• Big tech Russia bans and Usenet.

    From Oregonian Haruspex@21:1/5 to All on Fri Mar 4 22:18:33 2022
    Looks like we’re going back to the Kremvax days.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to meff on Fri Mar 4 18:02:46 2022
    On 3/4/22 5:51 PM, meff wrote:
    How does this affect Usenet?

    It depends.

    Have any prominent providers stopped allowing access from Russian
    IPs or ASNs?

    What do you consider "prominent providers" to be.

    Cogent, a major backbone / connectivity provider is de-peering Russian
    clients. So there is a good chance that Internet connectivity between
    parts of Russia and other parts of the world will be less reliable if
    not out & out broken (if more providers follow suit).

    Other big names in tech, particularly social media, are blocking Russian clients.

    We are witnessing what may be the first steps of a significant fracture
    of the Internet, and thus in many ways, Usenet. The coming days / weeks
    will show ho significant the fracture will be.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From meff@21:1/5 to All on Sat Mar 5 00:51:46 2022
    How does this affect Usenet? Have any prominent providers stopped
    allowing access from Russian IPs or ASNs?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Retrograde@21:1/5 to Oregonian Haruspex on Sat Mar 5 01:43:34 2022
    On 2022-03-04, Oregonian Haruspex <no_email@invalid.invalid> wrote:

    Looks like we’re going back to the Kremvax days.


    I saw they're banning foreign reporters and cutting access to Facebook
    and Twitter. Was just looking to see if they're cutting port 80 but
    Usenet is still an option.

    How do you know Usenet isn't accessible in Russia? Not doubting you,
    just trying to figure out if it's true.

    alt.russian.z1 is a Russian speaking newsgroup with a lot of activity.
    Seems to have recent posts as of 4 March.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From meff@21:1/5 to Grant Taylor on Sat Mar 5 01:49:56 2022
    On 2022-03-05, Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    Cogent, a major backbone / connectivity provider is de-peering Russian clients. So there is a good chance that Internet connectivity between
    parts of Russia and other parts of the world will be less reliable if
    not out & out broken (if more providers follow suit).

    This is true and I'm certainly not a fan of what Cogent is doing. I
    hope other backbones step up and use this opportunity to deploy more
    links into Russia. Fracturing Internet connectivity this way is, IMO, unacceptable.

    That said, I'm not familiar with Russian ISPs and who peers with
    them, so I'm not sure how big (or little) of an affect Cogent has.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Retrograde@21:1/5 to Grant Taylor on Fri Mar 4 20:58:27 2022
    Grant Taylor <gtaylor@tnetconsulting.net> writes:

    On 3/4/22 5:51 PM, meff wrote:
    Cogent, a major backbone / connectivity provider is de-peering Russian clients. So there is a good chance that Internet connectivity between
    parts of Russia and other parts of the world will be less reliable if
    not out & out broken (if more providers follow suit).

    Other big names in tech, particularly social media, are blocking
    Russian clients.

    We are witnessing what may be the first steps of a significant
    fracture of the Internet, and thus in many ways, Usenet. The coming
    days / weeks will show ho significant the fracture will be.

    Interesting. Unlike the WWW though, Usenet was designed (back in the
    Cold War, probably no coincidence) to be resistant to this sort of
    thing. We're seeing an interesting experiment. Wish Russia still had
    enough Usenet readers to make it a worthwhile channel of communication.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to meff on Fri Mar 4 21:42:43 2022
    On 3/4/22 6:49 PM, meff wrote:
    This is true and I'm certainly not a fan of what Cogent is doing. I
    hope other backbones step up and use this opportunity to deploy more
    links into Russia. Fracturing Internet connectivity this way is,
    IMO, unacceptable.

    I don't know how much of of a choice that Cogent, et al., feel like they
    have. It seems as if federal sanctions are forcing some companies
    hands. If not directly telling them to disconnect, then by saying that payments for services rendered can't be conducted, thus causing
    businesses bottom dollar to want to disconnect.

    Keep in mind that the level of circuits that we are talking about could
    be multiple thousands, if not tens of thousands, of dollars a month.
    There's only so much generosity that can be had.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From meff@21:1/5 to Grant Taylor on Sat Mar 5 05:12:18 2022
    On 2022-03-05, Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    I don't know how much of of a choice that Cogent, et al., feel like they have. It seems as if federal sanctions are forcing some companies
    hands. If not directly telling them to disconnect, then by saying that payments for services rendered can't be conducted, thus causing
    businesses bottom dollar to want to disconnect.

    Huh I hadn't thought of the payment perspective. Perhaps the costs of
    doing business have become too expensive in Russia for Cogent to
    continue operating. I'm curious whether the volatile banking situation
    there will affect other providers as well.

    Keep in mind that the level of circuits that we are talking about could
    be multiple thousands, if not tens of thousands, of dollars a month.
    There's only so much generosity that can be had.

    Fair enough.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Retrograde on Fri Mar 4 21:46:36 2022
    On 3/4/22 6:58 PM, Retrograde wrote:
    Interesting. Unlike the WWW though, Usenet was designed (back in the
    Cold War, probably no coincidence) to be resistant to this sort of
    thing.

    There is a saying, The Internet sees / views / detects censorship as
    breakage and routes around it.

    But that routing can only do so much and is reliant on /some/ path
    existing as well as that path being able to support the demand.

    Usenet, works by flooding articles between servers. So if there is a communications path, then the articles will /eventually/ flow.

    But, if there isn't a communications path, then the articles /can't/ flow.

    We're seeing an interesting experiment. Wish Russia still had enough
    Usenet readers to make it a worthwhile channel of communication.

    I wonder what the BBS / FidoNet is looking like these days.

    I would say that it's more difficult to block dial up connections
    between systems. But when an entire country wants to prevent
    international phone calls, they probably have ways to do that.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From meff@21:1/5 to Grant Taylor on Sat Mar 5 05:13:54 2022
    On 2022-03-05, Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    I would say that it's more difficult to block dial up connections
    between systems. But when an entire country wants to prevent
    international phone calls, they probably have ways to do that.

    Is it even possible to get a "phone line" anymore? Most phone
    traffic these days just flows over VoIP right?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to meff on Sat Mar 5 00:19:07 2022
    On 3/4/22 10:13 PM, meff wrote:
    Is it even possible to get a "phone line" anymore?

    Yes.

    But you have to ask yourself, what is a phone line?

    Most phone traffic these days just flows over VoIP right?

    Maybe.

    It's almost certainly a /digital/ phone line. But that does not mean
    that it's VoIP. The PSTN has been digital for decades. But ulaw / alaw
    (64 kbps codec) used in the PSTN is decidedly NOT VoIP. The former will happily carry faster (33.6 ~ 56 kbps) dial up modem connections under questionable conditions while the latter struggles to do carry slower
    (300 baud ~ 14.4 kbps) dial up modem connections under optimal conditions.

    ISDN, both Primary Rate Interfaces (a.k.a. PRI) and Basic Rate
    Interfaces (a.k.a. BRI) are completely digital and will happily carry
    faster dial up modem connections. Many traditional PBXs / key systems
    will support PRI and / or BRI interfaces.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Scott Dorsey@21:1/5 to fungus@amongus.com.invalid on Sat Mar 5 12:58:58 2022
    Retrograde <fungus@amongus.com.invalid> wrote:

    How do you know Usenet isn't accessible in Russia? Not doubting you,
    just trying to figure out if it's true.

    Usenet is hardly accessible at all anywhere. Used to be every ISP had
    a fast local server, now basically everyone is on a handful of big servers
    and that kind of defeats the whole purpose.
    --scott
    --
    "C'est un Nagra. C'est suisse, et tres, tres precis."

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Eric Pozharski@21:1/5 to Grant Taylor on Sat Mar 5 13:35:31 2022
    with <svupne$fmk$1@tncsrv09.home.tnetconsulting.net> Grant Taylor wrote:
    On 3/4/22 6:49 PM, meff wrote:

    This is true and I'm certainly not a fan of what Cogent is doing. I
    hope other backbones step up and use this opportunity to deploy more
    links into Russia. Fracturing Internet connectivity this way is, IMO,
    unacceptable.

    I don't know how much of of a choice that Cogent, et al., feel like
    they have. It seems as if federal sanctions are forcing some
    companies hands. If not directly telling them to disconnect, then by
    saying that payments for services rendered can't be conducted, thus
    causing businesses bottom dollar to want to disconnect.

    Keep in mind that the level of circuits that we are talking about
    could be multiple thousands, if not tens of thousands, of dollars a
    month. There's only so much generosity that can be had.

    As I see it, it's not "federal sanctions". It is about that Swift
    thingy. Turn it off and operational costs doing any business with such
    place become unaffordable (dealing with loads of cash costs loads of
    money, it seems).

    --
    Torvalds' goal for Linux is very simple: World Domination
    Stallman's goal for GNU is even simpler: Freedom

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Bud Spencer@21:1/5 to Grant Taylor on Sun Mar 6 10:19:13 2022
    This message is in MIME format. The first part should be readable text,
    while the remaining parts are likely unreadable without MIME-aware tools.

    On Fri, 4 Mar 2022, Grant Taylor wrote:

    I wonder what the BBS / FidoNet is looking like these days.

    Doing fine.

    --
    ₪ BUD ₪

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Bud Spencer on Sun Mar 6 10:43:31 2022
    On 3/6/22 1:19 AM, Bud Spencer wrote:
    Doing fine.

    I have little doubt that they are functioning.

    I wonder if they are seeing any mentionable change in traffic, either up
    or down.

    I wonder how well the BBS / FidoNet / other FTNs will do if they can't
    make Internet / TCP based connections because of filtering that I'm
    seeing some people talking about.

    Will FTNs find a way to remain functional in the face of adversity?
    Will their addressing scheme be flexible enough to allow significant
    changes in routing? -- My limited understanding of FTNs is that they
    tend to be hierarchical in nature. So can the FTN function if two
    (root) zone's can't communicate with each other, but two deep nodes or
    points therein can talk to each other? Can messages flow that way?



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Eric Pozharski@21:1/5 to Grant Taylor on Tue Mar 8 16:13:42 2022
    with <t02rre$8pg$1@tncsrv09.home.tnetconsulting.net> Grant Taylor wrote:
    On 3/6/22 1:19 AM, Bud Spencer wrote:

    Doing fine.

    I have little doubt that they are functioning.
    I wonder if they are seeing any mentionable change in traffic, either
    up or down.

    I've never had an option of getting sysop status, thus I can't say about dynamics. I'll take a look (if I still can) to snapshot what's going
    on, if you wish.

    I wonder how well the BBS / FidoNet / other FTNs will do if they can't
    make Internet / TCP based connections because of filtering that I'm
    seeing some people talking about.
    Will FTNs find a way to remain functional in the face of adversity?
    Will their addressing scheme be flexible enough to allow significant
    changes in routing? -- My limited understanding of FTNs is that they
    tend to be hierarchical in nature. So can the FTN function if two
    (root) zone's can't communicate with each other, but two deep nodes or
    points therein can talk to each other? Can messages flow that way?

    FTN is technically more like uucp. Sure, netmail and arcmail may be
    routed and pushed instantly but it doesn't have to. As technology goes
    bundles will wait until picked up, may be never. Back then, I've seen
    backlog was amassed for ten years.

    There is that The Policy thing though. This might become an issue.

    --
    Torvalds' goal for Linux is very simple: World Domination
    Stallman's goal for GNU is even simpler: Freedom

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Eric Pozharski on Tue Mar 8 22:38:05 2022
    On 3/8/22 9:13 AM, Eric Pozharski wrote:
    I've never had an option of getting sysop status, thus I can't say
    about dynamics. I'll take a look (if I still can) to snapshot what's
    going on, if you wish.

    I'm /curious/. But I'm not curios enough to invest more than about 5
    minutes of my time.

    FTN is technically more like uucp.

    I agree that FTN is a batched / store-and-forward network like UUCP.

    But I was thinking more the hierarchical routing. At least as I
    understand it, things flow up the hierarchy to a common or peer location
    and then back down the other side. Up, over, and down if you will. I
    was not aware that two nodes in separate regions / areas (?term?) could exchange email with each other without doing the up, over, and down
    routine. Thus you might be able to fracture chunks of the FTN if you
    prevented the highest level systems from communicating.

    Sure, netmail and arcmail may be routed and pushed instantly but it
    doesn't have to.

    I speculate that netmail uses the Internet as a BBS-to-BBS
    communications mechanism, probably contrary to the historic FidoNet up,
    over, and down architecture that I'm referring to.

    I'm not familiar with "arcmail".

    As technology goes bundles will wait until picked up, may be never.

    ACK

    Back then, I've seen backlog was amassed for ten years.

    Wow. I would have assumed that someone would have cleared the queue by
    then. Even most hardware gets replaced by then.

    There is that The Policy thing though. This might become an issue.

    ACK



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Eric Pozharski@21:1/5 to Grant Taylor on Fri Mar 11 09:41:31 2022
    with <t09ef7$kph$1@tncsrv09.home.tnetconsulting.net> Grant Taylor wrote:
    On 3/8/22 9:13 AM, Eric Pozharski wrote:

    I've never had an option of getting sysop status, thus I can't say
    about dynamics. I'll take a look (if I still can) to snapshot what's
    going on, if you wish.
    I'm /curious/. But I'm not curios enough to invest more than about 5
    minutes of my time.

    Well, I was more generous (10min per question). It took about half an
    hour ;) And so: people are aware of issues and perspectives (yup,
    today is The Blackout Day), plan for and do damage control. Yup,
    autopilot systmes are in need of immediate attention.

    FTN is technically more like uucp.
    I agree that FTN is a batched / store-and-forward network like UUCP.
    *SKIP*
    the FTN if you prevented the highest level systems from communicating.

    I explicitly withhold all education because nobody cares about it.

    Sure, netmail and arcmail may be routed and pushed instantly but it
    doesn't have to.
    I speculate that netmail uses the Internet as a BBS-to-BBS
    communications mechanism, probably contrary to the historic FidoNet
    up, over, and down architecture that I'm referring to.

    Yes, by design and history: up-over-down. Still, "stiches" are a thing
    and as long as nobody complains nobody has issues with this. As I
    see see it from afar, there are no that many defaults, almost everything
    has to be manually labored out. Those relying on third-party automation
    are eventually cut off. Because there's no automation that can handle
    this mess.

    I'm not familiar with "arcmail".

    (Withholding education here, again). In theory, netmail is plain and
    routed (or sent directly, see -- mess). While arcmail is _arc_hived
    (funny name for compression), tossed, re-tossed, spread, collapsed,
    and sent around (definetely not in that order, if there is any).

    *CUT*

    I'm going to look at it again in two weeks :\

    --
    Torvalds' goal for Linux is very simple: World Domination
    Stallman's goal for GNU is even simpler: Freedom

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to gtaylor@tnetconsulting.net on Fri Mar 11 14:09:38 2022
    In article <t02rre$8pg$1@tncsrv09.home.tnetconsulting.net>,
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/6/22 1:19 AM, Bud Spencer wrote:
    Doing fine.

    I have little doubt that they are functioning.

    I wonder if they are seeing any mentionable change in traffic, either up
    or down.

    I wonder how well the BBS / FidoNet / other FTNs will do if they can't
    make Internet / TCP based connections because of filtering that I'm
    seeing some people talking about.

    They will fare poorly.

    Will FTNs find a way to remain functional in the face of adversity?
    Will their addressing scheme be flexible enough to allow significant
    changes in routing? -- My limited understanding of FTNs is that they
    tend to be hierarchical in nature. So can the FTN function if two
    (root) zone's can't communicate with each other, but two deep nodes or
    points therein can talk to each other? Can messages flow that way?

    Pretty much every FTN-style network is moving traffic over the
    Internet these days, mostly on well-known ports. The entire
    thing is based on a hub-and-spoke model, so while it _can_ be
    point-to-point, most nodes send to a hub that then sends to
    other nodes in the "network". Again, this is pretty much all
    done over TCP/IP. Fidonet in particular has relied on the
    Internet for trans-Atlantic communications since 1991; for all
    intents and purposes, FTN networks are applications of the
    Internet, so cutting Internet access cuts off FTNs, as does
    shutting down the hubs.

    Most of the hubs are either running on home machines or VPSen
    somewhere, and most BBS "sysops" are not particularly technical.
    State-level actors easily could knock FTN hubs offline using
    DDoS attacks, or just infiltrate the nodes and watch the
    (unencrypted and unauthenticated) traffic flow.

    Some of the proponents will say, "but we can fall back to
    dial-up!" But it is perhaps even easier to cut off dialup
    access than the Internet. At that point you'd be better off
    using UUCP anyway.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to gtaylor@tnetconsulting.net on Fri Mar 11 14:01:03 2022
    In article <svv2sn$eno$1@tncsrv09.home.tnetconsulting.net>,
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/4/22 10:13 PM, meff wrote:
    Is it even possible to get a "phone line" anymore?

    Yes.

    But you have to ask yourself, what is a phone line?

    Most phone traffic these days just flows over VoIP right?

    Maybe.

    It's almost certainly a /digital/ phone line. But that does not mean
    that it's VoIP. The PSTN has been digital for decades. But ulaw / alaw
    (64 kbps codec) used in the PSTN is decidedly NOT VoIP. The former will >happily carry faster (33.6 ~ 56 kbps) dial up modem connections under >questionable conditions while the latter struggles to do carry slower
    (300 baud ~ 14.4 kbps) dial up modem connections under optimal conditions.

    ISDN, both Primary Rate Interfaces (a.k.a. PRI) and Basic Rate
    Interfaces (a.k.a. BRI) are completely digital and will happily carry
    faster dial up modem connections. Many traditional PBXs / key systems
    will support PRI and / or BRI interfaces.

    While that's all true, I imagine that the centrally managed
    telephone systems are more susceptible to severed links than the
    Internet at large; it's certainly more susceptible to
    wire-tapping by authoritarian dictatorships.

    The idea that dial-up is a viable alternative to the Internet to
    circumvent censorship is a fantasy people tell themselves. To
    the extent that it's effective at all, it's because the powers
    that be can't be bothered to shut it off.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Rich@21:1/5 to Dan Cross on Fri Mar 11 15:16:19 2022
    Dan Cross <cross@spitfire.i.gajendra.net> wrote:
    In article <svv2sn$eno$1@tncsrv09.home.tnetconsulting.net>,
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/4/22 10:13 PM, meff wrote:
    Is it even possible to get a "phone line" anymore?

    Yes.

    But you have to ask yourself, what is a phone line?

    Most phone traffic these days just flows over VoIP right?

    Maybe.

    It's almost certainly a /digital/ phone line. But that does not mean
    that it's VoIP. The PSTN has been digital for decades. But ulaw / alaw >>(64 kbps codec) used in the PSTN is decidedly NOT VoIP. The former will >>happily carry faster (33.6 ~ 56 kbps) dial up modem connections under >>questionable conditions while the latter struggles to do carry slower
    (300 baud ~ 14.4 kbps) dial up modem connections under optimal conditions.

    ISDN, both Primary Rate Interfaces (a.k.a. PRI) and Basic Rate
    Interfaces (a.k.a. BRI) are completely digital and will happily carry >>faster dial up modem connections. Many traditional PBXs / key systems
    will support PRI and / or BRI interfaces.

    While that's all true, I imagine that the centrally managed
    telephone systems are more susceptible to severed links than the
    Internet at large;

    Compared to the internet as originally intended, yes. But the modern
    internet, with the small handfull of ISP's per geographical area, with
    all customers connected in star patterns to those ISP's, has produced a
    network wiring diagram reality that looks much like those "centrally
    managed telephone systems" of old.

    it's certainly more susceptible to wire-tapping by authoritarian dictatorships.

    And to court warrants for wiretaps in non-authoritarian locales.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to rich@example.invalid on Fri Mar 11 16:45:12 2022
    In article <t0fp43$ftj$1@dont-email.me>, Rich <rich@example.invalid> wrote: >Dan Cross <cross@spitfire.i.gajendra.net> wrote:
    While that's all true, I imagine that the centrally managed
    telephone systems are more susceptible to severed links than the
    Internet at large;

    Compared to the internet as originally intended, yes. But the modern >internet, with the small handfull of ISP's per geographical area, with
    all customers connected in star patterns to those ISP's, has produced a >network wiring diagram reality that looks much like those "centrally
    managed telephone systems" of old.

    All fair points.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Dan Cross on Fri Mar 11 11:06:29 2022
    On 3/11/22 7:01 AM, Dan Cross wrote:
    While that's all true, I imagine that the centrally managed telephone
    systems are more susceptible to severed links than the Internet at
    large;

    Probably. But I wouldn't bet more than a cup of coffee on it. It's my understanding that the PSTN has become far more dynamic than it used to
    be. As such, I expect that the majority of it can route around
    problems. At least more so today than it could 20 / 40 years ago.

    it's certainly more susceptible to wire-tapping by authoritarian dictatorships.

    The PSTN itself, probably. Things going across the PSTN, well that's
    going to be far more dependent on what clients use.

    The idea that dial-up is a viable alternative to the Internet to
    circumvent censorship is a fantasy people tell themselves. To the
    extent that it's effective at all, it's because the powers that be
    can't be bothered to shut it off.

    I feel the need to clarify that I'm talking about ad-hoc point-to-point
    dial up connections between individuals. This is decidedly different
    than the traditional dial-up ISP model. Think more akin to BBS / UUCP
    systems / networks of yore. Especially if done from a notebook with a
    modem as a road warrior.

    Information /can/, and arguably /will/ flow. It will just be far more
    text than video that people seem to have become accustom to consuming.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Eric Pozharski on Fri Mar 11 11:15:23 2022
    On 3/11/22 2:41 AM, Eric Pozharski wrote:
    I explicitly withhold all education because nobody cares about it.

    That's demonstrably false because I care.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Dan Cross on Fri Mar 11 11:14:48 2022
    On 3/11/22 7:09 AM, Dan Cross wrote:
    They will fare poorly.

    :-(

    Pretty much every FTN-style network is moving traffic over the Internet
    these days, mostly on well-known ports.

    I can't even pretend to be surprised that the Internet is the preferred transport.

    The entire thing is based on a hub-and-spoke model, so while it
    _can_ be point-to-point, most nodes send to a hub that then sends
    to other nodes in the "network".

    The hub-and-spoke nature surprises me more than a little bit.

    I would have naively assumed that there would be something closer to a
    full mesh where systems could accept inbound connections.

    I get systems that can't accept inbound connections would need to ""call
    out to something else to retrieve messages.

    Again, this is pretty much all done over TCP/IP. Fidonet in particular
    has relied on the Internet for trans-Atlantic communications since
    1991; for all intents and purposes, FTN networks are applications
    of the Internet, so cutting Internet access cuts off FTNs, as does
    shutting down the hubs.

    Interesting.

    Most of the hubs are either running on home machines or VPSen
    somewhere, and most BBS "sysops" are not particularly technical.
    State-level actors easily could knock FTN hubs offline using DDoS
    attacks, or just infiltrate the nodes and watch the (unencrypted and unauthenticated) traffic flow.

    I'm not surprised by that.

    Some of the proponents will say, "but we can fall back to dial-up!"
    But it is perhaps even easier to cut off dialup access than the
    Internet. At that point you'd be better off using UUCP anyway.

    Please elaborate on it being easier to cut off dial up access than the Internet?

    I would think that UUCP would be akin to dial up.

    I can see one advantage of sticking with FTN over switching to UUCP.
    Presuming that you were starting with FTN. Sticking with FTN would
    maintain addressing. Conversely switching to UUCP (or anything else)
    would change addressing and likely disrupt a lot of things.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Sn!pe@21:1/5 to Grant Taylor on Fri Mar 11 19:05:56 2022
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:

    [...]

