
Review of decisions 3.7
Review of routed traffic 2.1.4
Routing 2.1.4 - 2.1.7, 4.2
Routing Hub, 4.4
Rules 9.1
Speedy decision 9.7
Standards (FTSC) 2.1.8, 2.4
Statute of limitations 9.6
Submissions to FidoNews 1.3.1
Sysop procedures 2
System operator (sysop) 1.2.1
Three-tiered networks
Time limit on decision 9.7
Timing of Zone Mail Hour 2.1.13, 2.1.14, 10.2
Top-down 1.4.9
Tradition 3.7
Trivial network 5.3
Unattended systems 2.3
Updates to nodelist 3.2
User access during ZMH 2.1.8
Vacation 2.3
Voice telephone number 2.2
Vote 8
eligibility 8.3, 8.7.2
ZMH see Zone Mail Hour
Zone Coordinator 1.2.5, 6
election 6.2
impeachment 8.7
procedures 6
removal 6.2
resignation during impeachment 8.7.4
Zone Coordinator Council 1.2.6, 7.1
Zone Mail Hour 1.3.3, 2.1.8
timing 2.1.13, 2.1.14, 10.2
Zones 1.2.5, 1.3.2