    Information /can/, and arguably /will/ flow. It will just be far more
    text than video that people seem to have become accustom to consuming.


    The thing about consuming video is that it's easy.
    You don't have to learn to read to watch video.

    --
    ^Ï^ "Wax on, wax off." -- Mr Miyagi

    My pet rock Gordon just is.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From scott@alfter.diespammersdie.us@21:1/5 to Grant Taylor on Fri Mar 11 19:14:23 2022
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/11/22 7:09 AM, Dan Cross wrote:
    They will fare poorly.

    :-(

    Pretty much every FTN-style network is moving traffic over the Internet
    these days, mostly on well-known ports.

    I can't even pretend to be surprised that the Internet is the preferred transport.

    The entire thing is based on a hub-and-spoke model, so while it
    _can_ be point-to-point, most nodes send to a hub that then sends
    to other nodes in the "network".

    The hub-and-spoke nature surprises me more than a little bit.

    I suspect (as a former sysop) that that's a holdover from when most Fidonet traffic traveled over phone lines. All hosts within the local net exchanged mail and messages with one designated host that would sort out local traffic and make the needed long-distance calls. That meant that most hosts would
    only need to make local calls (which were free) to stay up-to-date. I seem
    to recall paying a small amount annually to the sysop who was making those long-distance calls to defray his expenses.

    As for why this never changed: if it ain't broke, don't fix it. :)

    (FWIW, 1:209 got some sort of Internet connection back in '93 or '94. I
    recall it mainly being used as a Usenet and email gateway. By this point,
    my BBS was running on an early version of Linux on probably a 386SX, with a simple menu system replacing the shell for most users. I had
    comp.sys.apple2, rec.arts.startrek, and a few other groups being unwrapped
    from Fidonet format into a news spool, while Fidonet echoes were mapped into
    a local fidonet.* hierarchy. Everything got read with trn. :) )

    --
    _/_
    / v \ Scott Alfter (remove the obvious to send mail)
    (IIGS( https://alfter.us/ Top-posting!
    \_^_/ >What's the most annoying thing on Usenet?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From meff@21:1/5 to Dan Cross on Fri Mar 11 19:46:52 2022
    On 2022-03-11, Dan Cross <cross@spitfire.i.gajendra.net> wrote:
    Most of the hubs are either running on home machines or VPSen
    somewhere, and most BBS "sysops" are not particularly technical.
    State-level actors easily could knock FTN hubs offline using
    DDoS attacks, or just infiltrate the nodes and watch the
    (unencrypted and unauthenticated) traffic flow.

    Huh, what's the motivating factor of running these BBSes then. Is it
    just keeping-the-lights-on?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to meff on Fri Mar 11 13:50:12 2022
    On 3/11/22 12:46 PM, meff wrote:
    Huh, what's the motivating factor of running these BBSes then. Is it
    just keeping-the-lights-on?

    I think almost all BBSs fall into the Retro Computing / Retro Networking category these days.

    I'll allow for the possibility of actual use of BBS as a technology
    choice somewhere on the planet.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to All on Fri Mar 11 13:46:43 2022
    On 3/11/22 12:05 PM, Sn!pe wrote:
    The thing about consuming video is that it's easy.
    You don't have to learn to read to watch video.

    Sure.

    But what provides more information? A video that you can't get to or
    reading text that you can get to?



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Computer Nerd Kev@21:1/5 to Rich on Fri Mar 11 21:12:54 2022
    Rich <rich@example.invalid> wrote:
    Dan Cross <cross@spitfire.i.gajendra.net> wrote:
    While that's all true, I imagine that the centrally managed
    telephone systems are more susceptible to severed links than the
    Internet at large;

    Compared to the internet as originally intended, yes. But the modern internet, with the small handfull of ISP's per geographical area, with
    all customers connected in star patterns to those ISP's, has produced a network wiring diagram reality that looks much like those "centrally
    managed telephone systems" of old.

    Yep and in Australia they are all centrally managed as they all use
    the same infrastructure of the National Broadband Network (besides
    mobile broadband and maybe some small community networks). I don't
    know about how things work in Russia. If they're as weak at
    blocking websites as the Australian government, then they just made
    all their ISPs remove the domains of the blocked sites from their
    DNS servers. :)

    Packet radio (eg. D-STAR) would be more difficult to control.
    Though obviously open to jamming and location-finding, that would
    at least be much harder than with phone lines, especially if using
    directional links.

    Satellite internet is also an option if someone running it from
    another country is willing to provide free access or there's a
    way of paying for it from the afflicted country without getting
    locked up.

    --
    __ __
    #_ < |\| |< _#

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Computer Nerd Kev on Fri Mar 11 15:29:17 2022
    On 3/11/22 2:12 PM, Computer Nerd Kev wrote:
    Packet radio (eg. D-STAR) would be more difficult to control.

    Yep.

    Though obviously open to jamming and location-finding, that would
    at least be much harder than with phone lines, especially if using directional links.

    It's also illegal at the moment in Ukraine. They have temporarily
    suspended amateur radio privileges. As such, I suspect it's illegal in
    other countries to communicate with a ham in a location that's known to
    be suspended.

    But those are legality / paper tiger issues compared to can we establish communications or not. Or at the very least, deal with them later,
    after the immediate need for the communications is past.

    Satellite internet is also an option if someone running it from
    another country is willing to provide free access or there's a way
    of paying for it from the afflicted country without getting locked up.

    Yep. StarLink has been in the (tech) news quite a bit the last couple
    of weeks for this very reason.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to email@example.com on Sat Mar 12 01:57:44 2022
    In article <t0g8vc$p61$1@dont-email.me>, meff <email@example.com> wrote:
    On 2022-03-11, Dan Cross <cross@spitfire.i.gajendra.net> wrote:
    Most of the hubs are either running on home machines or VPSen
    somewhere, and most BBS "sysops" are not particularly technical.
    State-level actors easily could knock FTN hubs offline using
    DDoS attacks, or just infiltrate the nodes and watch the
    (unencrypted and unauthenticated) traffic flow.

    Huh, what's the motivating factor of running these BBSes then. Is it
    just keeping-the-lights-on?

    Some people just enjoy it, I think. For many it's a sense of
    nostalgia; for others, they like it in the same way some folks
    like futzing about with antiquated teletypes or using morse
    code over ham radio.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to gtaylor@tnetconsulting.net on Sat Mar 12 02:08:00 2022
    In article <t0gif6$udj$1@tncsrv09.home.tnetconsulting.net>,
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/11/22 2:12 PM, Computer Nerd Kev wrote:
    Packet radio (eg. D-STAR) would be more difficult to control.

    Yep.

    Though obviously open to jamming and location-finding, that would
    at least be much harder than with phone lines, especially if using
    directional links.

    It's also illegal at the moment in Ukraine. They have temporarily
    suspended amateur radio privileges. As such, I suspect it's illegal in
    other countries to communicate with a ham in a location that's known to
    be suspended.

    The funny thing is...Russian soldiers have been seen using
    Baofeng HTs on 2m in the clear. Apparently, they just can't
    get the military grade encrypted stuff. It seems the Russians
    sent in the cannon fodder first and didn't give them any
    gear.

    But those are legality / paper tiger issues compared to can we establish >communications or not. Or at the very least, deal with them later,
    after the immediate need for the communications is past.

    I mean, if I were in Kyiv or Mariupol right now, I'd be more
    worried about an 82mm mortar round landing on QTH or a 120mm
    sabot round coming through the window after DF'ing me than
    whatever the licensing authority has to say about pulling my
    ticket. But if I could call in a fire mission on a T-72 in the
    open or confuse the Russians by transmitting nonsense on their
    freqs....

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to gtaylor@tnetconsulting.net on Sat Mar 12 01:55:40 2022
    In article <t0g3i1$2d5$1@tncsrv09.home.tnetconsulting.net>,
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/11/22 7:09 AM, Dan Cross wrote:
    [snip]
    The entire thing is based on a hub-and-spoke model, so while it
    _can_ be point-to-point, most nodes send to a hub that then sends
    to other nodes in the "network".

    The hub-and-spoke nature surprises me more than a little bit.

    I would have naively assumed that there would be something closer to a
    full mesh where systems could accept inbound connections.

    I get systems that can't accept inbound connections would need to ""call
    out to something else to retrieve messages.

    In theory, they _can_ do that. In practice, they tend _not_ to.
    There are also two separable use-cases: netamil (basically,
    email) and echomail (roughly analogous to USENET). The former
    is more ammenable to point-to-point mesh-style connections; the
    latter almost always flows through a hub.

    [snip]
    Some of the proponents will say, "but we can fall back to dial-up!"
    But it is perhaps even easier to cut off dialup access than the
    Internet. At that point you'd be better off using UUCP anyway.

    Please elaborate on it being easier to cut off dial up access than the >Internet?

    The Internet, by design, can route around broken links, and end
    devices can usually take on any IP address they're configured
    with. In contrast, a land-line telephone is tied to a physical
    location and a single identifier. I could, in theory, plug my
    home network into some kind of IP over RF network and it would
    work; not so much my phone. Notably, at this point, most
    people's phones are little radios anyway and speak IP natively.

    I would think that UUCP would be akin to dial up.

    Sorry, two separate thoughts; IF I were using dialup, I'd use
    UUCP instead of FTN.

    I can see one advantage of sticking with FTN over switching to UUCP. >Presuming that you were starting with FTN. Sticking with FTN would
    maintain addressing. Conversely switching to UUCP (or anything else)
    would change addressing and likely disrupt a lot of things.

    I think there are well-defined standards for translating between
    UUCP addresses and ARPANET style addresses. FTN? Not so much.
    Really, FTN is poor technology and should be avoided.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to gtaylor@tnetconsulting.net on Sat Mar 12 01:47:38 2022
    In article <t0g32e$7o4$1@tncsrv09.home.tnetconsulting.net>,
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/11/22 7:01 AM, Dan Cross wrote:
    While that's all true, I imagine that the centrally managed telephone
    systems are more susceptible to severed links than the Internet at
    large;

    Probably. But I wouldn't bet more than a cup of coffee on it. It's my >understanding that the PSTN has become far more dynamic than it used to
    be. As such, I expect that the majority of it can route around
    problems. At least more so today than it could 20 / 40 years ago.

    Protocols like SS7 surely help, but the thing that has made it
    so reliable is massive redundancy and centrally managed systems.

    it's certainly more susceptible to wire-tapping by authoritarian
    dictatorships.

    The PSTN itself, probably. Things going across the PSTN, well that's
    going to be far more dependent on what clients use.

    The idea that dial-up is a viable alternative to the Internet to
    circumvent censorship is a fantasy people tell themselves. To the
    extent that it's effective at all, it's because the powers that be
    can't be bothered to shut it off.

    I feel the need to clarify that I'm talking about ad-hoc point-to-point
    dial up connections between individuals. This is decidedly different
    than the traditional dial-up ISP model. Think more akin to BBS / UUCP >systems / networks of yore. Especially if done from a notebook with a
    modem as a road warrior.

    Yes, I understood that. What I'm saying is that that is just
    as, if not even more, susceptible to suppresion, than the
    Internet.

    In general, dial-up "networking" a la FTN is useless without the
    Internet, and even easier to suppress. Consider a BBS: someone
    has to be hosting it somewhere to dial into. A state-level
    actor has any number of mechanisms to shut it down: for
    instance, they could trivially rig up half a dozen phones to
    call it continually, thus keeping the line perpetually busy; an
    analog DDoS attach.

    While it's true that point-to-point communications may not be
    attached specifically, the same is true of point-to-point data
    flow between Internet-connected computers. Moreover, to dial
    into some place, I'm basically doing that from set physical
    location: no trampolining through a VPS on the other side of
    the world, protected by a VPN.

    Information /can/, and arguably /will/ flow. It will just be far more
    text than video that people seem to have become accustom to consuming.

    There are cases in recent history of telephony networks being
    taken offline at the behest of local governments, while Internet
    access remained viable in some limited capacity. E.g., during
    the Arab Spring. And while there were much-touted reports of
    people rolling out BBSes talking to Fidonet to circumvent
    Intenet censorship, I've never found any credible evidence that
    that _actually_ happened: just people talking about it.

    Moreover, almost all BBSes are completely unencrypted.

    I suppose it's possible people could communicate real-time
    person to person over dialup, but the reach would be seriously
    limited: why not just talk on the phone?

    Honestly, ham radio is probably much harder to silence, but
    carries its own risks (direction finding and so on).

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Dan Cross on Fri Mar 11 22:45:46 2022
    On 3/11/22 7:08 PM, Dan Cross wrote:
    The funny thing is...

    I don't think there is anything funny about this. I will admit there is
    some irony in what you said.

    I mean, if I were in Kyiv or Mariupol right now, I'd be more worried
    about an 82mm mortar round landing on QTH or a 120mm sabot round
    coming through the window after DF'ing me than whatever the licensing authority has to say about pulling my ticket. But if I could call
    in a fire mission on a T-72 in the open or confuse the Russians by transmitting nonsense on their freqs....

    I completely agree on all accounts.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Dan Cross on Sat Mar 12 00:14:55 2022
    On 3/11/22 6:55 PM, Dan Cross wrote:
    In theory, they _can_ do that. In practice, they tend _not_ to.

    :-/

    There are also two separable use-cases: netamil (basically, email) and echomail (roughly analogous to USENET). The former is more ammenable
    to point-to-point mesh-style connections; the latter almost always
    flows through a hub.

    But does echomail flow through a hub because it /needs/ to or by
    convention / simplified configuration?

    The Internet, by design, can route around broken links, and end
    devices can usually take on any IP address they're configured with.
    In contrast, a land-line telephone is tied to a physical location
    and a single identifier. I could, in theory, plug my home network
    into some kind of IP over RF network and it would work; not so much
    my phone. Notably, at this point, most people's phones are little
    radios anyway and speak IP natively.

    ACK

    Sorry, two separate thoughts; IF I were using dialup, I'd use UUCP
    instead of FTN.

    I think I too would use UUCP if I were to green field something. Not
    the least of which is that I already have some UUCP, so extending that
    network is fairly easy.

    I think there are well-defined standards for translating between UUCP addresses and ARPANET style addresses. FTN? Not so much. Really,
    FTN is poor technology and should be avoided.

    I largely agree. I was just thinking an existing, not /truly/ Internet dependent network.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Dan Cross on Sat Mar 12 00:11:30 2022
    On 3/11/22 6:47 PM, Dan Cross wrote:
    Protocols like SS7 surely help, but the thing that has made it so
    reliable is massive redundancy and centrally managed systems.

    ACK

    Yes, I understood that. What I'm saying is that that is just as,
    if not even more, susceptible to suppresion, than the Internet.

    In general, dial-up "networking" a la FTN is useless without the
    Internet, and even easier to suppress.

    I don't agree.

    I'm thinking of something akin to FidoNet of the days of yore where
    there was no Internet and multiple BBSs formed the network.

    Consider a BBS: someone has to be hosting it somewhere to dial into.
    A state-level actor has any number of mechanisms to shut it down:
    for instance, they could trivially rig up half a dozen phones to call
    it continually, thus keeping the line perpetually busy; an analog
    DDoS attach.

    And what if the BBS is behind a different phone number each day? Or if
    you can't use BBS #1, use BBS #2.

    Maybe I'm asking too much of FTNs or thinking they can be made to be
    more dynamic.

    I do think that such could be done via UUCP between news servers. Each
    server would flood messages to all the other servers.

    While it's true that point-to-point communications may not be attached specifically, the same is true of point-to-point data flow between Internet-connected computers. Moreover, to dial into some place,
    I'm basically doing that from set physical location: no trampolining
    through a VPS on the other side of the world, protected by a VPN.

    I'm thinking more a notebook computer with a modem that's moving from
    place to place.

    There are cases in recent history of telephony networks being taken
    offline at the behest of local governments, while Internet access
    remained viable in some limited capacity. E.g., during the Arab
    Spring. And while there were much-touted reports of people rolling
    out BBSes talking to Fidonet to circumvent Intenet censorship, I've
    never found any credible evidence that that _actually_ happened:
    just people talking about it.

    ACK

    Moreover, almost all BBSes are completely unencrypted.

    True.

    But the BBS is in many ways a means to an end; communications through
    the network (FTN or otherwise) that is interconnecting them.

    Also, individual messages can be encrypted, much like email, such that
    someone without the decryption information only has (hopefully minimal) metadata.

    I suppose it's possible people could communicate real-time person
    to person over dialup, but the reach would be seriously limited:
    why not just talk on the phone?

    Agreed.

    Though it's probably easier to do voice encryption and exchange the data therefrom.

    Honestly, ham radio is probably much harder to silence, but carries
    its own risks (direction finding and so on).

    Yep.

    Being mobile is key.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Computer Nerd Kev@21:1/5 to Grant Taylor on Sat Mar 12 07:36:36 2022
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/11/22 2:12 PM, Computer Nerd Kev wrote:
    Packet radio (eg. D-STAR) would be more difficult to control.

    Yep.

    Though obviously open to jamming and location-finding, that would
    at least be much harder than with phone lines, especially if using
    directional links.

    It's also illegal at the moment in Ukraine. They have temporarily
    suspended amateur radio privileges. As such, I suspect it's illegal in
    other countries to communicate with a ham in a location that's known to
    be suspended.

    But those are legality / paper tiger issues compared to can we establish communications or not. Or at the very least, deal with them later,
    after the immediate need for the communications is past.

    As I followed the discussion we were talking more about accessing
    the internet from Russia if the links are going down and the
    government is cranking up censorship. However I doubt it's such a
    big issue in the first place. I tried a handfull of .ru sites from
    my bookmarks which resolve to Russian IP addresses and they seem to
    be working fine. If proxies and VPNs are still usable then they can
    get people onto blocked sites. Or like I said if they're as weak
    at blocking sites as the Aus government then people just need to
    switch to using another DNS server, but I expect the Russians have
    made it a bit harder than that.

    --
    __ __
    #_ < |\| |< _#

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Sn!pe@21:1/5 to Grant Taylor on Sat Mar 12 14:37:35 2022
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:

    On 3/11/22 12:05 PM, Sn!pe wrote:
    The thing about consuming video is that it's easy.
    You don't have to learn to read to watch video.


    Sure.

    But what provides more information? A video that
    you can't get to or reading text that you can get to?


    Give me text every time; trying to follow instructions on a video
    is a total PITA. I fear that's another battle already lost, though.

    --
    ^Ï^ "Wax on, wax off." -- Mr Miyagi

    My pet rock Gordon just is.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to gtaylor@tnetconsulting.net on Sat Mar 12 15:07:37 2022
    In article <t0hc1j$v3n$1@tncsrv09.home.tnetconsulting.net>,
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/11/22 7:08 PM, Dan Cross wrote:
    The funny thing is...

    I don't think there is anything funny about this. I will admit there is
    some irony in what you said.

    Context should have made this obvious, but when I wrote "funny"
    I was referring to irony, not levity. Surely that was clear?

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to gtaylor@tnetconsulting.net on Sat Mar 12 16:00:59 2022
    In article <t0hh8o$3mh$1@tncsrv09.home.tnetconsulting.net>,
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/11/22 6:55 PM, Dan Cross wrote:
    In theory, they _can_ do that. In practice, they tend _not_ to.

    :-/

    There are also two separable use-cases: netamil (basically, email) and
    echomail (roughly analogous to USENET). The former is more ammenable
    to point-to-point mesh-style connections; the latter almost always
    flows through a hub.

    But does echomail flow through a hub because it /needs/ to or by
    convention / simplified configuration?

    Define "needs". It does so because that's how pretty much all
    of the extant software is written. One could, conceivably,
    configure every node as a hub, but now you've got an n^2
    distribution problem. Over the Internet, that may be okay; over
    dialup, that's an issue (recall that only one user can "call"
    into a BBS at a time per phone line, and for these purposes
    mailers count as users). And with numbers changing all the
    time? And BBSes only being online when some hypothetical dude
    is in a cafe or something with a cell phone and a notebook? I
    just don't see how that works at all.

    Moreover, the message format relies on a "SEEN-BY" header that
    records the (FTN network) address of each node that the message
    has been sent to; there isn't a well-supported analog to the
    `Path:` header used in USENET. That alone strongly favors a
    hub-and-spoke architecture.

    I suppose one could reuse the FTN "packet" format with custom
    software that looks vaguely more like UUCP, but the packet
    format just wasn't designed with that in mind and again, why go
    to the trouble when other technologies exist that already solve
    many of these problems?

    AND this is all presuming a lot about the availability of things
    like phones with modems, untraceable phone numbers, and frankly
    the tacit cooperation of the telcos to make it happen.

    The Internet, by design, can route around broken links, and end
    devices can usually take on any IP address they're configured with.
    In contrast, a land-line telephone is tied to a physical location
    and a single identifier. I could, in theory, plug my home network
    into some kind of IP over RF network and it would work; not so much
    my phone. Notably, at this point, most people's phones are little
    radios anyway and speak IP natively.

    ACK

    Sorry, two separate thoughts; IF I were using dialup, I'd use UUCP
    instead of FTN.

    I think I too would use UUCP if I were to green field something. Not
    the least of which is that I already have some UUCP, so extending that >network is fairly easy.

    Precisely. It also avoids many structural problems of FTN.

    I think there are well-defined standards for translating between UUCP
    addresses and ARPANET style addresses. FTN? Not so much. Really,
    FTN is poor technology and should be avoided.

    I largely agree. I was just thinking an existing, not /truly/ Internet >dependent network.

    FTN is not that, and it hasn't been for 30 years. BBS
    enthusiasts like to think that it could be, but I honestly
    think those people are deluding themselves.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to gtaylor@tnetconsulting.net on Sat Mar 12 15:47:33 2022
    In article <t0hh2a$msg$1@tncsrv09.home.tnetconsulting.net>,
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/11/22 6:47 PM, Dan Cross wrote:
    Protocols like SS7 surely help, but the thing that has made it so
    reliable is massive redundancy and centrally managed systems.

    ACK

    Yes, I understood that. What I'm saying is that that is just as,
    if not even more, susceptible to suppresion, than the Internet.

    In general, dial-up "networking" a la FTN is useless without the
    Internet, and even easier to suppress.

    I don't agree.

    Sadly, that doesn't make it any less true.

    I'm thinking of something akin to FidoNet of the days of yore where
    there was no Internet and multiple BBSs formed the network.

    Like I said, if you want to try and fall back to a dailup based
    solution, you're better off with UUCP.

    Consider a BBS: someone has to be hosting it somewhere to dial into.
    A state-level actor has any number of mechanisms to shut it down:
    for instance, they could trivially rig up half a dozen phones to call
    it continually, thus keeping the line perpetually busy; an analog
    DDoS attach.

    And what if the BBS is behind a different phone number each day? Or if
    you can't use BBS #1, use BBS #2.

    That makes it nearly undiscoverable.

    Maybe I'm asking too much of FTNs or thinking they can be made to be
    more dynamic.

    I'm afraid you are.

    Why would one choose to use something like FTN at that point,
    and not UUCP or a more advanced technology that is interoperable
    with the larger Internet? Is the point to shoehorn FTN into
    this role, or to usefully share information?

    Even "point to point" FTN requires the distribution of a
    nodelist to every system in the network; without that, you can't
    usefully communicate between nodes. That implies that you need
    some mechanism to distribute the nodelist; in some hypothetical
    system where BBSes are hopping from number to number dynamically
    (where do these numbers come from, by the way?) daily, you've
    got a logistical problem keeping the network up to date. And if
    that nodelist falls into the wrong hands, someone now has a list
    of every BBS participating in this hyptothetical network. Phone
    numbers are not anonymous, and while there _are_ things like
    burner cell phones, it's not clear to me how you'd run a network
    of BBSes with them. Also, I imagine that once under occupation,
    burner phones are going to become hard to come by.

    Contrast with UUCP, where each node is configured only know
    about its neighbors. You could trivially exchange PGP-encrypted
    mail over UUCP; not so much with a BBS unless it's built into
    the BBS software (though I suppose you could figre out some way
    to leverage "offline readers" to download the mail and decrypt
    it locally).

    I do think that such could be done via UUCP between news servers. Each >server would flood messages to all the other servers.

    UUCP as a dialup transmission mechanism does more than that but,
    yes, if one were to try some kind of ersatz samizdat network
    over dialup telephony, UUCP would be the way to go.

    While it's true that point-to-point communications may not be attached
    specifically, the same is true of point-to-point data flow between
    Internet-connected computers. Moreover, to dial into some place,
    I'm basically doing that from set physical location: no trampolining
    through a VPS on the other side of the world, protected by a VPN.

    I'm thinking more a notebook computer with a modem that's moving from
    place to place.

    So we are envisioning people with some kind of interface cable,
    burner phone, and laptops clandestinely transmitting from cafes
    or something? I'm not sure how realistic that is under
    occupation, let alone an active war zone.

    The point is, why try to use an inferior technological mechanism
    like FTN when UUCP is available? Trying to bend the former into
    something useful seems like a heavy lift. For that matter, why
    not try to do something like IP over RF instead?

    Or even short messages sent over AX.25. Given that we know that
    B-team Russian troops are using cheap consumer HTs on the 2m ham
    band, one could conceivably put together a digipeater with a
    similar rig and a Rasperry Pi with a battery in an ammo box
    unattended on a hill somewhere: it is unlikely to be jammed.
    A network of those could easily make it into Poland where an
    igate could pick short messages and redirect them to anywhere;
    even twitter.

    There are cases in recent history of telephony networks being taken
    offline at the behest of local governments, while Internet access
    remained viable in some limited capacity. E.g., during the Arab
    Spring. And while there were much-touted reports of people rolling
    out BBSes talking to Fidonet to circumvent Intenet censorship, I've
    never found any credible evidence that that _actually_ happened:
    just people talking about it.

    ACK

    Moreover, almost all BBSes are completely unencrypted.

    True.

    But the BBS is in many ways a means to an end; communications through
    the network (FTN or otherwise) that is interconnecting them.

    A VPS somewhere that people could log into that's running a real
    operating system (Unix or the like) would be more useful, IMHO.

    Also, individual messages can be encrypted, much like email, such that >someone without the decryption information only has (hopefully minimal) >metadata.

    As I mentioned above, to use a BBS for that, you need BBS
    software that does it, which isn't super common. On the other
    hand, today one could throw together a cheap Linux install on a
    Raspberry Pi with UUCP, GPG, and mutt and make it work with as
    it would take to configure a BBS.

    I suppose it's possible people could communicate real-time person
    to person over dialup, but the reach would be seriously limited:
    why not just talk on the phone?

    Agreed.

    Though it's probably easier to do voice encryption and exchange the data >therefrom.

    Honestly, ham radio is probably much harder to silence, but carries
    its own risks (direction finding and so on).

    Yep.

    Being mobile is key.

    That's the hardest part in a combat zone.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Eric Pozharski@21:1/5 to Grant Taylor on Sat Mar 12 12:57:29 2022
    with <t0hh8o$3mh$1@tncsrv09.home.tnetconsulting.net> Grant Taylor wrote:
    On 3/11/22 6:55 PM, Dan Cross wrote:

    *SKIP*
    There are also two separable use-cases: netamil (basically, email) and
    echomail (roughly analogous to USENET). The former is more ammenable
    to point-to-point mesh-style connections; the latter almost always
    flows through a hub.

    And files, that would be analogy of binary Usenet.

    *SKIP*
    Sorry, two separate thoughts; IF I were using dialup, I'd use UUCP
    instead of FTN.
    I think I too would use UUCP if I were to green field something. Not
    the least of which is that I already have some UUCP, so extending that network is fairly easy.

    You two are avoiding one significant point of the puzzle. UUCP is fine
    to move articles and files around. It doesn't handle subscription.
    While FTN already has established way to communicate it (AreaFix and
    FileFix). AIAUI, compatibility is good enough.

    *CUT*

    p.s. Also, elaborate quoting. See these highlights? Straight from
    those ages :)

    --
    Torvalds' goal for Linux is very simple: World Domination
    Stallman's goal for GNU is even simpler: Freedom

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Eric Pozharski@21:1/5 to Grant Taylor on Sat Mar 12 15:11:47 2022
    with <t0g3j4$2d5$2@tncsrv09.home.tnetconsulting.net> Grant Taylor wrote:
    On 3/11/22 2:41 AM, Eric Pozharski wrote:

    I explicitly withhold all education because nobody cares about it.
    That's demonstrably false because I care.

    Well, let's clarify word use here. I presume you don't care about FTN (otherwise you'd be immersed there already). What you want to say is
    that you want to form educated opinion. And this is fine (in a sense,
    you must be proud and everybody must take you as an example).

    Now, back to your educated opinion. I suggest you dial up a little your imagination. What we are talking here, is the technology that was first implemented on DOS of early 90s (I believe, with some digging, it's
    still possible to run a node on 8086; connectivity might be a problem
    though).

    And the thing is -- it's stuck in this paradigm. I don't want even to
    think about security. What you have to know, "FTN is Network of
    Friends".

    How is your educated opinion now?

    --
    Torvalds' goal for Linux is very simple: World Domination
    Stallman's goal for GNU is even simpler: Freedom

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to whynot@pozharski.name on Sat Mar 12 21:55:38 2022
    In article <slrnt2p65p.50d.whynot@orphan.zombinet>,
    Eric Pozharski <whynot@pozharski.name> wrote:
    with <t0hh8o$3mh$1@tncsrv09.home.tnetconsulting.net> Grant Taylor wrote:
    On 3/11/22 6:55 PM, Dan Cross wrote:
    [snip]

    You two are avoiding one significant point of the puzzle. UUCP is fine
    to move articles and files around. It doesn't handle subscription.
    While FTN already has established way to communicate it (AreaFix and >FileFix). AIAUI, compatibility is good enough.

    News software has handled newgroup messages and had regular
    expressions for "subscriptions" for decades.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mike Spencer@21:1/5 to snipeco.2@gmail.com on Sat Mar 12 23:03:23 2022
    snipeco.2@gmail.com (Sn!pe) writes:

    Give me text every time; trying to follow instructions on a video
    is a total PITA. I fear that's another battle already lost, though.

    Agreed. But how many people can and do write lucid, unambigguous, parsimonious, well-informed text? It's a skill. It takes time and
    prolonged focused attention. Even people who write for a living seem,
    these days, too often to come up wanting. Precise instruction is even
    more demanding of those features than punditry or political analysis.
    People who know how to do complicated stuff, even those who know why
    they do it as they do, seem too often to lack the skill, time and
    focus to write well.

    I have several friends, some with advanced degrees, who are happy to
    chat over coffee but simply can't bring themselves to *write* with the
    same humor, erudition, insight etc. etc, that they bring to
    conversation over coffee. And that's just casual conversation, not
    instuction targeted on implementing practical
    directions/instructions. So it seems to be to some degree a natural
    talent as well.

    --
    Mike Spencer Nova Scotia, Canada

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Eric Pozharski@21:1/5 to Dan Cross on Sun Mar 13 16:56:06 2022
    with <t0j4sq$pc$1@reader1.panix.com> Dan Cross wrote:
    In article <slrnt2p65p.50d.whynot@orphan.zombinet>,
    Eric Pozharski <whynot@pozharski.name> wrote:
    with <t0hh8o$3mh$1@tncsrv09.home.tnetconsulting.net> Grant Taylor wrote:
    On 3/11/22 6:55 PM, Dan Cross wrote:

    You two are avoiding one significant point of the puzzle. UUCP is
    fine to move articles and files around. It doesn't handle
    subscription. While FTN already has established way to communicate
    it (AreaFix and FileFix). AIAUI, compatibility is good enough.
    News software has handled newgroup messages and had regular
    expressions for "subscriptions" for decades.

    I was misunderstood. I was trying to demonstrate The Apeal. The Apeal
    doesn't check with reality though.

    --
    Torvalds' goal for Linux is very simple: World Domination
    Stallman's goal for GNU is even simpler: Freedom

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Eric Pozharski@21:1/5 to Dan Cross on Sun Mar 13 16:53:26 2022
    with <t0ig3r$997$1@reader1.panix.com> Dan Cross wrote:
    In article <t0hh8o$3mh$1@tncsrv09.home.tnetconsulting.net>, Grant
    Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/11/22 6:55 PM, Dan Cross wrote:

    *SKIP*
    I largely agree. I was just thinking an existing, not /truly/
    Internet dependent network.
    FTN is not that, and it hasn't been for 30 years. BBS enthusiasts
    like to think that it could be, but I honestly think those people are deluding themselves.

    I can't agree more.

    gtaylor@, please stop beating this dead horse. It becomes painful
    (horse doesn't mind, it's already dead).

    --
    Torvalds' goal for Linux is very simple: World Domination
    Stallman's goal for GNU is even simpler: Freedom

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Eric Pozharski on Sun Mar 13 12:36:58 2022
    On 3/13/22 10:53 AM, Eric Pozharski wrote:
    gtaylor@, please stop beating this dead horse.

    As a practicioner of old networking technologies for anyone that wants
    to participate, I will continue to beat whatever horse that I want to,
    dead or alive.

    There is a very big difference in /what/ /could/ /be/ verses /what/
    /is/. If people are not willing to spend the effort to convert from
    /could/ /be/ to /is/ then that is on them. But their lack of effort
    doesn't change what the technology is capable of doing.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to whynot@pozharski.name on Sun Mar 13 19:11:11 2022
    In article <slrnt2s8h6.4oq.whynot@orphan.zombinet>,
    Eric Pozharski <whynot@pozharski.name> wrote:
    with <t0j4sq$pc$1@reader1.panix.com> Dan Cross wrote:
    In article <slrnt2p65p.50d.whynot@orphan.zombinet>,
    Eric Pozharski <whynot@pozharski.name> wrote:
    with <t0hh8o$3mh$1@tncsrv09.home.tnetconsulting.net> Grant Taylor wrote: >>>> On 3/11/22 6:55 PM, Dan Cross wrote:
    You two are avoiding one significant point of the puzzle. UUCP is
    fine to move articles and files around. It doesn't handle
    subscription. While FTN already has established way to communicate
    it (AreaFix and FileFix). AIAUI, compatibility is good enough.
    News software has handled newgroup messages and had regular
    expressions for "subscriptions" for decades.

    I was misunderstood. I was trying to demonstrate The Apeal. The Apeal >doesn't check with reality though.

    I see. I'm much in agreement; people who champion FTNs tend
    not to understand the limitations of FTNs.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Dan Cross on Sun Mar 13 13:12:28 2022
    On 3/12/22 8:47 AM, Dan Cross wrote:
    Sadly, that doesn't make it any less true.

    Please elaborate on why the Internet is required when a group of people
    make dial up connections to each other using FTN and / or UUCP.

    Like I said, if you want to try and fall back to a dailup based
    solution, you're better off with UUCP.

    Agreed. That's why I do use UUCP.

    That makes it nearly undiscoverable.

    /nearly/ is the operative word.

    How many different things that want to hide from authorities rotate
    where they are found at? As in they keep changing their location or
    phone number? Does a "burner phone" mean anything to you? The long and
    short is that those that need to know the current phone number will
    either know it or know how to get it.

    I'm afraid you are.

    :-/

    Why would one choose to use something like FTN at that point, and
    not UUCP or a more advanced technology that is interoperable with
    the larger Internet? Is the point to shoehorn FTN into this role,
    or to usefully share information?

    Even "point to point" FTN requires the distribution of a nodelist
    to every system in the network; without that, you can't usefully
    communicate between nodes.

    It's been a long time since I've looked at the routing in FTN. But I
    strongly believe that I don't need to have a list of every node in the
    FTN. I /do/ need a list of every node that I directly communicate with.
    The latter is decidedly a subset of the former.

    That implies that you need some mechanism to distribute the nodelist;
    in some hypothetical system where BBSes are hopping from number
    to number dynamically (where do these numbers come from, by the
    way?) daily,

    You don't need to distribute / synchronize the entire node list.

    You just need to distribute / synchronize the list of the nodes that you directly connect to / call.

    you've got a logistical problem keeping the network up to date.

    Yes and no.

    I believe that "eventual consistency" has a large hand in this.

    I think that it's far more important to have information on the nodes
    that I directly connect to / call than it is to have information on
    nodes that are one or more hops away, much less on the opposite side of
    the planet.

    Consider the Default Free Zone in global BGP that makes up the Internet
    today. It's in a constant state of flux. An *EXTREMELY* *TINY*
    percentage of the routers that make up the DFZ have the same prefixes,
    much less the same routes therefor.

    You don't even need /eventual/ /consistency/. You just need
    connectivity to adjacent / directly connected nodes to pass traffic
    through and knowledge that you can route traffic for something further
    away via a node you do connect with.

    Changes are like ripples in a body of water, in that they have the most
    impact closest to the ripple. The further you get away from it, the
    less impact, if any, is perceived.

    And if that nodelist falls into the wrong hands, someone now has
    a list of every BBS participating in this hyptothetical network.

    A very good reason to *NOT* have a complete list of phone numbers /
    connection methods.

    Phone numbers are not anonymous, and while there _are_ things like
    burner cell phones, it's not clear to me how you'd run a network of
    BBSes with them.

    What is unclear about the /how/? The burner cell phone is tantamount to
    a changing phone number. You just need the /current/ phone number of
    the systems that you directly call yourself.

    Arguably, you could get away with having the phone number of just one
    single system as a boot strap to retrieve a list of other phone numbers
    to call.

    Also, I imagine that once under occupation, burner phones are going
    to become hard to come by.

    It also doesn't have to be a cell phone. It could be a phone extension
    off of a phone system. Move a notebook every few days to a different
    location with a different phone number.

    You are bringing up things that are simply logistical challenges. None
    of them mean that things won't / can't work. They just mean that it's
    /harder/ to do. Harder != impossible.

    Contrast with UUCP, where each node is configured only know about
    its neighbors. You could trivially exchange PGP-encrypted mail over
    UUCP; not so much with a BBS unless it's built into the BBS software
    (though I suppose you could figre out some way to leverage "offline
    readers" to download the mail and decrypt it locally).

    I'll concede /integrated/ support for PGP (et al.). However /external/
    support for PGP has been the de facto for a long time. As in you copy
    and paste ciphertext into / out of the BBS message editor and the PGP /
    GPG implementation that you are using.

    This is a hurtle at best. Definitely not a show stopper.

    UUCP as a dialup transmission mechanism does more than that but, yes,
    if one were to try some kind of ersatz samizdat network over dialup telephony, UUCP would be the way to go.

    Agreed.

    I was naively assuming that FidoNet / other FTNs were /currently/ in a
    better state for peer to peer dial up connections than UUCP.

    If I were to green field something, I'd definitely use UUCP.

    So we are envisioning people with some kind of interface cable,
    burner phone, and laptops clandestinely transmitting from cafes
    or something?

    You're closer to what I describe above. The physical interface cable is largely a non-issue for someone that wants to acquire it. Even most contemporary cell phones can still act as modems and honor AT commands.

    There's a good chance that you can even continue to use the same phone
    with the same cable. Just trade the SIM cards. Or if you're worried
    about tracking signature of the same phone's radio fingerprint, multiple
    phones from the same model or that use the same cable.

    I'm not sure how realistic that is under occupation, let alone an
    active war zone.

    Realistic is along the lines of logistics and practicality. They are indifferent to the possibility that something could be done.

    The point is, why try to use an inferior technological mechanism like
    FTN when UUCP is available? Trying to bend the former into something
    useful seems like a heavy lift.

    I spoke to this above.

    For that matter, why not try to do something like IP over RF instead?

    RF has some advantages.

    I think that IP has some disadvantages from an addressing & coordination
    point of view. Both on directly attached links and at a larger routed
    network scale.

    IP tends to imply that you're wanting to do things across multiple hopes
    in the network. That end-to-end connectivity is an Achilles Heal to me, particularly in occupied / war zones.

    Conversely UUCP's store and forward networking model avoids the
    dependency on end-to-end connectivity.

    I believe that IP simply adds additional layers of complexity that
    aren't needed for two directly connected nodes to exchange files. I
    think that UUCP is better equipped to do this.

    Or even short messages sent over AX.25. Given that we know that
    B-team Russian troops are using cheap consumer HTs on the 2m ham band,
    one could conceivably put together a digipeater with a similar rig
    and a Rasperry Pi with a battery in an ammo box unattended on a hill somewhere: it is unlikely to be jammed. A network of those could
    easily make it into Poland where an igate could pick short messages
    and redirect them to anywhere; even twitter.

    Yes. This type of thing is in the spirit of a notebook computer moving
    from location to location.

    Though I would question digipeating as I think that it verges on
    multi-hop dependency.

    Conversely, packet between two adjacent systems and exchanging files
    with software to re-distribute them seems like it would be better IMHO.

    A VPS somewhere that people could log into that's running a real
    operating system (Unix or the like) would be more useful, IMHO.

    The VPS tends to be a SPOF in a fixed and determinable location. It's
    also a fixed identifier name / IP that will be easier to block.

    As I mentioned above, to use a BBS for that, you need BBS software that
    does it, which isn't super common. On the other hand, today one could
    throw together a cheap Linux install on a Raspberry Pi with UUCP, GPG,
    and mutt and make it work with as it would take to configure a BBS.

    Aside: I think there is some room for quibbling over what is a BBS? ;-)

    Some of the contemporary BBSs are exactly what you describe.

    Similarly, what is a notebook other than a small portable computer?
    What differentiates a notebook from a Raspberry Pi from a Pine64, etc?
    All of which can probably do the same job equally well. (Save for the different power needs.)

    That's the hardest part in a combat zone.

    Hard != impossible

    I'm also expecting that the area with /active/ fighting is
    proportionally small compared to a geographic area that has had / is
    having / will have fighting take place in it. Obviously avoid the areas
    where the /active/ fighting is.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to gtaylor@tnetconsulting.net on Sun Mar 13 19:27:44 2022
    In article <t0ldji$hjs$1@tncsrv09.home.tnetconsulting.net>,
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/13/22 10:53 AM, Eric Pozharski wrote:
    gtaylor@, please stop beating this dead horse.

    As a practicioner of old networking technologies for anyone that wants
    to participate, I will continue to beat whatever horse that I want to,
    dead or alive.

    "Won't someone please think of the horses?"

    There is a very big difference in /what/ /could/ /be/ verses /what/
    /is/. If people are not willing to spend the effort to convert from
    /could/ /be/ to /is/ then that is on them. But their lack of effort
    doesn't change what the technology is capable of doing.

    That's a bit reductive. In some sense, this is all software,
    and therefore extremely malleable. But so what? There are
    serious technical challenges with doing what you suggested
    (which I understood to be using FTNs as a serious alternative
    to the Internet for ersatz communication under a repressive
    regime of some kind). MAYBE something basd on Fido "standards"
    could be cobbled together to approximate what you're describing,
    but it doesn't exist now, and no one is doing that work. The
    packet structure, generally assumed hub-and-spoke architecture,
    and other things would make it a poor fit: one would basically
    be borrowing a handful of things to build something new and then
    retroactively calling it "FTN", but it wouldn't really be that.

    For all intents and purposes, FTN is not a practical solution
    here. Speculating otherwise may be an entertaining academic
    exercise, but is essentially a strawman.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to gtaylor@tnetconsulting.net on Mon Mar 14 14:24:48 2022
    In article <t0lfm4$elv$1@tncsrv09.home.tnetconsulting.net>,
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/12/22 8:47 AM, Dan Cross wrote:
    Sadly, that doesn't make it any less true.

    Please elaborate on why the Internet is required when a group of people
    make dial up connections to each other using FTN and / or UUCP.

    First, I was talking specifically about FTN. Second, I have,
    multiple times. Please review my earlier posts in this thread.

    Like I said, if you want to try and fall back to a dailup based
    solution, you're better off with UUCP.

    Agreed. That's why I do use UUCP.

    That makes it nearly undiscoverable.

    /nearly/ is the operative word.

    How many different things that want to hide from authorities rotate
    where they are found at? As in they keep changing their location or
    phone number? Does a "burner phone" mean anything to you? The long and >short is that those that need to know the current phone number will
    either know it or know how to get it.

    I have covered both burner phones and the logistical issues
    involved with respect to FTNs several times. Please review my
    earlier posts for more information.

    I'm afraid you are.

    :-/

    Why would one choose to use something like FTN at that point, and
    not UUCP or a more advanced technology that is interoperable with
    the larger Internet? Is the point to shoehorn FTN into this role,
    or to usefully share information?

    Even "point to point" FTN requires the distribution of a nodelist
    to every system in the network; without that, you can't usefully
    communicate between nodes.

    It's been a long time since I've looked at the routing in FTN. But I >strongly believe that I don't need to have a list of every node in the
    FTN. I /do/ need a list of every node that I directly communicate with.
    The latter is decidedly a subset of the former.

    Ok, but that's just not how it's designed to work.

    That implies that you need some mechanism to distribute the nodelist;
    in some hypothetical system where BBSes are hopping from number
    to number dynamically (where do these numbers come from, by the
    way?) daily,

    You don't need to distribute / synchronize the entire node list.

    You just need to distribute / synchronize the list of the nodes that you >directly connect to / call.

    Again, I've gone on at length about why this just doesn't match
    how FTN was designed. Please review other posts in this thread
    for more information.

    you've got a logistical problem keeping the network up to date.

    Yes and no.

    I believe that "eventual consistency" has a large hand in this.

    I think that it's far more important to have information on the nodes
    that I directly connect to / call than it is to have information on
    nodes that are one or more hops away, much less on the opposite side of
    the planet.

    The way that FTN works is that either you make a direct point
    to point connection to another node, _or_ you send via a hub.
    This disjointed networking thing basically reduces to the hub
    and spoke architecture, so now you're back to those problems.

    Consider the Default Free Zone in global BGP that makes up the Internet >today. It's in a constant state of flux. An *EXTREMELY* *TINY*
    percentage of the routers that make up the DFZ have the same prefixes,
    much less the same routes therefor.

    You don't even need /eventual/ /consistency/. You just need
    connectivity to adjacent / directly connected nodes to pass traffic
    through and knowledge that you can route traffic for something further
    away via a node you do connect with.

    You appear to be assuming that any node in an FTN network can
    act as a de facto hub. But that's not how extant software is
    written.

    Changes are like ripples in a body of water, in that they have the most >impact closest to the ripple. The further you get away from it, the
    less impact, if any, is perceived.

    This is all well and good in theory, but just doesn't match well
    with how extact FTN software and networks are designed to
    operate.

    And if that nodelist falls into the wrong hands, someone now has
    a list of every BBS participating in this hyptothetical network.

    A very good reason to *NOT* have a complete list of phone numbers / >connection methods.

    Yes. A great reason not to use FTN.

    Phone numbers are not anonymous, and while there _are_ things like
    burner cell phones, it's not clear to me how you'd run a network of
    BBSes with them.

    What is unclear about the /how/? The burner cell phone is tantamount to
    a changing phone number. You just need the /current/ phone number of
    the systems that you directly call yourself.

    Arguably, you could get away with having the phone number of just one
    single system as a boot strap to retrieve a list of other phone numbers
    to call.

    And those numbers must necessarily change frequently.

    Also, I imagine that once under occupation, burner phones are going
    to become hard to come by.

    It also doesn't have to be a cell phone. It could be a phone extension
    off of a phone system. Move a notebook every few days to a different >location with a different phone number.

    You are bringing up things that are simply logistical challenges. None
    of them mean that things won't / can't work. They just mean that it's >/harder/ to do. Harder != impossible.

    It seems to me that you are trying very hard to construct a
    hypothetical situation in which you are technically correct.
    I'll grant you that you may be able to do so. But that does
    not mean that that hypothetical situation is translatable into
    a working, useful communication system.

    Piling, "what if?" on top of "what if?" and moving the goalposts
    around doesn't mean any of this is realistic, I'm afraid, and in
    an engineering sense, sufficiently hard is basically impossible.

    Contrast with UUCP, where each node is configured only know about
    its neighbors. You could trivially exchange PGP-encrypted mail over
    UUCP; not so much with a BBS unless it's built into the BBS software
    (though I suppose you could figre out some way to leverage "offline
    readers" to download the mail and decrypt it locally).

    I'll concede /integrated/ support for PGP (et al.). However /external/ >support for PGP has been the de facto for a long time. As in you copy
    and paste ciphertext into / out of the BBS message editor and the PGP /
    GPG implementation that you are using.

    This is a hurtle at best. Definitely not a show stopper.

    Oh my goodness, this is getting silly now. The point is that
    BBSes and FTNs are simply a poor fit for this kind of thing,
    period end of story. You can keep constructing hypothetical
    scenarios, but aside from an academic thought experiment, this
    just isn't practical.

    FTN wasn't meant for this kind of thing. It wouldn't work well
    for it.

    UUCP as a dialup transmission mechanism does more than that but, yes,
    if one were to try some kind of ersatz samizdat network over dialup
    telephony, UUCP would be the way to go.

    Agreed.

    I was naively assuming that FidoNet / other FTNs were /currently/ in a
    better state for peer to peer dial up connections than UUCP.

    If I were to green field something, I'd definitely use UUCP.

    Good. Then could we please stop discussing the suitability of
    FTN for this kind of thing?

    So we are envisioning people with some kind of interface cable,
    burner phone, and laptops clandestinely transmitting from cafes
    or something?

    You're closer to what I describe above. The physical interface cable is >largely a non-issue for someone that wants to acquire it. Even most >contemporary cell phones can still act as modems and honor AT commands.

    There's a good chance that you can even continue to use the same phone
    with the same cable. Just trade the SIM cards. Or if you're worried
    about tracking signature of the same phone's radio fingerprint, multiple >phones from the same model or that use the same cable.

    Good luck getting them. This would quickly devolve into a small
    cell of people passing information among themselves, which
    is probably usful for kind of irregular guerilla action, but not
    much more.

    I'm not sure how realistic that is under occupation, let alone an
    active war zone.

    Realistic is along the lines of logistics and practicality. They are >indifferent to the possibility that something could be done.

    Then I ask again, what's the point? Is it to score an academic
    point on possibility, or build a useful communication system?
    Honestly, the hypotheticals are uninteresting if they cannot be
    reasonably applied to a practical solution.

    The point is, why try to use an inferior technological mechanism like
    FTN when UUCP is available? Trying to bend the former into something
    useful seems like a heavy lift.

    I spoke to this above.

    Great, then we can stop talking about about FTNs, right? :-)

    For that matter, why not try to do something like IP over RF instead?

    RF has some advantages.

    I think that IP has some disadvantages from an addressing & coordination >point of view. Both on directly attached links and at a larger routed >network scale.

    IP tends to imply that you're wanting to do things across multiple hopes
    in the network. That end-to-end connectivity is an Achilles Heal to me, >particularly in occupied / war zones.

    Conversely UUCP's store and forward networking model avoids the
    dependency on end-to-end connectivity.

    I believe that IP simply adds additional layers of complexity that
    aren't needed for two directly connected nodes to exchange files. I
    think that UUCP is better equipped to do this.

    IP is literally a store and forward networking protocol, though
    it could be configured to communicate only with directly
    connected hosts (ie, with no routing).

    But it strikes me that the most useful thing is to talk to the
    outside world.

    What would this hypothetical network be used for, otherwise?

    Or even short messages sent over AX.25. Given that we know that
    B-team Russian troops are using cheap consumer HTs on the 2m ham band,
    one could conceivably put together a digipeater with a similar rig
    and a Rasperry Pi with a battery in an ammo box unattended on a hill
    somewhere: it is unlikely to be jammed. A network of those could
    easily make it into Poland where an igate could pick short messages
    and redirect them to anywhere; even twitter.

    Yes. This type of thing is in the spirit of a notebook computer moving
    from location to location.

    Though I would question digipeating as I think that it verges on
    multi-hop dependency.

    So does UUCP/FTN/whatever else. For that matter, so does the
    PSTN. Those cell towers and copper pairs connect to something.

    One generally needs digipeating for coverage, even in a
    geographically isolated area.

    Conversely, packet between two adjacent systems and exchanging files
    with software to re-distribute them seems like it would be better IMHO.

    AX.25 mailers can already do this.

    A VPS somewhere that people could log into that's running a real
    operating system (Unix or the like) would be more useful, IMHO.

    The VPS tends to be a SPOF in a fixed and determinable location. It's
    also a fixed identifier name / IP that will be easier to block.

    So is a telephone exchange, which you have been arguing for
    pretty strenuously. This argument is not self-consistent with
    your earlier arguments.

    Besides, with IP connectivity, one could start to do things like
    have that VPS accessible via a VPN, or TOR, or....

    As I mentioned above, to use a BBS for that, you need BBS software that
    does it, which isn't super common. On the other hand, today one could
    throw together a cheap Linux install on a Raspberry Pi with UUCP, GPG,
    and mutt and make it work with as it would take to configure a BBS.

    Aside: I think there is some room for quibbling over what is a BBS? ;-)

    Some of the contemporary BBSs are exactly what you describe.

    I'd love to hear examples of such BBSes that participate in FTN
    networks.

    Similarly, what is a notebook other than a small portable computer?
    What differentiates a notebook from a Raspberry Pi from a Pine64, etc?
    All of which can probably do the same job equally well. (Save for the >different power needs.)

    ...are you referring to my digipeater thing here? The Raspberry
    Pi would be preferable due to (presumably) power power draw than
    a notebook, and smaller form factor. The HCI hardware on a
    notebook tends to imply interactive use; something you probably
    don't want for a digipeater or whatever.

    That's the hardest part in a combat zone.

    Hard != impossible

    I'm also expecting that the area with /active/ fighting is
    proportionally small compared to a geographic area that has had / is
    having / will have fighting take place in it. Obviously avoid the areas >where the /active/ fighting is.

    This are all false assumptions. I've been in a combat zone.
    What you are proposing is, simply, unrealistic.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Computer Nerd Kev@21:1/5 to All on Tue Mar 15 07:34:49 2022
    Related to this, I see that the most recent Firefox release has
    been put out solely for the purpose of removing Yandex and Mail.ru
    search functions and removing all customisations in their
    "browsers".

    "Yandex and Mail.ru have been removed as optional search providers
    in the drop-down search menu in Firefox.

    If you previously installed a customized version of Firefox with
    Yandex or Mail.ru, offered through partner distribution channels,
    this release removes those customizations, including add-ons and
    default bookmarks. Where applicable, your browser will revert back
    to default settings, as offered by Mozilla. All other releases of
    Firefox remain unaffected by the change."
    https://www.mozilla.org/en-US/firefox//notes/

    Politics aside, I don't like one bit the way an open source
    software project is willing to decide what services their users
    should be using, and sabotaging 3rd party customisations.

    I wouldn't want Putin deciding what websites I view, but I don't
    want the software I use restricting my access to services that its
    authors don't like either!

    So in protest I'll point out that there is an "Add custom search
    engine" add-on, which I used to replace the dead about:config
    setting where I used to have the default search engine URL set to
    DuckDuckGo Lite with my preferred parameters, before Mozilla
    decided that was allowing their users too much freedom: https://addons.mozilla.org/en-US/firefox/addon/add-custom-search-engine/

    --
    __ __
    #_ < |\| |< _#

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From meff@21:1/5 to snipeco.2@gmail.com on Tue Mar 15 05:44:33 2022
    On 2022-03-12, Sn!pe <snipeco.2@gmail.com> wrote:
    Give me text every time; trying to follow instructions on a video
    is a total PITA. I fear that's another battle already lost, though.

    Yet another unrealistic lamentation about textual preferences. Humans
    prefer lower effort things. Experts or motivated amateurs who spend
    many hours of their lives learning things, like reading and
    transmitting text or code, become good at those things. News at 11.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From meff@21:1/5 to Eric Pozharski on Tue Mar 15 05:31:13 2022
    On 2022-03-13, Eric Pozharski <whynot@pozharski.name> wrote:
    gtaylor@, please stop beating this dead horse. It becomes painful
    (horse doesn't mind, it's already dead).

    I was too young during the BBS days to use a BBS, but I generally hold
    the opinion that those who are ignorant of history are doomed to
    repeat it. I think documenting FTN would be a good exercise if
    anything to help ambitious folks not recreate some of its foibiles in
    modern IP networks.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Sn!pe@21:1/5 to meff on Tue Mar 15 10:07:51 2022
    meff <email@example.com> wrote:

    On 2022-03-12, Sn!pe <snipeco.2@gmail.com> wrote:
    Give me text every time; trying to follow instructions on a video
    is a total PITA. I fear that's another battle already lost, though.

    Yet another unrealistic lamentation about textual preferences. Humans
    prefer lower effort things. Experts or motivated amateurs who spend
    many hours of their lives learning things, like reading and
    transmitting text or code, become good at those things. News at 11.

    Thank you for your comment. What was your point?

    --
    ^Ï^ I've got a case of Dynamite, I could hold out here all night.

    My pet rock Gordon just is.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Javier@21:1/5 to Dan Cross on Tue Mar 15 09:31:43 2022
    Dan Cross <cross@spitfire.i.gajendra.net> wrote:
    UUCP as a dialup transmission mechanism does more than that but,
    yes, if one were to try some kind of ersatz samizdat network
    over dialup telephony, UUCP would be the way to go.

    The problem I foresee with underground samizdat networks is how prone
    they are to

    1) abuse
    2) flooding with low quality content

    To some extent you can prevent abuse with things like GPG signatures.
    But more than a technical problem, it is a social one.

    UUCPNET in the 80s was a cooperative network of universities and
    companies and all admins on it were well behaved and cooperated.
    Everything was unencrypted, and yet nobody was spoofing emails,
    nor doing crapflooding. I guess that the reasons for cooperation were

    a) the zeitgeist of the 80s encouraged technological cooperation.
    b) everybody's identity was public and most of them were academics
    who valued their prestige.
    c) barriers of entry (in terms of economical cost and the requirement
    of technical knowledge of hardware and software).

    In the case of an underground samizdat network in the 2020s (a) and (b)
    would no longer apply, and the only protection against abuse and
    flooding with low quality content is (c).

    For the purpose of setting barriers of entry (c) packet radio would be
    an ideal choice.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Spiros Bousbouras@21:1/5 to Computer Nerd Kev on Tue Mar 15 19:20:18 2022
    On 15 Mar 2022 07:34:49 +1000
    not@telling.you.invalid (Computer Nerd Kev) wrote:
    Related to this, I see that the most recent Firefox release has
    been put out solely for the purpose of removing Yandex and Mail.ru
    search functions and removing all customisations in their
    "browsers".

    Hmmmm...

    "Yandex and Mail.ru have been removed as optional search providers
    in the drop-down search menu in Firefox.

    If you previously installed a customized version of Firefox with
    Yandex or Mail.ru, offered through partner distribution channels,
    this release removes those customizations, including add-ons and
    default bookmarks. Where applicable, your browser will revert back
    to default settings, as offered by Mozilla. All other releases of
    Firefox remain unaffected by the change."
    https://www.mozilla.org/en-US/firefox//notes/

    With a quick browse around the site , I don't see a rationale either. Is
    there any possibility that there is legal justification due to sanctions against Russia ?

    Politics aside, I don't like one bit the way an open source
    software project is willing to decide what services their users
    should be using, and sabotaging 3rd party customisations.

    But it's not "politics aside" ; as far as I can tell , this is a political decision.

    I wouldn't want Putin deciding what websites I view, but I don't
    want the software I use restricting my access to services that its
    authors don't like either!

    Software should be politics free , as much as possible. Obviously there is
    one political decision that will inevitably accompany any piece of software
    and that is what license it will come under. But anything else political
    should be left out. Of course there was also Linux and "blacklist" a while
    ago.

    So in protest I'll point out that there is an "Add custom search
    engine" add-on, which I used to replace the dead about:config
    setting where I used to have the default search engine URL set to
    DuckDuckGo Lite with my preferred parameters, before Mozilla
    decided that was allowing their users too much freedom: https://addons.mozilla.org/en-US/firefox/addon/add-custom-search-engine/

    Thank you. I don't actually have a use for that but such decisions should
    be resisted as much as possible on principle.

    --
    The opposite of good is good intentions.
    German proverb

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Computer Nerd Kev@21:1/5 to Spiros Bousbouras on Wed Mar 16 07:37:02 2022
    Spiros Bousbouras <spibou@gmail.com> wrote:
    On 15 Mar 2022 07:34:49 +1000
    not@telling.you.invalid (Computer Nerd Kev) wrote:

    "Yandex and Mail.ru have been removed as optional search providers
    in the drop-down search menu in Firefox.

    If you previously installed a customized version of Firefox with
    Yandex or Mail.ru, offered through partner distribution channels,
    this release removes those customizations, including add-ons and
    default bookmarks. Where applicable, your browser will revert back
    to default settings, as offered by Mozilla. All other releases of
    Firefox remain unaffected by the change."
    https://www.mozilla.org/en-US/firefox//notes/

    With a quick browse around the site , I don't see a rationale either. Is there any possibility that there is legal justification due to sanctions against Russia ?

    I did a bit of searching and found this article including a
    statement received from Mozilla:

    "In a statement to BleepingComputer, Mozilla says they removed the
    search providers from users in Russia, Belarus, Kazakhstan, and
    Turkey for the "prevalence of state sponsored content."

    "After careful consideration, we are suspending the use of Yandex
    Search in Firefox due to credible reports of search results
    displaying a prevalence of state sponsored content, which is
    contrary to the principles of Mozilla," a Mozilla spokesperson
    explained to BleepingComputer.

    "This means for the time being Yandex Search will not be the
    default search experience (or a default search option) for users in
    Russia, Belarus, Kazakhstan, and Turkey. In the meantime we are
    pointing people to google.com." " ...
    https://www.bleepingcomputer.com/news/software/mozilla-firefox-removes-russian-search-providers-over-misinformation-concerns/

    So not a legal requirement due to any sanctions, just "contrary to
    the principles of Mozilla". I really don't want Mozilla deciding
    what is worthy content for me to view with their software and what
    isn't. I don't even agree with them on how a browser should work,
    let alone want to adopt their world view in general.

    I couldn't find a search "add-on" available for web searching with
    Yandex either, besides some little-used ones for image searching,
    so I don't think it's just been removed as a default option, but
    as an option altogether.

    Politics aside, I don't like one bit the way an open source
    software project is willing to decide what services their users
    should be using, and sabotaging 3rd party customisations.

    But it's not "politics aside" ; as far as I can tell , this is a political decision.

    Yes indeed, I just meant that I didn't want my post to be
    interpreted as an arbitrary defence of Russia rather than a
    criticism of Mozilla's policy. I don't want Mozilla making decisions
    on what services I use regardless of which political (ethical, etc.)
    side they choose to take.

    --
    __ __
    #_ < |\| |< _#

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From meff@21:1/5 to Computer Nerd Kev on Tue Mar 15 22:40:46 2022
    On 2022-03-15, Computer Nerd Kev <not@telling.you.invalid> wrote:
    Yes indeed, I just meant that I didn't want my post to be
    interpreted as an arbitrary defence of Russia rather than a
    criticism of Mozilla's policy. I don't want Mozilla making decisions
    on what services I use regardless of which political (ethical, etc.)
    side they choose to take.

    Sigh, welcome to the current Big Tech climate, where big websites try
    to push their values upon everyone and anyone. I was more sympathetic
    when it was about domestic issues in the US because that is, largely a
    domestic affair and only affected Americans. But once you begin to
    impose these values on other polities, that's when you make me take a
    step back.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From meff@21:1/5 to Javier on Tue Mar 15 22:47:24 2022
    On 2022-03-15, Javier <invalid@invalid.invalid> wrote:
    a) the zeitgeist of the 80s encouraged technological cooperation.
    b) everybody's identity was public and most of them were academics
    who valued their prestige.
    c) barriers of entry (in terms of economical cost and the requirement
    of technical knowledge of hardware and software).

    In the case of an underground samizdat network in the 2020s (a) and (b)
    would no longer apply, and the only protection against abuse and
    flooding with low quality content is (c).

    For the purpose of setting barriers of entry (c) packet radio would be
    an ideal choice.

    Given the conditions of the 2020s, I think it's best to assume that
    all traffic should be encrypted/authenticated and to reject traffic
    from unknown sources. Zero Trust models are gaining prominence even in
    fat, fairly private IP networks. In a samizdat environment with even semi-modern computing power encryption should be simple to add on top.

    For those unfamiliar, there's the
    [NNCP](http://www.nncpgo.org/index.html) project which is spiritually
    similar to UUCP but layers on encryption from the beginning. Peering
    must be negotiated and keys exchanged out of band, but could have
    promise on a Samizdat network.

    I do think the realities of armed conflict are such that samizdat
    network operators will probably stay in certain areas and transmit on bands/connects that are hard to detect, while folks on the ground will
    do their thing and probably interact in very simple ways (either
    through simple physical word-of-mouth or by sending written messages,
    or by setting up fixed rendezvous points to send/receive samizdat
    messages.) Though I'm probably going far afield from any situation
    that I have even close to real experience in so I think I'll stop
    entertaining fantastical possibilities.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Eric Pozharski on Tue Mar 15 17:24:08 2022
    On 3/12/22 5:57 AM, Eric Pozharski wrote:
    You two are avoiding one significant point of the puzzle. UUCP is fine
    to move articles and files around. It doesn't handle subscription.

    Please elaborate on what you mean by "subscriptions" in this context.

    I believe that something like news server exchanging things via UUCP
    would provide /a/ subscription type model. What I'm not sure of is if
    it would match what you mean by subscriptions in this context.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Eli the Bearded@21:1/5 to Computer Nerd Kev on Tue Mar 15 23:32:16 2022
    In comp.misc, Computer Nerd Kev <not@telling.you.invalid> wrote:
    I couldn't find a search "add-on" available for web searching with
    Yandex either, besides some little-used ones for image searching, so I
    don't think it's just been removed as a default option, but as an
    option altogether.

    Does Yandex have the opensearchdescription code in the page? If so, can
    you add it back using this old stardard method?

    https://www.ghacks.net/2016/11/10/how-to-add-custom-search-engines-to-your-web-browser/

    Checking, it seems yes, that would work. I see the green plus on my
    fairly recent Firefox for yandex.com.

    Elijah
    ------
    doesn't ever remember seeing yandex as a builtin search option

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Javier on Tue Mar 15 18:11:58 2022
    On 3/15/22 8:31 AM, Javier wrote:
    The problem I foresee with underground samizdat networks is how prone
    they are to

    1) abuse
    2) flooding with low quality content

    Agreed.

    To some extent you can prevent abuse with things like GPG signatures.

    I don't see how GPG, et al., signatures will prevent abuse. At most
    they could validate purported identity. But short of /requiring/
    signatures that pass some sort of test, you can still have unsigned
    messages purporting to be whomever.

    But more than a technical problem, it is a social one.

    I largely agree.

    I do think it's a case of trying to use technology to solve a people
    problem.

    the only protection against abuse and flooding with low quality
    content is (c).

    Of people that have access to the network.

    Though private networks are contrary to -- what I've taken -- the larger
    spirit of the network to be, namely open and available a la. the
    remailer network.

    For the purpose of setting barriers of entry (c) packet radio would be
    an ideal choice.

    I believe that the remailer community has some things that might
    contribute to this, e.g. NotBit messaging / network which -- as I
    understand it -- requires proof of work for messages (files) to be
    accepted and relayed.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Dan Cross on Tue Mar 15 17:20:56 2022
    On 3/14/22 8:24 AM, Dan Cross wrote:
    Good. Then could we please stop discussing the suitability of FTN
    for this kind of thing?

    Okay.

    IP is literally a store and forward networking protocol, though
    it could be configured to communicate only with directly
    connected hosts (ie, with no routing).

    IP is not a store and forward networking protocol. There is no
    persistent storage for IP. Buffers, which /may/ be used for a very
    short period of time are transient at best.

    IP functions as a transport mechanism between two endpoints that may or
    may not be directly connected to each other. The nature of how IP works requires that all of the necessary routing segments be online and
    operational between two IP endpoints /at/ /the/ /same/ time.

    Conversely UUCP can easily exchange files without there ever being
    end-to-end connectivity at the same time. UUCP only requires that each
    pair of nodes be able to communicate and exchange files. A & B can
    exchange files while B can't talk to C. B & C can exchange files while
    B can't talk to A. A & C never have the ability to perform end-to-end communications. This works perfectly fine with UUCP. IP will never
    suffice without something (like UUCP / FTN / MQueue / ftp / etc.) on top
    of it to exchange files.

    B in this example could be a notebook / files on a flash drive / cd-rom
    / etc that is physically transported between A's location and C's location.

    But it strikes me that the most useful thing is to talk to the
    outside world.

    The end communicating parties must either be in the network or have
    access to gateways into / out of the network. E.g. local email client
    speaking SMTP to a local email server which speaks UUCP to another
    system which itself speaks UUCP to another system (rinse, lather, and
    repeat as necessary) which speaks SMTP to a destination system which a
    remote client pulls messages from.

    What would this hypothetical network be used for, otherwise?

    non-real-time communications; email, file transfer, etc.

    Technically you could request web pages through it. Though the latency
    would be ... painful. This would work through multiple out and back
    cycles and / or out, package, and back cycle where the packaging deduces
    the necessary supporting files (image, CSS, etc.) in support of the
    requested file / page.

    So does UUCP/FTN/whatever else. For that matter, so does the PSTN.
    Those cell towers and copper pairs connect to something.

    The crux is that IP needs all the elements of the path to be up at the
    same time for end-to-end communications. Conversely UUCP only needs the
    path elements between adjacent nodes. (See the A - B - C example above.)

    One generally needs digipeating for coverage, even in a geographically isolated area.

    Maybe. Probably.

    What if instead of digipeating the repeater node actually received the
    files a la. UUCP, stored them, and then forwarded them on to the next
    node. You end up breaking the A - B - C /multi-hop/ communications path
    into two /single-hop/ communications paths that don't need to be
    available at the same time.

    This single vs multi hop becomes more of an issue as you integrate more
    hops.

    AX.25 mailers can already do this.

    Fair enough.

    Substitute AX.25 in place of UUCP. Well save for the fact that AX.25
    equipment is more specialized than UUCP equipment.

    So is a telephone exchange, which you have been arguing for pretty strenuously. This argument is not self-consistent with your earlier arguments.

    It depends on the scope of view and if things are mobile or not. The
    town that I'm from had three separate telephone exchanges. If any one
    of them became unavailable, it was not impossible to travel across town
    to another location serviced by a separate telephone exchange.

    If you want to consider the telephone exchange to be a link in A - B - C
    and expand it as such A - (eA)(eB) - B - (eB)(eC) - C.

    If A & B are on the same exchange and the exchange itself is down, then
    they are going to have a hard time using the phone to connect to each
    other. Fortunately there are other ways to get UUCP to communicate.

    If A & B are on different exchanges, then perhaps the one on a dead
    exchange can move to a different exchange and be able to communicate
    with the other.

    Aside: Fortunately UUCP is not dependent on the source {address,phone
    number, port} /by/ /default/. As such, if A or B can move to other
    exchanges, they can quite likely connect and exchange files.

    Further aside: digipeating will have similar dependencies in that you
    will be reliant on A's transceiver, both of B's transceivers, and C's transceiver all (four) being operational at the same time. Things only
    get worse as you add more hops.

    Besides, with IP connectivity, one could start to do things like have
    that VPS accessible via a VPN, or TOR, or....

    IP introduces more complexity and more vulnerability.

    I'd love to hear examples of such BBSes that participate in FTN
    networks.

    I believe the contemporary Synchronet and / or Citadel are effectively
    standard Unix / Linux packages that may gateway to FTN. I feel like
    there's another another major package that's effectively an FTN counter
    part to uucico, but I can't think of the name at the moment.

    I find ftnapps/FTNd / ftncico on GitHub, but that's not what I'm trying
    to remember.

    ...are you referring to my digipeater thing here?

    Not specifically a digipeater per se. Just any small computer being
    used for whatever small computers are used for. Either system B being physically carried between A and C in the example above, or the node
    connected to the B transceiver to receive, store, and forward files via
    UUCP, or anything else you want.

    The Raspberry Pi would be preferable due to (presumably) power power
    draw than a notebook, and smaller form factor. The HCI hardware on
    a notebook tends to imply interactive use; something you probably
    don't want for a digipeater or whatever.

    Agreed.

    This are all false assumptions. I've been in a combat zone. What you
    are proposing is, simply, unrealistic.

    So ... is every single square kM of Ukraine under /active/ fighting /
    bullets flying?

    My understanding is that there are hot spots / conflict zones in Ukraine
    as Russian troops move in. Thus the obvious battle fronts are a
    non-starter for anything tech wise. But I suspect that the areas on the
    other side of Ukraine and behind the Russian front are both considerably
    safer to move about than the active battle lines.

    Is any of that /easy/? Absolutely not. Is it impossible? I doubt it.
    Could sufficiently motivated people move about around outside of the
    active combat zone? I suspect so.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to meff on Tue Mar 15 18:23:22 2022
    On 3/15/22 4:47 PM, meff wrote:
    Given the conditions of the 2020s, I think it's best to assume that
    all traffic should be encrypted/authenticated and to reject traffic
    from unknown sources.

    I agree that /support/ for encryption *must* be included. I further
    agree that encryption should be used by /default/.

    I still there there is some value in supporting unencrypted communique.

    Zero Trust models are gaining prominence even in fat, fairly private
    IP networks. In a samizdat environment with even semi-modern computing
    power encryption should be simple to add on top.

    The down side of requiring encryption is that it tends to shut out
    people that are unable to use it for some reason. With the most likely
    reason being software that supports the necessary encryption.

    For those unfamiliar, there's the
    [NNCP](http://www.nncpgo.org/index.html) project which is spiritually
    similar to UUCP but layers on encryption from the beginning. Peering
    must be negotiated and keys exchanged out of band, but could have
    promise on a Samizdat network.

    I think that NNCP is interesting. I do think that there is a
    possibility for UUCP to be relatively easily extended to support for GPG relatively easily.

    I do think the realities of armed conflict are such that samizdat
    network operators will probably stay in certain areas and transmit
    on bands/connects that are hard to detect, while folks on the ground
    will do their thing and probably interact in very simple ways (either
    through simple physical word-of-mouth or by sending written messages,
    or by setting up fixed rendezvous points to send/receive samizdat
    messages.)

    That's one of the nice things about UUCP in particular. Messages /
    files can originate on one medium and then route to other mediums
    without any change by clients. I can edit a file, use the uucp command
    on it, and let the systems in the path deal with transitions. I my
    system can put the files in a queue directory on a flash drive that is
    imported on the next system which routes the file via an RF (802.11
    ad-hoc network) to a system which routes it via AX.25 to a system that
    has a SLIP connection, which routes it via IP to a remote system ....

    What's more is that it doesn't matter what the file is. It can be a
    recipe or a GPG encrypted file or a video.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From meff@21:1/5 to Grant Taylor on Wed Mar 16 01:04:07 2022
    On 2022-03-16, Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    I think that NNCP is interesting. I do think that there is a
    possibility for UUCP to be relatively easily extended to support for GPG relatively easily.

    Yes from my understanding, this should be fairly trivial with UUCP as
    well. You can always pipe UUCP payloads to a verifier which drops
    unverified payloads.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Computer Nerd Kev@21:1/5 to Eli the Bearded on Wed Mar 16 12:18:50 2022
    Eli the Bearded <*@eli.users.panix.com> wrote:
    In comp.misc, Computer Nerd Kev <not@telling.you.invalid> wrote:
    I couldn't find a search "add-on" available for web searching with
    Yandex either, besides some little-used ones for image searching, so I
    don't think it's just been removed as a default option, but as an
    option altogether.

    Does Yandex have the opensearchdescription code in the page? If so, can
    you add it back using this old stardard method?

    https://www.ghacks.net/2016/11/10/how-to-add-custom-search-engines-to-your-web-browser/

    Checking, it seems yes, that would work. I see the green plus on my
    fairly recent Firefox for yandex.com.

    Not for me with v. 98.0. I even tried in a fresh profile in case
    one of my innumerable about:config customisations was stopping it.
    No "green plus icon in the search bar", nor any Yandex entry on the
    search configuration page, after loading www.yandex.com.
    -- Scratch that, you need to _right_ _click_ on the search bar,
    then select "Add Yandex" from the drop-down menu. Now it works.
    But this is in the version before the one being discussed, so
    that's to be expected.

    I only ever knew of clicking the (poorly functional) "Find more
    search engines" link at the bottom of the search config page
    and sorting through all the non-search extensions to find (or
    in the case of what was looking for to replace the about:config
    string that I used to use, not find - because I wanted extra
    parameters) an "extension" to add one. eg. https://addons.mozilla.org/en-US/firefox/addon/ddg-lite-search-provider/

    I'm guessing Yandex used to have something like that there. Or
    maybe not if everyone else knows to do it "your" way...

    Anyway supposably they only removed Yandex etc. from the search
    options in the very latest release: 91.7.1 for ESR and 98.0.1
    for the regular releases. So if you're only using a "fairly recent
    Firefox", then this doesn't apply yet.

    --
    __ __
    #_ < |\| |< _#

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to meff on Tue Mar 15 22:35:59 2022
    On 3/15/22 7:04 PM, meff wrote:
    Yes from my understanding, this should be fairly trivial with UUCP
    as well. You can always pipe UUCP payloads to a verifier which drops unverified payloads.

    Yep.

    uux makes it even easier. STDOUT of the sending side into uux which
    will send that into the STDIN of gpg on the receiving side. :-D



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to email@example.com on Wed Mar 16 15:06:07 2022
    In article <BwVXJ.184493$SeK9.24445@fx97.iad>, meff <email@example.com> wrote: >On 2022-03-13, Eric Pozharski <whynot@pozharski.name> wrote:
    gtaylor@, please stop beating this dead horse. It becomes painful
    (horse doesn't mind, it's already dead).

    I was too young during the BBS days to use a BBS, but I generally hold
    the opinion that those who are ignorant of history are doomed to
    repeat it. I think documenting FTN would be a good exercise if
    anything to help ambitious folks not recreate some of its foibiles in
    modern IP networks.

    Well, there's http://ftsc.org/, which archives most of the
    standards.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to gtaylor@tnetconsulting.net on Wed Mar 16 15:03:17 2022
    In article <t0r6vv$8rv$1@tncsrv09.home.tnetconsulting.net>,
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/14/22 8:24 AM, Dan Cross wrote:
    Good. Then could we please stop discussing the suitability of FTN
    for this kind of thing?

    Okay.

    IP is literally a store and forward networking protocol, though
    it could be configured to communicate only with directly
    connected hosts (ie, with no routing).

    IP is not a store and forward networking protocol.

    This is simply incorrect.

    There is no persistent storage for IP.

    First, whether or not there is "persistent storage" for IP
    datagrams transiting a network is an implementation detail.

    Second, there is no persistent storage requirement for some
    network to be based on store-and-forward techniques.

    Store-and-forward simply means that a logical "packet" of data
    is completely received via some intermediate node in the network
    before being forwarded to the next hop en route to the eventual
    destination.

    Buffers, which /may/ be used for a very
    short period of time are transient at best.

    IP functions as a transport mechanism between two endpoints that may or
    may not be directly connected to each other. The nature of how IP works >requires that all of the necessary routing segments be online and
    operational between two IP endpoints /at/ /the/ /same/ time.

    That's not true at all, either in theory or in practice.

    Segments go down all the time, and datagrams may be routed
    across any number of paths between two nodes. Further, the
    network may be completely partitioned for some period of time;
    IP could care less. If a path between nodes is re-established
    before some higher-level protocol times out, it doesn't matter.
    TCP connections have been known to remain in the "established"
    state for _days_ in the face of a partition.

    Conversely UUCP can easily exchange files without there ever being
    end-to-end connectivity at the same time. UUCP only requires that each
    pair of nodes be able to communicate and exchange files. A & B can
    exchange files while B can't talk to C. B & C can exchange files while
    B can't talk to A. A & C never have the ability to perform end-to-end >communications. This works perfectly fine with UUCP. IP will never
    suffice without something (like UUCP / FTN / MQueue / ftp / etc.) on top
    of it to exchange files.

    You seem to be conflating two related, but separate, things: the
    physical transport used in some network, and the protocols that
    use that transport. Here, one could usefully compare UUCP with
    SMTP and HTTP or something similar, and IP versus a data stream
    over a telephone line via e.g. a modem.

    B in this example could be a notebook / files on a flash drive / cd-rom
    / etc that is physically transported between A's location and C's location.

    Perhaps I naively assumed it was obvious from context, but the
    whole point of providing IP connectivity in this sort of
    scenario would be to support higher-level protocols like those
    mentioned above.

    [snip]
    What would this hypothetical network be used for, otherwise?

    non-real-time communications; email, file transfer, etc.

    Technically you could request web pages through it. Though the latency
    would be ... painful. This would work through multiple out and back
    cycles and / or out, package, and back cycle where the packaging deduces
    the necessary supporting files (image, CSS, etc.) in support of the
    requested file / page.

    You misunderstand me. What would be the point of this network?

    If I may be blunt, you're fixating on specific technologies and
    their hypothetical potential to "communicate" without
    considering why people might want to use them or how they'd like
    to communicate. That's not terribly useful.

    So does UUCP/FTN/whatever else. For that matter, so does the PSTN.
    Those cell towers and copper pairs connect to something.

    The crux is that IP needs all the elements of the path to be up at the
    same time for end-to-end communications. Conversely UUCP only needs the
    path elements between adjacent nodes. (See the A - B - C example above.)

    See above.

    One generally needs digipeating for coverage, even in a geographically
    isolated area.

    Maybe. Probably.

    What if instead of digipeating the repeater node actually received the
    files a la. UUCP, stored them, and then forwarded them on to the next
    node. You end up breaking the A - B - C /multi-hop/ communications path
    into two /single-hop/ communications paths that don't need to be
    available at the same time.

    This single vs multi hop becomes more of an issue as you integrate more
    hops.

    This seems very confused.

    With modem-based communications of any kind, you need the
    receiving end to actually answer the phone. Since telephony
    systems are circuit-switched, that means that both ends and all
    intermediate steps within the phone system have to be online in
    order to establish a connection to exchange data. That those
    systems can then independently exchange data with other systems
    is irrelevant.

    Incidentally, this is also how AX.25 mailers pretty much already
    work. Here, you're simply avoiding the reliance on exiting
    infrastructure.

    AX.25 mailers can already do this.

    Fair enough.

    Substitute AX.25 in place of UUCP. Well save for the fact that AX.25 >equipment is more specialized than UUCP equipment.

    A $35 HT you can buy on Amazon and a rasperry pi is hardly
    "specialized". The software is trivial to install on the Linux
    distribution of your choice. In contrast, good luck finding a
    modem if you want to use a landline, and one hopes those burner
    phones have modems built in.

    So is a telephone exchange, which you have been arguing for pretty
    strenuously. This argument is not self-consistent with your earlier
    arguments.

    It depends on the scope of view and if things are mobile or not. The
    town that I'm from had three separate telephone exchanges. If any one
    of them became unavailable, it was not impossible to travel across town
    to another location serviced by a separate telephone exchange.

    Unless you get shot at doing so.

    If you want to consider the telephone exchange to be a link in A - B - C
    and expand it as such A - (eA)(eB) - B - (eB)(eC) - C.

    If A & B are on the same exchange and the exchange itself is down, then
    they are going to have a hard time using the phone to connect to each
    other. Fortunately there are other ways to get UUCP to communicate.

    ...such as?

    If A & B are on different exchanges, then perhaps the one on a dead
    exchange can move to a different exchange and be able to communicate
    with the other.

    Aside: Fortunately UUCP is not dependent on the source {address,phone >number, port} /by/ /default/. As such, if A or B can move to other >exchanges, they can quite likely connect and exchange files.

    ...and now you're back to this discovery issue. Phone numbers
    are tied to exchanges. If you wish to send data to B, and the
    exchange that B is connected to goes down, then B's number must
    change. How does A know what the new number is?

    Further aside: digipeating will have similar dependencies in that you
    will be reliant on A's transceiver, both of B's transceivers, and C's >transceiver all (four) being operational at the same time. Things only
    get worse as you add more hops.

    What you are ignoring here is that radio is inherently a
    broadcast medium. As such, any station that can hear A can
    repeat to C.

    As a technical aside, in the case of digipeating, since AX.25 is
    based on packet switching, which is store-and-forward, B only
    needs one transceiver.

    Besides, with IP connectivity, one could start to do things like have
    that VPS accessible via a VPN, or TOR, or....

    IP introduces more complexity and more vulnerability.

    You'll have to back that up with specifics.

    I'd love to hear examples of such BBSes that participate in FTN
    networks.

    I believe the contemporary Synchronet and / or Citadel are effectively >standard Unix / Linux packages that may gateway to FTN. I feel like
    there's another another major package that's effectively an FTN counter
    part to uucico, but I can't think of the name at the moment.

    Yes, but the context (which was removed) is that these do not do
    GPG.

    I find ftnapps/FTNd / ftncico on GitHub, but that's not what I'm trying
    to remember.

    ...are you referring to my digipeater thing here?

    Not specifically a digipeater per se. Just any small computer being
    used for whatever small computers are used for. Either system B being >physically carried between A and C in the example above, or the node >connected to the B transceiver to receive, store, and forward files via
    UUCP, or anything else you want.

    The context from you that I quoted was:

    Similarly, what is a notebook other than a small portable computer?
    What differentiates a notebook from a Raspberry Pi from a Pine64, etc?
    All of which can probably do the same job equally well. (Save for the >different power needs.)

    I did not understand (and still do not understand) your point
    here. Why would I want to use a notebook for a digipeater if I
    had something like a Raspberry Pi to hand?

    The Raspberry Pi would be preferable due to (presumably) power power
    draw than a notebook, and smaller form factor. The HCI hardware on
    a notebook tends to imply interactive use; something you probably
    don't want for a digipeater or whatever.

    Agreed.

    This are all false assumptions. I've been in a combat zone. What you
    are proposing is, simply, unrealistic.

    So ... is every single square kM of Ukraine under /active/ fighting /
    bullets flying?

    Those that are not can just continue what they've been doing and
    use the Internet, so for those, this is all a moot point. I
    thought we were talking about, effectively, clandestine networks
    for direct combat zones and occupied areas.

    My understanding is that there are hot spots / conflict zones in Ukraine
    as Russian troops move in. Thus the obvious battle fronts are a
    non-starter for anything tech wise. But I suspect that the areas on the >other side of Ukraine and behind the Russian front are both considerably >safer to move about than the active battle lines.

    I imagine that trying to "move around" as you describe behind
    Russian lines is actually quite difficult. Getting caught with
    a burner phone and a notebook running weird stuff is a good way
    to get detained and, given that this is the Russian army we're
    talking about, very likely shot once the counter intel people
    are done with you.

    Is any of that /easy/? Absolutely not. Is it impossible? I doubt it.
    Could sufficiently motivated people move about around outside of the
    active combat zone? I suspect so.

    Good luck. *shrug*

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Dan Cross on Wed Mar 16 15:56:57 2022
    On 3/16/22 9:03 AM, Dan Cross wrote:
    This is simply incorrect.

    Please name one implementation of the IP protocol (v4 or v6) that will
    store a packet, for at least multiple days, waiting for the next router
    or endpoint to be serviceable again.

    I'm explicitly talking about the IP protocol, not something that runs on
    top of it that will retry subsequent connections when the previous
    connection fails.

    First, whether or not there is "persistent storage" for IP datagrams transiting a network is an implementation detail.

    It is extremely germane detail.

    How is an IP system going to hold a packet for 14 days waiting on the
    next router or remote system becomes available? Especially without
    persistent storage and / or system reboots.

    What you are suggesting is that an IP router (B) will hold an IP packet
    from a different system (A) on it's way to yet another different system (C).

    Second, there is no persistent storage requirement for some network
    to be based on store-and-forward techniques.

    Store-and-forward simply means that a logical "packet" of data is
    completely received via some intermediate node in the network before
    being forwarded to the next hop en route to the eventual destination.

    How is a router going to store an IP packet for one or more weeks?

    That's not true at all, either in theory or in practice.

    I disagree.

    Consider the following scenario: End systems A and E want to
    communicate and the only physical and logical route is through the
    intermediary routers B, C, and D.

    [A]---[B]---[C]---[D]---[E]

    A and E can not establish end-to-end communications with each other
    without B and C and D being online and serviceable all at the same time
    that A and E want to communicate.

    With true store-and-forward, A and E can send messages / files to each
    other as long as the following happens.

    A generates messages / files to E

    [A]---[B] [C] [D] [E] A sends messages / files to B

    [A] [B]---[C] [D] [E] B sends messages / files to C

    [A] [B] [C]---[D] [E] C sends messages / files to D

    [A] [B] [C] [D]---[E] D sends messages / files to E

    E processes messages / files from A

    E generates messages / files to A

    [A] [B] [C] [D]---[E] E sends messages / files to D

    [A] [B] [C]---[D] [E] D sends messages / files to C

    [A] [B]---[C] [D] [E] C sends messages / files to B

    [A]---[B] [C] [D] [E] B sends messages / files to A

    A processes messages / files from E

    Notice how the only communications link that needs to be up at any given
    time -- all be it in successive sequences -- are the two communicating
    nodes.

    A is able to send a message to E and E is able to send a reply back to A
    over eight different cycles.

    Note how A and E have zero hope of ever establishing an IP connection
    with each other because there is no end-to-end connectivity between them.

    Segments go down all the time, and datagrams may be routed across
    any number of paths between two nodes.

    That is predicated on their being alternate routes. As established
    elsewhere in this thread, not all networks are flexible enough to allow
    the re-routing.

    Further, the network may be completely partitioned for some period of
    time;

    Yes.

    IP could care less.

    IP cares greatly if there is only one path A/B/C/D/E and some part of
    that path is always broken.

    If a path between nodes is re-established before some higher-level
    protocol times out, it doesn't matter.

    That is a really big if. The risk of said if becomes exponentially more
    risky as the number of digits in the number of seconds of the outage
    duration goes up.

    6 seconds, probably not a problem.
    60 seconds, may or may not be a problem.
    600 seconds, probably gong to be a problem.
    6000 seconds, almost certainly going to be a problem.
    60000 seconds, good luck

    TCP connections have been known to remain in the "established" state
    for _days_ in the face of a partition.

    That "established" state is extremely fragile. If either end tries to
    send one single byte, or even a heartbeat for a keep alive, while the end-to-end connectivity is lost, its a matter of time before the
    connection comes crashing down. Where the matter of time is a double,
    or at best triple, digit number of seconds.

    You seem to be conflating two related, but separate, things: the
    physical transport used in some network, and the protocols that use
    that transport. Here, one could usefully compare UUCP with SMTP
    and HTTP or something similar, and IP versus a data stream over a
    telephone line via e.g. a modem.

    I don't think so.

    SMTP and HTTP rely on underlying protocols, namely IP.

    UUCP provides it's own protocol and does not rely on any underlying
    protocols.

    Since both SMTP+IP and UUCP will require some physical link between
    systems A & B, I'm ignoring the particulars about it for the moment.

    Conceptually, at the 1,000 foot view, yes, UUCP / SMTP / HTTP move units
    of information. But we are discussing things at the 100 foot if not 10
    foot view. As such the differences between them are particularly important.

    Perhaps I naively assumed it was obvious from context, but the whole
    point of providing IP connectivity in this sort of scenario would be
    to support higher-level protocols like those mentioned above.

    I figured that's what you were striving for.

    I have naively assumed that A and E -- re-using my examples -- would be
    the SMTP / HTTP client & server and B, C, and D would be IP routers.

    Re-using my example, are you meaning that B, C, D, and E are SMTP / HTTP clients & servers too? Thus meaning that B, C, and D are actually not functioning as IP routers?

    You misunderstand me. What would be the point of this network?

    To exchange information.

    If I may be blunt, you're fixating on specific technologies and
    their hypothetical potential to "communicate" without considering
    why people might want to use them or how they'd like to communicate.
    That's not terribly useful.

    No, I'm not fixated on specific technologies. I'm fixated on specific
    features / capabilities. I have gravitated towards specific
    technologies that provide said features / capabilities.

    The ability to exchange messages is the fundamental goal. I believe
    that doing so is quite useful.

    See above.

    Indeed, see above. How are A and E going to communicate when there is
    no alternate path and the path between them always has at least one
    segment down.

    This seems very confused.

    I hope what I've outlined above with A, B, C, D, and E helps explain.

    With modem-based communications of any kind, you need the receiving
    end to actually answer the phone. Since telephony systems are circuit-switched, that means that both ends and all intermediate steps
    within the phone system have to be online in order to establish a
    connection to exchange data. That those systems can then independently exchange data with other systems is irrelevant.

    Incidentally, this is also how AX.25 mailers pretty much already work.
    Here, you're simply avoiding the reliance on exiting infrastructure.

    AX.25, as I understand it, would probably be a good comparison to what
    I'm describing with UUCP.

    The down side is that (historically) far fewer people had access to
    equipment necessary for AX.25 than did for UUCP.

    A $35 HT you can buy on Amazon and a rasperry pi is hardly
    "specialized". The software is trivial to install on the Linux
    distribution of your choice. In contrast, good luck finding a modem
    if you want to use a landline, and one hopes those burner phones have
    modems built in.

    Perhaps you touch on a point that relates to my (historically) comment
    above.

    Yes, an inexpensive HT and a mobile computer may be easier to order open
    market /today/. However I suspect that ordering something open market
    is antithetical to the environment that we're talking about.

    I still think that it's far more likely to find more modems in the
    environment that we're talking about than it is HTs.

    But as stated above, AX.25 and UUCP are mostly interchangeable in this scenario. If anything, chances are good that the inexpensive HTs that
    you're describing are going to be 2m / 440 or other relatively short
    distance communications, maybe across town. As such, you are going to
    be dependent one or more intermediate nodes.

    Unless you get shot at doing so.

    I consider the possibility of getting shot at to mean that you are too
    close to the active fighting.

    ...such as?

    AX.25, null modem / IrDA if physically close enough, LoRA, sneaker net.

    ...and now you're back to this discovery issue. Phone numbers are
    tied to exchanges. If you wish to send data to B, and the exchange
    that B is connected to goes down, then B's number must change.

    Sure.

    There are all sorts of covert communications. I leave that to your imagination.

    How does A know what the new number is?

    Thankfully, do to how UUCP operates, A doesn't /need/ to know B's new
    number to communicate. B can call A, authenticate, and exchange
    information just as if A had called B. Part of what's exchanged can be
    a message from B's operator to A's operator saying "I'm now at phone
    number ...".

    What you are ignoring here is that radio is inherently a broadcast
    medium.

    No, I'm not ignoring that.

    As such, any station that can hear A can repeat to C.

    No, that is not the case.

    [Z]))) ((([A]))) ((([B]))) ((([C]

    Z can hear A's broadcast, but Z can't repeat to C.

    RF broadcasts are mostly nice, but they do have some side effects.
    Besides the obvious of giving away your position, they also have the
    problem of distance and geography.

    In my state, there are many mountain valleys where the linear / daisy
    chain scenario that I'm describing is quite common. Even adjacent
    valleys tend to have to follow the daisy chain to a common point.

    Cross valley communications at peaks is problematic for a number of geographical reasons. Either it's difficult to clime the thousand(s) of
    feet, or it's a sensitive point of failure / attack.

    The point being that it is realistic to have the daisy chained
    communications path.

    As a technical aside, in the case of digipeating,
    I get the impression that we aren't using the same definition for "digipeating".

    To me, "digipeating" is a digital mode where two (digital) stations (A &
    C) are communicating with each other through the repeater (B). Wherein
    the repeater is receiving traffic from one station (A) and repeating it
    to the other station (C) in real time as if the output of B's A side transceiver is connected to the input of B's C side transceiver. --
    This is an end-to-end network which requires that A, B, and C all be
    online and operating at the same time.

    Conversely, UUCP, or AX.25, one station (A) sends to the intermediate
    system (B), independent of the operational state of the other station
    (C). Subsequently, the intermediate system (B) sends to the destination
    system (C), independent of the operational state of the other station
    (A). -- This is a store-and-forward network which only requires
    directly communicating systems to be operational at the same time.

    since AX.25 is based on packet switching, which is store-and-forward,
    B only needs one transceiver.

    Yes! Hence the beauty of store-and-forward communications.

    You'll have to back that up with specifics.

    Not the least of which is addressing complexities.

    Dependency on end-to-end IP connectivity.

    VPN encryption key distribution is probably exponentially more complex
    than addressing complexities. How do you make sure that the people that
    /need/ the keys have them while ensuring that the people that shouldn't
    have the keys don't?

    Tor will compound things by introducing even more dependencies on
    external entities. The bandwidth and latency issues with passing
    through multiple independent Tor nodes ....

    Yes, but the context (which was removed) is that these do not do GPG.

    I question the veracity of the intention of your statement.

    Technically, no, they don't have GPG as an integral part of their functionality. However they can easily exchange (ASCII armored) GPG
    encrypted messages.

    The same can be said about UUCP, AX.25*, FTN, and even SMTP & HTTP(S).

    AX.25 could be viewed as even more of a sticky wicket in that licenses
    tend to prohibit encryption of any type. But if we're flaunting
    licenses anyway....

    I did not understand (and still do not understand) your point here.
    Why would I want to use a notebook for a digipeater if I had something
    like a Raspberry Pi to hand?

    If you have a Raspberry Pi on hand and want to use it, then by all means
    do so.

    If you don't have a Raspberry Pi on hand and you do have an old
    notebook, then I'd suggest using the old notebook verses doing without
    the digipeater.

    Those that are not can just continue what they've been doing and
    use the Internet, so for those, this is all a moot point. I thought
    we were talking about, effectively, clandestine networks for direct
    combat zones and occupied areas.

    Depending on the amount of damage done in combat zones, there is a
    chance that the traditional networks no longer function.

    I imagine that trying to "move around" as you describe behind Russian
    lines is actually quite difficult. Getting caught with a burner phone
    and a notebook running weird stuff is a good way to get detained and,
    given that this is the Russian army we're talking about, very likely
    shot once the counter intel people are done with you.

    That is a distinct possibility.

    One of the nice things about UUCP is that you can carry files between
    computers via sneaker net. Thus you don't have the burner phone or
    computer. If people wanted to, they could put files on a micro SD card, swallow it, travel, wait for the inevitable, read the files off on the
    other end.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to gtaylor@tnetconsulting.net on Thu Mar 17 14:50:11 2022
    In article <t0tmeg$ut1$1@tncsrv09.home.tnetconsulting.net>,
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/16/22 9:03 AM, Dan Cross wrote:
    This is simply incorrect.

    Please name one implementation of the IP protocol (v4 or v6) that will
    store a packet, for at least multiple days, waiting for the next router
    or endpoint to be serviceable again.

    I'm explicitly talking about the IP protocol, not something that runs on
    top of it that will retry subsequent connections when the previous
    connection fails.

    That's irrelevant. You are factually incorrect about the
    definition of a store-and-forward protocol.

    First, whether or not there is "persistent storage" for IP datagrams
    transiting a network is an implementation detail.

    It is extremely germane detail.

    How is an IP system going to hold a packet for 14 days waiting on the
    next router or remote system becomes available? Especially without >persistent storage and / or system reboots.

    What you are suggesting is that an IP router (B) will hold an IP packet
    from a different system (A) on it's way to yet another different system (C).

    No, that is not at all what I am suggesting.

    You have, bluntly, subscribed to a definition of what
    "store-and-forward" means that is just wrong.

    The rest of what you wrote, based on your incorrect assumptions,
    is irrelevant.

    Second, there is no persistent storage requirement for some network
    to be based on store-and-forward techniques.

    Store-and-forward simply means that a logical "packet" of data is
    completely received via some intermediate node in the network before
    being forwarded to the next hop en route to the eventual destination.

    How is a router going to store an IP packet for one or more weeks?

    Irrelevant based on incorrect assumptions.

    That's not true at all, either in theory or in practice.

    I disagree.

    You can disagree all you want, but that doesn't change reality.

    [deleted a bunch of hypotheticals based on false assumptions]

    Note how A and E have zero hope of ever establishing an IP connection

    IP is not connection-oriented.

    [deleted more incorrect stuff]

    If a path between nodes is re-established before some higher-level
    protocol times out, it doesn't matter.

    That is a really big if.

    This happens all the time, every day. It's one of the
    foundational design principles of the Internet.

    [deleted more incorrect stuff]
    You seem to be conflating two related, but separate, things: the
    physical transport used in some network, and the protocols that use
    that transport. Here, one could usefully compare UUCP with SMTP
    and HTTP or something similar, and IP versus a data stream over a
    telephone line via e.g. a modem.

    I don't think so.

    Again, you can disagree, but that doesn't make you right.

    SMTP and HTTP rely on underlying protocols, namely IP.

    Yes. And usually TCP.

    UUCP provides it's own protocol and does not rely on any underlying >protocols.

    This is trivially incorrect. UUCP relies on some kind of
    transport: either TCP/IP if transiting over the Internet, or
    some kind of data stream provided by a modem or similar device
    (or any number of other potential transports, but let's make it
    easy on ourselves). That data stream runs over something like
    an analog phone line.

    How do you suppose those work, if not being based on
    "underlying protocols"?

    Since both SMTP+IP and UUCP will require some physical link between
    systems A & B, I'm ignoring the particulars about it for the moment.

    Which is why your arguments throughout this thread fall have not
    held.

    [snip]
    Re-using my example, are you meaning that B, C, D, and E are SMTP / HTTP >clients & servers too? Thus meaning that B, C, and D are actually not >functioning as IP routers?

    If two nodes in an internetwork want to exchange data, they
    first agree on some protocol to do so; let's assume HTTP as an
    example. Further, let's assume its usual configuration of
    sending that data via TCP/IP. To send data via HTTP, one first
    creates a TCP connection, which is a logical abstraction, which
    relies on transferring IP datagrams between the two nodes.

    Those datagrams can be routed by a number of intermediate
    routers along any available path between those two nodes. At
    each such "hop", the datagram is read and buffered (stored),
    examined for errors, and then (usually) forwarded towards the
    intended destination by that router according to its internal
    routing tables: this is what "store-and-forward" means.

    Note that it has nothing inherently to do with persistent
    storage.

    Once the connection is established (standard SYN, SYN-ACK, ACK
    "three-way handshake"), the higher-level protocol transfers
    data in accordance with its semantics. The TCP will break up
    the data stream produced by HTTP into "segments" that are
    transferred via IP datagrams; again, these can be routed along
    any viable path between the nodes. Once the two endpoints are
    done with the exchange, they (usually) tear down the underlying
    TCP connection. The implication is that the connection is
    resillient in the face of intermediate failures while the
    connection is established, given a sufficiently robust
    underlying networkd, and the endpoints are oblivious of
    intermediate failures while not actively exchanging data.

    In the case of the Internet, we generally have a very robust
    underlying network. In a conflict sort of scenario, the
    challenge would be to provide that robust substrate. This can
    be done by any number of means; for instance, one could even
    layer IP on top of AX.25 (this is commonly done in the amateur
    radio community), or use more robust protocols like ARNGLL (https://github.com/arngll/) over RF (note: we're still working
    on ARNGLL).

    Note that the establishment of the TCP connection is
    conceptually similar to the establishment of a circuit in a
    switched network, like the PSTN: mostly these days, that means
    a protocol like SS7 once you get past the copper loop to the
    end DCE (for, e.g., a landline "POTS" telephone). Transfer of
    data using a higher level protocol, like any number of UUCP
    protocols (g-, f-, t-; whatever) are much more conceptually
    closer to HTTP.

    Unlike with IP, the ability to build ad-hoc telephony networks
    is rather more limited, since they are much more specialized.
    It's unclear why one would prefer something like that to IP
    anyway.

    You misunderstand me. What would be the point of this network?

    To exchange information.

    To what end? This is critical. See below.

    If I may be blunt, you're fixating on specific technologies and
    their hypothetical potential to "communicate" without considering
    why people might want to use them or how they'd like to communicate.
    That's not terribly useful.

    No, I'm not fixated on specific technologies. I'm fixated on specific >features / capabilities. I have gravitated towards specific
    technologies that provide said features / capabilities.

    The ability to exchange messages is the fundamental goal. I believe
    that doing so is quite useful.

    Yes, but you haven't articulated the parameters around which you
    would like this to be used. The ability to communicate is
    useful only insofar as the participants in the communication
    actually have useful data to exchange. Two people coming up
    with some elaborate protocol to drive to coffee shops and dial
    up different phone numbers with netbook computers could just
    talk on the phone, or meet in a park. Or do SLIP or PPP over
    that dialup connection.

    See above.

    Indeed, see above. How are A and E going to communicate when there is
    no alternate path and the path between them always has at least one
    segment down.

    They're obviously not; the same as with any communications
    mechanism. The same would be true of telephony switching, or
    jammed (or just out of range) RF, or for message couriers if all
    the physical routes beteen A and E were destroyed or impractical
    to use.

    So you've constructed a strawman to prove a non-sequitur. But
    so what?

    This seems very confused.

    I hope what I've outlined above with A, B, C, D, and E helps explain.

    No sorry; if anything, that seemed to be based on some pretty
    fundamental misunderstandings of the underlying technology.

    With modem-based communications of any kind, you need the receiving
    end to actually answer the phone. Since telephony systems are
    circuit-switched, that means that both ends and all intermediate steps
    within the phone system have to be online in order to establish a
    connection to exchange data. That those systems can then independently
    exchange data with other systems is irrelevant.

    Incidentally, this is also how AX.25 mailers pretty much already work.
    Here, you're simply avoiding the reliance on exiting infrastructure.

    AX.25, as I understand it, would probably be a good comparison to what
    I'm describing with UUCP.

    The down side is that (historically) far fewer people had access to
    equipment necessary for AX.25 than did for UUCP.

    The Russian army is literally running around with cheap HTs of
    the kind I'm suggesting buying off of Amazon.

    A $35 HT you can buy on Amazon and a rasperry pi is hardly
    "specialized". The software is trivial to install on the Linux
    distribution of your choice. In contrast, good luck finding a modem
    if you want to use a landline, and one hopes those burner phones have
    modems built in.

    Perhaps you touch on a point that relates to my (historically) comment
    above.

    Yes, an inexpensive HT and a mobile computer may be easier to order open >market /today/. However I suspect that ordering something open market
    is antithetical to the environment that we're talking about.

    But you're advocating burner phones and notebooks using UUCP.
    In the sort of environment we're talking about, where do you
    suppose you're going to find those?

    I still think that it's far more likely to find more modems in the >environment that we're talking about than it is HTs.

    Again, you may believe that, but that doesn't mean that's the
    reality.

    But as stated above, AX.25 and UUCP are mostly interchangeable in this >scenario. If anything, chances are good that the inexpensive HTs that
    you're describing are going to be 2m / 440 or other relatively short
    distance communications, maybe across town. As such, you are going to
    be dependent one or more intermediate nodes.

    How, precisely, do you think that cell phones work?

    Unless you get shot at doing so.

    I consider the possibility of getting shot at to mean that you are too
    close to the active fighting.

    Then what is this communications network you are proposing to be
    used for? "Russian T-72 in the open north of bridge" or "troops
    bivouaced in treeline 5km west of landmark" are pretty dang
    useful in "active fighting".

    ...such as?

    AX.25, null modem / IrDA if physically close enough, LoRA, sneaker net.

    Why not just throw WiFi in the loop and use TCP/IP and call it a
    day?

    Interestingly, these are all protocols that would also support
    IP. Furthermore, they're all protocols; something you said
    above was not needed for UUCP because UUCP has its own
    protocols.

    ...and now you're back to this discovery issue. Phone numbers are
    tied to exchanges. If you wish to send data to B, and the exchange
    that B is connected to goes down, then B's number must change.

    Sure.

    There are all sorts of covert communications. I leave that to your >imagination.

    But that's the central technical challenge _you_ need to solve
    if these hypotheticals you've been throwing around are to
    actually be useful.

    How does A know what the new number is?

    Thankfully, do to how UUCP operates, A doesn't /need/ to know B's new
    number to communicate. B can call A, authenticate, and exchange
    information just as if A had called B.

    Part of what's exchanged can be
    a message from B's operator to A's operator saying "I'm now at phone
    number ...".

    But the numbers are changing all the time. Suppose A's number
    changed at the same time as B's. Suppose B doesn't have access
    to an exchange at all. Suppose A isn't in the coffee shop with
    the modem ready to answer when B tries to call. Suppose....

    These are _all_ problems you _have_ to solve to realize any sort
    of useful communications network.

    What you are ignoring here is that radio is inherently a broadcast
    medium.

    No, I'm not ignoring that.

    You keep focusing on linear paths between stations and
    constructing hypotheticals around that. Once you get over this
    fixation on "paths", and you can start thinking about creating
    other, more robust topologies.

    As such, any station that can hear A can repeat to C.

    No, that is not the case.

    [Z]))) ((([A]))) ((([B]))) ((([C]

    Z can hear A's broadcast, but Z can't repeat to C.

    You're taking a statement too literally. Perhaps I should have
    written, "can potentially repeat to...". I naively assumed that
    was clear from context.

    Furthermore, unlike in wired networks, nothing prohibits the
    introduction of a new node (call it "D") that may in range of
    both Z and C.

    I suppose now you will construct some scenario based on
    geography that precludes such a configuration, which would be a
    profound misreading of the point that RF-based networks can be
    mesh-oriented and hence very flexible.

    RF broadcasts are mostly nice, but they do have some side effects.
    Besides the obvious of giving away your position, they also have the
    problem of distance and geography.

    That's why I mentioned digipeating for coverage initially.

    In my state, there are many mountain valleys where the linear / daisy
    chain scenario that I'm describing is quite common. Even adjacent
    valleys tend to have to follow the daisy chain to a common point.

    Cross valley communications at peaks is problematic for a number of >geographical reasons. Either it's difficult to clime the thousand(s) of >feet, or it's a sensitive point of failure / attack.

    You mean like a telephone exchange? How would a telephony-based
    approach be any less vulnerable in that sort of scenario?

    As for being hard, well, war is hell man.

    The point being that it is realistic to have the daisy chained
    communications path.

    Sounds like a problem for every other potential comms plan as
    well. This is why military communicators, emergency services,
    and amateur radio operators plan for redundancy in their
    topologies.

    As a technical aside, in the case of digipeating,
    I get the impression that we aren't using the same definition for >"digipeating".

    To me, "digipeating" is a digital mode where two (digital) stations (A &
    C) are communicating with each other through the repeater (B). Wherein
    the repeater is receiving traffic from one station (A) and repeating it
    to the other station (C) in real time as if the output of B's A side >transceiver is connected to the input of B's C side transceiver. --
    This is an end-to-end network which requires that A, B, and C all be
    online and operating at the same time.

    That's incorrect. A digipeater in an AX.25 context is a
    store-and-forward thing; it reads a packet, buffers it, and then
    retransmits it, often on the same frequency, though
    multifrequency (and even cross-band) digipeaters do exist.

    Digipeaters are often used in the same way that repeaters are in
    e.g. FM phone communications; one uses them to boost range, not
    necessarily to create complex network topologies.

    There are also digipeaters already on amateur-radio carrying
    satellites, and the ISS. And yes, they can be used with the
    same cheap HTs I'm describing. So you don't even necessarily
    need to set anything up yourself.

    APRS can already gateway to twitter and SMS.

    Conversely, UUCP, or AX.25, one station (A) sends to the intermediate
    system (B), independent of the operational state of the other station
    (C). Subsequently, the intermediate system (B) sends to the destination >system (C), independent of the operational state of the other station
    (A). -- This is a store-and-forward network which only requires
    directly communicating systems to be operational at the same time.

    You're using AX.25 in the example you just used to argue against
    AX.25.

    since AX.25 is based on packet switching, which is store-and-forward,
    B only needs one transceiver.

    Yes! Hence the beauty of store-and-forward communications.

    It's somewhat odd that you seem to understand that AX.25 is a
    store-and-forward protocol, but assert that IP is not.

    You'll have to back that up with specifics.

    Not the least of which is addressing complexities.

    Such as?

    Dependency on end-to-end IP connectivity.

    How is that any different than any other communications
    protocol?

    VPN encryption key distribution is probably exponentially more complex
    than addressing complexities. How do you make sure that the people that >/need/ the keys have them while ensuring that the people that shouldn't
    have the keys don't?

    Techniques for this are well-understood and used daily.

    Tor will compound things by introducing even more dependencies on
    external entities. The bandwidth and latency issues with passing
    through multiple independent Tor nodes ....

    That's vague and unspecific, and "bandwidth" and "latency" are
    obviously a problem if using low-bandwidth dialup connections.

    Is the point to usefully communicate or surf the web?

    More generally, you made two specific assertions:

    IP introduces more complexity and more vulnerability.

    I asked for specifics, but you did not provide them. Vague
    hand-wavey answers just repeating the assertions do not count.

    Yes, but the context (which was removed) is that these do not do GPG.

    I question the veracity of the intention of your statement.

    Ok.

    Technically, no, they don't have GPG as an integral part of their >functionality. However they can easily exchange (ASCII armored) GPG >encrypted messages.

    The same can be said about UUCP, AX.25*, FTN, and even SMTP & HTTP(S).

    Any number of MUAs that can be used with UUCP/SMTP support GPG.
    Extant BBS packages supporting FTN just don't. Why go with a
    more complex solution with a simpler one, that fits the
    application domain better anyway, already exists? Just because
    you *can* do a thing doesn't mean that it's a good idea to *do
    that thing*, and "BBSes" in the sense usually inferred when
    discussing FTNs are a poor fit for this sort of thing.

    It's really that simple.

    AX.25 could be viewed as even more of a sticky wicket in that licenses
    tend to prohibit encryption of any type. But if we're flaunting
    licenses anyway....

    In an emergency situation like we are presently seeing in
    Ukraine, those restrictions basically go out the window. Pretty
    much every licensing authority on the planet is agreed on this
    point: if you're out hiking and grandpa has a stroke, you the
    unlicensed kid can absolutely use that HT to call for help.

    Similarly, if you are resisting a foreign invasion, I think the
    relevant authorities will give you a pass after the fact for
    using crypto on amateur frequencies.

    I did not understand (and still do not understand) your point here.
    Why would I want to use a notebook for a digipeater if I had something
    like a Raspberry Pi to hand?

    If you have a Raspberry Pi on hand and want to use it, then by all means
    do so.

    If you don't have a Raspberry Pi on hand and you do have an old
    notebook, then I'd suggest using the old notebook verses doing without
    the digipeater.

    Uh, ok. But your statement was,

    Similarly, what is a notebook other than a small portable computer?
    What differentiates a notebook from a Raspberry Pi from a Pine64, etc?
    All of which can probably do the same job equally well. (Save for the >different power needs.)

    Which was in response to me writing:

    As I mentioned above, to use a BBS for that, you need BBS software that
    does it, which isn't super common. On the other hand, today one could
    throw together a cheap Linux install on a Raspberry Pi with UUCP, GPG,
    and mutt and make it work with as it would take to configure a BBS.

    How is that relevant to the above?

    Those that are not can just continue what they've been doing and
    use the Internet, so for those, this is all a moot point. I thought
    we were talking about, effectively, clandestine networks for direct
    combat zones and occupied areas.

    Depending on the amount of damage done in combat zones, there is a
    chance that the traditional networks no longer function.

    Which is why you probably don't want to base your solution on
    relying on those.

    I imagine that trying to "move around" as you describe behind Russian
    lines is actually quite difficult. Getting caught with a burner phone
    and a notebook running weird stuff is a good way to get detained and,
    given that this is the Russian army we're talking about, very likely
    shot once the counter intel people are done with you.

    That is a distinct possibility.

    One of the nice things about UUCP is that you can carry files between >computers via sneaker net. Thus you don't have the burner phone or
    computer. If people wanted to, they could put files on a micro SD card, >swallow it, travel, wait for the inevitable, read the files off on the
    other end.

    You could just do that with a filesystem on the SD card. But
    often in situations like this, the movement of people is
    restricted outside of a geographical area, for precisely this
    sort of thing. Muling SD cards through the digestive track may
    sound all kinds of cool, but isn't really useful if you can't
    get to some place where someone who can consume the data is,
    anyway.

    Let me be clear about what I've been saying in this thread, as
    it appears to have been muddled:

    * IP is a good protocol on which to base a clandestine
    communications network in an occupied or active conflict
    situation.
    * The PSTN, and telephony in general, is not a viable
    alternative to IP networks in this context.
    * BBSes and FTN are poorly suited and best avoided.
    * UUCP is acceptable, but has limitations related to the
    underlying transport; this transport issue cannot be ignored.
    * Packet radio using e.g. AX.25 or APRS is probably the simplest
    and most robust mechanism for establishing a communications
    channel. Noteably, one can use TCP/IP over AX.25.
    * Unattended, cheap, throw-away digipeaters can be used to
    extend range and coverage.
    * In this sort of scenario, it is important to focus not so much
    on the technology but on the use cases and environment. The
    details, and getting them right, is critical to effective and
    useful communications.

    Constructing strawmen to prove a technical point isn't really
    all that interesting to me.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Eric Pozharski@21:1/5 to Grant Taylor on Thu Mar 17 17:11:47 2022
    with <t0r75v$8rv$2@tncsrv09.home.tnetconsulting.net> Grant Taylor wrote:
    On 3/12/22 5:57 AM, Eric Pozharski wrote:

    You two are avoiding one significant point of the puzzle. UUCP is
    fine to move articles and files around. It doesn't handle
    subscription.
    Please elaborate on what you mean by "subscriptions" in this context.

    (Well, seems like you can't stop beating this dead hosrse.) Anyway, The
    Apeal is about experience. Here how it looks like, most elaborate
    example.

    Wanabe Sysop (aka a Point, aka FTN-Compatible Sysop) sends netmail to
    their Boss (aka Sysop) with To set to special AreaFix nick (nicks are arbitrary, routing is concerned with addresses) with a line '%AVAIL'.
    Then waits.

    Meanwhile, AreaFix (at the Boss) sends '%AVAIL' requests to AreaFix'es
    to all its peers. Then waits.

    Eventually, replies from peers are somehow pressed into something that
    roughly may be interpreted as a reply.

    Then the Point receives more or less (mostly more) copious list of
    echos. Now comes most exciting part. The Point goes through couple of thousands of malformed lines. And they must be careful what they pick
    -- there are echos sources from different networks, regions, and zones (potential to cause fatal drama (potentianlly, international); such
    drama will be fatal to the Point, because noone gives a fsck about
    points), unreachable (physically) flea markets, and echos some bosses
    keep to deal with their points. When desired echos are picked, then
    list is sent to the AreaFix again. Then Point waits.

    Now the Areafix sends subscription requests to its peers, and then
    waits.

    Then, eventually, a message comes through this creates echo locally thus enabling the Point to achieve The Conversion Experience. However,
    sometimes initiating message never comes (like I can see FTN traffic in
    Usenet, subscription succeeds (I can verify, I'm subscribed), and
    nothing happens).

    If you don't see experience, then I don't know what experience is.

    Something alike is FileEcho's (different robot -- 'FileFix', and
    somewhat different mechanics). However, I hadn't no ability then
    reasons then chance to use it (for many different reasons), thus I
    can't describe it myself.

    I believe that something like news server exchanging things via UUCP
    would provide /a/ subscription type model. What I'm not sure of is if
    it would match what you mean by subscriptions in this context.

    Well, looking how this thread is developing I'll better abstain.

    --
    Torvalds' goal for Linux is very simple: World Domination
    Stallman's goal for GNU is even simpler: Freedom

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Eric Pozharski@21:1/5 to All on Thu Mar 17 17:17:13 2022
    *CUT*

    Guys, this isn't healty. Consider redoing all this ping-pong in OSI
    model.

    --
    Torvalds' goal for Linux is very simple: World Domination
    Stallman's goal for GNU is even simpler: Freedom

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From meff@21:1/5 to Dan Cross on Thu Mar 17 21:53:26 2022
    On 2022-03-17, Dan Cross <cross@spitfire.i.gajendra.net> wrote:
    Let me be clear about what I've been saying in this thread, as
    it appears to have been muddled:

    * IP is a good protocol on which to base a clandestine
    communications network in an occupied or active conflict
    situation.
    * The PSTN, and telephony in general, is not a viable
    alternative to IP networks in this context.
    * BBSes and FTN are poorly suited and best avoided.
    * UUCP is acceptable, but has limitations related to the
    underlying transport; this transport issue cannot be ignored.
    * Packet radio using e.g. AX.25 or APRS is probably the simplest
    and most robust mechanism for establishing a communications
    channel. Noteably, one can use TCP/IP over AX.25.
    * Unattended, cheap, throw-away digipeaters can be used to
    extend range and coverage.
    * In this sort of scenario, it is important to focus not so much
    on the technology but on the use cases and environment. The
    details, and getting them right, is critical to effective and
    useful communications.

    Indeed and now that I think about it, offering PPP over a link and
    then sending your message to a mailserver over SMTP/IP is a very
    simple thing to do in the hypothetical situation both of you have been discussing. That way you can still use your Raspberry Pi or laptop's
    MUA to send mail and then have the MTA deal with the long-term storage
    and forwarding.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to meff on Thu Mar 17 16:47:03 2022
    On 3/17/22 3:53 PM, meff wrote:
    Indeed and now that I think about it, offering PPP over a link and
    then sending your message to a mailserver over SMTP/IP is a very
    simple thing to do in the hypothetical situation both of you have been discussing. That way you can still use your Raspberry Pi or laptop's
    MUA to send mail and then have the MTA deal with the long-term storage
    and forwarding.

    Yes, having an SMTP server (or comparable functionality) on each side of
    a physical link (SLIP / PPP / UUCP / AX.25 / IrDA / etc.) is a viable
    option.

    The SMTP server actively receives the message, take responsibility for
    it, and will ((RFC) SHOULD persistently) store the message until it can
    pass the message to the next system in the link.

    Node A can use SMTP to send a message to node B. Where in node B will
    hold onto the message until some point in the future when node C is
    available at which point node B will send the message to node C. Thus
    node A has communicated with node C even though they were never online
    at the same time.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Dan Cross on Thu Mar 17 16:41:56 2022
    On 3/17/22 8:50 AM, Dan Cross wrote:
    That's irrelevant. You are factually incorrect about the
    definition of a store-and-forward protocol.

    Why don't you share the definition that you're using for store-and-forward.

    I'm using the following definition for store-and-forward networking:
    Something receives a message from a sender, stores it for some (possibly indeterminate) amount of time, and then sends it to the next system in
    the path at some point in the future.

    IP is not connection-oriented.

    Pick any higher transport layer protocol that want and it will still
    fail to establish communications when there is not an end to end path
    for IP to take.

    This happens all the time, every day. It's one of the
    foundational design principles of the Internet.

    There are many connections that fail to establish or die on a daily
    basis too.

    This is trivially incorrect. UUCP relies on some kind of
    transport: either TCP/IP if transiting over the Internet, or
    some kind of data stream provided by a modem or similar device
    (or any number of other potential transports, but let's make it
    easy on ourselves).

    UUCP provides it's own protocol that rides on the underlying physical
    serial port transport; be it null modem cable or modem or IrDA. There
    is nothing that interposes itself between UUCP and what UUCP sees as the physical hardware.

    That data stream runs over something like an analog phone line.

    How do you suppose those work, if not being based on
    "underlying protocols"?

    Both UUCP and IP are going to have the same requirement for some
    physical connection and the associated physical signaling. Ergo the
    same variables can be eliminated from both sides of the equation.

    Those datagrams can be routed by a number of intermediate
    routers along any available path between those two nodes. At
    each such "hop", the datagram is read and buffered (stored),
    examined for errors, and then (usually) forwarded towards the
    intended destination by that router according to its internal
    routing tables: this is what "store-and-forward" means.

    Note that it has nothing inherently to do with persistent
    storage.

    And what does the router do with the packets if the next hop is offline
    for an extended period of time (> 300 seconds)? It drops them.

    Once the connection is established (standard SYN, SYN-ACK, ACK
    "three-way handshake"), the higher-level protocol transfers
    data in accordance with its semantics.

    And what happens when there is no end-to-end path for the end systems to establish a connection?

    The implication is that the connection is resillient in
    the face of intermediate failures while the connection is established,
    given a sufficiently robust underlying networkd, and the endpoints are oblivious of intermediate failures while not actively exchanging data.

    That is predicated on a robust underlying layer. Which I've explicitly
    stated does not exist in the examples that I've provided.

    In the case of the Internet, we generally have a very robust
    underlying network. In a conflict sort of scenario, the
    challenge would be to provide that robust substrate. This can
    be done by any number of means; for instance, one could even
    layer IP on top of AX.25 (this is commonly done in the amateur
    radio community), or use more robust protocols like ARNGLL (https://github.com/arngll/) over RF (note: we're still working
    on ARNGLL).

    This too is predicated on the ability to establish multiple paths. (See
    my prior statement.)

    Note that the establishment of the TCP connection is
    conceptually similar to the establishment of a circuit in a
    switched network, like the PSTN:

    TCP, like the PSTN, is dependent on a path from end system (A) and the destination system (E). If any one (or more) of the links is down the
    TCP connection / PSTN switched circuit can't be established.

    Yes, but you haven't articulated the parameters around which you
    would like this to be used. The ability to communicate is
    useful only insofar as the participants in the communication
    actually have useful data to exchange. Two people coming up
    with some elaborate protocol to drive to coffee shops and dial
    up different phone numbers with netbook computers could just
    talk on the phone, or meet in a park. Or do SLIP or PPP over
    that dialup connection.

    Talking, be it on the phone or in person, is a poor communications
    medium, especially if you need to exchange many pieces of information.
    This is compounded by the desire / need to exchange other types of data, images, programs, audio recordings, etc. which are in electronic
    formats. UUCP, SLIP, or PPP are much better at that.

    SLIP or PPP can be used ad-hoc as you suggest. However that will not
    provide end-to-end connectivity between A and E. SLIP and PPP will be
    much more akin to the node to node to node connection that UUCP will
    provide.

    No sorry; if anything, that seemed to be based on some pretty
    fundamental misunderstandings of the underlying technology.

    Please elaborate.

    The Russian army is literally running around with cheap HTs of
    the kind I'm suggesting buying off of Amazon.

    What does what the Russian army is using have to do with what citizens
    will be able to get their hands on? Or are you suggesting that they get
    them from the Russian army?

    But you're advocating burner phones and notebooks using UUCP.
    In the sort of environment we're talking about, where do you
    suppose you're going to find those?

    I expect that there are (or were) many such burner phones in region already.

    I'm able to buy burner phones or SIM cards from most gas stations. As
    such, I'm expecting that there are (or were) many similarly available in
    the area.

    With this in mind, I suspect that burner phones or SIM cars are much
    easier to come by than HTs.

    How, precisely, do you think that cell phones work?

    Voice and modem calls will view the cell phone the same. They will also
    view the PSTN the same way.

    In short, the cell will be a short distance link to the PSTN for a
    longer distance connection.

    HTs won't have the benefit of the PSTN to make a longer distance connection.

    I'm ignoring auto-patches for the time being.

    Then what is this communications network you are proposing to be
    used for?

    To get information into and out of the larger area.

    What are communications in an ARES emergency net for?

    Why not just throw WiFi in the loop and use TCP/IP and call it a
    day?

    If you are in proximity and can do that, then do so.

    PSTN and even AX.25 will probably be able to go further than consumer WiFi.

    Interestingly, these are all protocols that would also support
    IP.

    See above comment about ad-hoc IP networks.

    Furthermore, they're all protocols; something you said above was not
    needed for UUCP because UUCP has its own protocols.

    AX.25, null modem / IrDA, LoRA, and sneaker net form the physical layer
    to connect two systems. -- I acknowledged that a physical connection
    of some sort was needed.

    But that's the central technical challenge _you_ need to solve
    if these hypotheticals you've been throwing around are to
    actually be useful.

    Just about any form of communications can be boiled down to files to be exchanged. Size of files really translates to amount of storage needed
    on the transmitting & receiving systems and duration of transmission.

    But the numbers are changing all the time.

    I had been presuming that a phone number would change no more frequently
    than every three days.

    If you want to use a different line in the sand for discussion, so be
    it. Please suggest such a time.

    Suppose A's number changed at the same time as B's.

    Valid concern.

    Suppose B doesn't have access to an exchange at all. Suppose A isn't
    in the coffee shop with the modem ready to answer when B tries to call. Suppose....

    The intention is that B will re-try the call at a later point in time
    when hopefully A is at $LOCATION and ready to answer.

    These are _all_ problems you _have_ to solve to realize any sort
    of useful communications network.

    You keep focusing on linear paths between stations and
    constructing hypotheticals around that. Once you get over this
    fixation on "paths", and you can start thinking about creating
    other, more robust topologies.

    More robust typologies are far superior. But in my experience, it's
    best to plan for the worst and hope for the best.

    You're taking a statement too literally. Perhaps I should have
    written, "can potentially repeat to...". I naively assumed that
    was clear from context.

    In a discussion about when various systems are online and offline at the
    same time, I think that's a fairly big assumption.

    Perhaps B could repeat A to C /if/ C were online at the same time as A
    and B. But that's a big /if/. It's also extremely pertinent to what
    I've been describing.

    Furthermore, unlike in wired networks, nothing prohibits the
    introduction of a new node (call it "D") that may in range of
    both Z and C.

    I suppose now you will construct some scenario based on
    geography that precludes such a configuration, which would be a
    profound misreading of the point that RF-based networks can be
    mesh-oriented and hence very flexible.

    Geography is very important contributing factor for nodes in a mesh
    network that can communicate with at least three other nodes.

    That's why I mentioned digipeating for coverage initially.

    Digipeating has the dependency of additional nodes being online at the
    same time.

    You mean like a telephone exchange? How would a telephony-based
    approach be any less vulnerable in that sort of scenario?

    Yes, a difficult to reach node would be a sensitive point like a
    telephone exchange.

    As for being hard, well, war is hell man.

    Agreed.

    So why scale a 1000 foot mountain if you can establish communications a different way?

    Sounds like a problem for every other potential comms plan as
    well. This is why military communicators, emergency services,
    and amateur radio operators plan for redundancy in their
    topologies.

    Redundancy is definitely desired.

    But even redundant networks have failures that end up in a non-redundant
    SPOF at some point or another.

    That's incorrect. A digipeater in an AX.25 context is a
    store-and-forward thing; it reads a packet, buffers it, and then
    retransmits it,

    I consider that storage to be buffering and non-persistent.

    Will what you are describing as digipeating work if the destination node
    is offline? Does the digipeater store the packet for longer than the
    few seconds that would be needed to receive, sanity check it, and
    re-transmit it?

    Digipeaters are often used in the same way that repeaters are in
    e.g. FM phone communications; one uses them to boost range, not
    necessarily to create complex network topologies.

    Agreed. But such connections are dependent on at least three systems
    being online at the same time; the source, the digipeater, and the
    destination. (Add additional digipeaters is possible but just compounds
    the dependency.)

    There are also digipeaters already on amateur-radio carrying
    satellites, and the ISS. And yes, they can be used with the
    same cheap HTs I'm describing. So you don't even necessarily
    need to set anything up yourself.

    Okay.

    How many of them are there?

    How busy are they?

    Will using them be faster or more reliable than daisy chaining through a
    few ground stations?

    APRS can already gateway to twitter and SMS.

    What does that have to do with the conversation?

    You're using AX.25 in the example you just used to argue against
    AX.25.

    I believe that you are conflating my use of digitpeating with my use of
    AX.25.

    A would rely on B as a digipeater to be able to reach C.

    AX.25 can be either a point to point connection or the basis for a more
    complex network.

    A would use AX.25 to communicate with B directly to exchange a message.
    At some indeterminate time in the future, B would use some
    communications mechanism to communicate with C to directly exchange a
    message.

    It's somewhat odd that you seem to understand that AX.25 is a store-and-forward protocol, but assert that IP is not.

    To me AX.25 is an unrouted L2 protocol which implies systems actively
    sending & receiving the data at the top of the application stack. IP
    when routed does not have the same implications.

    How is that any different than any other communications
    protocol?

    Store and forward will incrementally move the message along the desired communications path as long as the next segment is serviceable.

    IP and protocols that run on top if it need an end-to-end communications
    path wherein all of the segments are serviceable at the same time.

    Suppose you need to move files between two physically separated systems
    (A and C) and you only have one notebook computer (B) and one Ethernet /
    serial cable which is too short to physically connect A and C. UUCP
    makes it trivial to move the files from A to C. Conversely, traditional
    IP based protocols can't because they can't establish a connection
    between A and C.

    That's vague and unspecific, and "bandwidth" and "latency" are
    obviously a problem if using low-bandwidth dialup connections.

    So why exacerbate such low-bandwidth connections with unneeded complexity?

    Is the point to usefully communicate or surf the web?

    Usefully communicate.

    Surfing the web is a luxury that is way outside of what I'm talking
    about. Though it could be done if one wanted to get creative enough.

    I asked for specifics, but you did not provide them. Vague
    hand-wavey answers just repeating the assertions do not count.

    Addressing an ad-hoc IP network is one thing. Coordinating
    non-conflicting addresses across multiple such ad-hoc networks is a
    larger task which is complicated by churn.

    Any number of MUAs that can be used with UUCP/SMTP support GPG.
    Extant BBS packages supporting FTN just don't. Why go with a
    more complex solution with a simpler one, that fits the
    application domain better anyway, already exists? Just because
    you *can* do a thing doesn't mean that it's a good idea to *do
    that thing*, and "BBSes" in the sense usually inferred when
    discussing FTNs are a poor fit for this sort of thing.

    I thought I had indicated that FTN ~> BBSs were behind us.

    In an emergency situation ... those restrictions basically go out
    the window. Pretty much every licensing authority on the planet is
    agreed on this point: if you're out hiking and grandpa has a stroke,
    you the unlicensed kid can absolutely use that HT to call for help.

    Agreed.

    ... like we are presently seeing in Ukraine ...

    I don't know how a war zone applies to what is and is not allowed.

    I suspect that the "emergency" overrides things. But there is probably
    going to be stringent follow up as to why you put yourself in a
    situation that such an emergency could come up.

    Similarly, if you are resisting a foreign invasion, I think the
    relevant authorities will give you a pass after the fact for
    using crypto on amateur frequencies.

    Hopefully.

    How is that relevant to the above?

    I maintain that a notebook and a raspberry pi could both do the required
    job. The main differences being the physical size, heat, and power consumption. Both are capable of running the requisite hardware and
    software.

    Which is why you probably don't want to base your solution on
    relying on those.

    Agreed.

    You could just do that with a filesystem on the SD card. But
    often in situations like this, the movement of people is
    restricted outside of a geographical area, for precisely this
    sort of thing. Muling SD cards through the digestive track may
    sound all kinds of cool, but isn't really useful if you can't
    get to some place where someone who can consume the data is,
    anyway.

    I don't think it's cool by any sort of imagination. I stop at an
    undesired / unpleasant technical possibility.

    Such communications would only work if there is contact / hand off
    between people at a boundary.

    Similar hard boundaries exist for other communications modes too.

    Let me be clear about what I've been saying in this thread, as
    it appears to have been muddled:

    * IP is a good protocol on which to base a clandestine
    communications network in an occupied or active conflict
    situation.

    It depends.

    * The PSTN, and telephony in general, is not a viable
    alternative to IP networks in this context.

    It depends.

    * BBSes and FTN are poorly suited and best avoided.

    Agreed.

    * UUCP is acceptable, but has limitations related to the
    underlying transport; this transport issue cannot be ignored.

    It depends.

    * Packet radio using e.g. AX.25 or APRS is probably the simplest
    and most robust mechanism for establishing a communications
    channel. Noteably, one can use TCP/IP over AX.25.

    It depends.

    * Unattended, cheap, throw-away digipeaters can be used to
    extend range and coverage.

    I dislike digipeaters that don't participate at a message / packet
    routing level.

    * In this sort of scenario, it is important to focus not so much
    on the technology but on the use cases and environment. The
    details, and getting them right, is critical to effective and
    useful communications.

    Agreed.

    Constructing strawmen to prove a technical point isn't really
    all that interesting to me.

    It is important to understand failure modes of choices and how they
    interact with other choices.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Eric Pozharski on Thu Mar 17 19:51:53 2022
    On 3/17/22 11:11 AM, Eric Pozharski wrote:
    Wanabe Sysop (aka a Point, aka FTN-Compatible Sysop) sends netmail to
    their Boss (aka Sysop) with To set to special AreaFix nick (nicks are arbitrary, routing is concerned with addresses) with a line '%AVAIL'.
    Then waits.

    Meanwhile, AreaFix (at the Boss) sends '%AVAIL' requests to AreaFix'es
    to all its peers. Then waits.

    Okay. It sounds like '%AVAIL' propagates out multiple degrees; 1st
    point to node; 2nd node to nodes.

    How many degrees out does the '%AVAIL' go? Is there a limit? Or is it
    until it floods to all nodes in the FTN in question?

    Eventually, replies from peers are somehow pressed into something
    that roughly may be interpreted as a reply.

    ACK

    Then the Point receives more or less (mostly more) copious list
    of echos.

    If the point receives a reply from each remote node that responds to the '%AVAIL', I can see how that can be a lot of responses.

    Now comes most exciting part. The Point goes through couple of
    thousands of malformed lines.

    I'll believe it.

    And they must be careful what they pick -- there are echos sources from different networks, regions, and zones (potential to cause fatal drama (potentianlly, international); such drama will be fatal to the Point,
    because noone gives a fsck about points), unreachable (physically)
    flea markets, and echos some bosses keep to deal with their points.

    I can see how a point has a potential to cause ... problems by
    requesting something that disrupts the network.

    When desired echos are picked, then list is sent to the AreaFix again.
    Then Point waits.

    ACK

    Now the Areafix sends subscription requests to its peers, and then
    waits.

    ACK

    Then, eventually, a message comes through this creates echo locally
    thus enabling the Point to achieve The Conversion Experience. However, sometimes initiating message never comes (like I can see FTN traffic
    in Usenet, subscription succeeds (I can verify, I'm subscribed),
    and nothing happens).

    Okay.

    If you don't see experience, then I don't know what experience is.

    ;-)

    Something alike is FileEcho's (different robot -- 'FileFix', and
    somewhat different mechanics). However, I hadn't no ability then
    reasons then chance to use it (for many different reasons), thus I
    can't describe it myself.

    Fair enough.

    Well, looking how this thread is developing I'll better abstain.

    It seems to me like AreaFix / FileFix automate the process of what I
    consider to be newsgroup subscription management. What's more is that
    it seems like an off system (point) can initiate an automated change on
    a parent (point's upstream node) and maybe even remotes (parent's peer node(s)).

    I'm not aware of any automated subscription management on news servers / Usenet. In news servers / Usenet, this amounts to an email to the peer
    news master(s) asking them to alter the feed.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From bozo@dev.null@21:1/5 to Grant Taylor on Fri Mar 18 13:04:03 2022
    On 2022-03-05, Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/4/22 5:51 PM, meff wrote:
    How does this affect Usenet?

    It depends.

    Have any prominent providers stopped allowing access from Russian
    IPs or ASNs?

    What do you consider "prominent providers" to be.

    Cogent, a major backbone / connectivity provider is de-peering Russian clients. So there is a good chance that Internet connectivity between
    parts of Russia and other parts of the world will be less reliable if
    not out & out broken (if more providers follow suit).

    Other big names in tech, particularly social media, are blocking Russian clients.

    We are witnessing what may be the first steps of a significant fracture
    of the Internet, and thus in many ways, Usenet. The coming days / weeks
    will show ho significant the fracture will be.




    I2Pd has news servers accesible from any client (Pan, XNews, SLRN).
    It's just a matter of setting up a tunnel and configuring the news
    client to that localhost listening port.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Rich@21:1/5 to Grant Taylor on Fri Mar 18 13:06:57 2022
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/17/22 8:50 AM, Dan Cross wrote:
    That's irrelevant. You are factually incorrect about the
    definition of a store-and-forward protocol.

    Why don't you share the definition that you're using for store-and-forward.

    I'm using the following definition for store-and-forward networking: Something receives a message from a sender, stores it for some (possibly indeterminate) amount of time, and then sends it to the next system in
    the path at some point in the future.

    It appears that you two are talking past one another.

    Dan is conflating store and forward packet switching with store and
    forward networking and believing that both mean the same thing and then
    arguing that IP is a store-and-forward system (without any qualifiers
    to indicate what subset he is referencing).

    While some IP switches/routers can operate in a store-and-forward mode
    (whole IP packet is first received into memory before the header is
    analyzed to determine which link to transmit the IP packet, then the
    packet is transmitted (or dropped) depending upon the header analysis)
    this is not a requirement of IP networking. It is also possible, and
    many very high performance switches/routers do, for the switch/router
    to analyze the headers as they are received off the line, decide where
    to send the packet, and begin transmitting the packet on the outbound
    link while the remainder of it is still being received on the inbound
    link.

    Dan has conflated an invisible (to IP) implementation detail of
    router/switch hardware with a requirement of the protocol itself (as in
    SMTP protocol which explicitly requires that it operate in a store and
    forward networking mode) and is therefore arguing that IP is "store and forward". But IP does not require switches/routers operate in store
    and forward mode. Whether they do, or not, is invisible to, and
    unspecified by, IP.

    And even those routers/switches that /do/ operate in a store and
    forward like mode for IP, they do not 'store' said packet any longer
    than necessary to make their routing decision. If their header
    analysis indicates they do not know where to forward the packet, they
    drop it and move along. This is the critical distinction that Dan
    appears unaware of that differentates packet store and forward systems
    from what the rest of us term store and forward networking (i.e., SMTP
    like store and forward operation).

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From bozo@dev.null@21:1/5 to Scott Dorsey on Fri Mar 18 13:04:03 2022
    On 2022-03-05, Scott Dorsey <kludge@panix.com> wrote:
    Retrograde <fungus@amongus.com.invalid> wrote:

    How do you know Usenet isn't accessible in Russia? Not doubting you,
    just trying to figure out if it's true.

    Usenet is hardly accessible at all anywhere. Used to be every ISP had
    a fast local server, now basically everyone is on a handful of big servers and that kind of defeats the whole purpose.
    --scott

    That newsgroup it's perfectly accesible via I2P/i2Pd by setting
    up a custom config for any NNTP client pointing to a localhost
    proxy config. Setting up an NNTP tunnel on i2pd it's almost cloning
    the IRC one and chaging down the server URL and the
    source/dest ports.

    RetroBBS and friends provide an I2P address on Rslight or
    whatever is called, can't remember it now well, but
    I can tell that Russians won't get isolated.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From bozo@dev.null@21:1/5 to Oregonian Haruspex on Fri Mar 18 13:04:02 2022
    On 2022-03-04, Oregonian Haruspex <no_email@invalid.invalid> wrote:

    Looks like we’re going back to the Kremvax days.


    I2pd it's an interesting alternative to avoid that.

    They have several Russian servers on the IRC proxied
    servers (two), but one of the two it's almost Russian
    language based.

    They have an NNTP server, too. Setting up i2pd is not
    dark magic, I can write a guide if anyone wants.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to email@example.com on Fri Mar 18 14:09:05 2022
    In article <q5OYJ.208079$aT3.84251@fx09.iad>, meff <email@example.com> wrote: >On 2022-03-17, Dan Cross <cross@spitfire.i.gajendra.net> wrote:
    Let me be clear about what I've been saying in this thread, as
    it appears to have been muddled:

    * IP is a good protocol on which to base a clandestine
    communications network in an occupied or active conflict
    situation.
    * The PSTN, and telephony in general, is not a viable
    alternative to IP networks in this context.
    * BBSes and FTN are poorly suited and best avoided.
    * UUCP is acceptable, but has limitations related to the
    underlying transport; this transport issue cannot be ignored.
    * Packet radio using e.g. AX.25 or APRS is probably the simplest
    and most robust mechanism for establishing a communications
    channel. Noteably, one can use TCP/IP over AX.25.
    * Unattended, cheap, throw-away digipeaters can be used to
    extend range and coverage.
    * In this sort of scenario, it is important to focus not so much
    on the technology but on the use cases and environment. The
    details, and getting them right, is critical to effective and
    useful communications.

    Indeed and now that I think about it, offering PPP over a link and
    then sending your message to a mailserver over SMTP/IP is a very
    simple thing to do in the hypothetical situation both of you have been >discussing. That way you can still use your Raspberry Pi or laptop's
    MUA to send mail and then have the MTA deal with the long-term storage
    and forwarding.

    Yup. It's the obvious solution; all of these shenanigans around
    UUCP and Fidonet and the like seem like mostly an academic
    exercise.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Rich on Fri Mar 18 09:52:42 2022
    On 3/18/22 7:06 AM, Rich wrote:
    It appears that you two are talking past one another.

    Ya.... :-/

    Dan is conflating store and forward packet switching with store
    and forward networking and believing that both mean the same thing
    and then arguing that IP is a store-and-forward system (without any qualifiers to indicate what subset he is referencing).

    I've gotten the same impression. But I didn't see any value in digging
    deeper into that. -- In some ways, store-and-forward terminology can
    be applied at different layers. Switches can use store-and-forward via
    a non-persistent buffer (OSI) L2. UUCP & mail servers /are/
    store-and-forward at the application layer (OSI) L7.

    While some IP switches/routers can operate in a store-and-forward mode
    (whole IP packet is first received into memory before the header is
    analyzed to determine which link to transmit the IP packet, then the
    packet is transmitted (or dropped) depending upon the header analysis)

    Agreed.

    this is not a requirement of IP networking. It is also possible, and
    many very high performance switches/routers do, for the switch/router
    to analyze the headers as they are received off the line, decide
    where to send the packet, and begin transmitting the packet on the
    outbound link while the remainder of it is still being received on
    the inbound link.

    I believe this has been referred to as "cut-through" in the past.

    Dan has conflated an invisible (to IP) implementation detail of
    router/switch hardware with a requirement of the protocol itself
    (as in SMTP protocol which explicitly requires that it operate in a
    store and forward networking mode) and is therefore arguing that IP is
    "store and forward". But IP does not require switches/routers operate
    in store and forward mode. Whether they do, or not, is invisible to,
    and unspecified by, IP.

    Agreed.

    And even those routers/switches that /do/ operate in a store and
    forward like mode for IP, they do not 'store' said packet any longer
    than necessary to make their routing decision.

    Hence my comments about the amount of time that they store the packet
    alluding to the fact that they won't store them for O(days) at a time.

    If their header analysis indicates they do not know where to forward
    the packet, they drop it and move along.

    Even if such a switch / router does know where to forward the packet,
    there is no guarantee that the destination system is still online. E.g.
    the MAC address for an IP, be it the target / End System or a next hop
    router / Intermediate System, is still valid in the ARP / neighbor cache
    but is now offline for any reason; shutdown, crash, power fail, someone tripping over the network cable.

    This is the critical distinction that Dan appears unaware of that differentates packet store and forward systems from what the rest
    of us term store and forward networking (i.e., SMTP like store and
    forward operation).

    Agreed.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to gtaylor@tnetconsulting.net on Fri Mar 18 15:21:03 2022
    In article <t10der$k4a$1@tncsrv09.home.tnetconsulting.net>,
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/17/22 8:50 AM, Dan Cross wrote:
    That's irrelevant. You are factually incorrect about the
    definition of a store-and-forward protocol.

    Why don't you share the definition that you're using for store-and-forward.

    I have. Several times.

    I'm using the following definition for store-and-forward networking: >Something receives a message from a sender, stores it for some (possibly >indeterminate) amount of time, and then sends it to the next system in
    the path at some point in the future.

    Sure. But you also seem to be imposing additional requirements
    on top of this, in particular adding some kind of transactional
    persistence layer.

    IP is not connection-oriented.

    Pick any higher transport layer protocol that want and it will still
    fail to establish communications when there is not an end to end path
    for IP to take.

    So what? Continually throughout this thread, you've been
    conflating the transport with the applications running over that
    transport. I have tried to make this distinction clear, but you
    don't seen notice and continue with the confusion. Suffice it
    to say, these things are not synonymous.

    Similarly, you seem to assert that protocols like UUCP are
    immune to the problems you highlight with paths in e.g., IP
    networks, while not acknowledging that the PSTN or similar links
    you seem to be asserting can be used in lieu of an IP network
    suffer from the exact same problems. When this is pointed out,
    you move the goalposts by changing the parameters of the
    problem; this has happened so often it's no longer clear what
    you're arguing for.

    My conclusion is that you don't have a great grasp on the
    fundamental parameters of the problem, and ignore externalities
    that don't support your presuppositions. You seem to be more
    interested in being "right" in some pedantic sense than in
    building an actually useful communications solution. As such,
    I don't see further responses being particularly fruitful.

    I started writing a response to the rest of this post, but it
    was becoming a lot snarkier than I wanted, so I'm not going to
    do that.

    I'll just conclude by saying that I'm a former military
    communicator who actually has some experience communicating in a
    combat environment, including under fire. Most of what you've
    written, frankly, just isn't realistic.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From meff@21:1/5 to bozo@dev.null on Fri Mar 18 18:59:29 2022
    On 2022-03-18, bozo@dev.null <bozo@dev.null> wrote:
    On 2022-03-04, Oregonian Haruspex <no_email@invalid.invalid> wrote:

    Looks like we’re going back to the Kremvax days.


    I2pd it's an interesting alternative to avoid that.

    They have several Russian servers on the IRC proxied
    servers (two), but one of the two it's almost Russian
    language based.

    They have an NNTP server, too. Setting up i2pd is not
    dark magic, I can write a guide if anyone wants.

    I'm curious if you have thoughts on why I2P instead of Tor, or
    vice-versa (or neither). Just safer to not have to deal with the
    concept of an exit node?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Scott Dorsey@21:1/5 to gtaylor@tnetconsulting.net on Mon Mar 21 02:05:46 2022
    Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/12/22 8:47 AM, Dan Cross wrote:
    Sadly, that doesn't make it any less true.

    Please elaborate on why the Internet is required when a group of people
    make dial up connections to each other using FTN and / or UUCP.

    Because much of the FTN and pretty much all of UUCP is now carried over IP.
    IP connectivity is so cheap and ubiquitous that if you are picking up the
    phone and making a long distance call, it's likely being carried over a VoIP circuit. If you are using an ATM with an X.25 connection to a host bank...
    it is almost certainly X.25 tunnelled over IP on the public internet.

    You can order a contact closure "telegraph" circuit from the telco here...
    but secretly under the hood it's IP.

    All of that legacy physical infrastructure is long gone. It looks like it's there from up top because the functionality remains, but when you look under the hood you will find that functionality is provided by IP now.
    --scott
    --
    "C'est un Nagra. C'est suisse, et tres, tres precis."

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Scott Dorsey@21:1/5 to invalid@invalid.invalid on Mon Mar 21 02:10:50 2022
    Javier <invalid@invalid.invalid> wrote:

    UUCPNET in the 80s was a cooperative network of universities and
    companies and all admins on it were well behaved and cooperated.
    Everything was unencrypted, and yet nobody was spoofing emails,
    nor doing crapflooding. I guess that the reasons for cooperation were

    a) the zeitgeist of the 80s encouraged technological cooperation.
    b) everybody's identity was public and most of them were academics
    who valued their prestige.
    c) barriers of entry (in terms of economical cost and the requirement
    of technical knowledge of hardware and software).

    People were spoofing emails and crapflooding (at least I was). The thing
    is, though, that the people who ran the infrastructure were few, and they
    took their job of policing it seriously. If someone posted something that
    was problematic, you could get on the phone to the poor admin at Penn State
    and let him know what was going on and he would take care of it.

    I think it was 1993 when I called up an admin about an abusive user and I
    was told that there was nothing they could do about it. That's when it was clear to me that things were changing. For the life of me I can't remember
    the name of that ISP though.
    --scott

    --
    "C'est un Nagra. C'est suisse, et tres, tres precis."

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Scott Dorsey@21:1/5 to rich@example.invalid on Mon Mar 21 02:15:17 2022
    In article <t1205g$qhs$1@dont-email.me>, Rich <rich@example.invalid> wrote:

    Dan is conflating store and forward packet switching with store and
    forward networking and believing that both mean the same thing and then >arguing that IP is a store-and-forward system (without any qualifiers
    to indicate what subset he is referencing).

    This is likely because that terminology was used in some of the original
    RFCs for TCP/IP.
    --scott

    --
    "C'est un Nagra. C'est suisse, et tres, tres precis."

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Scott Dorsey@21:1/5 to email@example.com on Mon Mar 21 02:07:05 2022
    In article <BwVXJ.184493$SeK9.24445@fx97.iad>, meff <email@example.com> wrote:

    I was too young during the BBS days to use a BBS, but I generally hold
    the opinion that those who are ignorant of history are doomed to
    repeat it. I think documenting FTN would be a good exercise if
    anything to help ambitious folks not recreate some of its foibiles in
    modern IP networks.

    Few things are as well documented as the FTN. There are miles upon miles
    of Bell operating manuals.
    --scott
    --
    "C'est un Nagra. C'est suisse, et tres, tres precis."

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From bozo@dev.null@21:1/5 to meff on Mon Mar 21 02:36:04 2022
    On 2022-03-18, meff <email@example.com> wrote:
    On 2022-03-18, bozo@dev.null <bozo@dev.null> wrote:
    On 2022-03-04, Oregonian Haruspex <no_email@invalid.invalid> wrote:

    Looks like we’re going back to the Kremvax days.


    I2pd it's an interesting alternative to avoid that.

    They have several Russian servers on the IRC proxied
    servers (two), but one of the two it's almost Russian
    language based.

    They have an NNTP server, too. Setting up i2pd is not
    dark magic, I can write a guide if anyone wants.

    I'm curious if you have thoughts on why I2P instead of Tor, or
    vice-versa (or neither). Just safer to not have to deal with the
    concept of an exit node?

    That and instant yggdrasil suppport.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From meff@21:1/5 to Scott Dorsey on Mon Mar 21 08:41:57 2022
    On 2022-03-21, Scott Dorsey <kludge@panix.com> wrote:
    Few things are as well documented as the FTN. There are miles upon miles
    of Bell operating manuals.
    --scott

    Bell Operating Manuals?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Eric Pozharski@21:1/5 to Grant Taylor on Mon Mar 21 08:28:15 2022
    with <t10oiv$rln$1@tncsrv09.home.tnetconsulting.net> Grant Taylor wrote:
    On 3/17/22 11:11 AM, Eric Pozharski wrote:

    Wanabe Sysop (aka a Point, aka FTN-Compatible Sysop) sends netmail to
    their Boss (aka Sysop) with To set to special AreaFix nick (nicks are
    arbitrary, routing is concerned with addresses) with a line '%AVAIL'.
    Then waits.
    Meanwhile, AreaFix (at the Boss) sends '%AVAIL' requests to
    AreaFix'es to all its peers. Then waits.
    Okay. It sounds like '%AVAIL' propagates out multiple degrees; 1st
    point to node; 2nd node to nodes.
    How many degrees out does the '%AVAIL' go? Is there a limit? Or is
    it until it floods to all nodes in the FTN in question?

    I think no more then one step further -- to NC ('Network Coordinator')
    and Hubs (these bear so called "backbone" echos). Also note, FTN is so
    robust that private echos of Hubs and NCs slip onto backbone by pure
    chance (and are kept there even when those nodes are long gone).

    *SKIP*
    And they must be careful what they pick -- there are echos sources
    from different networks, regions, and zones (potential to cause fatal
    drama (potentianlly, international); such drama will be fatal to the
    Point, because noone gives a fsck about points), unreachable
    (physically) flea markets, and echos some bosses keep to deal with
    their points.
    I can see how a point has a potential to cause ... problems by
    requesting something that disrupts the network.

    Your interpretation is wrong.

    *SKIP*
    Well, looking how this thread is developing I'll better abstain.
    It seems to me like AreaFix / FileFix automate the process of what I
    consider to be newsgroup subscription management. What's more is that
    it seems like an off system (point) can initiate an automated change
    on a parent (point's upstream node) and maybe even remotes (parent's
    peer node(s)).
    I'm not aware of any automated subscription management on news servers
    / Usenet. In news servers / Usenet, this amounts to an email to the
    peer news master(s) asking them to alter the feed.

    "Lipstick on a pig" would be fairer description.

    --
    Torvalds' goal for Linux is very simple: World Domination
    Stallman's goal for GNU is even simpler: Freedom

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to rich@example.invalid on Mon Mar 21 12:30:36 2022
    In article <t1205g$qhs$1@dont-email.me>, Rich <rich@example.invalid> wrote: >Grant Taylor <gtaylor@tnetconsulting.net> wrote:
    On 3/17/22 8:50 AM, Dan Cross wrote:
    That's irrelevant. You are factually incorrect about the
    definition of a store-and-forward protocol.

    Why don't you share the definition that you're using for store-and-forward. >>
    I'm using the following definition for store-and-forward networking:
    Something receives a message from a sender, stores it for some (possibly
    indeterminate) amount of time, and then sends it to the next system in
    the path at some point in the future.

    It appears that you two are talking past one another.

    Dan is conflating store and forward packet switching with store and
    forward networking and believing that both mean the same thing and then >arguing that IP is a store-and-forward system (without any qualifiers
    to indicate what subset he is referencing).

    I'll ask you to please not put words in my mouth. This
    conversation had context that this sort of simplistic reading
    ignores.

    Grant asserted that IP was _not_ (meaning, _could not be_ a
    packet switched protocol because routers tend not to have a
    "persistence" layer. Moreover, he insisted, and continues to
    insist, that in order to successfully transmit IP datagrams from
    one node to another along some path in a network, all links
    along the path _must_ be up simultaneously; that is empirically
    not true.

    My initial comment about IP and store-and-forward was in
    response to this comment:

    >IP is not a store and forward networking protocol. There is no
    >persistent storage for IP. Buffers, which /may/ be used for a very
    >short period of time are transient at best.

    Persistent storage is NOT a requirement for a store-and-forward
    protocol. This is universally accepted. IP was designed for
    packet-switched networks, as it states clearly at the top of RFC
    791, and which at the time, predominantly used store-and-forward
    techniques.

    Consider this historical documentary, describing the ARPANET,
    and in particular Bob Khan describing using "store-and-forward"
    techniques when describing the network topology (at around the
    4:10 minute mark):

    https://www.youtube.com/watch?v=7tG7LZgOb-U

    Before someone says, "that was the ARPANET, not IP" note that
    TCP/IP was designed to implement the ARPANET reference model.

    See also things like "TCP/IP Illustrated: Volume 1" by Fall
    and Stevens, 2nd edition, page 4:

    "When packets are received at a packet switch, they
    are ordinarily stored in _buffer memory_ or _queue_..."

    Thus, store and forward. Similarly, consider this article,
    from Nichols and Jacobson:
    https://queue.acm.org/detail.cfm?id=2209336

    Note this line from the second section, "Attacking Bufferbloat":

    "Packet networks require buffers to absorb short-term
    arrival rate fluctuations."

    Note that I never suggested that there were not alternatives;
    things like AQM could imply different techniques, like
    cut-through switching, or using TDMA techniques (https://cseweb.ucsd.edu//~snoeren/papers/opera-nsdi20.pdf),
    or even cutting packet techniques (https://www.usenix.org/system/files/conference/nsdi14/nsdi14-paper-cheng.pdf).

    Indeed, this is an active area of research in the HPC and
    optical networking communities. But now we're really muddying
    the waters between theory and pratice.

    Whether IP is _using_ store-and-forward techniques or not
    becomes a very difficult question to answer in some sense once
    AQM and the like is on the table. However, it was undisputably
    designed for packet-switched, store-and-forward networks. To
    assert otherwise is laughably inaccurate.

    While some IP switches/routers can operate in a store-and-forward mode
    (whole IP packet is first received into memory before the header is
    analyzed to determine which link to transmit the IP packet, then the
    packet is transmitted (or dropped) depending upon the header analysis)
    this is not a requirement of IP networking.

    That is a fair statement, but ignores congestion.

    It is also possible, and
    many very high performance switches/routers do, for the switch/router
    to analyze the headers as they are received off the line, decide where
    to send the packet, and begin transmitting the packet on the outbound
    link while the remainder of it is still being received on the inbound
    link.

    You're referring to cut switching, which is very common at layer
    two, but this ignores some details: often a router will
    encounter contention and must buffer. The alternative is to
    drop the datagram on the floor, which is often also acceptable.

    This gets muddled very quickly. But this also elides context:
    we're talking about communications in a conflict environment.
    Those high-end switched and routers are unlikely to be used.

    Dan has conflated an invisible (to IP) implementation detail of
    router/switch hardware with a requirement of the protocol itself (as in
    SMTP protocol which explicitly requires that it operate in a store and >forward networking mode) and is therefore arguing that IP is "store and >forward". But IP does not require switches/routers operate in store
    and forward mode. Whether they do, or not, is invisible to, and
    unspecified by, IP.

    Again, please don't put words in my mouth. This is ignoring all
    context in the discussion, and in particular, is devoid of the
    context of the inaccuracies I was commenting on.

    And even those routers/switches that /do/ operate in a store and
    forward like mode for IP, they do not 'store' said packet any longer
    than necessary to make their routing decision. If their header
    analysis indicates they do not know where to forward the packet, they
    drop it and move along. This is the critical distinction that Dan
    appears unaware of that differentates packet store and forward systems
    from what the rest of us term store and forward networking (i.e., SMTP
    like store and forward operation).

    I think you are also taking a very narrow view of what "store
    and forward" means, and trying to retroactively apply that
    universally.

    I suppose none of you have ever seen a bounced message after
    sending email via SMTP? Or have you never seen cut-through
    switching used for SMTP?

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Scott Dorsey@21:1/5 to email@example.com on Mon Mar 21 13:56:48 2022
    In article <pTWZJ.305583$aT3.27985@fx09.iad>, meff <email@example.com> wrote: >On 2022-03-21, Scott Dorsey <kludge@panix.com> wrote:
    Few things are as well documented as the FTN. There are miles upon miles
    of Bell operating manuals.

    Bell Operating Manuals?

    Yes, and rooms and rooms full of Bell System Practices manuals.
    --scott
    --
    "C'est un Nagra. C'est suisse, et tres, tres precis."

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Scott Dorsey on Mon Mar 21 14:46:26 2022
    On 3/20/22 8:05 PM, Scott Dorsey wrote:
    Because much of the FTN and pretty much all of UUCP is now carried over IP.

    IP != Internet

    All of that legacy physical infrastructure is long gone. It looks like it's there from up top because the functionality remains, but when you look under the hood you will find that functionality is provided by IP now.

    I'll agree that many things are carried over IP now. But I strongly
    question the veracity of the public Internet being used for things
    inside of private enterprise networks.



    --
    Grant. . . .
    unix || die

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From meff@21:1/5 to Scott Dorsey on Mon Mar 21 21:13:15 2022
    On 2022-03-21, Scott Dorsey <kludge@panix.com> wrote:
    Bell Operating Manuals?

    Yes, and rooms and rooms full of Bell System Practices manuals.
    --scott

    Are they available on the net anywhere?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Scott Dorsey@21:1/5 to email@example.com on Mon Mar 21 22:13:56 2022
    In article <t1appb$cui$2@dont-email.me>, meff <email@example.com> wrote:
    On 2022-03-21, Scott Dorsey <kludge@panix.com> wrote:
    Bell Operating Manuals?

    Yes, and rooms and rooms full of Bell System Practices manuals.

    Are they available on the net anywhere?

    I have no idea. The Phone Cops used to come after anyone who had copies
    of the SS7 manuals, way back when. These days I doubt anyone cares.

    It's a lot of stuff to scan, though. I think the Telephone Museum in
    Seattle has paper copies complete up to at least 1980 or so.
    --scott
    --
    "C'est un Nagra. C'est suisse, et tres, tres precis."

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Burns@21:1/5 to meff on Tue Mar 22 08:43:39 2022
    meff wrote:

    Scott Dorsey wrote:

    Bell Operating Manuals?

    Yes, and rooms and rooms full of Bell System Practices manuals.

    Are they available on the net anywhere?

    Some are ...

    <https://google.com/search?q=Bell+System+Practices>

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)